aboutsummaryrefslogtreecommitdiff
path: root/Emby.Server.Implementations/Library/UserManager.cs
AgeCommit message (Collapse)Author
2020-02-03Merge pull request #2359 from Bond-009/usernamedkanada
Allow changing capitalization of usernames
2020-02-01update some commentsdkanada
Co-Authored-By: Bond-009 <bond.009@outlook.com>
2020-02-01improve scan progress and fix a few bugsdkanada
2020-01-31Allow changing capitalization of usernamesBond_009
2020-01-10Merge branch 'master' into warn12Bond_009
2020-01-04Merge pull request #2206 from Bond-009/userconfigdkanada
Delete user config dir on user deletion
2019-12-29Delete user config dir on user deletionBond_009
2019-12-13Enable TreatWarningsAsErrors for some projectsBond_009
Analyzers are only run in debug build, so setting TreatWarningsAsErrors for release build will catch the compiler warnings until we resolve all analyzer warnings.
2019-12-11More warnings (removed)Bond_009
2019-12-11Merge pull request #2041 from Bond-009/warn11dkanada
Fix more warnings
2019-12-10Apply suggestions from code reviewBond-009
Co-Authored-By: dkanada <dkanada@users.noreply.github.com>
2019-11-27Fix more warningsBond_009
2019-11-25* Add support for multi segment base urlsBond_009
* Make baseurl case-insensitive
2019-11-23Merge pull request #1926 from Bond-009/authdkanada
Add clearer exceptions, warnings and docs
2019-11-21Fix easy passwordBond-009
2019-11-01Rewrite hex encoder/decoderBond_009
2019-10-29Fix more warningsBond_009
2019-10-20Add clearer exceptions, warnings and docsBond_009
2019-09-23Fix multiple mistakes and warningsBond_009
2019-09-17Remove legacy auth code (#1677)Bond-009
* Remove legacy auth code * Adds tests so we don't break PasswordHash (again) * Clean up interfaces * Remove duplicate code * Use auto properties * static using * Don't use 'this' * Fix build
2019-09-13Reset invalid login counter on successfull loginBond-009
2019-08-18Fix UserNotFoundErrorBond_009
2019-08-16Improvements to UserManagerBond_009
2019-07-06Streamline authentication proccessBond_009
2019-06-28Reduce amount of raw sqlBond_009
2019-06-09Revert "Don't set a default reset provider"Joshua M. Boniface
This reverts commit c230d49d7c37d4fbe77676b835c3afd6c8cb56e7. This reenables an edge case where an admin might want to reset, with the default auth provider, the password of an externally-provided user so they could "unlock" the account while it was failing. There might be minor security implications to this, but the malicious actor would need FS access to do it (as they would with any password resets) so it's probably best to keep it as-is. Removing this in the first place was due to a misunderstanding anyways so no harm.
2019-06-09Remove superfluous conditionalJoshua M. Boniface
This wasn't needed to prevent updating the policy on-disk from my tests and can be removed as suggested by @Bond-009
2019-06-09Don't set a default reset providerJoshua M. Boniface
2019-06-09Apply suggestions from code reviewJoshua M. Boniface
Co-Authored-By: Claus Vium <cvium@users.noreply.github.com> Co-Authored-By: Bond-009 <bond.009@outlook.com>
2019-06-09Add nicer log message and commentJoshua M. Boniface
2019-06-08Implement InvalidAuthProviderJoshua M. Boniface
Implements the InvalidAuthProvider, which acts as a fallback if a configured authentication provider, e.g. LDAP, is unavailable due to a load failure or removal. Until the user or the authentication plugin is corrected, this will cause users with the missing provider to be locked out, while throwing errors in the logs about the issue. Fixes #1445 part 2
2019-05-25Format correctly the PIN when updating itDrPandemic
2019-05-11Fix pin bug introduced in 10.3.z.DrPandemic
The issue is that the new easyPassword format prepends the hash function. This PR extract the hash from "$SHA1$_hash_".
2019-04-30Fix incorrect hasPassword flag when easy pin setbugfixin
2019-04-07Override username with AuthenticationProviderJoshua Boniface
Pass back the Username directive returned by an AuthenticationProvider to the calling code, so we may override the user-provided Username value if the authentication provider passes this back. Useful for instance in an LDAP scenario where what the user types may not necessarily be the "username" that is mapped in the system, e.g. the user providing 'mail' while 'uid' is the "username" value. Could also then be extensible to other authentication providers as well, should they wish to do a similar thing.
2019-03-25Apply minor suggestions from code reviewLogicalPhallacy
Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com>
2019-03-24removes needless dictionaryPhallacy
2019-03-24Update Emby.Server.Implementations/Library/UserManager.csClaus Vium
Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com>
2019-03-22made password resets an interface and per userPhallacy
2019-03-16really fixed line endingsPhallacy
2019-03-16adding regex fixPhallacy
2019-03-16Update Emby.Server.Implementations/Library/UserManager.csJoshua M. Boniface
Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com>
2019-03-16updated regex to string literal with escaped -Phallacy
2019-03-16configurable user lockoutPhallacy
2019-03-05Minor fixes to address style issuesPhallacy
2019-03-04minor style fixesPhallacy
2019-02-20merging with master to clear merge conflictPhallacy
2019-02-20minor changes and return to netstandardPhallacy
2019-02-19Merge pull request #848 from Bond-009/perfJoshua M. Boniface
Minor changes to reduce allocations
2019-02-18added justaman notes, fixed new bug from emty has removalsPhallacy