You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: source/_components/http.markdown
+60-15Lines changed: 60 additions & 15 deletions
Original file line number
Diff line number
Diff line change
@@ -27,21 +27,66 @@ http:
27
27
api_password: YOUR_PASSWORD
28
28
```
29
29
30
-
Configuration variables:
31
-
32
-
- **api_password** (*Optional*): Protect Home Assistant with a password.
33
-
- **server_host** (*Optional*): Only listen to incoming requests on specific IP/host (default: bind to `0.0.0.0` which means accept all IPv4 connections). Use `server_host: "::0"` if you want to listen to (and only) IPv6.
34
-
- **server_port** (*Optional*): Let you set a port to use. Defaults to 8123.
35
-
- **base_url** (*Optional*): The URL that Home Assistant is available on the internet. For example: `hass-example.duckdns.org:8123`. Defaults to the local IP address. The iOS app finds local installations, if you have an outside URL use this so that you can auto-fill when discovered in the app.
36
-
- **ssl_certificate** (*Optional*): Path to your TLS/SSL certificate to serve Home Assistant over a secure connection.
37
-
- **ssl_peer_certificate** (*Optional*): Path to the client/peer TLS/SSL certificate to accept secure connections from.
38
-
- **ssl_key** (*Optional*): Path to your TLS/SSL key to serve Home Assistant over a secure connection.
39
-
- **cors_allowed_origins** (*Optional*): A list of origin domain names to allow [CORS](https://en.wikipedia.org/wiki/Cross-origin_resource_sharing) requests from. Enabling this will set the `Access-Control-Allow-Origin` header to the Origin header if it is found in the list, and the `Access-Control-Allow-Headers` header to `Origin, Accept, X-Requested-With, Content-type, X-HA-access`. You must provide the exact Origin, i.e. `https://www.home-assistant.io` will allow requests from `https://www.home-assistant.io` but __not__ `http://www.home-assistant.io`.
40
-
- **use_x_forwarded_for** (*Optional*): Enable parsing of the `X-Forwarded-For` header, passing on the client's correct IP address in proxied setups. You must also whitelist trusted proxies using the `trusted_proxies` setting below for this to work. Non-whitelisted requests with this header will be considered IP spoofing attacks, and the header will, therefore, be ignored. Defaults to False.
41
-
- **trusted_proxies** (*Optional*): List of trusted proxies, consisting of IP addresses or networks, that are allowed to set the `X-Forwarded-For` header. This is required when using `use_x_forwarded_for` because all requests to Home Assistant, regardless of source, will arrive from the reverse proxy IP address. Therefore in a reverse proxy scenario, this option should be set with extreme care.
42
-
- **trusted_networks** (*Optional*): List of trusted networks, consisting of IP addresses or networks, that are allowed to bypass password protection when accessing Home Assistant. If using a reverse proxy with the `use_x_forwarded_for` option enabled, requests proxied to Home Assistant with a trusted `X-Forwarded-For` header will appear to come from the IP given in that header instead of the proxy IP.
43
-
- **ip_ban_enabled** (*Optional*): Flag indicating whether additional IP filtering is enabled. Defaults to False.
44
-
- **login_attempts_threshold** (*Optional*): Number of failed login attempt from single IP after which it will be automatically banned if `ip_ban_enabled` is True. Defaults to -1, meaning that no new automatic bans will be added.
30
+
{% configuration %}
31
+
api_password:
32
+
description: Protect Home Assistant with a password.
33
+
required: false
34
+
type: string
35
+
server_host:
36
+
description: "Only listen to incoming requests on specific IP/host. By default it will accept all IPv4 connections. Use `::0` if you want to listen to (and only) IPv6."
37
+
required: false
38
+
type: string
39
+
default: 0.0.0.0
40
+
server_port:
41
+
description: Let you set a port to use.
42
+
required: false
43
+
type: int
44
+
default: 8123
45
+
base_url:
46
+
description: "The URL that Home Assistant is available on the internet. For example: `hass-example.duckdns.org:8123`. The iOS app finds local installations, if you have an outside URL use this so that you can auto-fill when discovered in the app."
47
+
required: false
48
+
type: string
49
+
default: *the local IP address*
50
+
ssl_certificate:
51
+
description: Path to your TLS/SSL certificate to serve Home Assistant over a secure connection.
52
+
required: false
53
+
type: string
54
+
ssl_peer_certificate:
55
+
description: Path to the client/peer TLS/SSL certificate to accept secure connections from.
56
+
required: false
57
+
type: string
58
+
ssl_key:
59
+
description: Path to your TLS/SSL key to serve Home Assistant over a secure connection.
60
+
required: false
61
+
type: string
62
+
cors_allowed_origins:
63
+
description: "A list of origin domain names to allow [CORS](https://en.wikipedia.org/wiki/Cross-origin_resource_sharing) requests from. Enabling this will set the `Access-Control-Allow-Origin` header to the Origin header if it is found in the list, and the `Access-Control-Allow-Headers` header to `Origin, Accept, X-Requested-With, Content-type, X-HA-access`. You must provide the exact Origin, i.e. `https://www.home-assistant.io` will allow requests from `https://www.home-assistant.io` but __not__ `http://www.home-assistant.io`."
64
+
required: false
65
+
type: list
66
+
use_x_forwarded_for:
67
+
description: "Enable parsing of the `X-Forwarded-For` header, passing on the client's correct IP address in proxied setups. You must also whitelist trusted proxies using the `trusted_proxies` setting below for this to work. Non-whitelisted requests with this header will be considered IP spoofing attacks, and the header will, therefore, be ignored."
68
+
required: false
69
+
type: boolean
70
+
default: False
71
+
trusted_proxies:
72
+
description: "List of trusted proxies, consisting of IP addresses or networks, that are allowed to set the `X-Forwarded-For` header. This is required when using `use_x_forwarded_for` because all requests to Home Assistant, regardless of source, will arrive from the reverse proxy IP address. Therefore in a reverse proxy scenario, this option should be set with extreme care."
73
+
required: false
74
+
type: list
75
+
trusted_networks:
76
+
description: "List of trusted networks, consisting of IP addresses or networks, that are allowed to bypass password protection when accessing Home Assistant. If using a reverse proxy with the `use_x_forwarded_for` option enabled, requests proxied to Home Assistant with a trusted `X-Forwarded-For` header will appear to come from the IP given in that header instead of the proxy IP."
77
+
required: false
78
+
type: list
79
+
ip_ban_enabled:
80
+
description: Flag indicating whether additional IP filtering is enabled.
81
+
required: false
82
+
type: boolean
83
+
default: False
84
+
login_attempts_threshold:
85
+
description: "Number of failed login attempt from single IP after which it will be automatically banned if `ip_ban_enabled` is True. By default it will not add new automatic bans."
86
+
required: false
87
+
type: int
88
+
default: -1
89
+
{% endconfiguration %}
45
90
46
91
The sample below shows a configuration entry with possible values:
0 commit comments