Wire up passing credentials from FediPanel to the Pixelfed configuration #190

Open
opened 2025-02-24 11:32:12 +01:00 by kiara · 7 comments
Owner

As a Fediversity user,
I want to choose my initial user credentials,
so that I can log in to my Pixelfed instance.

Test:

Given that I am in the panel,
when I am filling the deployment form,
then I should be able to specify my initial credentials such that I can log in to my deployed instance.

implementation notes

  • proper approach: use LDAP (#615)
**As** a Fediversity user, **I want** to choose my initial user credentials, **so that** I can log in to my Pixelfed instance. Test: **Given** that I am in the panel, **when** I am filling the deployment form, **then** I should be able to specify my [initial credentials](https://git.fediversity.eu/Fediversity/Fediversity/pulls/215/files#diff-c959e516a3e7e73b06277e1352072cd290f6d96b) such that I can log in to my deployed instance. ### implementation notes - proper approach: use LDAP (#615)
kiara added this to the Fediversity project 2025-03-18 09:25:41 +01:00
Author
Owner

as a workaround until this story, a dummy value is passed

as a workaround until this story, a [dummy value](https://git.fediversity.eu/Fediversity/Fediversity/commit/6275e8b2dc1e7dd4091e9f2d1bb58a9f2acab09d#diff-de06c10854bd6e90e4d3acc5f00f0c1fdbb89a00) is passed
Author
Owner

@kevin noted we may be able to pull these from the django auth info

@kevin noted we may be able to pull these from the django auth info
Owner

I looked at what info you can get from the django auth and.

we can get the username and email from django. But for the password we cant since django uses 1 way hashing and thus its impossible to get the password from django. so we need find a create a way to have the operator specify that themself when the configure the services

I looked at what info you can get from the django auth and. we can get the username and email from django. But for the password we cant since django uses 1 way hashing and thus its impossible to get the password from django. so we need find a create a way to have the operator specify that themself when the configure the services
Author
Owner

@kevin makes sense. i guess with the declarative approach of our form putting it in the form kinda sucks too, as it would then remain exposed. that maybe seems like a broader challenge in our approach we should further consider, to e.g.:

  • have a password field in the form (potential security risk, viable at most for demo purposes);
  • have the passwords generated rather than user-specified, then present to the user, potentially with the advice to change them (least advisable long-term, as storing/presenting them and relying on user behavior would make for additional attack vectors);
  • use generated passwords we neither store nor show the user but would then have them use the 'forgot password' function to reset;
  • long-term: have them hooked into an SSO (#212) so we don't need to generate application-specific users.

we should prob discuss our options here to build some consensus.

@kevin makes sense. i guess with the declarative approach of our form putting it in the form kinda sucks too, as it would then remain exposed. that maybe seems like a broader challenge in our approach we should further consider, to e.g.: - have a password field in the form (potential security risk, viable at most for demo purposes); - have the passwords generated rather than user-specified, then present to the user, potentially with the advice to change them (least advisable long-term, as storing/presenting them and relying on user behavior would make for additional attack vectors); - use generated passwords we neither store nor show the user but would then have them use the 'forgot password' function to reset; - long-term: have them hooked into an SSO (#212) so we don't need to generate application-specific users. we should prob discuss our options here to build some consensus.

Showing once and adding a note to use "forgot password" for a reset sounds reasonable.

Showing once and adding a note to use "forgot password" for a reset sounds reasonable.
kiara removed this from the Fediversity project 2025-04-14 11:12:31 +02:00
Author
Owner

out of scope for now as per #327

out of scope for now as per #327
kiara closed this issue 2025-06-02 09:28:37 +02:00
Author
Owner

our implementation now only creates an initial user, i.e. does not account for changes to the user or password.

our [implementation](https://git.fediversity.eu/Fediversity/Fediversity/src/branch/main/services/fediversity/pixelfed/default.nix) now only creates an initial user, i.e. does not account for changes to the user or password.
kiara reopened this issue 2025-09-14 13:18:18 +02:00
Sign in to join this conversation.
No milestone
No project
No assignees
3 participants
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Reference
fediversity/fediversity#190
No description provided.