using System; using System.Linq; using System.Text; using System.Threading.Tasks; using Jellyfin.Data.Entities; using MediaBrowser.Common.Cryptography; using MediaBrowser.Controller.Authentication; using MediaBrowser.Model.Cryptography; namespace Jellyfin.Server.Implementations.Users { /// /// The default authentication provider. /// public class DefaultAuthenticationProvider : IAuthenticationProvider, IRequiresResolvedUser { private readonly ICryptoProvider _cryptographyProvider; /// /// Initializes a new instance of the class. /// /// The cryptography provider. public DefaultAuthenticationProvider(ICryptoProvider cryptographyProvider) { _cryptographyProvider = cryptographyProvider; } /// public string Name => "Default"; /// public bool IsEnabled => true; /// // This is dumb and an artifact of the backwards way auth providers were designed. // This version of authenticate was never meant to be called, but needs to be here for interface compat // Only the providers that don't provide local user support use this public Task Authenticate(string username, string password) { throw new NotImplementedException(); } /// // This is the version that we need to use for local users. Because reasons. public Task Authenticate(string username, string password, User resolvedUser) { if (resolvedUser == null) { throw new AuthenticationException("Specified user does not exist."); } bool success = false; // As long as jellyfin supports password-less users, we need this little block here to accommodate if (!HasPassword(resolvedUser) && string.IsNullOrEmpty(password)) { return Task.FromResult(new ProviderAuthenticationResult { Username = username }); } // Handle the case when the stored password is null, but the user tried to login with a password if (resolvedUser.Password != null) { byte[] passwordBytes = Encoding.UTF8.GetBytes(password); PasswordHash readyHash = PasswordHash.Parse(resolvedUser.Password); if (_cryptographyProvider.GetSupportedHashMethods().Contains(readyHash.Id) || _cryptographyProvider.DefaultHashMethod == readyHash.Id) { byte[] calculatedHash = _cryptographyProvider.ComputeHash( readyHash.Id, passwordBytes, readyHash.Salt.ToArray()); if (readyHash.Hash.SequenceEqual(calculatedHash)) { success = true; } } else { throw new AuthenticationException($"Requested crypto method not available in provider: {readyHash.Id}"); } } if (!success) { throw new AuthenticationException("Invalid username or password"); } return Task.FromResult(new ProviderAuthenticationResult { Username = username }); } /// public bool HasPassword(User user) => !string.IsNullOrEmpty(user?.Password); /// public Task ChangePassword(User user, string newPassword) { if (string.IsNullOrEmpty(newPassword)) { user.Password = null; return Task.CompletedTask; } PasswordHash newPasswordHash = _cryptographyProvider.CreatePasswordHash(newPassword); user.Password = newPasswordHash.ToString(); return Task.CompletedTask; } } }