Skip to content

Commit ef34f8c

Browse files
authored
Update Configuration Variables section
1 parent 49f69a3 commit ef34f8c

File tree

1 file changed

+60
-15
lines changed

1 file changed

+60
-15
lines changed

source/_components/http.markdown

Lines changed: 60 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -27,21 +27,66 @@ http:
2727
api_password: YOUR_PASSWORD
2828
```
2929
30-
Configuration variables:
31-
32-
- **api_password** (*Optional*): Protect Home Assistant with a password.
33-
- **server_host** (*Optional*): Only listen to incoming requests on specific IP/host (default: bind to `0.0.0.0` which means accept all IPv4 connections). Use `server_host: "::0"` if you want to listen to (and only) IPv6.
34-
- **server_port** (*Optional*): Let you set a port to use. Defaults to 8123.
35-
- **base_url** (*Optional*): The URL that Home Assistant is available on the internet. For example: `hass-example.duckdns.org:8123`. Defaults to the local IP address. The iOS app finds local installations, if you have an outside URL use this so that you can auto-fill when discovered in the app.
36-
- **ssl_certificate** (*Optional*): Path to your TLS/SSL certificate to serve Home Assistant over a secure connection.
37-
- **ssl_peer_certificate** (*Optional*): Path to the client/peer TLS/SSL certificate to accept secure connections from.
38-
- **ssl_key** (*Optional*): Path to your TLS/SSL key to serve Home Assistant over a secure connection.
39-
- **cors_allowed_origins** (*Optional*): A list of origin domain names to allow [CORS](https://en.wikipedia.org/wiki/Cross-origin_resource_sharing) requests from. Enabling this will set the `Access-Control-Allow-Origin` header to the Origin header if it is found in the list, and the `Access-Control-Allow-Headers` header to `Origin, Accept, X-Requested-With, Content-type, X-HA-access`. You must provide the exact Origin, i.e. `https://www.home-assistant.io` will allow requests from `https://www.home-assistant.io` but __not__ `http://www.home-assistant.io`.
40-
- **use_x_forwarded_for** (*Optional*): Enable parsing of the `X-Forwarded-For` header, passing on the client's correct IP address in proxied setups. You must also whitelist trusted proxies using the `trusted_proxies` setting below for this to work. Non-whitelisted requests with this header will be considered IP spoofing attacks, and the header will, therefore, be ignored. Defaults to False.
41-
- **trusted_proxies** (*Optional*): List of trusted proxies, consisting of IP addresses or networks, that are allowed to set the `X-Forwarded-For` header. This is required when using `use_x_forwarded_for` because all requests to Home Assistant, regardless of source, will arrive from the reverse proxy IP address. Therefore in a reverse proxy scenario, this option should be set with extreme care.
42-
- **trusted_networks** (*Optional*): List of trusted networks, consisting of IP addresses or networks, that are allowed to bypass password protection when accessing Home Assistant. If using a reverse proxy with the `use_x_forwarded_for` option enabled, requests proxied to Home Assistant with a trusted `X-Forwarded-For` header will appear to come from the IP given in that header instead of the proxy IP.
43-
- **ip_ban_enabled** (*Optional*): Flag indicating whether additional IP filtering is enabled. Defaults to False.
44-
- **login_attempts_threshold** (*Optional*): Number of failed login attempt from single IP after which it will be automatically banned if `ip_ban_enabled` is True. Defaults to -1, meaning that no new automatic bans will be added.
30+
{% configuration %}
31+
api_password:
32+
description: Protect Home Assistant with a password.
33+
required: false
34+
type: string
35+
server_host:
36+
description: "Only listen to incoming requests on specific IP/host. By default it will accept all IPv4 connections. Use `::0` if you want to listen to (and only) IPv6."
37+
required: false
38+
type: string
39+
default: 0.0.0.0
40+
server_port:
41+
description: Let you set a port to use.
42+
required: false
43+
type: int
44+
default: 8123
45+
base_url:
46+
description: "The URL that Home Assistant is available on the internet. For example: `hass-example.duckdns.org:8123`. The iOS app finds local installations, if you have an outside URL use this so that you can auto-fill when discovered in the app."
47+
required: false
48+
type: string
49+
default: *the local IP address*
50+
ssl_certificate:
51+
description: Path to your TLS/SSL certificate to serve Home Assistant over a secure connection.
52+
required: false
53+
type: string
54+
ssl_peer_certificate:
55+
description: Path to the client/peer TLS/SSL certificate to accept secure connections from.
56+
required: false
57+
type: string
58+
ssl_key:
59+
description: Path to your TLS/SSL key to serve Home Assistant over a secure connection.
60+
required: false
61+
type: string
62+
cors_allowed_origins:
63+
description: "A list of origin domain names to allow [CORS](https://en.wikipedia.org/wiki/Cross-origin_resource_sharing) requests from. Enabling this will set the `Access-Control-Allow-Origin` header to the Origin header if it is found in the list, and the `Access-Control-Allow-Headers` header to `Origin, Accept, X-Requested-With, Content-type, X-HA-access`. You must provide the exact Origin, i.e. `https://www.home-assistant.io` will allow requests from `https://www.home-assistant.io` but __not__ `http://www.home-assistant.io`."
64+
required: false
65+
type: list
66+
use_x_forwarded_for:
67+
description: "Enable parsing of the `X-Forwarded-For` header, passing on the client's correct IP address in proxied setups. You must also whitelist trusted proxies using the `trusted_proxies` setting below for this to work. Non-whitelisted requests with this header will be considered IP spoofing attacks, and the header will, therefore, be ignored."
68+
required: false
69+
type: boolean
70+
default: False
71+
trusted_proxies:
72+
description: "List of trusted proxies, consisting of IP addresses or networks, that are allowed to set the `X-Forwarded-For` header. This is required when using `use_x_forwarded_for` because all requests to Home Assistant, regardless of source, will arrive from the reverse proxy IP address. Therefore in a reverse proxy scenario, this option should be set with extreme care."
73+
required: false
74+
type: list
75+
trusted_networks:
76+
description: "List of trusted networks, consisting of IP addresses or networks, that are allowed to bypass password protection when accessing Home Assistant. If using a reverse proxy with the `use_x_forwarded_for` option enabled, requests proxied to Home Assistant with a trusted `X-Forwarded-For` header will appear to come from the IP given in that header instead of the proxy IP."
77+
required: false
78+
type: list
79+
ip_ban_enabled:
80+
description: Flag indicating whether additional IP filtering is enabled.
81+
required: false
82+
type: boolean
83+
default: False
84+
login_attempts_threshold:
85+
description: "Number of failed login attempt from single IP after which it will be automatically banned if `ip_ban_enabled` is True. By default it will not add new automatic bans."
86+
required: false
87+
type: int
88+
default: -1
89+
{% endconfiguration %}
4590

4691
The sample below shows a configuration entry with possible values:
4792

0 commit comments

Comments
 (0)