No sorry… I ended up just opening a new port for a new apache server.
I noticed that hass is using aiohttp but I didn’t find where I can enable follow symlinks.
The following also works and may be more robust against changes in the underlying aiohttp library, because even that library is now instructed to follow symlinks
+++ ~/.local/lib/python3.8/site-packages/homeassistant/components/http/static.py
@@ -25,6 +25,7 @@ class CachingStaticResource(StaticResource):
# where the static dir is totally different
raise HTTPForbidden()
filepath = self._directory.joinpath(filename).resolve()
+ self._follow_symlinks=True
if not self._follow_symlinks:
filepath.relative_to(self._directory)
I came across this issue too.
The fixes above are very temporary, and will get blown away on a HASS update.
I’ve made a pull request for a more permanent solution:
Can an HA Server’s owner decide if an OPTIONAL feature is a security risk, or does someone-else (devs) have to choose it for him?
There are others configuration attributes (like “trusted_networks” or “allow_bypass_login”) that has been implemented even if risky…and those are well used from many ppl