I thought I'd share a demo of my work to enhance Pixelfed with an OpenWebAuth service.
The video shows that it's possible to login on Pixelfed with a (streams), Hubzilla, Mastodon and Friendica account, and like/comment.
The 'permission' model of Pixelfed is very simple: either all your pictures are public, or you can configure your profile as 'Private', then only followers can see your pictures.
It typically solves issues reported here:
#^https://github.com/pixelfed/pixelfed/issues/4385 and this:
#^https://github.com/pixelfed/pixelfed/issues/1745 - even if you follow someone on another Pixelfed server, you can't see past pictures (before you started following) unless you have an account on that server.
On my todo/wishlist:
* that OpenWebAuth clients, including (streams) and Hubzilla would zidify (add ...?zid=xxx) not only zot and nomad peers, but also gives the benefit of the doubt to instances known through other protocols like ActivityPub. Then the user experience would really be to go from streams/hubzilla or any other software implementing at least the client-side of OpenWebAuth to pixelfed like an interweb (click on a user's handle, and be logged in remotely).
* additionally, an identity manager on Pixelfed which allows a user to configure as which remote user they are also known. Then you could be logged in as your account on Pixelfed from (streams), Hubzilla etc. I guess I will take a peek at (streams) and its 'External identities' for that...
* polish this work into an actual PR for Pixelfed and have it reviewed by the Pixelfed folks. In my opinion, this could actually render the existing feature "Sign in with Mastodon" (
#^https://github.com/pixelfed/pixelfed/pull/4545) obsolete.
There are possibly some limitations, e.g. I have to limit the UI to only the actions that make sense (and this is not complete yet in my demo). Example is to 'Create post' or 'Edit profile' on Pixelfed which doesn't make sense for a remotely authenticated user as Pixelfed actually has no concept of users that are not local (but this would actually not be needed if one could login remotely via the identity management...)
But hey, something works and hell, it even works on mobile...
#
OpenWebAuth#^https://vimeo.com/877251006 (no sound so don't bother to put on a headset)