Skip to content

Commit 8f1095f

Browse files
authored
Move infrastructure cookbooks to docs (home-assistant#2331)
* Move apache configuration to docs * Add redirect * Move certificate cookbooks to docs * Add redirect * Move tor configuration to docs * Fix extension * Update headings and add redirect * Move file to docs * Add redirect and remove whitespaces * Add new sections
1 parent 82c9798 commit 8f1095f

File tree

6 files changed

+43
-25
lines changed

6 files changed

+43
-25
lines changed

source/_cookbook/apache_configuration.markdown renamed to source/_docs/ecosystem/apache.markdown

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
layout: page
3-
title: "Apache Configuration"
3+
title: "Apache Proxy"
44
description: "Configure Apache to work with Home Assistant as a subdomain"
55
date: 2016-06-20 13:05
66
sidebar: true
77
comments: false
88
sharing: true
99
footer: true
10-
ha_category: Infrastructure
10+
redirect_from: /cookbook/apache_configuration/
1111
---
1212

1313
This example demonstrates how you can configure Apache to act as a proxy for Home Assistant.

source/_cookbook/githubbackup.markdown renamed to source/_docs/ecosystem/backup/backup_github.markdown

+4-4
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar: true
77
comments: false
88
sharing: true
99
footer: true
10-
ha_category: Infrastructure
10+
redirect_from: /cookbook/githubbackup/
1111
---
1212

1313
Backing up and regularly syncing your Home Assistant configuration to [GitHub](http://GitHub.com) has several benefits:
@@ -149,7 +149,7 @@ Every time you run this script, you will be prompted for a comment to describe t
149149

150150
[Travis CI](https://travis-ci.org) is a continuous integration testing system that runs every time the code in your repository is updated and allows you to validate that your code works on a fresh install.
151151

152-
- [Authorise Travis CI](https://travis-ci.org/auth) to have access to your github repos.
152+
- [Authorise Travis CI](https://travis-ci.org/auth) to have access to your github repos.
153153
- Create the build script that travis will run to test your repo.
154154
- Create a dummy secrets.yaml for Travis.
155155

@@ -159,7 +159,7 @@ language: python
159159
python:
160160
- "3.4"
161161
before_install:
162-
- mv travis_secrets.yaml secrets.yaml
162+
- mv travis_secrets.yaml secrets.yaml
163163
install:
164164
- pip3 install homeassistant
165165
script:
@@ -188,7 +188,7 @@ $ git status
188188
Examples:
189189

190190
```bash
191-
homeassistant@raspberrypi:~/.homeassistant $ git ls-files
191+
homeassistant@raspberrypi:~/.homeassistant $ git ls-files
192192
.gitignore
193193
README.md
194194
automation.yaml

source/_cookbook/tls_domain_certificate.markdown renamed to source/_docs/ecosystem/certificates/tls_domain_certificate.markdown

+10-3
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,19 @@ sidebar: true
77
comments: false
88
sharing: true
99
footer: true
10-
ha_category: Infrastructure
10+
redirect_from: /cookbook/tls_domain_certificate/
1111
---
1212

1313
If your Home Assistant instance is only accessible from your local network you can still protect the communication between your browsers and the frontend with SSL/TLS. You can use [Self-sign certificate](/cookbook/tls_self_signed_certificate/) but your browser will present a warning and some https-only features might not work.
1414

1515
### {% linkable_title Prerequirement for this guide %}
16+
1617
* Your Home Assistant instance is not exposed to the internet. If it is - use [this guide]({{site_root}}/blog/2015/12/13/setup-encryption-using-lets-encrypt/)
1718
* You control a public domain name. The domain doesn't have to point to a site. A domain controlled by a *trusted* friend will do. (A friend you trust not to MITM you)
1819
* Your home router supports custom DNS entries.
1920

2021
### {% linkable_title Run certbot %}
22+
2123
```bash
2224
$ mkdir certbot
2325
$ cd certbot
@@ -44,22 +46,27 @@ Press Enter to Continue
4446
```
4547

4648
* Deploy the value to TXT field using your domain registar.
47-
4849
* Go to a site that queries domain record. For example [this one](https://mxtoolbox.com/TXTLookup.aspx) and look if it sees your brand new TXT field (Don't forget to enter the full domain: `_acme-challenge.mydomain.com`)
4950
* Press Enter at certbot prompt.
5051

5152
### {% linkable_title Make mydomain.com point to your Home Assistant instance %}
53+
5254
If your router uses DNSMasq (for example DDWRT) add the following line to DNSMasq options:
53-
```
55+
56+
```text
5457
address=/mydomain.com/<hass ip>
5558
```
5659

5760
### {% linkable_title Edit your Home Assistant configuration to use your certificates %}
61+
62+
The [`http`](/components/http/) section must contain the full path to the needed files.
63+
5864
```yaml
5965
http:
6066
api_password: YOUR_SECRET_PASSWORD
6167
base_url: https://mydomain.com:8123
6268
ssl_certificate: /etc/letsencrypt/live/mydomain.com/fullchain.pem
6369
ssl_key: /etc/letsencrypt/live/mydomain.com/privkey.pem
6470
```
71+
6572
Make sure the files are accessible by the user that runs Home Assistant, eg. `homeassistant` for a HASSbian setup.

source/_cookbook/tls_self_signed_certificate.markdown renamed to source/_docs/ecosystem/certificates/tls_self_signed_certificate.markdown

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar: true
77
comments: false
88
sharing: true
99
footer: true
10-
ha_category: Infrastructure
10+
redirect_from: /cookbook/tls_self_signed_certificate/
1111
---
1212

1313
If your Home Assistant instance is only accessible from your local network you can still protect the communication between your browsers and the frontend with SSL/TLS. [Let's encrypt]({{site_root}}/blog/2015/12/13/setup-encryption-using-lets-encrypt/) will only work if you have a DNS entry and remote access is allowed. The solution is to use a self-signed certificate. As you most likely don't have a certification authority (CA) your browser will conplain about the security. If you have a CA then this will not be an issue.

source/_cookbook/tor_configuration.markdown renamed to source/_docs/ecosystem/tor.markdown

+10-12
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,10 @@ sidebar: true
77
comments: false
88
sharing: true
99
footer: true
10-
ha_category: Infrastructure
11-
author: Nathan Freitas
12-
author_twitter: n8fr8
10+
redirect_from: /cookbook/tor_configuration/
1311
---
1412

15-
This is an example about how you can configure Tor to provide secure remote access to your Home Assistant instance as an Onion site, through Tor's Hidden Service feature. With this enabled, you do not need to open your firewall ports or setup HTTPS to enable secure remote access.
13+
This is an example about how you can configure Tor to provide secure remote access to your Home Assistant instance as an Onion site, through [Tor's Hidden Service](https://www.torproject.org/docs/hidden-services.html.en) feature. With this enabled, you do not need to open your firewall ports or setup HTTPS to enable secure remote access.
1614

1715
This is useful if you want to have:
1816

@@ -21,21 +19,19 @@ This is useful if you want to have:
2119
* Want to block attackers from even being able to access/scan your port and server at all
2220
* Want to block anyone from knowing your home IP address and seeing your traffic to your Home Assistant
2321

24-
#### {% linkable_title Background and Contact %}
22+
## {% linkable_title Background and Contact %}
2523

2624
This configuration is part of an effort to apply strong cryptography technologies (like Onion Routing and End-to-End Encryption) to technology we increasingly depend on in our day to day lives. Just like when WhatsApp enabled end-to-end encryption messaging for everyone, every home automation and IoT platform should do the same, because A) the technology is all there, freely licensed and open-source and B) up to this point, all the commercial manufacturers have been doing a horrific job with security.
2725

2826
You can learn more about how Tor can be used to secure home automation and IoT platforms through this short set of slides on the [Internet of Onion Things](https://github.com/n8fr8/talks/blob/master/onion_things/Internet%20of%20Onion%20Things.pdf)
2927

30-
This configuration was provided by @n8fr8 ([github](https://github.com/n8fr8), [twitter](https://twitter.com/n8fr8)) of the [Guardian Project](https://guardianproject.info) and [Tor Project](https://torproject.org). You can send questions, feedback and ideas to [support@guardianproject.info](mailto:support@guardianproject.info).
31-
32-
#### {% linkable_title Hidden Services and Onion Sites %}
28+
## {% linkable_title Hidden Services and Onion Sites %}
3329

3430
Tor allows clients and relays to offer hidden services. That is, you can offer a web server, SSH server, etc., without revealing your IP address to its users. In fact, because you don't use any public address, you can run a hidden service from behind your firewall. Learn more about Hidden Services on the [Tor Project website](https://www.torproject.org/docs/tor-hidden-service.html.en).
3531

3632
Onion sites are websites that run on a Tor Hidden Service node. "dot onion" sites are an [IETF recognized special use domain name](https://datatracker.ietf.org/doc/rfc7686/).
3733

38-
#### {% linkable_title Setting up Tor on your Home Assistant %}
34+
## {% linkable_title Setting up Tor on your Home Assistant %}
3935

4036
First, install Tor. On a Debian-based system, you can install the package easily:
4137

@@ -82,7 +78,7 @@ abcdef1234567890.onion ABCDEF1122334455667789 # client: haremote1
8278

8379
You are now done with the Home Assistant Tor server configuration. Make sure your Home Assistant instance is running, and now you can move to client configuration.
8480

85-
#### {% linkable_title Tor Client Access Setup %}
81+
## {% linkable_title Tor Client Access Setup %}
8682

8783
Using this setup, you can access your Home Assistant instance over Tor from your laptop or mobile device, using Tor Browser and other software.
8884

@@ -100,7 +96,7 @@ For [Orbot: Tor on Android](https://guardianproject.info/apps/orbot), add it in
10096

10197
On iOS, we have not fully tested this yet, but you should be able to add custom torrc entries on [Onion Browser](https://mike.tig.as/onionbrowser/), Red Onion or TOBY browsers, all available in the iTunes App Store.
10298

103-
#### {% linkable_title Some More Advanced Ideas %}
99+
## {% linkable_title Some More Advanced Ideas %}
104100

105101
With this configuration, only you can access your Home Assistant instance Onion site through Tor, and no one else. You can share the authentication cookie with multiple devices and users, or you can generate a unique one for each - up to you! If you have multiple, say for an industrial, business or corporate configuration, this would provide an easy way to revoke access to a specific user or device.
106102

@@ -109,4 +105,6 @@ If you always access your Home Assistant instance via Tor, you can easily run th
109105
You could also use Tor as a means to connect your Home Assistant instance to a remote device, sensor or other service that you do not want to or connect provide a direct, open IP connection to. Again, Tor provides authenticated and confidential routing (aka "privacy and encryption") by default, without having to setup TLS/SSL or VPN. It is just important to secure IoT nodes within your network, as it is to secure remote access!
110106

111107
As mentioned, with Orbot on Android, you can enable a "full device" VPN mode, that allows any app you have to tunnel through Tor, even if it is not Tor or proxy aware. This means you should be able to enter your "dot onion" Onion site address into any app you want to access to your Home Assistant instance, and it should work.
112-
108+
109+
This configuration was provided by @n8fr8 ([github](https://github.com/n8fr8), [twitter](https://twitter.com/n8fr8)) of the [Guardian Project](https://guardianproject.info) and [Tor Project](https://torproject.org). You can send questions, feedback and ideas to [support@guardianproject.info](mailto:support@guardianproject.info).
110+

source/_includes/asides/docs_navigation.html

+16-3
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,6 @@ <h1 class="title delta">Topics</h1>
136136
<li>{% active_link /docs/ecosystem/appdaemon/api/ AppDaemon API Reference %}</li>
137137
</ul>
138138
</li>
139-
140139
<li>
141140
{% active_link /docs/ecosystem/hadashboard/ HADashboard %}
142141
<ul>
@@ -147,7 +146,6 @@ <h1 class="title delta">Topics</h1>
147146
<li>{% active_link /docs/ecosystem/hadashboard/updating/ Updating HADashboard %}</li>
148147
</ul>
149148
</li>
150-
151149
<li>
152150
{% active_link /docs/ecosystem/notebooks/ Notebooks %}
153151
<ul>
@@ -179,9 +177,24 @@ <h1 class="title delta">Topics</h1>
179177
<li>{% active_link /docs/ecosystem/ios/integration/ Integration with other apps %}</li>
180178
</ul>
181179
</li>
182-
<li>{% active_link /docs/ecosystem/nginx/ NGINX %}</li>
180+
<li>
181+
Remote access
182+
<ul>
183+
<li>{% active_link /docs/ecosystem/apache/ Apache %}</li>
184+
<li>{% active_link /docs/ecosystem/nginx/ NGINX %}</li>
185+
<li>{% active_link /docs/ecosystem/tor/ Tor Onion Service %}</li>
186+
</ul>
187+
</li>
188+
<li>
189+
Certificates
190+
<ul>
191+
<li>{% active_link /docs/ecosystem/certificates/tls_self_signed_certificate/ Self-signed certificate %}</li>
192+
<li>{% active_link /docs/ecosystem/certificates/tls_domain_certificate/ Certificate domain owners %}</li>
193+
</ul>
194+
</li>
183195
<li>{% active_link /docs/ecosystem/scenegen/ scenegen %}</li>
184196
<li>{% active_link /docs/ecosystem/synology/ Synology %}</li>
197+
<li>{% active_link /docs/ecosystem/backup/backup_github/ Backup to GitHub %}</li>
185198
</ul>
186199
</ul>
187200
</div>

0 commit comments

Comments
 (0)