<feed xmlns='http://www.w3.org/2005/Atom'>
<title>jellyfin, branch v10.3.5</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://git.lodewillems.com/jellyfin/atom?h=v10.3.5</id>
<link rel='self' href='https://git.lodewillems.com/jellyfin/atom?h=v10.3.5'/>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/'/>
<updated>2019-06-10T01:47:45Z</updated>
<entry>
<title>Bump version for 10.3.5</title>
<updated>2019-06-10T01:47:45Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-10T01:47:45Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=d5fe82314e11d3b8b2ba58e4684a7968fbe6dbca'/>
<id>urn:sha1:d5fe82314e11d3b8b2ba58e4684a7968fbe6dbca</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge pull request #1447 from joshuaboniface/implement-invalidauth</title>
<updated>2019-06-09T19:36:25Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-09T19:36:25Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=06834fefef66b5fe29d0edf039c40dacb132af42'/>
<id>urn:sha1:06834fefef66b5fe29d0edf039c40dacb132af42</id>
<content type='text'>
Implement InvalidAuthProvider</content>
</entry>
<entry>
<title>Revert "Don't set a default reset provider"</title>
<updated>2019-06-09T19:29:43Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-09T19:27:38Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=2946ae10092cddadade4c84cfa000129bf117e03'/>
<id>urn:sha1:2946ae10092cddadade4c84cfa000129bf117e03</id>
<content type='text'>
This reverts commit c230d49d7c37d4fbe77676b835c3afd6c8cb56e7.

This reenables an edge case where an admin might want to reset, with
the default auth provider, the password of an externally-provided
user so they could "unlock" the account while it was failing. There
might be minor security implications to this, but the malicious
actor would need FS access to do it (as they would with any password
resets) so it's probably best to keep it as-is.

Removing this in the first place was due to a misunderstanding
anyways so no harm.
</content>
</entry>
<entry>
<title>Remove superfluous conditional</title>
<updated>2019-06-09T17:57:49Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-09T17:57:49Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=4b8f735cb89901bd1004d590f4f2820c23e2493c'/>
<id>urn:sha1:4b8f735cb89901bd1004d590f4f2820c23e2493c</id>
<content type='text'>
This wasn't needed to prevent updating the policy on-disk from my
tests and can be removed as suggested by @Bond-009
</content>
</entry>
<entry>
<title>Don't set a default reset provider</title>
<updated>2019-06-09T17:46:53Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-09T17:46:53Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=c230d49d7c37d4fbe77676b835c3afd6c8cb56e7'/>
<id>urn:sha1:c230d49d7c37d4fbe77676b835c3afd6c8cb56e7</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Use SecurityException for auth failure</title>
<updated>2019-06-09T17:45:51Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-09T17:45:51Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=20e2cb2d8693e3f53749bcde5b5fd6367bd15007'/>
<id>urn:sha1:20e2cb2d8693e3f53749bcde5b5fd6367bd15007</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Apply suggestions from code review</title>
<updated>2019-06-09T17:41:14Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-09T17:41:14Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=b70083f3b370055b2942e450291ce42345732cb7'/>
<id>urn:sha1:b70083f3b370055b2942e450291ce42345732cb7</id>
<content type='text'>
Co-Authored-By: Claus Vium &lt;cvium@users.noreply.github.com&gt;
Co-Authored-By: Bond-009 &lt;bond.009@outlook.com&gt;</content>
</entry>
<entry>
<title>Add nicer log message and comment</title>
<updated>2019-06-09T15:07:35Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-09T15:07:35Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=74ef3898798033a7cad987c4a869e7e72f57b229'/>
<id>urn:sha1:74ef3898798033a7cad987c4a869e7e72f57b229</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Implement InvalidAuthProvider</title>
<updated>2019-06-09T02:54:31Z</updated>
<author>
<name>Joshua M. Boniface</name>
<email>joshua@boniface.me</email>
</author>
<published>2019-06-09T02:54:31Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=d78a55adb4f66b8a82449216a11657da1388ab12'/>
<id>urn:sha1:d78a55adb4f66b8a82449216a11657da1388ab12</id>
<content type='text'>
Implements the InvalidAuthProvider, which acts as a fallback if a
configured authentication provider, e.g. LDAP, is unavailable due
to a load failure or removal. Until the user or the authentication
plugin is corrected, this will cause users with the missing provider
to be locked out, while throwing errors in the logs about the issue.

Fixes #1445 part 2
</content>
</entry>
<entry>
<title>Merge pull request #1443 from jellyfin/qemu</title>
<updated>2019-06-07T22:41:35Z</updated>
<author>
<name>Andrew Rabert</name>
<email>6550543+nvllsvm@users.noreply.github.com</email>
</author>
<published>2019-06-07T22:41:35Z</published>
<link rel='alternate' type='text/html' href='https://git.lodewillems.com/jellyfin/commit/?id=6f99ed39551facba97e12224f099dc557bffaee0'/>
<id>urn:sha1:6f99ed39551facba97e12224f099dc557bffaee0</id>
<content type='text'>
Docker - Update arm* Dockerfiles for latest multiarch</content>
</entry>
</feed>
