| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112 | 
							- #pragma warning disable CS1591
 
- #pragma warning disable SA1600
 
- using System;
 
- using System.Collections.Concurrent;
 
- using System.Collections.Generic;
 
- using System.Globalization;
 
- using System.IO;
 
- using System.Linq;
 
- using System.Text;
 
- using System.Text.RegularExpressions;
 
- using System.Threading;
 
- using System.Threading.Tasks;
 
- using MediaBrowser.Common.Cryptography;
 
- using MediaBrowser.Common.Events;
 
- using MediaBrowser.Common.Net;
 
- using MediaBrowser.Controller;
 
- using MediaBrowser.Controller.Authentication;
 
- using MediaBrowser.Controller.Devices;
 
- using MediaBrowser.Controller.Drawing;
 
- using MediaBrowser.Controller.Dto;
 
- using MediaBrowser.Controller.Entities;
 
- using MediaBrowser.Controller.Library;
 
- using MediaBrowser.Controller.Persistence;
 
- using MediaBrowser.Controller.Plugins;
 
- using MediaBrowser.Controller.Providers;
 
- using MediaBrowser.Controller.Security;
 
- using MediaBrowser.Controller.Session;
 
- using MediaBrowser.Model.Configuration;
 
- using MediaBrowser.Model.Cryptography;
 
- using MediaBrowser.Model.Dto;
 
- using MediaBrowser.Model.Entities;
 
- using MediaBrowser.Model.Events;
 
- using MediaBrowser.Model.IO;
 
- using MediaBrowser.Model.Serialization;
 
- using MediaBrowser.Model.Users;
 
- using Microsoft.Extensions.Logging;
 
- namespace Emby.Server.Implementations.Library
 
- {
 
-     /// <summary>
 
-     /// Class UserManager.
 
-     /// </summary>
 
-     public class UserManager : IUserManager
 
-     {
 
-         private readonly object _policySyncLock = new object();
 
-         private readonly object _configSyncLock = new object();
 
-         /// <summary>
 
-         /// The logger.
 
-         /// </summary>
 
-         private readonly ILogger _logger;
 
-         /// <summary>
 
-         /// Gets the active user repository.
 
-         /// </summary>
 
-         /// <value>The user repository.</value>
 
-         private readonly IUserRepository _userRepository;
 
-         private readonly IXmlSerializer _xmlSerializer;
 
-         private readonly IJsonSerializer _jsonSerializer;
 
-         private readonly INetworkManager _networkManager;
 
-         private readonly Func<IImageProcessor> _imageProcessorFactory;
 
-         private readonly Func<IDtoService> _dtoServiceFactory;
 
-         private readonly IServerApplicationHost _appHost;
 
-         private readonly IFileSystem _fileSystem;
 
-         private readonly ICryptoProvider _cryptoProvider;
 
-         private ConcurrentDictionary<Guid, User> _users;
 
-         private IAuthenticationProvider[] _authenticationProviders;
 
-         private DefaultAuthenticationProvider _defaultAuthenticationProvider;
 
-         private InvalidAuthProvider _invalidAuthProvider;
 
-         private IPasswordResetProvider[] _passwordResetProviders;
 
-         private DefaultPasswordResetProvider _defaultPasswordResetProvider;
 
-         public UserManager(
 
-             ILogger<UserManager> logger,
 
-             IUserRepository userRepository,
 
-             IXmlSerializer xmlSerializer,
 
-             INetworkManager networkManager,
 
-             Func<IImageProcessor> imageProcessorFactory,
 
-             Func<IDtoService> dtoServiceFactory,
 
-             IServerApplicationHost appHost,
 
-             IJsonSerializer jsonSerializer,
 
-             IFileSystem fileSystem,
 
-             ICryptoProvider cryptoProvider)
 
-         {
 
-             _logger = logger;
 
-             _userRepository = userRepository;
 
-             _xmlSerializer = xmlSerializer;
 
-             _networkManager = networkManager;
 
-             _imageProcessorFactory = imageProcessorFactory;
 
-             _dtoServiceFactory = dtoServiceFactory;
 
-             _appHost = appHost;
 
-             _jsonSerializer = jsonSerializer;
 
-             _fileSystem = fileSystem;
 
-             _cryptoProvider = cryptoProvider;
 
-             _users = null;
 
-         }
 
-         public event EventHandler<GenericEventArgs<User>> UserPasswordChanged;
 
-         /// <summary>
 
-         /// Occurs when [user updated].
 
-         /// </summary>
 
-         public event EventHandler<GenericEventArgs<User>> UserUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserPolicyUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserConfigurationUpdated;
 
-         public event EventHandler<GenericEventArgs<User>> UserLockedOut;
 
-         public event EventHandler<GenericEventArgs<User>> UserCreated;
 
-         /// <summary>
 
-         /// Occurs when [user deleted].
 
-         /// </summary>
 
-         public event EventHandler<GenericEventArgs<User>> UserDeleted;
 
-         /// <inheritdoc />
 
-         public IEnumerable<User> Users => _users.Values;
 
-         /// <inheritdoc />
 
-         public IEnumerable<Guid> UsersIds => _users.Keys;
 
-         /// <summary>
 
-         /// Called when [user updated].
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         private void OnUserUpdated(User user)
 
-         {
 
-             UserUpdated?.Invoke(this, new GenericEventArgs<User> { Argument = user });
 
-         }
 
-         /// <summary>
 
-         /// Called when [user deleted].
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         private void OnUserDeleted(User user)
 
-         {
 
-             UserDeleted?.Invoke(this, new GenericEventArgs<User> { Argument = user });
 
-         }
 
-         public NameIdPair[] GetAuthenticationProviders()
 
-         {
 
-             return _authenticationProviders
 
-                 .Where(i => i.IsEnabled)
 
-                 .OrderBy(i => i is DefaultAuthenticationProvider ? 0 : 1)
 
-                 .ThenBy(i => i.Name)
 
-                 .Select(i => new NameIdPair
 
-                 {
 
-                     Name = i.Name,
 
-                     Id = GetAuthenticationProviderId(i)
 
-                 })
 
-                 .ToArray();
 
-         }
 
-         public NameIdPair[] GetPasswordResetProviders()
 
-         {
 
-             return _passwordResetProviders
 
-                 .Where(i => i.IsEnabled)
 
-                 .OrderBy(i => i is DefaultPasswordResetProvider ? 0 : 1)
 
-                 .ThenBy(i => i.Name)
 
-                 .Select(i => new NameIdPair
 
-                 {
 
-                     Name = i.Name,
 
-                     Id = GetPasswordResetProviderId(i)
 
-                 })
 
-                 .ToArray();
 
-         }
 
-         public void AddParts(IEnumerable<IAuthenticationProvider> authenticationProviders, IEnumerable<IPasswordResetProvider> passwordResetProviders)
 
-         {
 
-             _authenticationProviders = authenticationProviders.ToArray();
 
-             _defaultAuthenticationProvider = _authenticationProviders.OfType<DefaultAuthenticationProvider>().First();
 
-             _invalidAuthProvider = _authenticationProviders.OfType<InvalidAuthProvider>().First();
 
-             _passwordResetProviders = passwordResetProviders.ToArray();
 
-             _defaultPasswordResetProvider = passwordResetProviders.OfType<DefaultPasswordResetProvider>().First();
 
-         }
 
-         /// <inheritdoc />
 
-         public User GetUserById(Guid id)
 
-         {
 
-             if (id == Guid.Empty)
 
-             {
 
-                 throw new ArgumentException("Guid can't be empty", nameof(id));
 
-             }
 
-             _users.TryGetValue(id, out User user);
 
-             return user;
 
-         }
 
-         public User GetUserByName(string name)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(name))
 
-             {
 
-                 throw new ArgumentException("Invalid username", nameof(name));
 
-             }
 
-             return Users.FirstOrDefault(u => string.Equals(u.Name, name, StringComparison.OrdinalIgnoreCase));
 
-         }
 
-         public void Initialize()
 
-         {
 
-             LoadUsers();
 
-             var users = Users;
 
-             // If there are no local users with admin rights, make them all admins
 
-             if (!users.Any(i => i.Policy.IsAdministrator))
 
-             {
 
-                 foreach (var user in users)
 
-                 {
 
-                     user.Policy.IsAdministrator = true;
 
-                     UpdateUserPolicy(user, user.Policy, false);
 
-                 }
 
-             }
 
-         }
 
-         public static bool IsValidUsername(string username)
 
-         {
 
-             // This is some regex that matches only on unicode "word" characters, as well as -, _ and @
 
-             // In theory this will cut out most if not all 'control' characters which should help minimize any weirdness
 
-             // Usernames can contain letters (a-z + whatever else unicode is cool with), numbers (0-9), at-signs (@), dashes (-), underscores (_), apostrophes ('), and periods (.)
 
-             return Regex.IsMatch(username, @"^[\w\-'._@]*$");
 
-         }
 
-         private static bool IsValidUsernameCharacter(char i)
 
-             => IsValidUsername(i.ToString(CultureInfo.InvariantCulture));
 
-         public string MakeValidUsername(string username)
 
-         {
 
-             if (IsValidUsername(username))
 
-             {
 
-                 return username;
 
-             }
 
-             // Usernames can contain letters (a-z), numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.)
 
-             var builder = new StringBuilder();
 
-             foreach (var c in username)
 
-             {
 
-                 if (IsValidUsernameCharacter(c))
 
-                 {
 
-                     builder.Append(c);
 
-                 }
 
-             }
 
-             return builder.ToString();
 
-         }
 
-         public async Task<User> AuthenticateUser(
 
-             string username,
 
-             string password,
 
-             string hashedPassword,
 
-             string remoteEndPoint,
 
-             bool isUserSession)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(username))
 
-             {
 
-                 throw new ArgumentNullException(nameof(username));
 
-             }
 
-             var user = Users.FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase));
 
-             var success = false;
 
-             IAuthenticationProvider authenticationProvider = null;
 
-             if (user != null)
 
-             {
 
-                 var authResult = await AuthenticateLocalUser(username, password, hashedPassword, user, remoteEndPoint).ConfigureAwait(false);
 
-                 authenticationProvider = authResult.authenticationProvider;
 
-                 success = authResult.success;
 
-             }
 
-             else
 
-             {
 
-                 // user is null
 
-                 var authResult = await AuthenticateLocalUser(username, password, hashedPassword, null, remoteEndPoint).ConfigureAwait(false);
 
-                 authenticationProvider = authResult.authenticationProvider;
 
-                 string updatedUsername = authResult.username;
 
-                 success = authResult.success;
 
-                 if (success
 
-                     && authenticationProvider != null
 
-                     && !(authenticationProvider is DefaultAuthenticationProvider))
 
-                 {
 
-                     // Trust the username returned by the authentication provider
 
-                     username = updatedUsername;
 
-                     // Search the database for the user again
 
-                     // the authentication provider might have created it
 
-                     user = Users
 
-                         .FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase));
 
-                     if (authenticationProvider is IHasNewUserPolicy hasNewUserPolicy)
 
-                     {
 
-                         var policy = hasNewUserPolicy.GetNewUserPolicy();
 
-                         UpdateUserPolicy(user, policy, true);
 
-                     }
 
-                 }
 
-             }
 
-             if (success && user != null && authenticationProvider != null)
 
-             {
 
-                 var providerId = GetAuthenticationProviderId(authenticationProvider);
 
-                 if (!string.Equals(providerId, user.Policy.AuthenticationProviderId, StringComparison.OrdinalIgnoreCase))
 
-                 {
 
-                     user.Policy.AuthenticationProviderId = providerId;
 
-                     UpdateUserPolicy(user, user.Policy, true);
 
-                 }
 
-             }
 
-             if (user == null)
 
-             {
 
-                 throw new AuthenticationException("Invalid username or password entered.");
 
-             }
 
-             if (user.Policy.IsDisabled)
 
-             {
 
-                 throw new AuthenticationException(
 
-                     string.Format(
 
-                         CultureInfo.InvariantCulture,
 
-                         "The {0} account is currently disabled. Please consult with your administrator.",
 
-                         user.Name));
 
-             }
 
-             if (!user.Policy.EnableRemoteAccess && !_networkManager.IsInLocalNetwork(remoteEndPoint))
 
-             {
 
-                 throw new AuthenticationException("Forbidden.");
 
-             }
 
-             if (!user.IsParentalScheduleAllowed())
 
-             {
 
-                 throw new AuthenticationException("User is not allowed access at this time.");
 
-             }
 
-             // Update LastActivityDate and LastLoginDate, then save
 
-             if (success)
 
-             {
 
-                 if (isUserSession)
 
-                 {
 
-                     user.LastActivityDate = user.LastLoginDate = DateTime.UtcNow;
 
-                     UpdateUser(user);
 
-                 }
 
-                 ResetInvalidLoginAttemptCount(user);
 
-             }
 
-             else
 
-             {
 
-                 IncrementInvalidLoginAttemptCount(user);
 
-             }
 
-             _logger.LogInformation("Authentication request for {0} {1}.", user.Name, success ? "has succeeded" : "has been denied");
 
-             return success ? user : null;
 
-         }
 
- #nullable enable
 
-         private static string GetAuthenticationProviderId(IAuthenticationProvider provider)
 
-         {
 
-             return provider.GetType().FullName;
 
-         }
 
-         private static string GetPasswordResetProviderId(IPasswordResetProvider provider)
 
-         {
 
-             return provider.GetType().FullName;
 
-         }
 
-         private IAuthenticationProvider GetAuthenticationProvider(User user)
 
-         {
 
-             return GetAuthenticationProviders(user)[0];
 
-         }
 
-         private IPasswordResetProvider GetPasswordResetProvider(User user)
 
-         {
 
-             return GetPasswordResetProviders(user)[0];
 
-         }
 
-         private IAuthenticationProvider[] GetAuthenticationProviders(User? user)
 
-         {
 
-             var authenticationProviderId = user?.Policy.AuthenticationProviderId;
 
-             var providers = _authenticationProviders.Where(i => i.IsEnabled).ToArray();
 
-             if (!string.IsNullOrEmpty(authenticationProviderId))
 
-             {
 
-                 providers = providers.Where(i => string.Equals(authenticationProviderId, GetAuthenticationProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray();
 
-             }
 
-             if (providers.Length == 0)
 
-             {
 
-                 // Assign the user to the InvalidAuthProvider since no configured auth provider was valid/found
 
-                 _logger.LogWarning("User {UserName} was found with invalid/missing Authentication Provider {AuthenticationProviderId}. Assigning user to InvalidAuthProvider until this is corrected", user?.Name, user?.Policy.AuthenticationProviderId);
 
-                 providers = new IAuthenticationProvider[] { _invalidAuthProvider };
 
-             }
 
-             return providers;
 
-         }
 
-         private IPasswordResetProvider[] GetPasswordResetProviders(User? user)
 
-         {
 
-             var passwordResetProviderId = user?.Policy.PasswordResetProviderId;
 
-             var providers = _passwordResetProviders.Where(i => i.IsEnabled).ToArray();
 
-             if (!string.IsNullOrEmpty(passwordResetProviderId))
 
-             {
 
-                 providers = providers.Where(i => string.Equals(passwordResetProviderId, GetPasswordResetProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray();
 
-             }
 
-             if (providers.Length == 0)
 
-             {
 
-                 providers = new IPasswordResetProvider[] { _defaultPasswordResetProvider };
 
-             }
 
-             return providers;
 
-         }
 
-         private async Task<(string username, bool success)> AuthenticateWithProvider(
 
-             IAuthenticationProvider provider,
 
-             string username,
 
-             string password,
 
-             User? resolvedUser)
 
-         {
 
-             try
 
-             {
 
-                 var authenticationResult = provider is IRequiresResolvedUser requiresResolvedUser
 
-                     ? await requiresResolvedUser.Authenticate(username, password, resolvedUser).ConfigureAwait(false)
 
-                     : await provider.Authenticate(username, password).ConfigureAwait(false);
 
-                 if (authenticationResult.Username != username)
 
-                 {
 
-                     _logger.LogDebug("Authentication provider provided updated username {1}", authenticationResult.Username);
 
-                     username = authenticationResult.Username;
 
-                 }
 
-                 return (username, true);
 
-             }
 
-             catch (AuthenticationException ex)
 
-             {
 
-                 _logger.LogError(ex, "Error authenticating with provider {Provider}", provider.Name);
 
-                 return (username, false);
 
-             }
 
-         }
 
-         private async Task<(IAuthenticationProvider? authenticationProvider, string username, bool success)> AuthenticateLocalUser(
 
-             string username,
 
-             string password,
 
-             string hashedPassword,
 
-             User? user,
 
-             string remoteEndPoint)
 
-         {
 
-             bool success = false;
 
-             IAuthenticationProvider? authenticationProvider = null;
 
-             foreach (var provider in GetAuthenticationProviders(user))
 
-             {
 
-                 var providerAuthResult = await AuthenticateWithProvider(provider, username, password, user).ConfigureAwait(false);
 
-                 var updatedUsername = providerAuthResult.username;
 
-                 success = providerAuthResult.success;
 
-                 if (success)
 
-                 {
 
-                     authenticationProvider = provider;
 
-                     username = updatedUsername;
 
-                     break;
 
-                 }
 
-             }
 
-             if (!success
 
-                 && _networkManager.IsInLocalNetwork(remoteEndPoint)
 
-                 && user?.Configuration.EnableLocalPassword == true
 
-                 && !string.IsNullOrEmpty(user.EasyPassword))
 
-             {
 
-                 // Check easy password
 
-                 var passwordHash = PasswordHash.Parse(user.EasyPassword);
 
-                 var hash = _cryptoProvider.ComputeHash(
 
-                     passwordHash.Id,
 
-                     Encoding.UTF8.GetBytes(password),
 
-                     passwordHash.Salt.ToArray());
 
-                 success = passwordHash.Hash.SequenceEqual(hash);
 
-             }
 
-             return (authenticationProvider, username, success);
 
-         }
 
-         private void ResetInvalidLoginAttemptCount(User user)
 
-         {
 
-             user.Policy.InvalidLoginAttemptCount = 0;
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-         }
 
-         private void IncrementInvalidLoginAttemptCount(User user)
 
-         {
 
-             int invalidLogins = ++user.Policy.InvalidLoginAttemptCount;
 
-             int maxInvalidLogins = user.Policy.LoginAttemptsBeforeLockout;
 
-             if (maxInvalidLogins > 0
 
-                 && invalidLogins >= maxInvalidLogins)
 
-             {
 
-                 user.Policy.IsDisabled = true;
 
-                 UserLockedOut?.Invoke(this, new GenericEventArgs<User>(user));
 
-                 _logger.LogWarning(
 
-                     "Disabling user {UserName} due to {Attempts} unsuccessful login attempts.",
 
-                     user.Name,
 
-                     invalidLogins);
 
-             }
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-         }
 
-         /// <summary>
 
-         /// Loads the users from the repository.
 
-         /// </summary>
 
-         private void LoadUsers()
 
-         {
 
-             var users = _userRepository.RetrieveAllUsers();
 
-             // There always has to be at least one user.
 
-             if (users.Count != 0)
 
-             {
 
-                 _users = new ConcurrentDictionary<Guid, User>(
 
-                     users.Select(x => new KeyValuePair<Guid, User>(x.Id, x)));
 
-                 return;
 
-             }
 
-             var defaultName = Environment.UserName;
 
-             if (string.IsNullOrWhiteSpace(defaultName))
 
-             {
 
-                 defaultName = "MyJellyfinUser";
 
-             }
 
-             _logger.LogWarning("No users, creating one with username {UserName}", defaultName);
 
-             var name = MakeValidUsername(defaultName);
 
-             var user = InstantiateNewUser(name);
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.CreateUser(user);
 
-             user.Policy.IsAdministrator = true;
 
-             user.Policy.EnableContentDeletion = true;
 
-             user.Policy.EnableRemoteControlOfOtherUsers = true;
 
-             UpdateUserPolicy(user, user.Policy, false);
 
-             _users = new ConcurrentDictionary<Guid, User>();
 
-             _users[user.Id] = user;
 
-         }
 
- #nullable restore
 
-         public UserDto GetUserDto(User user, string remoteEndPoint = null)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             bool hasConfiguredPassword = GetAuthenticationProvider(user).HasPassword(user);
 
-             bool hasConfiguredEasyPassword = !string.IsNullOrEmpty(GetAuthenticationProvider(user).GetEasyPasswordHash(user));
 
-             bool hasPassword = user.Configuration.EnableLocalPassword && !string.IsNullOrEmpty(remoteEndPoint) && _networkManager.IsInLocalNetwork(remoteEndPoint) ?
 
-                 hasConfiguredEasyPassword :
 
-                 hasConfiguredPassword;
 
-             UserDto dto = new UserDto
 
-             {
 
-                 Id = user.Id,
 
-                 Name = user.Name,
 
-                 HasPassword = hasPassword,
 
-                 HasConfiguredPassword = hasConfiguredPassword,
 
-                 HasConfiguredEasyPassword = hasConfiguredEasyPassword,
 
-                 LastActivityDate = user.LastActivityDate,
 
-                 LastLoginDate = user.LastLoginDate,
 
-                 Configuration = user.Configuration,
 
-                 ServerId = _appHost.SystemId,
 
-                 Policy = user.Policy
 
-             };
 
-             if (!hasPassword && _users.Count == 1)
 
-             {
 
-                 dto.EnableAutoLogin = true;
 
-             }
 
-             ItemImageInfo image = user.GetImageInfo(ImageType.Primary, 0);
 
-             if (image != null)
 
-             {
 
-                 dto.PrimaryImageTag = GetImageCacheTag(user, image);
 
-                 try
 
-                 {
 
-                     _dtoServiceFactory().AttachPrimaryImageAspectRatio(dto, user);
 
-                 }
 
-                 catch (Exception ex)
 
-                 {
 
-                     // Have to use a catch-all unfortunately because some .net image methods throw plain Exceptions
 
-                     _logger.LogError(ex, "Error generating PrimaryImageAspectRatio for {User}", user.Name);
 
-                 }
 
-             }
 
-             return dto;
 
-         }
 
-         public UserDto GetOfflineUserDto(User user)
 
-         {
 
-             var dto = GetUserDto(user);
 
-             dto.ServerName = _appHost.FriendlyName;
 
-             return dto;
 
-         }
 
-         private string GetImageCacheTag(BaseItem item, ItemImageInfo image)
 
-         {
 
-             try
 
-             {
 
-                 return _imageProcessorFactory().GetImageCacheTag(item, image);
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error getting {ImageType} image info for {ImagePath}", image.Type, image.Path);
 
-                 return null;
 
-             }
 
-         }
 
-         /// <summary>
 
-         /// Refreshes metadata for each user
 
-         /// </summary>
 
-         /// <param name="cancellationToken">The cancellation token.</param>
 
-         /// <returns>Task.</returns>
 
-         public async Task RefreshUsersMetadata(CancellationToken cancellationToken)
 
-         {
 
-             foreach (var user in Users)
 
-             {
 
-                 await user.RefreshMetadata(new MetadataRefreshOptions(new DirectoryService(_fileSystem)), cancellationToken).ConfigureAwait(false);
 
-             }
 
-         }
 
-         /// <summary>
 
-         /// Renames the user.
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         /// <param name="newName">The new name.</param>
 
-         /// <returns>Task.</returns>
 
-         /// <exception cref="ArgumentNullException">user</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public async Task RenameUser(User user, string newName)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (string.IsNullOrWhiteSpace(newName))
 
-             {
 
-                 throw new ArgumentException("Invalid username", nameof(newName));
 
-             }
 
-             if (user.Name.Equals(newName, StringComparison.Ordinal))
 
-             {
 
-                 throw new ArgumentException("The new and old names must be different.");
 
-             }
 
-             if (Users.Any(
 
-                 u => u.Id != user.Id && u.Name.Equals(newName, StringComparison.OrdinalIgnoreCase)))
 
-             {
 
-                 throw new ArgumentException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "A user with the name '{0}' already exists.",
 
-                     newName));
 
-             }
 
-             await user.Rename(newName).ConfigureAwait(false);
 
-             OnUserUpdated(user);
 
-         }
 
-         /// <summary>
 
-         /// Updates the user.
 
-         /// </summary>
 
-         /// <param name="user">The user.</param>
 
-         /// <exception cref="ArgumentNullException">user</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public void UpdateUser(User user)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (user.Id == Guid.Empty)
 
-             {
 
-                 throw new ArgumentException("Id can't be empty.", nameof(user));
 
-             }
 
-             if (!_users.ContainsKey(user.Id))
 
-             {
 
-                 throw new ArgumentException(
 
-                     string.Format(
 
-                         CultureInfo.InvariantCulture,
 
-                         "A user '{0}' with Id {1} does not exist.",
 
-                         user.Name,
 
-                         user.Id),
 
-                     nameof(user));
 
-             }
 
-             user.DateModified = DateTime.UtcNow;
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.UpdateUser(user);
 
-             OnUserUpdated(user);
 
-         }
 
-         /// <summary>
 
-         /// Creates the user.
 
-         /// </summary>
 
-         /// <param name="name">The name.</param>
 
-         /// <returns>User.</returns>
 
-         /// <exception cref="ArgumentNullException">name</exception>
 
-         /// <exception cref="ArgumentException"></exception>
 
-         public User CreateUser(string name)
 
-         {
 
-             if (string.IsNullOrWhiteSpace(name))
 
-             {
 
-                 throw new ArgumentNullException(nameof(name));
 
-             }
 
-             if (!IsValidUsername(name))
 
-             {
 
-                 throw new ArgumentException("Usernames can contain unicode symbols, numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.)");
 
-             }
 
-             if (Users.Any(u => u.Name.Equals(name, StringComparison.OrdinalIgnoreCase)))
 
-             {
 
-                 throw new ArgumentException(string.Format("A user with the name '{0}' already exists.", name));
 
-             }
 
-             var user = InstantiateNewUser(name);
 
-             _users[user.Id] = user;
 
-             user.DateLastSaved = DateTime.UtcNow;
 
-             _userRepository.CreateUser(user);
 
-             EventHelper.QueueEventIfNotNull(UserCreated, this, new GenericEventArgs<User> { Argument = user }, _logger);
 
-             return user;
 
-         }
 
-         /// <inheritdoc />
 
-         /// <exception cref="ArgumentNullException">The <c>user</c> is <c>null</c>.</exception>
 
-         /// <exception cref="ArgumentException">The <c>user</c> doesn't exist, or is the last administrator.</exception>
 
-         /// <exception cref="InvalidOperationException">The <c>user</c> can't be deleted; there are no other users.</exception>
 
-         public void DeleteUser(User user)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             if (!_users.ContainsKey(user.Id))
 
-             {
 
-                 throw new ArgumentException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "The user cannot be deleted because there is no user with the Name {0} and Id {1}.",
 
-                     user.Name,
 
-                     user.Id));
 
-             }
 
-             if (_users.Count == 1)
 
-             {
 
-                 throw new InvalidOperationException(string.Format(
 
-                     CultureInfo.InvariantCulture,
 
-                     "The user '{0}' cannot be deleted because there must be at least one user in the system.",
 
-                     user.Name));
 
-             }
 
-             if (user.Policy.IsAdministrator
 
-                 && Users.Count(i => i.Policy.IsAdministrator) == 1)
 
-             {
 
-                 throw new ArgumentException(
 
-                     string.Format(
 
-                         CultureInfo.InvariantCulture,
 
-                         "The user '{0}' cannot be deleted because there must be at least one admin user in the system.",
 
-                         user.Name),
 
-                     nameof(user));
 
-             }
 
-             var configPath = GetConfigurationFilePath(user);
 
-             _userRepository.DeleteUser(user);
 
-             // Delete user config dir
 
-             lock (_configSyncLock)
 
-             lock (_policySyncLock)
 
-             {
 
-                 try
 
-                 {
 
-                     Directory.Delete(user.ConfigurationDirectoryPath, true);
 
-                 }
 
-                 catch (IOException ex)
 
-                 {
 
-                     _logger.LogError(ex, "Error deleting user config dir: {Path}", user.ConfigurationDirectoryPath);
 
-                 }
 
-             }
 
-             _users.TryRemove(user.Id, out _);
 
-             OnUserDeleted(user);
 
-         }
 
-         /// <summary>
 
-         /// Resets the password by clearing it.
 
-         /// </summary>
 
-         /// <returns>Task.</returns>
 
-         public Task ResetPassword(User user)
 
-         {
 
-             return ChangePassword(user, string.Empty);
 
-         }
 
-         public void ResetEasyPassword(User user)
 
-         {
 
-             ChangeEasyPassword(user, string.Empty, null);
 
-         }
 
-         public async Task ChangePassword(User user, string newPassword)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             await GetAuthenticationProvider(user).ChangePassword(user, newPassword).ConfigureAwait(false);
 
-             UpdateUser(user);
 
-             UserPasswordChanged?.Invoke(this, new GenericEventArgs<User>(user));
 
-         }
 
-         public void ChangeEasyPassword(User user, string newPassword, string newPasswordHash)
 
-         {
 
-             if (user == null)
 
-             {
 
-                 throw new ArgumentNullException(nameof(user));
 
-             }
 
-             GetAuthenticationProvider(user).ChangeEasyPassword(user, newPassword, newPasswordHash);
 
-             UpdateUser(user);
 
-             UserPasswordChanged?.Invoke(this, new GenericEventArgs<User>(user));
 
-         }
 
-         /// <summary>
 
-         /// Instantiates the new user.
 
-         /// </summary>
 
-         /// <param name="name">The name.</param>
 
-         /// <returns>User.</returns>
 
-         private static User InstantiateNewUser(string name)
 
-         {
 
-             return new User
 
-             {
 
-                 Name = name,
 
-                 Id = Guid.NewGuid(),
 
-                 DateCreated = DateTime.UtcNow,
 
-                 DateModified = DateTime.UtcNow
 
-             };
 
-         }
 
-         public async Task<ForgotPasswordResult> StartForgotPasswordProcess(string enteredUsername, bool isInNetwork)
 
-         {
 
-             var user = string.IsNullOrWhiteSpace(enteredUsername) ?
 
-                 null :
 
-                 GetUserByName(enteredUsername);
 
-             var action = ForgotPasswordAction.InNetworkRequired;
 
-             if (user != null && isInNetwork)
 
-             {
 
-                 var passwordResetProvider = GetPasswordResetProvider(user);
 
-                 return await passwordResetProvider.StartForgotPasswordProcess(user, isInNetwork).ConfigureAwait(false);
 
-             }
 
-             else
 
-             {
 
-                 return new ForgotPasswordResult
 
-                 {
 
-                     Action = action,
 
-                     PinFile = string.Empty
 
-                 };
 
-             }
 
-         }
 
-         public async Task<PinRedeemResult> RedeemPasswordResetPin(string pin)
 
-         {
 
-             foreach (var provider in _passwordResetProviders)
 
-             {
 
-                 var result = await provider.RedeemPasswordResetPin(pin).ConfigureAwait(false);
 
-                 if (result.Success)
 
-                 {
 
-                     return result;
 
-                 }
 
-             }
 
-             return new PinRedeemResult
 
-             {
 
-                 Success = false,
 
-                 UsersReset = Array.Empty<string>()
 
-             };
 
-         }
 
-         public UserPolicy GetUserPolicy(User user)
 
-         {
 
-             var path = GetPolicyFilePath(user);
 
-             if (!File.Exists(path))
 
-             {
 
-                 return GetDefaultPolicy();
 
-             }
 
-             try
 
-             {
 
-                 lock (_policySyncLock)
 
-                 {
 
-                     return (UserPolicy)_xmlSerializer.DeserializeFromFile(typeof(UserPolicy), path);
 
-                 }
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error reading policy file: {Path}", path);
 
-                 return GetDefaultPolicy();
 
-             }
 
-         }
 
-         private static UserPolicy GetDefaultPolicy()
 
-         {
 
-             return new UserPolicy
 
-             {
 
-                 EnableContentDownloading = true,
 
-                 EnableSyncTranscoding = true
 
-             };
 
-         }
 
-         public void UpdateUserPolicy(Guid userId, UserPolicy userPolicy)
 
-         {
 
-             var user = GetUserById(userId);
 
-             UpdateUserPolicy(user, userPolicy, true);
 
-         }
 
-         private void UpdateUserPolicy(User user, UserPolicy userPolicy, bool fireEvent)
 
-         {
 
-             // The xml serializer will output differently if the type is not exact
 
-             if (userPolicy.GetType() != typeof(UserPolicy))
 
-             {
 
-                 var json = _jsonSerializer.SerializeToString(userPolicy);
 
-                 userPolicy = _jsonSerializer.DeserializeFromString<UserPolicy>(json);
 
-             }
 
-             var path = GetPolicyFilePath(user);
 
-             Directory.CreateDirectory(Path.GetDirectoryName(path));
 
-             lock (_policySyncLock)
 
-             {
 
-                 _xmlSerializer.SerializeToFile(userPolicy, path);
 
-                 user.Policy = userPolicy;
 
-             }
 
-             if (fireEvent)
 
-             {
 
-                 UserPolicyUpdated?.Invoke(this, new GenericEventArgs<User> { Argument = user });
 
-             }
 
-         }
 
-         private static string GetPolicyFilePath(User user)
 
-         {
 
-             return Path.Combine(user.ConfigurationDirectoryPath, "policy.xml");
 
-         }
 
-         private static string GetConfigurationFilePath(User user)
 
-         {
 
-             return Path.Combine(user.ConfigurationDirectoryPath, "config.xml");
 
-         }
 
-         public UserConfiguration GetUserConfiguration(User user)
 
-         {
 
-             var path = GetConfigurationFilePath(user);
 
-             if (!File.Exists(path))
 
-             {
 
-                 return new UserConfiguration();
 
-             }
 
-             try
 
-             {
 
-                 lock (_configSyncLock)
 
-                 {
 
-                     return (UserConfiguration)_xmlSerializer.DeserializeFromFile(typeof(UserConfiguration), path);
 
-                 }
 
-             }
 
-             catch (Exception ex)
 
-             {
 
-                 _logger.LogError(ex, "Error reading policy file: {Path}", path);
 
-                 return new UserConfiguration();
 
-             }
 
-         }
 
-         public void UpdateConfiguration(Guid userId, UserConfiguration config)
 
-         {
 
-             var user = GetUserById(userId);
 
-             UpdateConfiguration(user, config);
 
-         }
 
-         public void UpdateConfiguration(User user, UserConfiguration config)
 
-         {
 
-             UpdateConfiguration(user, config, true);
 
-         }
 
-         private void UpdateConfiguration(User user, UserConfiguration config, bool fireEvent)
 
-         {
 
-             var path = GetConfigurationFilePath(user);
 
-             // The xml serializer will output differently if the type is not exact
 
-             if (config.GetType() != typeof(UserConfiguration))
 
-             {
 
-                 var json = _jsonSerializer.SerializeToString(config);
 
-                 config = _jsonSerializer.DeserializeFromString<UserConfiguration>(json);
 
-             }
 
-             Directory.CreateDirectory(Path.GetDirectoryName(path));
 
-             lock (_configSyncLock)
 
-             {
 
-                 _xmlSerializer.SerializeToFile(config, path);
 
-                 user.Configuration = config;
 
-             }
 
-             if (fireEvent)
 
-             {
 
-                 UserConfigurationUpdated?.Invoke(this, new GenericEventArgs<User> { Argument = user });
 
-             }
 
-         }
 
-     }
 
-     public class DeviceAccessEntryPoint : IServerEntryPoint
 
-     {
 
-         private IUserManager _userManager;
 
-         private IAuthenticationRepository _authRepo;
 
-         private IDeviceManager _deviceManager;
 
-         private ISessionManager _sessionManager;
 
-         public DeviceAccessEntryPoint(IUserManager userManager, IAuthenticationRepository authRepo, IDeviceManager deviceManager, ISessionManager sessionManager)
 
-         {
 
-             _userManager = userManager;
 
-             _authRepo = authRepo;
 
-             _deviceManager = deviceManager;
 
-             _sessionManager = sessionManager;
 
-         }
 
-         public Task RunAsync()
 
-         {
 
-             _userManager.UserPolicyUpdated += _userManager_UserPolicyUpdated;
 
-             return Task.CompletedTask;
 
-         }
 
-         private void _userManager_UserPolicyUpdated(object sender, GenericEventArgs<User> e)
 
-         {
 
-             var user = e.Argument;
 
-             if (!user.Policy.EnableAllDevices)
 
-             {
 
-                 UpdateDeviceAccess(user);
 
-             }
 
-         }
 
-         private void UpdateDeviceAccess(User user)
 
-         {
 
-             var existing = _authRepo.Get(new AuthenticationInfoQuery
 
-             {
 
-                 UserId = user.Id
 
-             }).Items;
 
-             foreach (var authInfo in existing)
 
-             {
 
-                 if (!string.IsNullOrEmpty(authInfo.DeviceId) && !_deviceManager.CanAccessDevice(user, authInfo.DeviceId))
 
-                 {
 
-                     _sessionManager.Logout(authInfo);
 
-                 }
 
-             }
 
-         }
 
-         public void Dispose()
 
-         {
 
-         }
 
-     }
 
- }
 
 
  |