Impressive that Barcelona's really bad period around December hasn't come to bite them by now. Sad to see Atletico falling off for now but impressed by Bilbao this season as always. Will be cheering for Bilbao in the Europa league
keyez
This is exciting, usually choose the PDX or Dolby auditorium near me when I can. Also the higher ticket price should price should reduce the amount of people who don't care about the movie going and being a distraction
I have been trying to use jellyfin locally but subtitles have issues some times depending on the show or format. Also recently my wife watched 2 episodes more than me so we needed to go back 2 episodes and only way to do that from the Up Next or Resume screens was to start a new search of the show and click into the season and then find the episode. In Plex that takes 2extra clicks to get to the season and find the episode. I get supporting open source but for my jellyfin only has 70% of the features I use weekly on Plex. Definitely supporting it and trying to use it but it's not feature parity for me
You've been missing out then, horror movies have been having a renaissance in the last couple years with new directors, actors and plenty of new well done stories coming out. Even great low budget and some with high studio budgets
Just did that, honestly didn't know lifetime was always available, thought it was only during sales or certain times, should have gotten it years ago
I just upgraded to lifetime and also use jellyfin but right now it only does 80% of what Plex does in my workflow so gonna use it until I can't anymore.
Fair, though $7 doesn't go far anymore it's only half a burrito at most places. I usually don't get popcorn and other stuff so for a family I understand that is still pricey. At my local Alamo I'd combine the ticket as dinner so it was a pricey dinner and drink or two with a full experience.
Most theaters nowadays have discount days. $7 Tuesdays in several cities I've visited this year.
I've been testing out jellyfin for the last couple months but it doesn't really fill the void of this specific feature that's being locked behind a pay wall. If anyone has good recommendations for securely and reliably hosting jellyfin behind SSL and auth with email password resets where I don't have to worry about it as much as Plex.
I use jellyfin locally but for a handful of remote clients I have I may well block off their access they're not going to be able to figure out my hand spun services and wall of text.
Heres what I'm running:
authentication_backend:
file:
path: '/config/users_database.yml'
watch: false
search:
email: false
case_insensitive: false
password:
algorithm: 'sha2crypt'
access_control:
## Default policy can either be 'bypass', 'one_factor', 'two_factor' or 'deny'. It is the policy applied to any
## resource if there is no policy to be applied to the user.
default_policy: 'deny'
networks:
- name: 'internal'
networks:
# - '10.10.0.0/16'
- '192.168.1.0/24'
- name: 'VPN'
networks: '10.0.1.0/24'
rules:
## Rules applied to everyone
- domain: '*.mydomain.com'
policy: 'one_factor'
session:
## The secret to encrypt the session data. This is only used with Redis / Redis Sentinel.
## Secret can also be set using a secret: https://www.authelia.com/c/secrets
secret: 'insecure_session_secret'
## Cookies configures the list of allowed cookie domains for sessions to be created on.
## Undefined values will default to the values below.
cookies:
# -
## The name of the session cookie.
- name: 'authelia_session'
## The domain to protect.
## Note: the Authelia portal must also be in that domain.
domain: 'mydomain.com'
## Required. The fully qualified URI of the portal to redirect users to on proxies that support redirections.
## Rules:
## - MUST use the secure scheme 'https://'
## - The above 'domain' option MUST either:
## - Match the host portion of this URI.
## - Match the suffix of the host portion when prefixed with '.'.
authelia_url: 'https://auth.mydomain.com/'
storage:
postgres:
....
identity_providers:
oidc:
## Cross-Origin Resource Sharing (CORS) settings.
cors:
## List of endpoints in addition to the metadata endpoints to permit cross-origin requests on.
endpoints:
- 'authorization'
- 'token'
- 'revocation'
- 'introspection'
# - 'pushed-authorization-request'
# - 'userinfo'
## List of allowed origins.
## Any origin with https is permitted unless this option is configured or the
## allowed_origins_from_client_redirect_uris option is enabled.
allowed_origins:
- 'https://mydomain.com/'
- 'https://grafana.mydomain.com/'
- 'https://wiki.mydomain.com/'
- 'https://foodz.mydomain.com/'
## Automatically adds the origin portion of all redirect URI's on all clients to the list of allowed_origins,
## provided they have the scheme http or https and do not have the hostname of localhost.
allowed_origins_from_client_redirect_uris: true
## Clients is a list of known clients and their configuration.
clients:
- client_id: 'grafana'
client_name: 'Grafana'
client_secret: 'XXXXXX'
public: false
consent_mode: 'pre-configured'
authorization_policy: 'one_factor'
require_pkce: true
pkce_challenge_method: 'S256'
redirect_uris:
- 'https://grafana.mydomain.com/login/generic_oauth'
scopes:
- 'openid'
- 'profile'
- 'groups'
- 'email'
userinfo_signed_response_alg: 'none'
token_endpoint_auth_method: 'client_secret_basic'
- client_id: 'wiki'
client_name: 'Wiki'
client_secret: 'XXXX'
consent_mode: 'pre-configured'
public: false
authorization_policy: 'one_factor'
require_pkce: true
pkce_challenge_method: 'S256'
redirect_uris:
- 'https://wiki.mydomain.com/oidc/callback'
scopes:
- 'openid'
- 'profile'
- 'groups'
- 'email'
userinfo_signed_response_alg: 'none'
token_endpoint_auth_method: 'client_secret_basic'
....
Then my users_database.yml looks like:
users:
authelia:
disabled: false
displayname: "Test User"
password: ""
email: authelia@authelia.com
groups:
- admins
- dev
user001:
disabled: false
displayname: 'User 001'
password: "$6$rounds=50000$XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
email: test@gmail.com
groups:
- admins
- users
Certainly, I'll post it tomorrow
I would say so to ensure these kinds of tackles are prevented in the future. this one looked as in control as one can be, tried tripping him higher up to ensure he catches him but could also go very very wrong at that speed and force.
Also since most people here love the PL, Allan did a similar tackle to Saint-Maximan 2-3 years ago, the latter sprinting and trying to jump over the challenge and Allan tripped him high up with his legs extended and got a red.