Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable 'secure' option for pwgen #2260

Merged
merged 2 commits into from
Feb 8, 2022
Merged

Enable 'secure' option for pwgen #2260

merged 2 commits into from
Feb 8, 2022

Conversation

lyh16
Copy link
Contributor

@lyh16 lyh16 commented Feb 8, 2022

Details

  • Does this resolve an issue?
    Resolves #

Changes

New Features

  • Enables "-s"(secure) option in pwgen

Breaking Changes

  • None

Additional

As per the pwgen manual, the "-s"(secure) option instructs pwgen to generate completely random passwords, where as the default for pwgen is to generate more memorable passwords. Since the passwords generated in this part of the installation process are to be "remembered" by the dot env file, I believe that users may benefit from the additional entropy provided by the "-s" option in pwgen.

EDIT: Deleted unnecessary commas.

As per the [pwgen manual](https://linux.die.net/man/1/pwgen, "pwgen manual"), the "-s"(secure) option instructs pwgen to generate completely random passwords, where as the default for pwgen is to generate more memorable passwords. Since, the passwords generated in this part of the installation process are to be "remembered" by the dot env file, I believe that users may benefit from the additional entropy provided by the "-s" option in pwgen.
@netlify
Copy link

netlify bot commented Feb 8, 2022

✔️ Deploy Preview for authentik ready!

🔨 Explore the source changes: 08901f3

🔍 Inspect the deploy log: https://app.netlify.com/sites/authentik/deploys/62024c472f0b1f0007244e33

😎 Browse the preview: https://deploy-preview-2260--authentik.netlify.app

@BeryJu
Copy link
Member

BeryJu commented Feb 8, 2022

TIL about this option, could you add it for the other pwgen examples too?

@codecov
Copy link

codecov bot commented Feb 8, 2022

Codecov Report

Merging #2260 (08901f3) into master (6ba150f) will decrease coverage by 1.09%.
The diff coverage is n/a.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #2260      +/-   ##
==========================================
- Coverage   91.63%   90.55%   -1.08%     
==========================================
  Files         447      447              
  Lines       19450    19450              
==========================================
- Hits        17822    17611     -211     
- Misses       1628     1839     +211     
Impacted Files Coverage Δ
authentik/providers/oauth2/views/introspection.py 29.88% <0.00%> (-41.55%) ⬇️
authentik/providers/oauth2/views/provider.py 60.72% <0.00%> (-39.28%) ⬇️
authentik/policies/denied.py 58.34% <0.00%> (-37.50%) ⬇️
authentik/providers/saml/views/sso.py 47.30% <0.00%> (-35.13%) ⬇️
authentik/providers/saml/processors/metadata.py 65.00% <0.00%> (-35.00%) ⬇️
authentik/core/views/session.py 69.24% <0.00%> (-30.76%) ⬇️
authentik/providers/oauth2/views/github.py 70.00% <0.00%> (-30.00%) ⬇️
authentik/policies/views.py 65.22% <0.00%> (-27.53%) ⬇️
authentik/providers/saml/views/flows.py 59.68% <0.00%> (-20.96%) ⬇️
authentik/lib/utils/urls.py 70.00% <0.00%> (-20.00%) ⬇️
... and 19 more

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 6ba150f...08901f3. Read the comment docs.

@lyh16
Copy link
Contributor Author

lyh16 commented Feb 8, 2022

TIL about this option, could you add it for the other pwgen examples too?

Done!

@BeryJu BeryJu merged commit 6c880e0 into goauthentik:master Feb 8, 2022
@lyh16 lyh16 deleted the patch-1 branch February 8, 2022 11:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants