| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107 | 
							- #pragma warning disable CS1591
 
- using System;
 
- using System.Collections.Concurrent;
 
- using System.Collections.Generic;
 
- using System.Globalization;
 
- using System.IO;
 
- using System.Linq;
 
- using System.Text;
 
- using System.Text.RegularExpressions;
 
- using System.Threading;
 
- using System.Threading.Tasks;
 
- using MediaBrowser.Common.Cryptography;
 
- using MediaBrowser.Common.Events;
 
- using MediaBrowser.Common.Net;
 
- using MediaBrowser.Controller;
 
- using MediaBrowser.Controller.Authentication;
 
- using MediaBrowser.Controller.Devices;
 
- using MediaBrowser.Controller.Drawing;
 
- using MediaBrowser.Controller.Dto;
 
- using MediaBrowser.Controller.Entities;
 
- using MediaBrowser.Controller.Library;
 
- using MediaBrowser.Controller.Net;
 
- using MediaBrowser.Controller.Persistence;
 
- using MediaBrowser.Controller.Plugins;
 
- using MediaBrowser.Controller.Providers;
 
- using MediaBrowser.Controller.Security;
 
- using MediaBrowser.Controller.Session;
 
- using MediaBrowser.Model.Configuration;
 
- using MediaBrowser.Model.Cryptography;
 
- using MediaBrowser.Model.Dto;
 
- using MediaBrowser.Model.Entities;
 
- using MediaBrowser.Model.Events;
 
- using MediaBrowser.Model.IO;
 
- using MediaBrowser.Model.Serialization;
 
- using MediaBrowser.Model.Users;
 
- using Microsoft.Extensions.Logging;
 
- namespace Emby.Server.Implementations.Library
 
- {
 
-     /// <summary>
 
-     /// Class UserManager.
 
-     /// </summary>
 
-     public class UserManager : IUserManager
 
-     {
 
-         private readonly object _policySyncLock = new object();
 
-         private readonly object _configSyncLock = new object();
 
-         private readonly ILogger _logger;
 
-         private readonly IUserRepository _userRepository;
 
-         private readonly IXmlSerializer _xmlSerializer;
 
-         private readonly IJsonSerializer _jsonSerializer;
 
-         private readonly INetworkManager _networkManager;
 
-         private readonly IImageProcessor _imageProcessor;
 
-         private readonly Lazy<IDtoService> _dtoServiceFactory;
 
-         private readonly IServerApplicationHost _appHost;
 
-         private readonly IFileSystem _fileSystem;
 
-         private readonly ICryptoProvider _cryptoProvider;
 
-         private ConcurrentDictionary<Guid, User> _users;
 
-         private IAuthenticationProvider[] _authenticationProviders;
 
-         private DefaultAuthenticationProvider _defaultAuthenticationProvider;
 
-         private InvalidAuthProvider _invalidAuthProvider;
 
-         private IPasswordResetProvider[] _passwordResetProviders;
 
-         private DefaultPasswordResetProvider _defaultPasswordResetProvider;
 
-         private IDtoService DtoService => _dtoServiceFactory.Value;
 
-         public UserManager(
 
-             ILogger<UserManager> logger,
 
-             IUserRepository userRepository,
 
-             IXmlSerializer xmlSerializer,
 
-             INetworkManager networkManager,
 
-             IImageProcessor imageProcessor,
 
-             Lazy<IDtoService> dtoServiceFactory,
 
-             IServerApplicationHost appHost,
 
-             IJsonSerializer jsonSerializer,
 
-             IFileSystem fileSystem,
 
-             ICryptoProvider cryptoProvider)
 
-         {
 
-             _logger = logger;
 
-             _userRepository = userRepository;
 
-             _xmlSerializer = xmlSerializer;
 
-             _networkManager = networkManager;
 
-             _imageProcessor = imageProcessor;
 
-             _dtoServiceFactory = dtoServiceFactory;
 
-             _appHost = appHost;
 
-             _jsonSerializer = jsonSerializer;
 
-             _fileSystem = fileSystem;
 
-             _cryptoProvider = cryptoProvider;
 
-             _users = null;
 
-         }
 
-         public event EventHandler<GenericEventArgs<User>> UserPasswordChanged;
 
-         /// <summary>
 
-         /// Occurs when [user updated].
 
-         /// </summary>
 
-         public event EventHandler<GenericEventArgs<User>> UserUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserPolicyUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserConfigurationUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserLockedOut;
 
-         public event EventHandler<GenericEventArgs<User>> UserCreated;
 
-         /// <summary>
 
-         /// Occurs when [user deleted].
 
-         /// </summary>
 
-         public event EventHandler<GenericEventArgs<User>> UserDeleted;
 
-         /// <inheritdoc />
 
-         public IEnumerable<User> Users => _users.Values;
 
-         /// <inheritdoc />
 
-         public IEnumerable<Guid> UsersIds => _users.Keys;
 
-         /// <summary>
 
-         /// Called when [user updated].
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         private void OnUserUpdated(User user)
 
-         {
 
-             UserUpdated?.Invoke(this, new GenericEventArgs<User>(user));
 
-         }
 
-         /// <summary>
 
-         /// Called when [user deleted].
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         private void OnUserDeleted(User user)
 
-         {
 
-             UserDeleted?.Invoke(this, new GenericEventArgs<User>(user));
 
-         }
 
-         public NameIdPair[] GetAuthenticationProviders()
 
-         {
 
-             return _authenticationProviders
 
-                 .Where(i => i.IsEnabled)
 
-                 .OrderBy(i => i is DefaultAuthenticationProvider ? 0 : 1)
 
-                 .ThenBy(i => i.Name)
 
-                 .Select(i => new NameIdPair
 
-                 {
 
-                     Name = i.Name,
 
-                     Id = GetAuthenticationProviderId(i)
 
-                 })
 
-                 .ToArray();
 
-         }
 
-         public NameIdPair[] GetPasswordResetProviders()
 
-         {
 
-             return _passwordResetProviders
 
-                 .Where(i => i.IsEnabled)
 
-                 .OrderBy(i => i is DefaultPasswordResetProvider ? 0 : 1)
 
-                 .ThenBy(i => i.Name)
 
-                 .Select(i => new NameIdPair
 
-                 {
 
-                     Name = i.Name,
 
-                     Id = GetPasswordResetProviderId(i)
 
-                 })
 
-                 .ToArray();
 
-         }
 
-         public void AddParts(IEnumerable<IAuthenticationProvider> authenticationProviders, IEnumerable<IPasswordResetProvider> passwordResetProviders)
 
-         {
 
-             _authenticationProviders = authenticationProviders.ToArray();
 
-             _defaultAuthenticationProvider = _authenticationProviders.OfType<DefaultAuthenticationProvider>().First();
 
-             _invalidAuthProvider = _authenticationProviders.OfType<InvalidAuthProvider>().First();
 
-             _passwordResetProviders = passwordResetProviders.ToArray();
 
-             _defaultPasswordResetProvider = passwordResetProviders.OfType<DefaultPasswordResetProvider>().First();
 
-         }
 
-         /// <inheritdoc />
 
-         public User GetUserById(Guid id)
 
-         {
 
-             if (id == Guid.Empty)
 
-             {
 
-                 throw new ArgumentException("Guid can't be empty", nameof(id));
 
-             }
 
-             _users.TryGetValue(id, out User user);
 
-             return user;
 
-         }
 
-         public User GetUserByName(string name)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(name))
 
-             {
 
-                 throw new ArgumentException("Invalid username", nameof(name));
 
-             }
 
-             return Users.FirstOrDefault(u => string.Equals(u.Name, name, StringComparison.OrdinalIgnoreCase));
 
-         }
 
-         public void Initialize()
 
-         {
 
-             LoadUsers();
 
-             var users = Users;
 
-             // If there are no local users with admin rights, make them all admins
 
-             if (!users.Any(i => i.Policy.IsAdministrator))
 
-             {
 
-                 foreach (var user in users)
 
-                 {
 
-                     user.Policy.IsAdministrator = true;
 
-                     UpdateUserPolicy(user, user.Policy, false);
 
-                 }
 
-             }
 
-         }
 
-         public static bool IsValidUsername(string username)
 
-         {
 
-             // This is some regex that matches only on unicode "word" characters, as well as -, _ and @
 
-             // In theory this will cut out most if not all 'control' characters which should help minimize any weirdness
 
-             // Usernames can contain letters (a-z + whatever else unicode is cool with), numbers (0-9), at-signs (@), dashes (-), underscores (_), apostrophes ('), and periods (.)
 
-             return Regex.IsMatch(username, @"^[\w\-'._@]*$");
 
-         }
 
-         private static bool IsValidUsernameCharacter(char i)
 
-             => IsValidUsername(i.ToString(CultureInfo.InvariantCulture));
 
-         public string MakeValidUsername(string username)
 
-         {
 
-             if (IsValidUsername(username))
 
-             {
 
-                 return username;
 
-             }
 
-             // Usernames can contain letters (a-z), numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.)
 
-             var builder = new StringBuilder();
 
-             foreach (var c in username)
 
-             {
 
-                 if (IsValidUsernameCharacter(c))
 
-                 {
 
-                     builder.Append(c);
 
-                 }
 
-             }
 
-             return builder.ToString();
 
-         }
 
-         public async Task<User> AuthenticateUser(
 
-             string username,
 
-             string password,
 
-             string hashedPassword,
 
-             string remoteEndPoint,
 
-             bool isUserSession)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(username))
 
-             {
 
-                 _logger.LogInformation("Authentication request without username has been denied (IP: {IP}).", remoteEndPoint);
 
-                 throw new ArgumentNullException(nameof(username));
 
-             }
 
-             var user = Users.FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase));
 
-             var success = false;
 
-             IAuthenticationProvider authenticationProvider = null;
 
-             if (user != null)
 
-             {
 
-                 var authResult = await AuthenticateLocalUser(username, password, hashedPassword, user, remoteEndPoint).ConfigureAwait(false);
 
-                 authenticationProvider = authResult.authenticationProvider;
 
-                 success = authResult.success;
 
-             }
 
-             else
 
-             {
 
-                 // user is null
 
-                 var authResult = await AuthenticateLocalUser(username, password, hashedPassword, null, remoteEndPoint).ConfigureAwait(false);
 
-                 authenticationProvider = authResult.authenticationProvider;
 
-                 string updatedUsername = authResult.username;
 
-                 success = authResult.success;
 
-                 if (success
 
-                     && authenticationProvider != null
 
-                     && !(authenticationProvider is DefaultAuthenticationProvider))
 
-                 {
 
-                     // Trust the username returned by the authentication provider
 
-                     username = updatedUsername;
 
-                     // Search the database for the user again
 
-                     // the authentication provider might have created it
 
-                     user = Users
 
-                         .FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase));
 
-                     if (authenticationProvider is IHasNewUserPolicy hasNewUserPolicy)
 
-                     {
 
-                         var policy = hasNewUserPolicy.GetNewUserPolicy();
 
-                         UpdateUserPolicy(user, policy, true);
 
-                     }
 
-                 }
 
-             }
 
-             if (success && user != null && authenticationProvider != null)
 
-             {
 
-                 var providerId = GetAuthenticationProviderId(authenticationProvider);
 
-                 if (!string.Equals(providerId, user.Policy.AuthenticationProviderId, StringComparison.OrdinalIgnoreCase))
 
-                 {
 
-                     user.Policy.AuthenticationProviderId = providerId;
 
-                     UpdateUserPolicy(user, user.Policy, true);
 
-                 }
 
-             }
 
-             if (user == null)
 
-             {
 
-                 _logger.LogInformation("Authentication request for {UserName} has been denied (IP: {IP}).", username, remoteEndPoint);
 
-                 throw new AuthenticationException("Invalid username or password entered.");
 
-             }
 
-             if (user.Policy.IsDisabled)
 
-             {
 
-                 _logger.LogInformation("Authentication request for {UserName} has been denied because this account is currently disabled (IP: {IP}).", username, remoteEndPoint);
 
-                 throw new SecurityException($"The {user.Name} account is currently disabled. Please consult with your administrator.");
 
-             }
 
-             if (!user.Policy.EnableRemoteAccess && !_networkManager.IsInLocalNetwork(remoteEndPoint))
 
-             {
 
-                 _logger.LogInformation("Authentication request for {UserName} forbidden: remote access disabled and user not in local network (IP: {IP}).", username, remoteEndPoint);
 
-                 throw new SecurityException("Forbidden.");
 
-             }
 
-             if (!user.IsParentalScheduleAllowed())
 
-             {
 
-                 _logger.LogInformation("Authentication request for {UserName} is not allowed at this time due parental restrictions (IP: {IP}).", username, remoteEndPoint);
 
-                 throw new SecurityException("User is not allowed access at this time.");
 
-             }
 
-             // Update LastActivityDate and LastLoginDate, then save
 
-             if (success)
 
-             {
 
-                 if (isUserSession)
 
-                 {
 
-                     user.LastActivityDate = user.LastLoginDate = DateTime.UtcNow;
 
-                     UpdateUser(user);
 
-                 }
 
-                 ResetInvalidLoginAttemptCount(user);
 
-                 _logger.LogInformation("Authentication request for {UserName} has succeeded.", user.Name);
 
-             }
 
-             else
 
-             {
 
-                 IncrementInvalidLoginAttemptCount(user);
 
-                 _logger.LogInformation("Authentication request for {UserName} has been denied (IP: {IP}).", user.Name, remoteEndPoint);
 
-             }
 
-             return success ? user : null;
 
-         }
 
- #nullable enable
 
-         private static string GetAuthenticationProviderId(IAuthenticationProvider provider)
 
-         {
 
-             return provider.GetType().FullName;
 
-         }
 
-         private static string GetPasswordResetProviderId(IPasswordResetProvider provider)
 
-         {
 
-             return provider.GetType().FullName;
 
-         }
 
-         private IAuthenticationProvider GetAuthenticationProvider(User user)
 
-         {
 
-             return GetAuthenticationProviders(user)[0];
 
-         }
 
-         private IPasswordResetProvider GetPasswordResetProvider(User user)
 
-         {
 
-             return GetPasswordResetProviders(user)[0];
 
-         }
 
-         private IAuthenticationProvider[] GetAuthenticationProviders(User? user)
 
-         {
 
-             var authenticationProviderId = user?.Policy.AuthenticationProviderId;
 
-             var providers = _authenticationProviders.Where(i => i.IsEnabled).ToArray();
 
-             if (!string.IsNullOrEmpty(authenticationProviderId))
 
-             {
 
-                 providers = providers.Where(i => string.Equals(authenticationProviderId, GetAuthenticationProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray();
 
-             }
 
-             if (providers.Length == 0)
 
-             {
 
-                 // Assign the user to the InvalidAuthProvider since no configured auth provider was valid/found
 
-                 _logger.LogWarning("User {UserName} was found with invalid/missing Authentication Provider {AuthenticationProviderId}. Assigning user to InvalidAuthProvider until this is corrected", user?.Name, user?.Policy.AuthenticationProviderId);
 
-                 providers = new IAuthenticationProvider[] { _invalidAuthProvider };
 
-             }
 
-             return providers;
 
-         }
 
-         private IPasswordResetProvider[] GetPasswordResetProviders(User? user)
 
-         {
 
-             var passwordResetProviderId = user?.Policy.PasswordResetProviderId;
 
-             var providers = _passwordResetProviders.Where(i => i.IsEnabled).ToArray();
 
-             if (!string.IsNullOrEmpty(passwordResetProviderId))
 
-             {
 
-                 providers = providers.Where(i => string.Equals(passwordResetProviderId, GetPasswordResetProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray();
 
-             }
 
-             if (providers.Length == 0)
 
-             {
 
-                 providers = new IPasswordResetProvider[] { _defaultPasswordResetProvider };
 
-             }
 
-             return providers;
 
-         }
 
-         private async Task<(string username, bool success)> AuthenticateWithProvider(
 
-             IAuthenticationProvider provider,
 
-             string username,
 
-             string password,
 
-             User? resolvedUser)
 
-         {
 
-             try
 
-             {
 
-                 var authenticationResult = provider is IRequiresResolvedUser requiresResolvedUser
 
-                     ? await requiresResolvedUser.Authenticate(username, password, resolvedUser).ConfigureAwait(false)
 
-                     : await provider.Authenticate(username, password).ConfigureAwait(false);
 
-                 if (authenticationResult.Username != username)
 
-                 {
 
-                     _logger.LogDebug("Authentication provider provided updated username {1}", authenticationResult.Username);
 
-                     username = authenticationResult.Username;
 
-                 }
 
-                 return (username, true);
 
-             }
 
-             catch (AuthenticationException ex)
 
-             {
 
-                 _logger.LogError(ex, "Error authenticating with provider {Provider}", provider.Name);
 
-                 return (username, false);
 
-             }
 
-         }
 
-         private async Task<(IAuthenticationProvider? authenticationProvider, string username, bool success)> AuthenticateLocalUser(
 
-             string username,
 
-             string password,
 
-             string hashedPassword,
 
-             User? user,
 
-             string remoteEndPoint)
 
-         {
 
-             bool success = false;
 
-             IAuthenticationProvider? authenticationProvider = null;
 
-             foreach (var provider in GetAuthenticationProviders(user))
 
-             {
 
-                 var providerAuthResult = await AuthenticateWithProvider(provider, username, password, user).ConfigureAwait(false);
 
-                 var updatedUsername = providerAuthResult.username;
 
-                 success = providerAuthResult.success;
 
-                 if (success)
 
-                 {
 
-                     authenticationProvider = provider;
 
-                     username = updatedUsername;
 
-                     break;
 
-                 }
 
-             }
 
-             if (!success
 
-                 && _networkManager.IsInLocalNetwork(remoteEndPoint)
 
-                 && user?.Configuration.EnableLocalPassword == true
 
-                 && !string.IsNullOrEmpty(user.EasyPassword))
 
-             {
 
-                 // Check easy password
 
-                 var passwordHash = PasswordHash.Parse(user.EasyPassword);
 
-                 var hash = _cryptoProvider.ComputeHash(
 
-                     passwordHash.Id,
 
-                     Encoding.UTF8.GetBytes(password),
 
-                     passwordHash.Salt.ToArray());
 
-                 success = passwordHash.Hash.SequenceEqual(hash);
 
-             }
 
-             return (authenticationProvider, username, success);
 
-         }
 
-         private void ResetInvalidLoginAttemptCount(User user)
 
-         {
 
-             user.Policy.InvalidLoginAttemptCount = 0;
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-         }
 
-         private void IncrementInvalidLoginAttemptCount(User user)
 
-         {
 
-             int invalidLogins = ++user.Policy.InvalidLoginAttemptCount;
 
-             int maxInvalidLogins = user.Policy.LoginAttemptsBeforeLockout;
 
-             if (maxInvalidLogins > 0
 
-                 && invalidLogins >= maxInvalidLogins)
 
-             {
 
-                 user.Policy.IsDisabled = true;
 
-                 UserLockedOut?.Invoke(this, new GenericEventArgs<User>(user));
 
-                 _logger.LogWarning(
 
-                     "Disabling user {UserName} due to {Attempts} unsuccessful login attempts.",
 
-                     user.Name,
 
-                     invalidLogins);
 
-             }
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-         }
 
-         /// <summary>
 
-         /// Loads the users from the repository.
 
-         /// </summary>
 
-         private void LoadUsers()
 
-         {
 
-             var users = _userRepository.RetrieveAllUsers();
 
-             // There always has to be at least one user.
 
-             if (users.Count != 0)
 
-             {
 
-                 _users = new ConcurrentDictionary<Guid, User>(
 
-                     users.Select(x => new KeyValuePair<Guid, User>(x.Id, x)));
 
-                 return;
 
-             }
 
-             var defaultName = Environment.UserName;
 
-             if (string.IsNullOrWhiteSpace(defaultName))
 
-             {
 
-                 defaultName = "MyJellyfinUser";
 
-             }
 
-             _logger.LogWarning("No users, creating one with username {UserName}", defaultName);
 
-             var name = MakeValidUsername(defaultName);
 
-             var user = InstantiateNewUser(name);
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.CreateUser(user);
 
-             user.Policy.IsAdministrator = true;
 
-             user.Policy.EnableContentDeletion = true;
 
-             user.Policy.EnableRemoteControlOfOtherUsers = true;
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-             _users = new ConcurrentDictionary<Guid, User>();
 
-             _users[user.Id] = user;
 
-         }
 
- #nullable restore
 
-         public UserDto GetUserDto(User user, string remoteEndPoint = null)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             bool hasConfiguredPassword = GetAuthenticationProvider(user).HasPassword(user);
 
-             bool hasConfiguredEasyPassword = !string.IsNullOrEmpty(GetAuthenticationProvider(user).GetEasyPasswordHash(user));
 
-             bool hasPassword = user.Configuration.EnableLocalPassword && !string.IsNullOrEmpty(remoteEndPoint) && _networkManager.IsInLocalNetwork(remoteEndPoint) ?
 
-                 hasConfiguredEasyPassword :
 
-                 hasConfiguredPassword;
 
-             UserDto dto = new UserDto
 
-             {
 
-                 Id = user.Id,
 
-                 Name = user.Name,
 
-                 HasPassword = hasPassword,
 
-                 HasConfiguredPassword = hasConfiguredPassword,
 
-                 HasConfiguredEasyPassword = hasConfiguredEasyPassword,
 
-                 LastActivityDate = user.LastActivityDate,
 
-                 LastLoginDate = user.LastLoginDate,
 
-                 Configuration = user.Configuration,
 
-                 ServerId = _appHost.SystemId,
 
-                 Policy = user.Policy
 
-             };
 
-             if (!hasPassword && _users.Count == 1)
 
-             {
 
-                 dto.EnableAutoLogin = true;
 
-             }
 
-             ItemImageInfo image = user.GetImageInfo(ImageType.Primary, 0);
 
-             if (image != null)
 
-             {
 
-                 dto.PrimaryImageTag = GetImageCacheTag(user, image);
 
-                 try
 
-                 {
 
-                     DtoService.AttachPrimaryImageAspectRatio(dto, user);
 
-                 }
 
-                 catch (Exception ex)
 
-                 {
 
-                     // Have to use a catch-all unfortunately because some .net image methods throw plain Exceptions
 
-                     _logger.LogError(ex, "Error generating PrimaryImageAspectRatio for {User}", user.Name);
 
-                 }
 
-             }
 
-             return dto;
 
-         }
 
-         public UserDto GetOfflineUserDto(User user)
 
-         {
 
-             var dto = GetUserDto(user);
 
-             dto.ServerName = _appHost.FriendlyName;
 
-             return dto;
 
-         }
 
-         private string GetImageCacheTag(BaseItem item, ItemImageInfo image)
 
-         {
 
-             try
 
-             {
 
-                 return _imageProcessor.GetImageCacheTag(item, image);
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error getting {ImageType} image info for {ImagePath}", image.Type, image.Path);
 
-                 return null;
 
-             }
 
-         }
 
-         /// <summary>
 
-         /// Refreshes metadata for each user
 
-         /// </summary>
 
-         /// <param name="cancellationToken">The cancellation token.</param>
 
-         /// <returns>Task.</returns>
 
-         public async Task RefreshUsersMetadata(CancellationToken cancellationToken)
 
-         {
 
-             foreach (var user in Users)
 
-             {
 
-                 await user.RefreshMetadata(new MetadataRefreshOptions(new DirectoryService(_fileSystem)), cancellationToken).ConfigureAwait(false);
 
-             }
 
-         }
 
-         /// <summary>
 
-         /// Renames the user.
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         /// <param name="newName">The new name.</param>
 
-         /// <returns>Task.</returns>
 
-         /// <exception cref="ArgumentNullException">user</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public async Task RenameUser(User user, string newName)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (string.IsNullOrWhiteSpace(newName))
 
-             {
 
-                 throw new ArgumentException("Invalid username", nameof(newName));
 
-             }
 
-             if (user.Name.Equals(newName, StringComparison.Ordinal))
 
-             {
 
-                 throw new ArgumentException("The new and old names must be different.");
 
-             }
 
-             if (Users.Any(
 
-                 u => u.Id != user.Id && u.Name.Equals(newName, StringComparison.OrdinalIgnoreCase)))
 
-             {
 
-                 throw new ArgumentException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "A user with the name '{0}' already exists.",
 
-                     newName));
 
-             }
 
-             await user.Rename(newName).ConfigureAwait(false);
 
-             OnUserUpdated(user);
 
-         }
 
-         /// <summary>
 
-         /// Updates the user.
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         /// <exception cref="ArgumentNullException">user</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public void UpdateUser(User user)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (user.Id == Guid.Empty)
 
-             {
 
-                 throw new ArgumentException("Id can't be empty.", nameof(user));
 
-             }
 
-             if (!_users.ContainsKey(user.Id))
 
-             {
 
-                 throw new ArgumentException(
 
-                     string.Format(
 
-                         CultureInfo.InvariantCulture,
 
-                         "A user '{0}' with Id {1} does not exist.",
 
-                         user.Name,
 
-                         user.Id),
 
-                     nameof(user));
 
-             }
 
-             user.DateModified = DateTime.UtcNow;
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.UpdateUser(user);
 
-             OnUserUpdated(user);
 
-         }
 
-         /// <summary>
 
-         /// Creates the user.
 
-         /// </summary>
 
-         /// <param name="name">The name.</param>
 
-         /// <returns>User.</returns>
 
-         /// <exception cref="ArgumentNullException">name</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public User CreateUser(string name)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(name))
 
-             {
 
-                 throw new ArgumentNullException(nameof(name));
 
-             }
 
-             if (!IsValidUsername(name))
 
-             {
 
-                 throw new ArgumentException("Usernames can contain unicode symbols, numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.)");
 
-             }
 
-             if (Users.Any(u => u.Name.Equals(name, StringComparison.OrdinalIgnoreCase)))
 
-             {
 
-                 throw new ArgumentException(string.Format("A user with the name '{0}' already exists.", name));
 
-             }
 
-             var user = InstantiateNewUser(name);
 
-             _users[user.Id] = user;
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.CreateUser(user);
 
-             EventHelper.QueueEventIfNotNull(UserCreated, this, new GenericEventArgs<User>(user), _logger);
 
-             return user;
 
-         }
 
-         /// <inheritdoc />
 
-         /// <exception cref="ArgumentNullException">The <c>user</c> is <c>null</c>.</exception>
 
-         /// <exception cref="ArgumentException">The <c>user</c> doesn't exist, or is the last administrator.</exception>
 
-         /// <exception cref="InvalidOperationException">The <c>user</c> can't be deleted; there are no other users.</exception>
 
-         public void DeleteUser(User user)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (!_users.ContainsKey(user.Id))
 
-             {
 
-                 throw new ArgumentException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "The user cannot be deleted because there is no user with the Name {0} and Id {1}.",
 
-                     user.Name,
 
-                     user.Id));
 
-             }
 
-             if (_users.Count == 1)
 
-             {
 
-                 throw new InvalidOperationException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "The user '{0}' cannot be deleted because there must be at least one user in the system.",
 
-                     user.Name));
 
-             }
 
-             if (user.Policy.IsAdministrator
 
-                 && Users.Count(i => i.Policy.IsAdministrator) == 1)
 
-             {
 
-                 throw new ArgumentException(
 
-                     string.Format(
 
-                         CultureInfo.InvariantCulture,
 
-                         "The user '{0}' cannot be deleted because there must be at least one admin user in the system.",
 
-                         user.Name),
 
-                     nameof(user));
 
-             }
 
-             var configPath = GetConfigurationFilePath(user);
 
-             _userRepository.DeleteUser(user);
 
-             // Delete user config dir
 
-             lock (_configSyncLock)
 
-                 lock (_policySyncLock)
 
-                 {
 
-                     try
 
-                     {
 
-                         Directory.Delete(user.ConfigurationDirectoryPath, true);
 
-                     }
 
-                     catch (IOException ex)
 
-                     {
 
-                         _logger.LogError(ex, "Error deleting user config dir: {Path}", user.ConfigurationDirectoryPath);
 
-                     }
 
-                 }
 
-             _users.TryRemove(user.Id, out _);
 
-             OnUserDeleted(user);
 
-         }
 
-         /// <summary>
 
-         /// Resets the password by clearing it.
 
-         /// </summary>
 
-         /// <returns>Task.</returns>
 
-         public Task ResetPassword(User user)
 
-         {
 
-             return ChangePassword(user, string.Empty);
 
-         }
 
-         public void ResetEasyPassword(User user)
 
-         {
 
-             ChangeEasyPassword(user, string.Empty, null);
 
-         }
 
-         public async Task ChangePassword(User user, string newPassword)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             await GetAuthenticationProvider(user).ChangePassword(user, newPassword).ConfigureAwait(false);
 
-             UpdateUser(user);
 
-             UserPasswordChanged?.Invoke(this, new GenericEventArgs<User>(user));
 
-         }
 
-         public void ChangeEasyPassword(User user, string newPassword, string newPasswordHash)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             GetAuthenticationProvider(user).ChangeEasyPassword(user, newPassword, newPasswordHash);
 
-             UpdateUser(user);
 
-             UserPasswordChanged?.Invoke(this, new GenericEventArgs<User>(user));
 
-         }
 
-         /// <summary>
 
-         /// Instantiates the new user.
 
-         /// </summary>
 
-         /// <param name="name">The name.</param>
 
-         /// <returns>User.</returns>
 
-         private static User InstantiateNewUser(string name)
 
-         {
 
-             return new User
 
-             {
 
-                 Name = name,
 
-                 Id = Guid.NewGuid(),
 
-                 DateCreated = DateTime.UtcNow,
 
-                 DateModified = DateTime.UtcNow
 
-             };
 
-         }
 
-         public async Task<ForgotPasswordResult> StartForgotPasswordProcess(string enteredUsername, bool isInNetwork)
 
-         {
 
-             var user = string.IsNullOrWhiteSpace(enteredUsername) ?
 
-                 null :
 
-                 GetUserByName(enteredUsername);
 
-             var action = ForgotPasswordAction.InNetworkRequired;
 
-             if (user != null && isInNetwork)
 
-             {
 
-                 var passwordResetProvider = GetPasswordResetProvider(user);
 
-                 return await passwordResetProvider.StartForgotPasswordProcess(user, isInNetwork).ConfigureAwait(false);
 
-             }
 
-             else
 
-             {
 
-                 return new ForgotPasswordResult
 
-                 {
 
-                     Action = action,
 
-                     PinFile = string.Empty
 
-                 };
 
-             }
 
-         }
 
-         public async Task<PinRedeemResult> RedeemPasswordResetPin(string pin)
 
-         {
 
-             foreach (var provider in _passwordResetProviders)
 
-             {
 
-                 var result = await provider.RedeemPasswordResetPin(pin).ConfigureAwait(false);
 
-                 if (result.Success)
 
-                 {
 
-                     return result;
 
-                 }
 
-             }
 
-             return new PinRedeemResult
 
-             {
 
-                 Success = false,
 
-                 UsersReset = Array.Empty<string>()
 
-             };
 
-         }
 
-         public UserPolicy GetUserPolicy(User user)
 
-         {
 
-             var path = GetPolicyFilePath(user);
 
-             if (!File.Exists(path))
 
-             {
 
-                 return GetDefaultPolicy();
 
-             }
 
-             try
 
-             {
 
-                 lock (_policySyncLock)
 
-                 {
 
-                     return (UserPolicy)_xmlSerializer.DeserializeFromFile(typeof(UserPolicy), path);
 
-                 }
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error reading policy file: {Path}", path);
 
-                 return GetDefaultPolicy();
 
-             }
 
-         }
 
-         private static UserPolicy GetDefaultPolicy()
 
-         {
 
-             return new UserPolicy
 
-             {
 
-                 EnableContentDownloading = true,
 
-                 EnableSyncTranscoding = true
 
-             };
 
-         }
 
-         public void UpdateUserPolicy(Guid userId, UserPolicy userPolicy)
 
-         {
 
-             var user = GetUserById(userId);
 
-             UpdateUserPolicy(user, userPolicy, true);
 
-         }
 
-         private void UpdateUserPolicy(User user, UserPolicy userPolicy, bool fireEvent)
 
-         {
 
-             // The xml serializer will output differently if the type is not exact
 
-             if (userPolicy.GetType() != typeof(UserPolicy))
 
-             {
 
-                 var json = _jsonSerializer.SerializeToString(userPolicy);
 
-                 userPolicy = _jsonSerializer.DeserializeFromString<UserPolicy>(json);
 
-             }
 
-             var path = GetPolicyFilePath(user);
 
-             Directory.CreateDirectory(Path.GetDirectoryName(path));
 
-             lock (_policySyncLock)
 
-             {
 
-                 _xmlSerializer.SerializeToFile(userPolicy, path);
 
-                 user.Policy = userPolicy;
 
-             }
 
-             if (fireEvent)
 
-             {
 
-                 UserPolicyUpdated?.Invoke(this, new GenericEventArgs<User>(user));
 
-             }
 
-         }
 
-         private static string GetPolicyFilePath(User user)
 
-         {
 
-             return Path.Combine(user.ConfigurationDirectoryPath, "policy.xml");
 
-         }
 
-         private static string GetConfigurationFilePath(User user)
 
-         {
 
-             return Path.Combine(user.ConfigurationDirectoryPath, "config.xml");
 
-         }
 
-         public UserConfiguration GetUserConfiguration(User user)
 
-         {
 
-             var path = GetConfigurationFilePath(user);
 
-             if (!File.Exists(path))
 
-             {
 
-                 return new UserConfiguration();
 
-             }
 
-             try
 
-             {
 
-                 lock (_configSyncLock)
 
-                 {
 
-                     return (UserConfiguration)_xmlSerializer.DeserializeFromFile(typeof(UserConfiguration), path);
 
-                 }
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error reading policy file: {Path}", path);
 
-                 return new UserConfiguration();
 
-             }
 
-         }
 
-         public void UpdateConfiguration(Guid userId, UserConfiguration config)
 
-         {
 
-             var user = GetUserById(userId);
 
-             UpdateConfiguration(user, config);
 
-         }
 
-         public void UpdateConfiguration(User user, UserConfiguration config)
 
-         {
 
-             UpdateConfiguration(user, config, true);
 
-         }
 
-         private void UpdateConfiguration(User user, UserConfiguration config, bool fireEvent)
 
-         {
 
-             var path = GetConfigurationFilePath(user);
 
-             // The xml serializer will output differently if the type is not exact
 
-             if (config.GetType() != typeof(UserConfiguration))
 
-             {
 
-                 var json = _jsonSerializer.SerializeToString(config);
 
-                 config = _jsonSerializer.DeserializeFromString<UserConfiguration>(json);
 
-             }
 
-             Directory.CreateDirectory(Path.GetDirectoryName(path));
 
-             lock (_configSyncLock)
 
-             {
 
-                 _xmlSerializer.SerializeToFile(config, path);
 
-                 user.Configuration = config;
 
-             }
 
-             if (fireEvent)
 
-             {
 
-                 UserConfigurationUpdated?.Invoke(this, new GenericEventArgs<User>(user));
 
-             }
 
-         }
 
-     }
 
-     public class DeviceAccessEntryPoint : IServerEntryPoint
 
-     {
 
-         private IUserManager _userManager;
 
-         private IAuthenticationRepository _authRepo;
 
-         private IDeviceManager _deviceManager;
 
-         private ISessionManager _sessionManager;
 
-         public DeviceAccessEntryPoint(IUserManager userManager, IAuthenticationRepository authRepo, IDeviceManager deviceManager, ISessionManager sessionManager)
 
-         {
 
-             _userManager = userManager;
 
-             _authRepo = authRepo;
 
-             _deviceManager = deviceManager;
 
-             _sessionManager = sessionManager;
 
-         }
 
-         public Task RunAsync()
 
-         {
 
-             _userManager.UserPolicyUpdated += _userManager_UserPolicyUpdated;
 
-             return Task.CompletedTask;
 
-         }
 
-         private void _userManager_UserPolicyUpdated(object sender, GenericEventArgs<User> e)
 
-         {
 
-             var user = e.Argument;
 
-             if (!user.Policy.EnableAllDevices)
 
-             {
 
-                 UpdateDeviceAccess(user);
 
-             }
 
-         }
 
-         private void UpdateDeviceAccess(User user)
 
-         {
 
-             var existing = _authRepo.Get(new AuthenticationInfoQuery
 
-             {
 
-                 UserId = user.Id
 
-             }).Items;
 
-             foreach (var authInfo in existing)
 
-             {
 
-                 if (!string.IsNullOrEmpty(authInfo.DeviceId) && !_deviceManager.CanAccessDevice(user, authInfo.DeviceId))
 
-                 {
 
-                     _sessionManager.Logout(authInfo);
 
-                 }
 
-             }
 
-         }
 
-         public void Dispose()
 
-         {
 
-         }
 
-     }
 
- }
 
 
  |