using System; using System.Collections.Generic; using System.Globalization; using System.IO; using System.Linq; using System.Text; using System.Text.RegularExpressions; using System.Threading; using System.Threading.Tasks; using MediaBrowser.Common.Events; using MediaBrowser.Common.Net; using MediaBrowser.Controller; using MediaBrowser.Controller.Authentication; using MediaBrowser.Controller.Configuration; using MediaBrowser.Controller.Devices; using MediaBrowser.Controller.Drawing; using MediaBrowser.Controller.Dto; using MediaBrowser.Controller.Entities; using MediaBrowser.Controller.Library; using MediaBrowser.Controller.Net; using MediaBrowser.Controller.Persistence; using MediaBrowser.Controller.Plugins; using MediaBrowser.Controller.Providers; using MediaBrowser.Controller.Security; using MediaBrowser.Controller.Session; using MediaBrowser.Model.Configuration; using MediaBrowser.Model.Cryptography; using MediaBrowser.Model.Dto; using MediaBrowser.Model.Entities; using MediaBrowser.Model.Events; using MediaBrowser.Model.IO; using MediaBrowser.Model.Serialization; using MediaBrowser.Model.Users; using Microsoft.Extensions.Logging; namespace Emby.Server.Implementations.Library { /// /// Class UserManager /// public class UserManager : IUserManager { /// /// Gets the users. /// /// The users. public IEnumerable Users => _users; private User[] _users; /// /// The _logger /// private readonly ILogger _logger; /// /// Gets or sets the configuration manager. /// /// The configuration manager. private IServerConfigurationManager ConfigurationManager { get; set; } /// /// Gets the active user repository /// /// The user repository. private IUserRepository UserRepository { get; set; } public event EventHandler> UserPasswordChanged; private readonly IXmlSerializer _xmlSerializer; private readonly IJsonSerializer _jsonSerializer; private readonly INetworkManager _networkManager; private readonly Func _imageProcessorFactory; private readonly Func _dtoServiceFactory; private readonly IServerApplicationHost _appHost; private readonly IFileSystem _fileSystem; private readonly ICryptoProvider _cryptographyProvider; private IAuthenticationProvider[] _authenticationProviders; private DefaultAuthenticationProvider _defaultAuthenticationProvider; public UserManager( ILoggerFactory loggerFactory, IServerConfigurationManager configurationManager, IUserRepository userRepository, IXmlSerializer xmlSerializer, INetworkManager networkManager, Func imageProcessorFactory, Func dtoServiceFactory, IServerApplicationHost appHost, IJsonSerializer jsonSerializer, IFileSystem fileSystem, ICryptoProvider cryptographyProvider) { _logger = loggerFactory.CreateLogger(nameof(UserManager)); UserRepository = userRepository; _xmlSerializer = xmlSerializer; _networkManager = networkManager; _imageProcessorFactory = imageProcessorFactory; _dtoServiceFactory = dtoServiceFactory; _appHost = appHost; _jsonSerializer = jsonSerializer; _fileSystem = fileSystem; _cryptographyProvider = cryptographyProvider; ConfigurationManager = configurationManager; _users = Array.Empty(); DeletePinFile(); } public NameIdPair[] GetAuthenticationProviders() { return _authenticationProviders .Where(i => i.IsEnabled) .OrderBy(i => i is DefaultAuthenticationProvider ? 0 : 1) .ThenBy(i => i.Name) .Select(i => new NameIdPair { Name = i.Name, Id = GetAuthenticationProviderId(i) }) .ToArray(); } public void AddParts(IEnumerable authenticationProviders) { _authenticationProviders = authenticationProviders.ToArray(); _defaultAuthenticationProvider = _authenticationProviders.OfType().First(); } #region UserUpdated Event /// /// Occurs when [user updated]. /// public event EventHandler> UserUpdated; public event EventHandler> UserPolicyUpdated; public event EventHandler> UserConfigurationUpdated; public event EventHandler> UserLockedOut; /// /// Called when [user updated]. /// /// The user. private void OnUserUpdated(User user) { UserUpdated?.Invoke(this, new GenericEventArgs { Argument = user }); } #endregion #region UserDeleted Event /// /// Occurs when [user deleted]. /// public event EventHandler> UserDeleted; /// /// Called when [user deleted]. /// /// The user. private void OnUserDeleted(User user) { UserDeleted?.Invoke(this, new GenericEventArgs { Argument = user }); } #endregion /// /// Gets a User by Id /// /// The id. /// User. /// public User GetUserById(Guid id) { if (id.Equals(Guid.Empty)) { throw new ArgumentNullException(nameof(id)); } return Users.FirstOrDefault(u => u.Id == id); } /// /// Gets the user by identifier. /// /// The identifier. /// User. public User GetUserById(string id) { return GetUserById(new Guid(id)); } public User GetUserByName(string name) { if (string.IsNullOrWhiteSpace(name)) { throw new ArgumentNullException(nameof(name)); } return Users.FirstOrDefault(u => string.Equals(u.Name, name, StringComparison.OrdinalIgnoreCase)); } public void Initialize() { _users = LoadUsers(); var users = Users.ToList(); // If there are no local users with admin rights, make them all admins if (!users.Any(i => i.Policy.IsAdministrator)) { foreach (var user in users) { user.Policy.IsAdministrator = true; UpdateUserPolicy(user, user.Policy, false); } } } public bool IsValidUsername(string username) { //The old way was dumb, we should make it less dumb, lets do so. //This is some regex that matches only on unicode "word" characters, as well as -, _ and @ //In theory this will cut out most if not all 'control' characters which should help minimize any weirdness string UserNameRegex = "^[\\w-'._@]*$"; // Usernames can contain letters (a-z + whatever else unicode is cool with), numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.) return Regex.IsMatch(username, UserNameRegex); } private static bool IsValidUsernameCharacter(char i) { string UserNameRegex = "^[\\w-'._@]*$"; return Regex.IsMatch(i.ToString(), UserNameRegex); } public string MakeValidUsername(string username) { if (IsValidUsername(username)) { return username; } // Usernames can contain letters (a-z), numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.) var builder = new StringBuilder(); foreach (var c in username) { if (IsValidUsernameCharacter(c)) { builder.Append(c); } } return builder.ToString(); } public async Task AuthenticateUser(string username, string password, string hashedPassword, string remoteEndPoint, bool isUserSession) { if (string.IsNullOrWhiteSpace(username)) { throw new ArgumentNullException(nameof(username)); } var user = Users .FirstOrDefault(i => string.Equals(username, i.Name, StringComparison.OrdinalIgnoreCase)); var success = false; IAuthenticationProvider authenticationProvider = null; if (user != null) { var authResult = await AuthenticateLocalUser(username, password, hashedPassword, user, remoteEndPoint).ConfigureAwait(false); authenticationProvider = authResult.Item1; success = authResult.Item2; } else { // user is null var authResult = await AuthenticateLocalUser(username, password, hashedPassword, null, remoteEndPoint).ConfigureAwait(false); authenticationProvider = authResult.Item1; success = authResult.Item2; if (success && authenticationProvider != null && !(authenticationProvider is DefaultAuthenticationProvider)) { user = await CreateUser(username).ConfigureAwait(false); var hasNewUserPolicy = authenticationProvider as IHasNewUserPolicy; if (hasNewUserPolicy != null) { var policy = hasNewUserPolicy.GetNewUserPolicy(); UpdateUserPolicy(user, policy, true); } } } if (success && user != null && authenticationProvider != null) { var providerId = GetAuthenticationProviderId(authenticationProvider); if (!string.Equals(providerId, user.Policy.AuthenticationProviderId, StringComparison.OrdinalIgnoreCase)) { user.Policy.AuthenticationProviderId = providerId; UpdateUserPolicy(user, user.Policy, true); } } if (user == null) { throw new SecurityException("Invalid username or password entered."); } if (user.Policy.IsDisabled) { throw new SecurityException(string.Format("The {0} account is currently disabled. Please consult with your administrator.", user.Name)); } if (!user.Policy.EnableRemoteAccess && !_networkManager.IsInLocalNetwork(remoteEndPoint)) { throw new SecurityException("Forbidden."); } if (!user.IsParentalScheduleAllowed()) { throw new SecurityException("User is not allowed access at this time."); } // Update LastActivityDate and LastLoginDate, then save if (success) { if (isUserSession) { user.LastActivityDate = user.LastLoginDate = DateTime.UtcNow; UpdateUser(user); } UpdateInvalidLoginAttemptCount(user, 0); } else { UpdateInvalidLoginAttemptCount(user, user.Policy.InvalidLoginAttemptCount + 1); } _logger.LogInformation("Authentication request for {0} {1}.", user.Name, success ? "has succeeded" : "has been denied"); return success ? user : null; } private static string GetAuthenticationProviderId(IAuthenticationProvider provider) { return provider.GetType().FullName; } private IAuthenticationProvider GetAuthenticationProvider(User user) { return GetAuthenticationProviders(user).First(); } private IAuthenticationProvider[] GetAuthenticationProviders(User user) { var authenticationProviderId = user == null ? null : user.Policy.AuthenticationProviderId; var providers = _authenticationProviders.Where(i => i.IsEnabled).ToArray(); if (!string.IsNullOrEmpty(authenticationProviderId)) { providers = providers.Where(i => string.Equals(authenticationProviderId, GetAuthenticationProviderId(i), StringComparison.OrdinalIgnoreCase)).ToArray(); } if (providers.Length == 0) { providers = new IAuthenticationProvider[] { _defaultAuthenticationProvider }; } return providers; } private async Task AuthenticateWithProvider(IAuthenticationProvider provider, string username, string password, User resolvedUser) { try { var requiresResolvedUser = provider as IRequiresResolvedUser; if (requiresResolvedUser != null) { await requiresResolvedUser.Authenticate(username, password, resolvedUser).ConfigureAwait(false); } else { await provider.Authenticate(username, password).ConfigureAwait(false); } return true; } catch (Exception ex) { _logger.LogError(ex, "Error authenticating with provider {provider}", provider.Name); return false; } } private async Task> AuthenticateLocalUser(string username, string password, string hashedPassword, User user, string remoteEndPoint) { bool success = false; IAuthenticationProvider authenticationProvider = null; if (password != null && user != null) { // Doesn't look like this is even possible to be used, because of password == null checks below hashedPassword = _defaultAuthenticationProvider.GetHashedString(user, password); } if (password == null) { // legacy success = string.Equals(_defaultAuthenticationProvider.GetPasswordHash(user), hashedPassword.Replace("-", string.Empty), StringComparison.OrdinalIgnoreCase); } else { foreach (var provider in GetAuthenticationProviders(user)) { success = await AuthenticateWithProvider(provider, username, password, user).ConfigureAwait(false); if (success) { authenticationProvider = provider; break; } } } if (user != null) { if (!success && _networkManager.IsInLocalNetwork(remoteEndPoint) && user.Configuration.EnableLocalPassword) { if (password == null) { // legacy success = string.Equals(GetLocalPasswordHash(user), hashedPassword.Replace("-", string.Empty), StringComparison.OrdinalIgnoreCase); } else { success = string.Equals(GetLocalPasswordHash(user), _defaultAuthenticationProvider.GetHashedString(user, password), StringComparison.OrdinalIgnoreCase); } } } return new Tuple(authenticationProvider, success); } private void UpdateInvalidLoginAttemptCount(User user, int newValue) { if (user.Policy.InvalidLoginAttemptCount == newValue || newValue <= 0) { return; } user.Policy.InvalidLoginAttemptCount = newValue; var maxCount = user.Policy.IsAdministrator ? 3 : 5; var fireLockout = false; if (newValue >= maxCount) { _logger.LogDebug("Disabling user {0} due to {1} unsuccessful login attempts.", user.Name, newValue); user.Policy.IsDisabled = true; fireLockout = true; } UpdateUserPolicy(user, user.Policy, false); if (fireLockout) { UserLockedOut?.Invoke(this, new GenericEventArgs(user)); } } private string GetLocalPasswordHash(User user) { return string.IsNullOrEmpty(user.EasyPassword) ? _defaultAuthenticationProvider.GetEmptyHashedString(user) : user.EasyPassword; } private bool IsPasswordEmpty(User user, string passwordHash) { return string.Equals(passwordHash, _defaultAuthenticationProvider.GetEmptyHashedString(user), StringComparison.OrdinalIgnoreCase); } /// /// Loads the users from the repository /// /// IEnumerable{User}. private User[] LoadUsers() { var users = UserRepository.RetrieveAllUsers(); // There always has to be at least one user. if (users.Count == 0) { var defaultName = Environment.UserName; if (string.IsNullOrWhiteSpace(defaultName)) { defaultName = "MyJellyfinUser"; } var name = MakeValidUsername(defaultName); var user = InstantiateNewUser(name); user.DateLastSaved = DateTime.UtcNow; UserRepository.CreateUser(user); users.Add(user); user.Policy.IsAdministrator = true; user.Policy.EnableContentDeletion = true; user.Policy.EnableRemoteControlOfOtherUsers = true; UpdateUserPolicy(user, user.Policy, false); } return users.ToArray(); } public UserDto GetUserDto(User user, string remoteEndPoint = null) { if (user == null) { throw new ArgumentNullException(nameof(user)); } var hasConfiguredPassword = GetAuthenticationProvider(user).HasPassword(user).Result; var hasConfiguredEasyPassword = !IsPasswordEmpty(user, GetLocalPasswordHash(user)); var hasPassword = user.Configuration.EnableLocalPassword && !string.IsNullOrEmpty(remoteEndPoint) && _networkManager.IsInLocalNetwork(remoteEndPoint) ? hasConfiguredEasyPassword : hasConfiguredPassword; var dto = new UserDto { Id = user.Id, Name = user.Name, HasPassword = hasPassword, HasConfiguredPassword = hasConfiguredPassword, HasConfiguredEasyPassword = hasConfiguredEasyPassword, LastActivityDate = user.LastActivityDate, LastLoginDate = user.LastLoginDate, Configuration = user.Configuration, ServerId = _appHost.SystemId, Policy = user.Policy }; if (!hasPassword && Users.Count() == 1) { dto.EnableAutoLogin = true; } var image = user.GetImageInfo(ImageType.Primary, 0); if (image != null) { dto.PrimaryImageTag = GetImageCacheTag(user, image); try { _dtoServiceFactory().AttachPrimaryImageAspectRatio(dto, user); } catch (Exception ex) { // Have to use a catch-all unfortunately because some .net image methods throw plain Exceptions _logger.LogError(ex, "Error generating PrimaryImageAspectRatio for {user}", user.Name); } } return dto; } public UserDto GetOfflineUserDto(User user) { var dto = GetUserDto(user); dto.ServerName = _appHost.FriendlyName; return dto; } private string GetImageCacheTag(BaseItem item, ItemImageInfo image) { try { return _imageProcessorFactory().GetImageCacheTag(item, image); } catch (Exception ex) { _logger.LogError(ex, "Error getting {imageType} image info for {imagePath}", image.Type, image.Path); return null; } } /// /// Refreshes metadata for each user /// /// The cancellation token. /// Task. public async Task RefreshUsersMetadata(CancellationToken cancellationToken) { foreach (var user in Users) { await user.RefreshMetadata(new MetadataRefreshOptions(new DirectoryService(_logger, _fileSystem)), cancellationToken).ConfigureAwait(false); } } /// /// Renames the user. /// /// The user. /// The new name. /// Task. /// user /// public async Task RenameUser(User user, string newName) { if (user == null) { throw new ArgumentNullException(nameof(user)); } if (string.IsNullOrEmpty(newName)) { throw new ArgumentNullException(nameof(newName)); } if (Users.Any(u => u.Id != user.Id && u.Name.Equals(newName, StringComparison.OrdinalIgnoreCase))) { throw new ArgumentException(string.Format("A user with the name '{0}' already exists.", newName)); } if (user.Name.Equals(newName, StringComparison.Ordinal)) { throw new ArgumentException("The new and old names must be different."); } await user.Rename(newName); OnUserUpdated(user); } /// /// Updates the user. /// /// The user. /// user /// public void UpdateUser(User user) { if (user == null) { throw new ArgumentNullException(nameof(user)); } if (user.Id.Equals(Guid.Empty) || !Users.Any(u => u.Id.Equals(user.Id))) { throw new ArgumentException(string.Format("User with name '{0}' and Id {1} does not exist.", user.Name, user.Id)); } user.DateModified = DateTime.UtcNow; user.DateLastSaved = DateTime.UtcNow; UserRepository.UpdateUser(user); OnUserUpdated(user); } public event EventHandler> UserCreated; private readonly SemaphoreSlim _userListLock = new SemaphoreSlim(1, 1); /// /// Creates the user. /// /// The name. /// User. /// name /// public async Task CreateUser(string name) { if (string.IsNullOrWhiteSpace(name)) { throw new ArgumentNullException(nameof(name)); } if (!IsValidUsername(name)) { throw new ArgumentException("Usernames can contain letters (a-z), numbers (0-9), dashes (-), underscores (_), apostrophes ('), and periods (.)"); } if (Users.Any(u => u.Name.Equals(name, StringComparison.OrdinalIgnoreCase))) { throw new ArgumentException(string.Format("A user with the name '{0}' already exists.", name)); } await _userListLock.WaitAsync(CancellationToken.None).ConfigureAwait(false); try { var user = InstantiateNewUser(name); var list = Users.ToList(); list.Add(user); _users = list.ToArray(); user.DateLastSaved = DateTime.UtcNow; UserRepository.CreateUser(user); EventHelper.QueueEventIfNotNull(UserCreated, this, new GenericEventArgs { Argument = user }, _logger); return user; } finally { _userListLock.Release(); } } /// /// Deletes the user. /// /// The user. /// Task. /// user /// public async Task DeleteUser(User user) { if (user == null) { throw new ArgumentNullException(nameof(user)); } var allUsers = Users.ToList(); if (allUsers.FirstOrDefault(u => u.Id == user.Id) == null) { throw new ArgumentException(string.Format("The user cannot be deleted because there is no user with the Name {0} and Id {1}.", user.Name, user.Id)); } if (allUsers.Count == 1) { throw new ArgumentException(string.Format("The user '{0}' cannot be deleted because there must be at least one user in the system.", user.Name)); } if (user.Policy.IsAdministrator && allUsers.Count(i => i.Policy.IsAdministrator) == 1) { throw new ArgumentException(string.Format("The user '{0}' cannot be deleted because there must be at least one admin user in the system.", user.Name)); } await _userListLock.WaitAsync(CancellationToken.None).ConfigureAwait(false); try { var configPath = GetConfigurationFilePath(user); UserRepository.DeleteUser(user); try { _fileSystem.DeleteFile(configPath); } catch (IOException ex) { _logger.LogError(ex, "Error deleting file {path}", configPath); } DeleteUserPolicy(user); _users = allUsers.Where(i => i.Id != user.Id).ToArray(); OnUserDeleted(user); } finally { _userListLock.Release(); } } /// /// Resets the password by clearing it. /// /// Task. public Task ResetPassword(User user) { return ChangePassword(user, string.Empty); } public void ResetEasyPassword(User user) { ChangeEasyPassword(user, string.Empty, null); } public async Task ChangePassword(User user, string newPassword) { if (user == null) { throw new ArgumentNullException(nameof(user)); } await GetAuthenticationProvider(user).ChangePassword(user, newPassword).ConfigureAwait(false); UpdateUser(user); UserPasswordChanged?.Invoke(this, new GenericEventArgs(user)); } public void ChangeEasyPassword(User user, string newPassword, string newPasswordHash) { if (user == null) { throw new ArgumentNullException(nameof(user)); } if (newPassword != null) { newPasswordHash = _defaultAuthenticationProvider.GetHashedString(user, newPassword); } if (string.IsNullOrWhiteSpace(newPasswordHash)) { throw new ArgumentNullException(nameof(newPasswordHash)); } user.EasyPassword = newPasswordHash; UpdateUser(user); UserPasswordChanged?.Invoke(this, new GenericEventArgs(user)); } /// /// Instantiates the new user. /// /// The name. /// User. private static User InstantiateNewUser(string name) { return new User { Name = name, Id = Guid.NewGuid(), DateCreated = DateTime.UtcNow, DateModified = DateTime.UtcNow, UsesIdForConfigurationPath = true, //Salt = BCrypt.GenerateSalt() }; } private string PasswordResetFile => Path.Combine(ConfigurationManager.ApplicationPaths.ProgramDataPath, "passwordreset.txt"); private string _lastPin; private PasswordPinCreationResult _lastPasswordPinCreationResult; private int _pinAttempts; private async Task CreatePasswordResetPin() { var num = new Random().Next(1, 9999); var path = PasswordResetFile; var pin = num.ToString("0000", CultureInfo.InvariantCulture); _lastPin = pin; var time = TimeSpan.FromMinutes(5); var expiration = DateTime.UtcNow.Add(time); var text = new StringBuilder(); var localAddress = (await _appHost.GetLocalApiUrl(CancellationToken.None).ConfigureAwait(false)) ?? string.Empty; text.AppendLine("Use your web browser to visit:"); text.AppendLine(string.Empty); text.AppendLine(localAddress + "/web/index.html#!/forgotpasswordpin.html"); text.AppendLine(string.Empty); text.AppendLine("Enter the following pin code:"); text.AppendLine(string.Empty); text.AppendLine(pin); text.AppendLine(string.Empty); var localExpirationTime = expiration.ToLocalTime(); // Tuesday, 22 August 2006 06:30 AM text.AppendLine("The pin code will expire at " + localExpirationTime.ToString("f1", CultureInfo.CurrentCulture)); File.WriteAllText(path, text.ToString(), Encoding.UTF8); var result = new PasswordPinCreationResult { PinFile = path, ExpirationDate = expiration }; _lastPasswordPinCreationResult = result; _pinAttempts = 0; return result; } public async Task StartForgotPasswordProcess(string enteredUsername, bool isInNetwork) { DeletePinFile(); var user = string.IsNullOrWhiteSpace(enteredUsername) ? null : GetUserByName(enteredUsername); var action = ForgotPasswordAction.InNetworkRequired; string pinFile = null; DateTime? expirationDate = null; if (user != null && !user.Policy.IsAdministrator) { action = ForgotPasswordAction.ContactAdmin; } else { if (isInNetwork) { action = ForgotPasswordAction.PinCode; } var result = await CreatePasswordResetPin().ConfigureAwait(false); pinFile = result.PinFile; expirationDate = result.ExpirationDate; } return new ForgotPasswordResult { Action = action, PinFile = pinFile, PinExpirationDate = expirationDate }; } public async Task RedeemPasswordResetPin(string pin) { DeletePinFile(); var usersReset = new List(); var valid = !string.IsNullOrWhiteSpace(_lastPin) && string.Equals(_lastPin, pin, StringComparison.OrdinalIgnoreCase) && _lastPasswordPinCreationResult != null && _lastPasswordPinCreationResult.ExpirationDate > DateTime.UtcNow; if (valid) { _lastPin = null; _lastPasswordPinCreationResult = null; foreach (var user in Users) { await ResetPassword(user).ConfigureAwait(false); if (user.Policy.IsDisabled) { user.Policy.IsDisabled = false; UpdateUserPolicy(user, user.Policy, true); } usersReset.Add(user.Name); } } else { _pinAttempts++; if (_pinAttempts >= 3) { _lastPin = null; _lastPasswordPinCreationResult = null; } } return new PinRedeemResult { Success = valid, UsersReset = usersReset.ToArray() }; } private void DeletePinFile() { try { _fileSystem.DeleteFile(PasswordResetFile); } catch { } } class PasswordPinCreationResult { public string PinFile { get; set; } public DateTime ExpirationDate { get; set; } } public UserPolicy GetUserPolicy(User user) { var path = GetPolicyFilePath(user); if (!File.Exists(path)) { return GetDefaultPolicy(user); } try { lock (_policySyncLock) { return (UserPolicy)_xmlSerializer.DeserializeFromFile(typeof(UserPolicy), path); } } catch (IOException) { return GetDefaultPolicy(user); } catch (Exception ex) { _logger.LogError(ex, "Error reading policy file: {path}", path); return GetDefaultPolicy(user); } } private static UserPolicy GetDefaultPolicy(User user) { return new UserPolicy { EnableContentDownloading = true, EnableSyncTranscoding = true }; } private readonly object _policySyncLock = new object(); public void UpdateUserPolicy(Guid userId, UserPolicy userPolicy) { var user = GetUserById(userId); UpdateUserPolicy(user, userPolicy, true); } private void UpdateUserPolicy(User user, UserPolicy userPolicy, bool fireEvent) { // The xml serializer will output differently if the type is not exact if (userPolicy.GetType() != typeof(UserPolicy)) { var json = _jsonSerializer.SerializeToString(userPolicy); userPolicy = _jsonSerializer.DeserializeFromString(json); } var path = GetPolicyFilePath(user); Directory.CreateDirectory(Path.GetDirectoryName(path)); lock (_policySyncLock) { _xmlSerializer.SerializeToFile(userPolicy, path); user.Policy = userPolicy; } if (fireEvent) { UserPolicyUpdated?.Invoke(this, new GenericEventArgs { Argument = user }); } } private void DeleteUserPolicy(User user) { var path = GetPolicyFilePath(user); try { lock (_policySyncLock) { _fileSystem.DeleteFile(path); } } catch (IOException) { } catch (Exception ex) { _logger.LogError(ex, "Error deleting policy file"); } } private static string GetPolicyFilePath(User user) { return Path.Combine(user.ConfigurationDirectoryPath, "policy.xml"); } private static string GetConfigurationFilePath(User user) { return Path.Combine(user.ConfigurationDirectoryPath, "config.xml"); } public UserConfiguration GetUserConfiguration(User user) { var path = GetConfigurationFilePath(user); if (!File.Exists(path)) { return new UserConfiguration(); } try { lock (_configSyncLock) { return (UserConfiguration)_xmlSerializer.DeserializeFromFile(typeof(UserConfiguration), path); } } catch (IOException) { return new UserConfiguration(); } catch (Exception ex) { _logger.LogError(ex, "Error reading policy file: {path}", path); return new UserConfiguration(); } } private readonly object _configSyncLock = new object(); public void UpdateConfiguration(Guid userId, UserConfiguration config) { var user = GetUserById(userId); UpdateConfiguration(user, config); } public void UpdateConfiguration(User user, UserConfiguration config) { UpdateConfiguration(user, config, true); } private void UpdateConfiguration(User user, UserConfiguration config, bool fireEvent) { var path = GetConfigurationFilePath(user); // The xml serializer will output differently if the type is not exact if (config.GetType() != typeof(UserConfiguration)) { var json = _jsonSerializer.SerializeToString(config); config = _jsonSerializer.DeserializeFromString(json); } Directory.CreateDirectory(Path.GetDirectoryName(path)); lock (_configSyncLock) { _xmlSerializer.SerializeToFile(config, path); user.Configuration = config; } if (fireEvent) { UserConfigurationUpdated?.Invoke(this, new GenericEventArgs { Argument = user }); } } } public class DeviceAccessEntryPoint : IServerEntryPoint { private IUserManager _userManager; private IAuthenticationRepository _authRepo; private IDeviceManager _deviceManager; private ISessionManager _sessionManager; public DeviceAccessEntryPoint(IUserManager userManager, IAuthenticationRepository authRepo, IDeviceManager deviceManager, ISessionManager sessionManager) { _userManager = userManager; _authRepo = authRepo; _deviceManager = deviceManager; _sessionManager = sessionManager; } public Task RunAsync() { _userManager.UserPolicyUpdated += _userManager_UserPolicyUpdated; return Task.CompletedTask; } private void _userManager_UserPolicyUpdated(object sender, GenericEventArgs e) { var user = e.Argument; if (!user.Policy.EnableAllDevices) { UpdateDeviceAccess(user); } } private void UpdateDeviceAccess(User user) { var existing = _authRepo.Get(new AuthenticationInfoQuery { UserId = user.Id }).Items; foreach (var authInfo in existing) { if (!string.IsNullOrEmpty(authInfo.DeviceId) && !_deviceManager.CanAccessDevice(user, authInfo.DeviceId)) { _sessionManager.Logout(authInfo); } } } public void Dispose() { } } }