this post was submitted on 31 Aug 2025
85 points (92.9% liked)

Selfhosted

51056 readers
1418 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

This release adds the ability to edit existing links, show and download QR codes for easy sharing, and various improvements in the frontend. Check out the release note for a list of all changes.

you are viewing a single comment's thread
view the rest of the comments
[–] glizzyguzzler@piefed.blahaj.zone 5 points 20 hours ago (2 children)

I am digging this, thanks for keeping it updated and improving it!

I see that you say it's feature complete / no user stuff; but it'd really mesh well if it took OIDC authentication. Don't need it to make users or anything, just instead of the password popup the OIDC provider is asked for confirmation that whatever user registered with the OIDC is logged in. That'd let me leverage extra 2FA protection from the OIDC provider and juice on that one-login life.

Now I have no experience making OIDC crap work nor how it even works behind the scenes, so I can't help :( sorry; just wishful thinking.

Also saw on your github - hope our newly shit-out gestapo don't bother you!

[–] SinTan1729@programming.dev 4 points 20 hours ago* (last edited 20 hours ago)

I don't understand much about OIDC either. But I'll keep it in mind. Thanks.

[–] flubba86@lemmy.world 3 points 20 hours ago (2 children)

This would require configuration with a whitelist of which OIDC IdPs to trust. Otherwise anybody could self-authorise a OIDC token (using their own IdP) and use that to log in.

[–] SinTan1729@programming.dev 3 points 20 hours ago* (last edited 20 hours ago) (1 children)

Hmm, so that might be out of scope here. But I can try to do some kind of 2FA, shouldn't be much of an issue, really. It's just that I never thought a link shortener needed 2FA protection since the links will be publicly shared anyway.

[–] flubba86@lemmy.world 3 points 20 hours ago

I agree with you, a simple minimal url-shortener does not need 2FA.

[–] glizzyguzzler@piefed.blahaj.zone 1 points 16 hours ago

Yes that tracks with how OIDC setup works with my other services (you give the container the OIDC links and shared secrets so it knows how to talk to the OIDC and trust it).