From 86db0c484cd6aaa1524224f2cf7d9e742c8b54e9 Mon Sep 17 00:00:00 2001 From: Franck Nijhof Date: Wed, 21 Apr 2021 17:03:32 +0200 Subject: [PATCH] Remove HIBP checks (#121) --- tautulli/DOCS.md | 12 ------------ tautulli/config.json | 1 - tautulli/rootfs/etc/cont-init.d/tautulli.sh | 6 ------ 3 files changed, 19 deletions(-) diff --git a/tautulli/DOCS.md b/tautulli/DOCS.md index 5fbacc2..4a761cd 100644 --- a/tautulli/DOCS.md +++ b/tautulli/DOCS.md @@ -67,14 +67,10 @@ to prevent users from using your installation for themselves. This option is HIGHLY recommended in case you expose this add-on to the outside world. -**Note**: _This option support secrets, e.g., `!secret tautulli_username`._ - ### Option: `password` Password for authenticating with Tautulli interface. -**Note**: _This option support secrets, e.g., `!secret tautulli_password`._ - ### Option: `ssl` Enables/Disables SSL (HTTPS) on the web interface of Tautulli. Set it `true` @@ -92,14 +88,6 @@ The private key file to use for SSL. **Note**: _The file MUST be stored in `/ssl/`, which is the default_ -### Option: `i_like_to_be_pwned` - -Adding this option to the add-on configuration allows to you bypass the -HaveIBeenPwned password requirement by setting it to `true`. - -**Note**: _We STRONGLY suggest picking a stronger/safer password instead of -using this option! USE AT YOUR OWN RISK!_ - ### Option: `leave_front_door_open` Adding this option to the add-on configuration allows you to disable diff --git a/tautulli/config.json b/tautulli/config.json index ab1e48e..e11679a 100644 --- a/tautulli/config.json +++ b/tautulli/config.json @@ -29,7 +29,6 @@ "ssl": "bool", "certfile": "str", "keyfile": "str", - "i_like_to_be_pwned": "bool?", "leave_front_door_open": "bool?" } } diff --git a/tautulli/rootfs/etc/cont-init.d/tautulli.sh b/tautulli/rootfs/etc/cont-init.d/tautulli.sh index 4b47de4..96e4ca7 100644 --- a/tautulli/rootfs/etc/cont-init.d/tautulli.sh +++ b/tautulli/rootfs/etc/cont-init.d/tautulli.sh @@ -14,12 +14,6 @@ if ! bashio::config.true 'leave_front_door_open'; then bashio::config.require.password; fi -# Require a secure password -if bashio::config.has_value 'password' \ - && ! bashio::config.true 'i_like_to_be_pwned'; then - bashio::config.require.safe_password -fi - # Check SSL cerrificate bashio::config.require.ssl