You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
/// <param name="alwaysAddTrailingSlashToBasePath">Should a trailing slash be added to the base path. See AlwaysAddTrailingSlashToBasePath property for details </param>
28
+
/// <param name="insecureConnection">(Dangerous!) Ignore certificate validation. This implies self-signed certificates are accepted.</param>
29
+
/// <param name="serverCertificateCustomValidationCallback">An optional action to post-process the HttpClientHandler. Used to manually validate the server certificate. Ignored if AcceptInsecureConnection is true.</param>
/// <param name="alwaysAddTrailingSlashToBasePath">Should a trailing slash be added to the base path. See AlwaysAddTrailingSlashToBasePath property for details </param>
69
+
/// <param name="insecureConnection">(Dangerous!) Ignore certificate validation. This implies self-signed certificates are accepted.</param>
70
+
/// <param name="serverCertificateCustomValidationCallback">An optional action to post-process the HttpClientHandler. Used to manually validate the server certificate. Ignored if AcceptInsecureConnection is true.</param>
/// Gets a value indicating whether the Vault key should be ommited when generation Configuration key names.
118
133
/// </summary>
119
-
publicboolOmitVaultKeyName{get;}
134
+
publicboolOmitVaultKeyName{get;}
120
135
121
136
/// <summary>
122
137
/// Gets an array of characters that will be used as a path to form the Configuration.
@@ -134,5 +149,19 @@ public VaultOptions(
134
149
/// It is true by default. Set to false if you don't have permissions to list keys in the base path.
135
150
/// </summary>
136
151
publicboolAlwaysAddTrailingSlashToBasePath{get;}
152
+
153
+
/// <summary>
154
+
/// Indicates whether we should disregard the certificate validation (for examples, servers behind Internet aren't likely to have a strong certs but we can't afford to use HTTP either)
155
+
/// Previously, the certificate behavior can be set globally, but subsequently removed in .NET Core and onwards due to security reasons.
156
+
/// We need to set the behavior to each HttpClient on a case-by-case basis. As such, this option is provided as a resolution.
157
+
/// If it is true, a custom PostProcessHttpClientHandlerAction will be injected to the VaultClientSettings to accept any server certificate.
158
+
/// Default value: false. Hashicorp also recommend using a proper CA to setup Vault access due to security concerns.
159
+
/// </summary>
160
+
publicboolAcceptInsecureConnection{get;}
161
+
162
+
/// <summary>
163
+
/// An optional action to post-process the HttpClientHandler. Used to manually validate the server certificate. Ignored if AcceptInsecureConnection is true.
0 commit comments