aboutsummaryrefslogtreecommitdiff
path: root/Emby.Server.Implementations/Library/UserManager.cs
AgeCommit message (Collapse)Author
2019-11-24Merge pull request #2034 from Bond-009/easypassVasily
Fix easy password (cherry picked from commit 13dd63d631d63ad9e1818af88a3662cae7c88f52) Signed-off-by: Joshua Boniface <joshua@boniface.me>
2019-09-23Fix multiple mistakes and warningsBond_009
2019-09-17Remove legacy auth code (#1677)Bond-009
* Remove legacy auth code * Adds tests so we don't break PasswordHash (again) * Clean up interfaces * Remove duplicate code * Use auto properties * static using * Don't use 'this' * Fix build
2019-09-13Reset invalid login counter on successfull loginBond-009
2019-08-18Fix UserNotFoundErrorBond_009
2019-08-16Improvements to UserManagerBond_009
2019-07-06Streamline authentication proccessBond_009
2019-06-28Reduce amount of raw sqlBond_009
2019-06-09Revert "Don't set a default reset provider"Joshua M. Boniface
This reverts commit c230d49d7c37d4fbe77676b835c3afd6c8cb56e7. This reenables an edge case where an admin might want to reset, with the default auth provider, the password of an externally-provided user so they could "unlock" the account while it was failing. There might be minor security implications to this, but the malicious actor would need FS access to do it (as they would with any password resets) so it's probably best to keep it as-is. Removing this in the first place was due to a misunderstanding anyways so no harm.
2019-06-09Remove superfluous conditionalJoshua M. Boniface
This wasn't needed to prevent updating the policy on-disk from my tests and can be removed as suggested by @Bond-009
2019-06-09Don't set a default reset providerJoshua M. Boniface
2019-06-09Apply suggestions from code reviewJoshua M. Boniface
Co-Authored-By: Claus Vium <cvium@users.noreply.github.com> Co-Authored-By: Bond-009 <bond.009@outlook.com>
2019-06-09Add nicer log message and commentJoshua M. Boniface
2019-06-08Implement InvalidAuthProviderJoshua M. Boniface
Implements the InvalidAuthProvider, which acts as a fallback if a configured authentication provider, e.g. LDAP, is unavailable due to a load failure or removal. Until the user or the authentication plugin is corrected, this will cause users with the missing provider to be locked out, while throwing errors in the logs about the issue. Fixes #1445 part 2
2019-05-25Format correctly the PIN when updating itDrPandemic
2019-05-11Fix pin bug introduced in 10.3.z.DrPandemic
The issue is that the new easyPassword format prepends the hash function. This PR extract the hash from "$SHA1$_hash_".
2019-04-30Fix incorrect hasPassword flag when easy pin setbugfixin
2019-04-07Override username with AuthenticationProviderJoshua Boniface
Pass back the Username directive returned by an AuthenticationProvider to the calling code, so we may override the user-provided Username value if the authentication provider passes this back. Useful for instance in an LDAP scenario where what the user types may not necessarily be the "username" that is mapped in the system, e.g. the user providing 'mail' while 'uid' is the "username" value. Could also then be extensible to other authentication providers as well, should they wish to do a similar thing.
2019-03-25Apply minor suggestions from code reviewLogicalPhallacy
Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com>
2019-03-24removes needless dictionaryPhallacy
2019-03-24Update Emby.Server.Implementations/Library/UserManager.csClaus Vium
Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com>
2019-03-22made password resets an interface and per userPhallacy
2019-03-16really fixed line endingsPhallacy
2019-03-16adding regex fixPhallacy
2019-03-16Update Emby.Server.Implementations/Library/UserManager.csJoshua M. Boniface
Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com>
2019-03-16updated regex to string literal with escaped -Phallacy
2019-03-16configurable user lockoutPhallacy
2019-03-05Minor fixes to address style issuesPhallacy
2019-03-04minor style fixesPhallacy
2019-02-20merging with master to clear merge conflictPhallacy
2019-02-20minor changes and return to netstandardPhallacy
2019-02-19Merge pull request #848 from Bond-009/perfJoshua M. Boniface
Minor changes to reduce allocations
2019-02-18added justaman notes, fixed new bug from emty has removalsPhallacy
2019-02-13Minor fixes re:PR870, added null checks from PR876Phallacy
2019-02-12Use HashSets for increased perfBond_009
2019-02-12sha256 with salt auth and sha1 interopPhallacy
2019-02-11Merge pull request #9 from jellyfin/masterLogicalPhallacy
Yanking in latest changes
2019-02-09Removed some unused fieldsBond_009
2019-02-04Merge pull request #797 from Bond-009/warningsVasily
Fix all warnings
2019-02-03Merge pull request #736 from Bond-009/startasyncJoshua M. Boniface
Start startup tasks async
2019-02-02Fix all warningsBond-009
2019-01-31Remove more Connect related stuffClaus Vium
2019-01-31Upgrade crypto provider, retarget better frameworkPhallacy
2019-01-28Unwrapped all /(Write|Read)All(Text|Bytes)/ functions.Erwin de Haan
2019-01-28Unwrapped CreateDirectory and DeleteDirectoryErwin de Haan
2019-01-28Unwrapped GetDirectoryName and DirectorySeperatorCharErwin de Haan
2019-01-27Check if file exists instead of catching exceptionsBond_009
2019-01-27Start startup tasks asyncBond_009
2019-01-22Remove conditions that are always true/falseBond_009
2019-01-20Replaced injections of ILogger with ILoggerFactoryWilliam Taylor
This makes resolving dependencies from the container much easier as you cannot resolve with primitives parameters in a way that is any more readable. The aim of this commit is to change as little as possible with the end result, loggers that were newed up for the parent object were given the same name. Objects that used the base or app loggers, were given a new logger with an appropriate name. Also removed some unused dependencies.