| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111 | 
							- #pragma warning disable CS1591
 
- using System;
 
- using System.Collections.Concurrent;
 
- using System.Collections.Generic;
 
- using System.Globalization;
 
- using System.IO;
 
- using System.Linq;
 
- using System.Text;
 
- using System.Text.RegularExpressions;
 
- using System.Threading;
 
- using System.Threading.Tasks;
 
- using MediaBrowser.Common.Cryptography;
 
- using MediaBrowser.Common.Events;
 
- using MediaBrowser.Common.Net;
 
- using MediaBrowser.Controller;
 
- using MediaBrowser.Controller.Authentication;
 
- using MediaBrowser.Controller.Devices;
 
- using MediaBrowser.Controller.Drawing;
 
- using MediaBrowser.Controller.Dto;
 
- using MediaBrowser.Controller.Entities;
 
- using MediaBrowser.Controller.Library;
 
- using MediaBrowser.Controller.Persistence;
 
- using MediaBrowser.Controller.Plugins;
 
- using MediaBrowser.Controller.Providers;
 
- using MediaBrowser.Controller.Security;
 
- using MediaBrowser.Controller.Session;
 
- using MediaBrowser.Model.Configuration;
 
- using MediaBrowser.Model.Cryptography;
 
- using MediaBrowser.Model.Dto;
 
- using MediaBrowser.Model.Entities;
 
- using MediaBrowser.Model.Events;
 
- using MediaBrowser.Model.IO;
 
- using MediaBrowser.Model.Serialization;
 
- using MediaBrowser.Model.Users;
 
- using Microsoft.Extensions.Logging;
 
- namespace Emby.Server.Implementations.Library
 
- {
 
-     /// <summary>
 
-     /// Class UserManager.
 
-     /// </summary>
 
-     public class UserManager : IUserManager
 
-     {
 
-         private readonly object _policySyncLock = new object();
 
-         private readonly object _configSyncLock = new object();
 
-         /// <summary>
 
-         /// The logger.
 
-         /// </summary>
 
-         private readonly ILogger _logger;
 
-         /// <summary>
 
-         /// Gets the active user repository.
 
-         /// </summary>
 
-         /// <value>The user repository.</value>
 
-         private readonly IUserRepository _userRepository;
 
-         private readonly IXmlSerializer _xmlSerializer;
 
-         private readonly IJsonSerializer _jsonSerializer;
 
-         private readonly INetworkManager _networkManager;
 
-         private readonly Func<IImageProcessor> _imageProcessorFactory;
 
-         private readonly Func<IDtoService> _dtoServiceFactory;
 
-         private readonly IServerApplicationHost _appHost;
 
-         private readonly IFileSystem _fileSystem;
 
-         private readonly ICryptoProvider _cryptoProvider;
 
-         private ConcurrentDictionary<Guid, User> _users;
 
-         private IAuthenticationProvider[] _authenticationProviders;
 
-         private DefaultAuthenticationProvider _defaultAuthenticationProvider;
 
-         private InvalidAuthProvider _invalidAuthProvider;
 
-         private IPasswordResetProvider[] _passwordResetProviders;
 
-         private DefaultPasswordResetProvider _defaultPasswordResetProvider;
 
-         public UserManager(
 
-             ILogger<UserManager> logger,
 
-             IUserRepository userRepository,
 
-             IXmlSerializer xmlSerializer,
 
-             INetworkManager networkManager,
 
-             Func<IImageProcessor> imageProcessorFactory,
 
-             Func<IDtoService> dtoServiceFactory,
 
-             IServerApplicationHost appHost,
 
-             IJsonSerializer jsonSerializer,
 
-             IFileSystem fileSystem,
 
-             ICryptoProvider cryptoProvider)
 
-         {
 
-             _logger = logger;
 
-             _userRepository = userRepository;
 
-             _xmlSerializer = xmlSerializer;
 
-             _networkManager = networkManager;
 
-             _imageProcessorFactory = imageProcessorFactory;
 
-             _dtoServiceFactory = dtoServiceFactory;
 
-             _appHost = appHost;
 
-             _jsonSerializer = jsonSerializer;
 
-             _fileSystem = fileSystem;
 
-             _cryptoProvider = cryptoProvider;
 
-             _users = null;
 
-         }
 
-         public event EventHandler<GenericEventArgs<User>> UserPasswordChanged;
 
-         /// <summary>
 
-         /// Occurs when [user updated].
 
-         /// </summary>
 
-         public event EventHandler<GenericEventArgs<User>> UserUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserPolicyUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserConfigurationUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserLockedOut;
 
-         public event EventHandler<GenericEventArgs<User>> UserCreated;
 
-         /// <summary>
 
-         /// Occurs when [user deleted].
 
-         /// </summary>
 
-         public event EventHandler<GenericEventArgs<User>> UserDeleted;
 
-         /// <inheritdoc />
 
-         public IEnumerable<User> Users => _users.Values;
 
-         /// <inheritdoc />
 
-         public IEnumerable<Guid> UsersIds => _users.Keys;
 
-         /// <summary>
 
-         /// Called when [user updated].
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         private void OnUserUpdated(User user)
 
-         {
 
-             UserUpdated?.Invoke(this, new GenericEventArgs<User> { Argument = user });
 
-         }
 
-         /// <summary>
 
-         /// Called when [user deleted].
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         private void OnUserDeleted(User user)
 
-         {
 
-             UserDeleted?.Invoke(this, new GenericEventArgs<User> { Argument = user });
 
-         }
 
-         public NameIdPair[] GetAuthenticationProviders()
 
-         {
 
-             return _authenticationProviders
 
-                 .Where(i => i.IsEnabled)
 
-                 .OrderBy(i => i is DefaultAuthenticationProvider ? 0 : 1)
 
-                 .ThenBy(i => i.Name)
 
-                 .Select(i => new NameIdPair
 
-                 {
 
-                     Name = i.Name,
 
-                     Id = GetAuthenticationProviderId(i)
 
-                 })
 
-                 .ToArray();
 
-         }
 
-         public NameIdPair[] GetPasswordResetProviders()
 
-         {
 
-             return _passwordResetProviders
 
-                 .Where(i => i.IsEnabled)
 
-                 .OrderBy(i => i is DefaultPasswordResetProvider ? 0 : 1)
 
-                 .ThenBy(i => i.Name)
 
-                 .Select(i => new NameIdPair
 
-                 {
 
-                     Name = i.Name,
 
-                     Id = GetPasswordResetProviderId(i)
 
-                 })
 
-                 .ToArray();
 
-         }
 
-         public void AddParts(IEnumerable<IAuthenticationProvider> authenticationProviders, IEnumerable<IPasswordResetProvider> passwordResetProviders)
 
-         {
 
-             _authenticationProviders = authenticationProviders.ToArray();
 
-             _defaultAuthenticationProvider = _authenticationProviders.OfType<DefaultAuthenticationProvider>().First();
 
-             _invalidAuthProvider = _authenticationProviders.OfType<InvalidAuthProvider>().First();
 
-             _passwordResetProviders = passwordResetProviders.ToArray();
 
-             _defaultPasswordResetProvider = passwordResetProviders.OfType<DefaultPasswordResetProvider>().First();
 
-         }
 
-         /// <inheritdoc />
 
-         public User GetUserById(Guid id)
 
-         {
 
-             if (id == Guid.Empty)
 
-             {
 
-                 throw new ArgumentException("Guid can't be empty", nameof(id));
 
-             }
 
-             _users.TryGetValue(id, out User user);
 
-             return user;
 
-         }
 
-         public User GetUserByName(string name)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(name))
 
-             {
 
-                 throw new ArgumentException("Invalid username", nameof(name));
 
-             }
 
-             return Users.FirstOrDefault(u => string.Equals(u.Name, name, StringComparison.OrdinalIgnoreCase));
 
-         }
 
-         public void Initialize()
 
-         {
 
-             LoadUsers();
 
-             var users = Users;
 
-             // If there are no local users with admin rights, make them all admins
 
-             if (!users.Any(i => i.Policy.IsAdministrator))
 
-             {
 
-                 foreach (var user in users)
 
-                 {
 
-                     user.Policy.IsAdministrator = true;
 
-                     UpdateUserPolicy(user, user.Policy, false);
 
-                 }
 
-             }
 
-         }
 
-         public static bool IsValidUsername(string username)
 
-         {
 
-             // This is some regex that matches only on unicode "word" characters, as well as -, _ and @
 
-             // In theory this will cut out most if not all 'control' characters which should help minimize any weirdness
 
-             // Usernames can contain letters (a-z + whatever else unicode is cool with), numbers (0-9), at-signs (@), dashes (-), underscores (_), apostrophes ('), and periods (.)
 
-             return Regex.IsMatch(username, @"^[\w\-'._@]*$");
 
-         }
 
-         private static bool IsValidUsernameCharacter(char i)
 
-             => IsValidUsername(i.ToString(CultureInfo.InvariantCulture));
 
-         public string MakeValidUsername(string username)
 
-         {
 
-             if (IsValidUsername(username))
 
-             {
 
-                 return username;
 
-             }
 
-             // Usernames can contain letters (a-z), numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.)
 
-             var builder = new StringBuilder();
 
-             foreach (var c in username)
 
-             {
 
-                 if (IsValidUsernameCharacter(c))
 
-                 {
 
-                     builder.Append(c);
 
-                 }
 
-             }
 
-             return builder.ToString();
 
-         }
 
-         public async Task<User> AuthenticateUser(
 
-             string username,
 
-             string password,
 
-             string hashedPassword,
 
-             string remoteEndPoint,
 
-             bool isUserSession)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(username))
 
-             {
 
-                 throw new ArgumentNullException(nameof(username));
 
-             }
 
-             var user = Users.FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase));
 
-             var success = false;
 
-             IAuthenticationProvider authenticationProvider = null;
 
-             if (user != null)
 
-             {
 
-                 var authResult = await AuthenticateLocalUser(username, password, hashedPassword, user, remoteEndPoint).ConfigureAwait(false);
 
-                 authenticationProvider = authResult.authenticationProvider;
 
-                 success = authResult.success;
 
-             }
 
-             else
 
-             {
 
-                 // user is null
 
-                 var authResult = await AuthenticateLocalUser(username, password, hashedPassword, null, remoteEndPoint).ConfigureAwait(false);
 
-                 authenticationProvider = authResult.authenticationProvider;
 
-                 string updatedUsername = authResult.username;
 
-                 success = authResult.success;
 
-                 if (success
 
-                     && authenticationProvider != null
 
-                     && !(authenticationProvider is DefaultAuthenticationProvider))
 
-                 {
 
-                     // Trust the username returned by the authentication provider
 
-                     username = updatedUsername;
 
-                     // Search the database for the user again
 
-                     // the authentication provider might have created it
 
-                     user = Users
 
-                         .FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase));
 
-                     if (authenticationProvider is IHasNewUserPolicy hasNewUserPolicy)
 
-                     {
 
-                         var policy = hasNewUserPolicy.GetNewUserPolicy();
 
-                         UpdateUserPolicy(user, policy, true);
 
-                     }
 
-                 }
 
-             }
 
-             if (success && user != null && authenticationProvider != null)
 
-             {
 
-                 var providerId = GetAuthenticationProviderId(authenticationProvider);
 
-                 if (!string.Equals(providerId, user.Policy.AuthenticationProviderId, StringComparison.OrdinalIgnoreCase))
 
-                 {
 
-                     user.Policy.AuthenticationProviderId = providerId;
 
-                     UpdateUserPolicy(user, user.Policy, true);
 
-                 }
 
-             }
 
-             if (user == null)
 
-             {
 
-                 throw new AuthenticationException("Invalid username or password entered.");
 
-             }
 
-             if (user.Policy.IsDisabled)
 
-             {
 
-                 throw new AuthenticationException(
 
-                     string.Format(
 
-                         CultureInfo.InvariantCulture,
 
-                         "The {0} account is currently disabled. Please consult with your administrator.",
 
-                         user.Name));
 
-             }
 
-             if (!user.Policy.EnableRemoteAccess && !_networkManager.IsInLocalNetwork(remoteEndPoint))
 
-             {
 
-                 throw new AuthenticationException("Forbidden.");
 
-             }
 
-             if (!user.IsParentalScheduleAllowed())
 
-             {
 
-                 throw new AuthenticationException("User is not allowed access at this time.");
 
-             }
 
-             // Update LastActivityDate and LastLoginDate, then save
 
-             if (success)
 
-             {
 
-                 if (isUserSession)
 
-                 {
 
-                     user.LastActivityDate = user.LastLoginDate = DateTime.UtcNow;
 
-                     UpdateUser(user);
 
-                 }
 
-                 ResetInvalidLoginAttemptCount(user);
 
-             }
 
-             else
 
-             {
 
-                 IncrementInvalidLoginAttemptCount(user);
 
-             }
 
-             _logger.LogInformation("Authentication request for {0} {1}.", user.Name, success ? "has succeeded" : "has been denied");
 
-             return success ? user : null;
 
-         }
 
- #nullable enable
 
-         private static string GetAuthenticationProviderId(IAuthenticationProvider provider)
 
-         {
 
-             return provider.GetType().FullName;
 
-         }
 
-         private static string GetPasswordResetProviderId(IPasswordResetProvider provider)
 
-         {
 
-             return provider.GetType().FullName;
 
-         }
 
-         private IAuthenticationProvider GetAuthenticationProvider(User user)
 
-         {
 
-             return GetAuthenticationProviders(user)[0];
 
-         }
 
-         private IPasswordResetProvider GetPasswordResetProvider(User user)
 
-         {
 
-             return GetPasswordResetProviders(user)[0];
 
-         }
 
-         private IAuthenticationProvider[] GetAuthenticationProviders(User? user)
 
-         {
 
-             var authenticationProviderId = user?.Policy.AuthenticationProviderId;
 
-             var providers = _authenticationProviders.Where(i => i.IsEnabled).ToArray();
 
-             if (!string.IsNullOrEmpty(authenticationProviderId))
 
-             {
 
-                 providers = providers.Where(i => string.Equals(authenticationProviderId, GetAuthenticationProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray();
 
-             }
 
-             if (providers.Length == 0)
 
-             {
 
-                 // Assign the user to the InvalidAuthProvider since no configured auth provider was valid/found
 
-                 _logger.LogWarning("User {UserName} was found with invalid/missing Authentication Provider {AuthenticationProviderId}. Assigning user to InvalidAuthProvider until this is corrected", user?.Name, user?.Policy.AuthenticationProviderId);
 
-                 providers = new IAuthenticationProvider[] { _invalidAuthProvider };
 
-             }
 
-             return providers;
 
-         }
 
-         private IPasswordResetProvider[] GetPasswordResetProviders(User? user)
 
-         {
 
-             var passwordResetProviderId = user?.Policy.PasswordResetProviderId;
 
-             var providers = _passwordResetProviders.Where(i => i.IsEnabled).ToArray();
 
-             if (!string.IsNullOrEmpty(passwordResetProviderId))
 
-             {
 
-                 providers = providers.Where(i => string.Equals(passwordResetProviderId, GetPasswordResetProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray();
 
-             }
 
-             if (providers.Length == 0)
 
-             {
 
-                 providers = new IPasswordResetProvider[] { _defaultPasswordResetProvider };
 
-             }
 
-             return providers;
 
-         }
 
-         private async Task<(string username, bool success)> AuthenticateWithProvider(
 
-             IAuthenticationProvider provider,
 
-             string username,
 
-             string password,
 
-             User? resolvedUser)
 
-         {
 
-             try
 
-             {
 
-                 var authenticationResult = provider is IRequiresResolvedUser requiresResolvedUser
 
-                     ? await requiresResolvedUser.Authenticate(username, password, resolvedUser).ConfigureAwait(false)
 
-                     : await provider.Authenticate(username, password).ConfigureAwait(false);
 
-                 if (authenticationResult.Username != username)
 
-                 {
 
-                     _logger.LogDebug("Authentication provider provided updated username {1}", authenticationResult.Username);
 
-                     username = authenticationResult.Username;
 
-                 }
 
-                 return (username, true);
 
-             }
 
-             catch (AuthenticationException ex)
 
-             {
 
-                 _logger.LogError(ex, "Error authenticating with provider {Provider}", provider.Name);
 
-                 return (username, false);
 
-             }
 
-         }
 
-         private async Task<(IAuthenticationProvider? authenticationProvider, string username, bool success)> AuthenticateLocalUser(
 
-             string username,
 
-             string password,
 
-             string hashedPassword,
 
-             User? user,
 
-             string remoteEndPoint)
 
-         {
 
-             bool success = false;
 
-             IAuthenticationProvider? authenticationProvider = null;
 
-             foreach (var provider in GetAuthenticationProviders(user))
 
-             {
 
-                 var providerAuthResult = await AuthenticateWithProvider(provider, username, password, user).ConfigureAwait(false);
 
-                 var updatedUsername = providerAuthResult.username;
 
-                 success = providerAuthResult.success;
 
-                 if (success)
 
-                 {
 
-                     authenticationProvider = provider;
 
-                     username = updatedUsername;
 
-                     break;
 
-                 }
 
-             }
 
-             if (!success
 
-                 && _networkManager.IsInLocalNetwork(remoteEndPoint)
 
-                 && user?.Configuration.EnableLocalPassword == true
 
-                 && !string.IsNullOrEmpty(user.EasyPassword))
 
-             {
 
-                 // Check easy password
 
-                 var passwordHash = PasswordHash.Parse(user.EasyPassword);
 
-                 var hash = _cryptoProvider.ComputeHash(
 
-                     passwordHash.Id,
 
-                     Encoding.UTF8.GetBytes(password),
 
-                     passwordHash.Salt.ToArray());
 
-                 success = passwordHash.Hash.SequenceEqual(hash);
 
-             }
 
-             return (authenticationProvider, username, success);
 
-         }
 
-         private void ResetInvalidLoginAttemptCount(User user)
 
-         {
 
-             user.Policy.InvalidLoginAttemptCount = 0;
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-         }
 
-         private void IncrementInvalidLoginAttemptCount(User user)
 
-         {
 
-             int invalidLogins = ++user.Policy.InvalidLoginAttemptCount;
 
-             int maxInvalidLogins = user.Policy.LoginAttemptsBeforeLockout;
 
-             if (maxInvalidLogins > 0
 
-                 && invalidLogins >= maxInvalidLogins)
 
-             {
 
-                 user.Policy.IsDisabled = true;
 
-                 UserLockedOut?.Invoke(this, new GenericEventArgs<User>(user));
 
-                 _logger.LogWarning(
 
-                     "Disabling user {UserName} due to {Attempts} unsuccessful login attempts.",
 
-                     user.Name,
 
-                     invalidLogins);
 
-             }
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-         }
 
-         /// <summary>
 
-         /// Loads the users from the repository.
 
-         /// </summary>
 
-         private void LoadUsers()
 
-         {
 
-             var users = _userRepository.RetrieveAllUsers();
 
-             // There always has to be at least one user.
 
-             if (users.Count != 0)
 
-             {
 
-                 _users = new ConcurrentDictionary<Guid, User>(
 
-                     users.Select(x => new KeyValuePair<Guid, User>(x.Id, x)));
 
-                 return;
 
-             }
 
-             var defaultName = Environment.UserName;
 
-             if (string.IsNullOrWhiteSpace(defaultName))
 
-             {
 
-                 defaultName = "MyJellyfinUser";
 
-             }
 
-             _logger.LogWarning("No users, creating one with username {UserName}", defaultName);
 
-             var name = MakeValidUsername(defaultName);
 
-             var user = InstantiateNewUser(name);
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.CreateUser(user);
 
-             user.Policy.IsAdministrator = true;
 
-             user.Policy.EnableContentDeletion = true;
 
-             user.Policy.EnableRemoteControlOfOtherUsers = true;
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-             _users = new ConcurrentDictionary<Guid, User>();
 
-             _users[user.Id] = user;
 
-         }
 
- #nullable restore
 
-         public UserDto GetUserDto(User user, string remoteEndPoint = null)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             bool hasConfiguredPassword = GetAuthenticationProvider(user).HasPassword(user);
 
-             bool hasConfiguredEasyPassword = !string.IsNullOrEmpty(GetAuthenticationProvider(user).GetEasyPasswordHash(user));
 
-             bool hasPassword = user.Configuration.EnableLocalPassword && !string.IsNullOrEmpty(remoteEndPoint) && _networkManager.IsInLocalNetwork(remoteEndPoint) ?
 
-                 hasConfiguredEasyPassword :
 
-                 hasConfiguredPassword;
 
-             UserDto dto = new UserDto
 
-             {
 
-                 Id = user.Id,
 
-                 Name = user.Name,
 
-                 HasPassword = hasPassword,
 
-                 HasConfiguredPassword = hasConfiguredPassword,
 
-                 HasConfiguredEasyPassword = hasConfiguredEasyPassword,
 
-                 LastActivityDate = user.LastActivityDate,
 
-                 LastLoginDate = user.LastLoginDate,
 
-                 Configuration = user.Configuration,
 
-                 ServerId = _appHost.SystemId,
 
-                 Policy = user.Policy
 
-             };
 
-             if (!hasPassword && _users.Count == 1)
 
-             {
 
-                 dto.EnableAutoLogin = true;
 
-             }
 
-             ItemImageInfo image = user.GetImageInfo(ImageType.Primary, 0);
 
-             if (image != null)
 
-             {
 
-                 dto.PrimaryImageTag = GetImageCacheTag(user, image);
 
-                 try
 
-                 {
 
-                     _dtoServiceFactory().AttachPrimaryImageAspectRatio(dto, user);
 
-                 }
 
-                 catch (Exception ex)
 
-                 {
 
-                     // Have to use a catch-all unfortunately because some .net image methods throw plain Exceptions
 
-                     _logger.LogError(ex, "Error generating PrimaryImageAspectRatio for {User}", user.Name);
 
-                 }
 
-             }
 
-             return dto;
 
-         }
 
-         public UserDto GetOfflineUserDto(User user)
 
-         {
 
-             var dto = GetUserDto(user);
 
-             dto.ServerName = _appHost.FriendlyName;
 
-             return dto;
 
-         }
 
-         private string GetImageCacheTag(BaseItem item, ItemImageInfo image)
 
-         {
 
-             try
 
-             {
 
-                 return _imageProcessorFactory().GetImageCacheTag(item, image);
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error getting {ImageType} image info for {ImagePath}", image.Type, image.Path);
 
-                 return null;
 
-             }
 
-         }
 
-         /// <summary>
 
-         /// Refreshes metadata for each user
 
-         /// </summary>
 
-         /// <param name="cancellationToken">The cancellation token.</param>
 
-         /// <returns>Task.</returns>
 
-         public async Task RefreshUsersMetadata(CancellationToken cancellationToken)
 
-         {
 
-             foreach (var user in Users)
 
-             {
 
-                 await user.RefreshMetadata(new MetadataRefreshOptions(new DirectoryService(_fileSystem)), cancellationToken).ConfigureAwait(false);
 
-             }
 
-         }
 
-         /// <summary>
 
-         /// Renames the user.
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         /// <param name="newName">The new name.</param>
 
-         /// <returns>Task.</returns>
 
-         /// <exception cref="ArgumentNullException">user</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public async Task RenameUser(User user, string newName)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (string.IsNullOrWhiteSpace(newName))
 
-             {
 
-                 throw new ArgumentException("Invalid username", nameof(newName));
 
-             }
 
-             if (user.Name.Equals(newName, StringComparison.Ordinal))
 
-             {
 
-                 throw new ArgumentException("The new and old names must be different.");
 
-             }
 
-             if (Users.Any(
 
-                 u => u.Id != user.Id && u.Name.Equals(newName, StringComparison.OrdinalIgnoreCase)))
 
-             {
 
-                 throw new ArgumentException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "A user with the name '{0}' already exists.",
 
-                     newName));
 
-             }
 
-             await user.Rename(newName).ConfigureAwait(false);
 
-             OnUserUpdated(user);
 
-         }
 
-         /// <summary>
 
-         /// Updates the user.
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         /// <exception cref="ArgumentNullException">user</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public void UpdateUser(User user)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (user.Id == Guid.Empty)
 
-             {
 
-                 throw new ArgumentException("Id can't be empty.", nameof(user));
 
-             }
 
-             if (!_users.ContainsKey(user.Id))
 
-             {
 
-                 throw new ArgumentException(
 
-                     string.Format(
 
-                         CultureInfo.InvariantCulture,
 
-                         "A user '{0}' with Id {1} does not exist.",
 
-                         user.Name,
 
-                         user.Id),
 
-                     nameof(user));
 
-             }
 
-             user.DateModified = DateTime.UtcNow;
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.UpdateUser(user);
 
-             OnUserUpdated(user);
 
-         }
 
-         /// <summary>
 
-         /// Creates the user.
 
-         /// </summary>
 
-         /// <param name="name">The name.</param>
 
-         /// <returns>User.</returns>
 
-         /// <exception cref="ArgumentNullException">name</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public User CreateUser(string name)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(name))
 
-             {
 
-                 throw new ArgumentNullException(nameof(name));
 
-             }
 
-             if (!IsValidUsername(name))
 
-             {
 
-                 throw new ArgumentException("Usernames can contain unicode symbols, numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.)");
 
-             }
 
-             if (Users.Any(u => u.Name.Equals(name, StringComparison.OrdinalIgnoreCase)))
 
-             {
 
-                 throw new ArgumentException(string.Format("A user with the name '{0}' already exists.", name));
 
-             }
 
-             var user = InstantiateNewUser(name);
 
-             _users[user.Id] = user;
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.CreateUser(user);
 
-             EventHelper.QueueEventIfNotNull(UserCreated, this, new GenericEventArgs<User> { Argument = user }, _logger);
 
-             return user;
 
-         }
 
-         /// <inheritdoc />
 
-         /// <exception cref="ArgumentNullException">The <c>user</c> is <c>null</c>.</exception>
 
-         /// <exception cref="ArgumentException">The <c>user</c> doesn't exist, or is the last administrator.</exception>
 
-         /// <exception cref="InvalidOperationException">The <c>user</c> can't be deleted; there are no other users.</exception>
 
-         public void DeleteUser(User user)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (!_users.ContainsKey(user.Id))
 
-             {
 
-                 throw new ArgumentException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "The user cannot be deleted because there is no user with the Name {0} and Id {1}.",
 
-                     user.Name,
 
-                     user.Id));
 
-             }
 
-             if (_users.Count == 1)
 
-             {
 
-                 throw new InvalidOperationException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "The user '{0}' cannot be deleted because there must be at least one user in the system.",
 
-                     user.Name));
 
-             }
 
-             if (user.Policy.IsAdministrator
 
-                 && Users.Count(i => i.Policy.IsAdministrator) == 1)
 
-             {
 
-                 throw new ArgumentException(
 
-                     string.Format(
 
-                         CultureInfo.InvariantCulture,
 
-                         "The user '{0}' cannot be deleted because there must be at least one admin user in the system.",
 
-                         user.Name),
 
-                     nameof(user));
 
-             }
 
-             var configPath = GetConfigurationFilePath(user);
 
-             _userRepository.DeleteUser(user);
 
-             // Delete user config dir
 
-             lock (_configSyncLock)
 
-                 lock (_policySyncLock)
 
-                 {
 
-                     try
 
-                     {
 
-                         Directory.Delete(user.ConfigurationDirectoryPath, true);
 
-                     }
 
-                     catch (IOException ex)
 
-                     {
 
-                         _logger.LogError(ex, "Error deleting user config dir: {Path}", user.ConfigurationDirectoryPath);
 
-                     }
 
-                 }
 
-             _users.TryRemove(user.Id, out _);
 
-             OnUserDeleted(user);
 
-         }
 
-         /// <summary>
 
-         /// Resets the password by clearing it.
 
-         /// </summary>
 
-         /// <returns>Task.</returns>
 
-         public Task ResetPassword(User user)
 
-         {
 
-             return ChangePassword(user, string.Empty);
 
-         }
 
-         public void ResetEasyPassword(User user)
 
-         {
 
-             ChangeEasyPassword(user, string.Empty, null);
 
-         }
 
-         public async Task ChangePassword(User user, string newPassword)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             await GetAuthenticationProvider(user).ChangePassword(user, newPassword).ConfigureAwait(false);
 
-             UpdateUser(user);
 
-             UserPasswordChanged?.Invoke(this, new GenericEventArgs<User>(user));
 
-         }
 
-         public void ChangeEasyPassword(User user, string newPassword, string newPasswordHash)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             GetAuthenticationProvider(user).ChangeEasyPassword(user, newPassword, newPasswordHash);
 
-             UpdateUser(user);
 
-             UserPasswordChanged?.Invoke(this, new GenericEventArgs<User>(user));
 
-         }
 
-         /// <summary>
 
-         /// Instantiates the new user.
 
-         /// </summary>
 
-         /// <param name="name">The name.</param>
 
-         /// <returns>User.</returns>
 
-         private static User InstantiateNewUser(string name)
 
-         {
 
-             return new User
 
-             {
 
-                 Name = name,
 
-                 Id = Guid.NewGuid(),
 
-                 DateCreated = DateTime.UtcNow,
 
-                 DateModified = DateTime.UtcNow
 
-             };
 
-         }
 
-         public async Task<ForgotPasswordResult> StartForgotPasswordProcess(string enteredUsername, bool isInNetwork)
 
-         {
 
-             var user = string.IsNullOrWhiteSpace(enteredUsername) ?
 
-                 null :
 
-                 GetUserByName(enteredUsername);
 
-             var action = ForgotPasswordAction.InNetworkRequired;
 
-             if (user != null && isInNetwork)
 
-             {
 
-                 var passwordResetProvider = GetPasswordResetProvider(user);
 
-                 return await passwordResetProvider.StartForgotPasswordProcess(user, isInNetwork).ConfigureAwait(false);
 
-             }
 
-             else
 
-             {
 
-                 return new ForgotPasswordResult
 
-                 {
 
-                     Action = action,
 
-                     PinFile = string.Empty
 
-                 };
 
-             }
 
-         }
 
-         public async Task<PinRedeemResult> RedeemPasswordResetPin(string pin)
 
-         {
 
-             foreach (var provider in _passwordResetProviders)
 
-             {
 
-                 var result = await provider.RedeemPasswordResetPin(pin).ConfigureAwait(false);
 
-                 if (result.Success)
 
-                 {
 
-                     return result;
 
-                 }
 
-             }
 
-             return new PinRedeemResult
 
-             {
 
-                 Success = false,
 
-                 UsersReset = Array.Empty<string>()
 
-             };
 
-         }
 
-         public UserPolicy GetUserPolicy(User user)
 
-         {
 
-             var path = GetPolicyFilePath(user);
 
-             if (!File.Exists(path))
 
-             {
 
-                 return GetDefaultPolicy();
 
-             }
 
-             try
 
-             {
 
-                 lock (_policySyncLock)
 
-                 {
 
-                     return (UserPolicy)_xmlSerializer.DeserializeFromFile(typeof(UserPolicy), path);
 
-                 }
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error reading policy file: {Path}", path);
 
-                 return GetDefaultPolicy();
 
-             }
 
-         }
 
-         private static UserPolicy GetDefaultPolicy()
 
-         {
 
-             return new UserPolicy
 
-             {
 
-                 EnableContentDownloading = true,
 
-                 EnableSyncTranscoding = true
 
-             };
 
-         }
 
-         public void UpdateUserPolicy(Guid userId, UserPolicy userPolicy)
 
-         {
 
-             var user = GetUserById(userId);
 
-             UpdateUserPolicy(user, userPolicy, true);
 
-         }
 
-         private void UpdateUserPolicy(User user, UserPolicy userPolicy, bool fireEvent)
 
-         {
 
-             // The xml serializer will output differently if the type is not exact
 
-             if (userPolicy.GetType() != typeof(UserPolicy))
 
-             {
 
-                 var json = _jsonSerializer.SerializeToString(userPolicy);
 
-                 userPolicy = _jsonSerializer.DeserializeFromString<UserPolicy>(json);
 
-             }
 
-             var path = GetPolicyFilePath(user);
 
-             Directory.CreateDirectory(Path.GetDirectoryName(path));
 
-             lock (_policySyncLock)
 
-             {
 
-                 _xmlSerializer.SerializeToFile(userPolicy, path);
 
-                 user.Policy = userPolicy;
 
-             }
 
-             if (fireEvent)
 
-             {
 
-                 UserPolicyUpdated?.Invoke(this, new GenericEventArgs<User> { Argument = user });
 
-             }
 
-         }
 
-         private static string GetPolicyFilePath(User user)
 
-         {
 
-             return Path.Combine(user.ConfigurationDirectoryPath, "policy.xml");
 
-         }
 
-         private static string GetConfigurationFilePath(User user)
 
-         {
 
-             return Path.Combine(user.ConfigurationDirectoryPath, "config.xml");
 
-         }
 
-         public UserConfiguration GetUserConfiguration(User user)
 
-         {
 
-             var path = GetConfigurationFilePath(user);
 
-             if (!File.Exists(path))
 
-             {
 
-                 return new UserConfiguration();
 
-             }
 
-             try
 
-             {
 
-                 lock (_configSyncLock)
 
-                 {
 
-                     return (UserConfiguration)_xmlSerializer.DeserializeFromFile(typeof(UserConfiguration), path);
 
-                 }
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error reading policy file: {Path}", path);
 
-                 return new UserConfiguration();
 
-             }
 
-         }
 
-         public void UpdateConfiguration(Guid userId, UserConfiguration config)
 
-         {
 
-             var user = GetUserById(userId);
 
-             UpdateConfiguration(user, config);
 
-         }
 
-         public void UpdateConfiguration(User user, UserConfiguration config)
 
-         {
 
-             UpdateConfiguration(user, config, true);
 
-         }
 
-         private void UpdateConfiguration(User user, UserConfiguration config, bool fireEvent)
 
-         {
 
-             var path = GetConfigurationFilePath(user);
 
-             // The xml serializer will output differently if the type is not exact
 
-             if (config.GetType() != typeof(UserConfiguration))
 
-             {
 
-                 var json = _jsonSerializer.SerializeToString(config);
 
-                 config = _jsonSerializer.DeserializeFromString<UserConfiguration>(json);
 
-             }
 
-             Directory.CreateDirectory(Path.GetDirectoryName(path));
 
-             lock (_configSyncLock)
 
-             {
 
-                 _xmlSerializer.SerializeToFile(config, path);
 
-                 user.Configuration = config;
 
-             }
 
-             if (fireEvent)
 
-             {
 
-                 UserConfigurationUpdated?.Invoke(this, new GenericEventArgs<User> { Argument = user });
 
-             }
 
-         }
 
-     }
 
-     public class DeviceAccessEntryPoint : IServerEntryPoint
 
-     {
 
-         private IUserManager _userManager;
 
-         private IAuthenticationRepository _authRepo;
 
-         private IDeviceManager _deviceManager;
 
-         private ISessionManager _sessionManager;
 
-         public DeviceAccessEntryPoint(IUserManager userManager, IAuthenticationRepository authRepo, IDeviceManager deviceManager, ISessionManager sessionManager)
 
-         {
 
-             _userManager = userManager;
 
-             _authRepo = authRepo;
 
-             _deviceManager = deviceManager;
 
-             _sessionManager = sessionManager;
 
-         }
 
-         public Task RunAsync()
 
-         {
 
-             _userManager.UserPolicyUpdated += _userManager_UserPolicyUpdated;
 
-             return Task.CompletedTask;
 
-         }
 
-         private void _userManager_UserPolicyUpdated(object sender, GenericEventArgs<User> e)
 
-         {
 
-             var user = e.Argument;
 
-             if (!user.Policy.EnableAllDevices)
 
-             {
 
-                 UpdateDeviceAccess(user);
 
-             }
 
-         }
 
-         private void UpdateDeviceAccess(User user)
 
-         {
 
-             var existing = _authRepo.Get(new AuthenticationInfoQuery
 
-             {
 
-                 UserId = user.Id
 
-             }).Items;
 
-             foreach (var authInfo in existing)
 
-             {
 
-                 if (!string.IsNullOrEmpty(authInfo.DeviceId) && !_deviceManager.CanAccessDevice(user, authInfo.DeviceId))
 
-                 {
 
-                     _sessionManager.Logout(authInfo);
 
-                 }
 
-             }
 
-         }
 
-         public void Dispose()
 
-         {
 
-         }
 
-     }
 
- }
 
 
  |