• 0 Posts
  • 532 Comments
Joined 2 years ago
cake
Cake day: June 9th, 2023

help-circle

  • ShortN0te@lemmy.mltoSelfhosted@lemmy.worldJellyfin 10.11 RC1 Released
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    6 days ago

    … and may also break compatibility with previous 10.Y releases if required for later cleanup work.

    If you read through the whole paragraph, it is clear that they mean the compatibility of previous jellyfin versions.

    Also, again:

    Note however that the 10.Y.Z release chain represents the “cleanup” of the codebase, so it should be accepted that 10.Y.Z breaks all compatibility,

    That means that the code is not cleaned up with that release.

    If you would release 11 before the code is considered cleaned up, you would basically break your own defined versioning convention. That is best decided by the active maintainers.


  • ShortN0te@lemmy.mltoSelfhosted@lemmy.worldJellyfin 10.11 RC1 Released
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    7 days ago

    Consider the 10.y.z simply to be 0.y.z and everything works out.

    Jellyfin inherited a lot of shitty code and architecture from emby. They simply cannot guarantee anything across patches until it is sorted out.

    imho much better then releasing major version after major version because the break stuff regularly.












  • ShortN0te@lemmy.mltoSelfhosted@lemmy.worldLatest Watchtower fork?
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    3
    ·
    edit-2
    3 months ago

    Just because there is no update does not mean there are security vulnerabilities to worry about, or do you have a specific one that is not fixed?

    The attack vector seems very narrow to me. It checks the container registry downloads the containers and runs some docker commands.

    It has no interface, so in order to attack it you either have to compromise the container registry (but then it would be easier to compromise the containers you download) the secure connection used to download the containers (https is quite stable) or something on the server side.

    Also the project does not really look that abundant to me.

    EDIT: So i have not checked this, but watchtower is probably using docker for most steps anyway? So basically the only thing that could be attacked is via the notifications watchtower is sending?