-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Install grep to avoid issues in pihole -w/b with the default busybox … #1576
Conversation
Question: I tested adding pidev:/# grep -V
grep (GNU grep) 3.11
Copyright (C) 2023 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Written by Mike Haertel and others; see
<https://git.savannah.gnu.org/cgit/grep.git/tree/AUTHORS>.
grep -P uses PCRE2 10.42 2022-12-11 |
d0dddcf
to
fd1881e
Compare
…grep Signed-off-by: Adam Warner <[email protected]>
fd1881e
to
a49600e
Compare
Something must have changed in between so that it is working now with only P.S. Adding |
Yeah, absolutley agree on that - just going for the quickfix option for the time being :) |
We have code for CLI lists via API ready for quite some time but there was an ongoing discussion because this change then introduces authentication for these CLI options while there was none before. We discussed this shortly back in the days but never came to a conclusion what we wanted to do IIRC. Eventually, it was forgotten. My latest suggestion was to change the default of CLI domain searching is also ported to the API and we added a separate option for it ( |
I don't remember what my position was when we discussed this back then, but today I think we should not let the cli to bypass the authentication by default. We have https://github.com/pi-hole/pi-hole/blob/development-v6/advanced/Scripts/api.sh which can handle cli authentication so there should be no need to allow bypassing it. |
Yes, storing the session somewhere in the respective user's home should solve this. Maybe we create a directory Users will complain, but probably not too hard. We could offer the possibility to create a file |
Storing the password could work, BUT how would we do that in such a way that it doesn't lead to the possibility of the password being compromised? |
I wouldn't store the password. I think it's fine to request re-login after the session has expired. Saving the SID should make it very convenient already. |
That's what the application password has been designed for. If they use (and store!) it in some Python scripts in their home directory programmatically interacting with the API, why not allow them to store it in an equally "safe" (that's why I said in |
So maybe we just preface it with "you can do x but it is at your own risk" SID maybe the better option, mind. |
We'll do SID anyway but it will still require relogin after some inactivity. |
What does this PR aim to accomplish?:
Fixes #1577 by replacing
busybox
'sgrep
- which does not include theP
optionBefore:
After:
dev-v6:/# pihole -b test.com [i] Adding test.com to the blacklist... [✓] Reloading DNS lists
By submitting this pull request, I confirm the following:
git rebase
)