aboutsummaryrefslogtreecommitdiff
path: root/Emby.Server.Implementations/Library
AgeCommit message (Collapse)Author
2019-11-23Merge pull request #1926 from Bond-009/authdkanada
Add clearer exceptions, warnings and docs
2019-11-22Reword exception messageBond_009
2019-11-22Fix some warningsBond-009
2019-11-21Fix easy passwordBond-009
2019-11-10Merge pull request #1965 from Bond-009/dbjsondkanada
Deserialize with the correct type (and warning fixes)
2019-11-08Merge pull request #1929 from Narfinger/parser-fix4dkanada
[Draft][Help wanted] Fix parsing of certain names and adds a default season if no season was found
2019-11-07removed restriction to 3 digits in episodenumber and 4 in season numbersNarfinger
2019-11-01Rewrite hex encoder/decoderBond_009
2019-11-01Deserialize with the correct type (and warning fixes)Bond_009
2019-10-29More warning fixesBond_009
2019-10-29Fix more warningsBond_009
2019-10-29Update Emby.Server.Implementations/Library/UserViewManager.csBond-009
Co-Authored-By: dkanada <dkanada@users.noreply.github.com>
2019-10-22add another parser case and allow parsing of seasonlessNarfinger
Add another parser case and we now allow parsing of seasonless series which hopefully should cover more cases of directory structure
2019-10-20Add clearer exceptions, warnings and docsBond_009
2019-09-23Fix multiple mistakes and warningsBond_009
2019-09-17Remove legacy auth code (#1677)Bond-009
* Remove legacy auth code * Adds tests so we don't break PasswordHash (again) * Clean up interfaces * Remove duplicate code * Use auto properties * static using * Don't use 'this' * Fix build
2019-09-13Reset invalid login counter on successfull loginBond-009
2019-09-02Add debug logs and try/catch when creating folderJoshua Boniface
2019-09-02Fix warnings, improve performance (#1665)Bond-009
* Fix warnings, improve performance `QueryResult.Items` is now a `IReadOnlyList` so we don't need to allocate a new `Array` when we have a `List` (and `Items` shouldn't need to be mutable anyway) * Update Providers .csproj to latest C# * Remove extra newline from DtoService.cs * Remove extra newline from UserLibraryService.cs
2019-08-28Fix loginBond_009
2019-08-18Fix UserNotFoundErrorBond_009
2019-08-16Improvements to UserManagerBond_009
2019-08-10Merge pull request #1397 from Bond-009/passfastJoshua M. Boniface
Streamline authentication proccess
2019-08-09Use CultureInvariant string conversion for GuidsBond-009
2019-07-06Fix style issuesBond_009
2019-07-06Streamline authentication proccessBond_009
2019-07-04Merge pull request #1247 from bugfixin/masterdkanada
Adjust detection of 'sample' in filenames to use regex boundaries
2019-06-28Reduce amount of raw sqlBond_009
2019-06-12Merge pull request #1442 from jellyfin/release-10.3.zJoshua M. Boniface
Backmerge for Release 10.3.4 and 10.3.5
2019-06-09Revert "Don't set a default reset provider"Joshua M. Boniface
This reverts commit c230d49d7c37d4fbe77676b835c3afd6c8cb56e7. This reenables an edge case where an admin might want to reset, with the default auth provider, the password of an externally-provided user so they could "unlock" the account while it was failing. There might be minor security implications to this, but the malicious actor would need FS access to do it (as they would with any password resets) so it's probably best to keep it as-is. Removing this in the first place was due to a misunderstanding anyways so no harm.
2019-06-09Remove superfluous conditionalJoshua M. Boniface
This wasn't needed to prevent updating the policy on-disk from my tests and can be removed as suggested by @Bond-009
2019-06-09Don't set a default reset providerJoshua M. Boniface
2019-06-09Use SecurityException for auth failureJoshua M. Boniface
2019-06-09Apply suggestions from code reviewJoshua M. Boniface
Co-Authored-By: Claus Vium <cvium@users.noreply.github.com> Co-Authored-By: Bond-009 <bond.009@outlook.com>
2019-06-09Add nicer log message and commentJoshua M. Boniface
2019-06-08Implement InvalidAuthProviderJoshua M. Boniface
Implements the InvalidAuthProvider, which acts as a fallback if a configured authentication provider, e.g. LDAP, is unavailable due to a load failure or removal. Until the user or the authentication plugin is corrected, this will cause users with the missing provider to be locked out, while throwing errors in the logs about the issue. Fixes #1445 part 2
2019-06-01Fix more warningsBond-009
2019-05-25Format correctly the PIN when updating itDrPandemic
2019-05-18Merge pull request #1383 from jellyfin/release-10.3.zBond-009
Backmerge for Release 10.3.3
2019-05-11Fix pin bug introduced in 10.3.z.DrPandemic
The issue is that the new easyPassword format prepends the hash function. This PR extract the hash from "$SHA1$_hash_".
2019-05-11Ignore casing photo extensionsBond-009
2019-04-30Fix incorrect hasPassword flag when easy pin setbugfixin
2019-04-19Fix incorrect escaping in regex patternbugfixin
2019-04-19Adjust detection of 'sample' in filenames to use regex boundariesbugfixin
2019-04-07Override username with AuthenticationProviderJoshua Boniface
Pass back the Username directive returned by an AuthenticationProvider to the calling code, so we may override the user-provided Username value if the authentication provider passes this back. Useful for instance in an LDAP scenario where what the user types may not necessarily be the "username" that is mapped in the system, e.g. the user providing 'mail' while 'uid' is the "username" value. Could also then be extensible to other authentication providers as well, should they wish to do a similar thing.
2019-03-29Correct bad quote charactersJoshua Boniface
2019-03-29Remove dashes from pinsLogicalPhallacy
2019-03-29adds readonly to propertiesPhallacy
2019-03-28fix byte stringPhallacy
2019-03-28switched to a hexa string with crypto random backingPhallacy