| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2020-06-05 | Use typed logger where possible | crobibero | |
| 2020-06-03 | Merge pull request #2767 from Bond-009/nullable3 | Vasily | |
| Enable nullabe reference types for MediaBrowser.Model | |||
| 2020-05-27 | Merge branch 'master' into nullable3 | Bond_009 | |
| 2020-05-26 | Revert "Fix emby/user/public API leaking sensitive data" | Joshua M. Boniface | |
| 2020-05-07 | Merge pull request #2492 from Polpetta/fix-api-private-data-leak | Bond-009 | |
| Fix emby/user/public API leaking sensitive data | |||
| 2020-05-06 | Fix variable declaration and follow sonarcloud suggestions | Davide Polonio | |
| 2020-05-02 | Remove extra line in UserManager | Davide Polonio | |
| Co-authored-by: Bond-009 <bond.009@outlook.com> | |||
| 2020-04-23 | Merge pull request #2861 from mark-monteiro/fix-auth-response-codes | dkanada | |
| Fix Auth Response Codes | |||
| 2020-04-22 | Merge branch 'master' into fix-auth-response-codes | Bond-009 | |
| 2020-04-20 | Merge remote-tracking branch 'upstream/master' into register-services-correctly | Mark Monteiro | |
| 2020-04-13 | Return correct status codes for authentication and authorization errors | Mark Monteiro | |
| - Use AuthenticatonException to return 401 - Use SecurityException to return 403 - Update existing throws to throw the correct exception for the circumstance | |||
| 2020-04-08 | Log message for each exception during login | dafo90 | |
| 2020-04-06 | Fix Authentication request log | dafo90 | |
| 2020-04-05 | Enable nullabe reference types for MediaBrowser.Model | Bond_009 | |
| 2020-04-04 | Register and construct IUserManager and IUserRepository correctly | Mark Monteiro | |
| 2020-04-02 | Authentication request log with IP | Didier Dafond | |
| 2020-03-24 | Remove unused usings | Bond_009 | |
| 2020-03-01 | Fix emby/user/public API leaking private data | Davide Polonio | |
| This commit fixes the emby/user/public API that was returning more data than necessary. Now only the following information are returned: - the account name - the primary image tag - the field hasPassword - the field hasConfiguredPassword, useful for the first wizard only (see https://github.com/jellyfin/jellyfin/issues/880#issuecomment-465370051) - the primary image aspect ratio A new DTO class, PrivateUserDTO has been created, and the route has been modified in order to return that data object. | |||
| 2020-02-23 | Fix some warnings | Bond_009 | |
| * Add analyzers to MediaBrowser.XbmcMetadata * Enable TreatWarningsAsErrors for MediaBrowser.XbmcMetadata * Add analyzers to MediaBrowser.WebDashboard * Enable TreatWarningsAsErrors for MediaBrowser.WebDashboard * Disable SA1600 in favor of CS1591 | |||
| 2020-02-03 | Merge pull request #2359 from Bond-009/username | dkanada | |
| Allow changing capitalization of usernames | |||
| 2020-02-01 | update some comments | dkanada | |
| Co-Authored-By: Bond-009 <bond.009@outlook.com> | |||
| 2020-02-01 | improve scan progress and fix a few bugs | dkanada | |
| 2020-01-31 | Allow changing capitalization of usernames | Bond_009 | |
| 2020-01-10 | Merge branch 'master' into warn12 | Bond_009 | |
| 2020-01-04 | Merge pull request #2206 from Bond-009/userconfig | dkanada | |
| Delete user config dir on user deletion | |||
| 2019-12-29 | Delete user config dir on user deletion | Bond_009 | |
| 2019-12-13 | Enable TreatWarningsAsErrors for some projects | Bond_009 | |
| Analyzers are only run in debug build, so setting TreatWarningsAsErrors for release build will catch the compiler warnings until we resolve all analyzer warnings. | |||
| 2019-12-11 | More warnings (removed) | Bond_009 | |
| 2019-12-11 | Merge pull request #2041 from Bond-009/warn11 | dkanada | |
| Fix more warnings | |||
| 2019-12-10 | Apply suggestions from code review | Bond-009 | |
| Co-Authored-By: dkanada <dkanada@users.noreply.github.com> | |||
| 2019-11-27 | Fix more warnings | Bond_009 | |
| 2019-11-25 | * Add support for multi segment base urls | Bond_009 | |
| * Make baseurl case-insensitive | |||
| 2019-11-23 | Merge pull request #1926 from Bond-009/auth | dkanada | |
| Add clearer exceptions, warnings and docs | |||
| 2019-11-21 | Fix easy password | Bond-009 | |
| 2019-11-01 | Rewrite hex encoder/decoder | Bond_009 | |
| 2019-10-29 | Fix more warnings | Bond_009 | |
| 2019-10-20 | Add clearer exceptions, warnings and docs | Bond_009 | |
| 2019-09-23 | Fix multiple mistakes and warnings | Bond_009 | |
| 2019-09-17 | Remove legacy auth code (#1677) | Bond-009 | |
| * Remove legacy auth code * Adds tests so we don't break PasswordHash (again) * Clean up interfaces * Remove duplicate code * Use auto properties * static using * Don't use 'this' * Fix build | |||
| 2019-09-13 | Reset invalid login counter on successfull login | Bond-009 | |
| 2019-08-18 | Fix UserNotFoundError | Bond_009 | |
| 2019-08-16 | Improvements to UserManager | Bond_009 | |
| 2019-07-06 | Streamline authentication proccess | Bond_009 | |
| 2019-06-28 | Reduce amount of raw sql | Bond_009 | |
| 2019-06-09 | Revert "Don't set a default reset provider" | Joshua M. Boniface | |
| This reverts commit c230d49d7c37d4fbe77676b835c3afd6c8cb56e7. This reenables an edge case where an admin might want to reset, with the default auth provider, the password of an externally-provided user so they could "unlock" the account while it was failing. There might be minor security implications to this, but the malicious actor would need FS access to do it (as they would with any password resets) so it's probably best to keep it as-is. Removing this in the first place was due to a misunderstanding anyways so no harm. | |||
| 2019-06-09 | Remove superfluous conditional | Joshua M. Boniface | |
| This wasn't needed to prevent updating the policy on-disk from my tests and can be removed as suggested by @Bond-009 | |||
| 2019-06-09 | Don't set a default reset provider | Joshua M. Boniface | |
| 2019-06-09 | Apply suggestions from code review | Joshua M. Boniface | |
| Co-Authored-By: Claus Vium <cvium@users.noreply.github.com> Co-Authored-By: Bond-009 <bond.009@outlook.com> | |||
| 2019-06-09 | Add nicer log message and comment | Joshua M. Boniface | |
| 2019-06-08 | Implement InvalidAuthProvider | Joshua M. Boniface | |
| Implements the InvalidAuthProvider, which acts as a fallback if a configured authentication provider, e.g. LDAP, is unavailable due to a load failure or removal. Until the user or the authentication plugin is corrected, this will cause users with the missing provider to be locked out, while throwing errors in the logs about the issue. Fixes #1445 part 2 | |||
