Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
jellyfin-apiclient-python
Advanced tools
This is the API client from Jellyfin Kodi extracted as a python package so that other users may use the API without maintaining a fork of the API client. Please note that this API client is not complete. You may have to add API calls to perform certain tasks. Please see Contributing below.
This client can be installed with pip3 install jellyfin-apiclient-python
and imported with import jellyfin_apiclient_python
.
from jellyfin_apiclient_python import JellyfinClient
client = JellyfinClient()
You need to set some configuration values before you can connect a server:
client.config.app('your_brilliant_app', '0.0.1', 'machine_name', 'unique_id')
client.config.data["auth.ssl"] = True
If you do not have a token, you will need to connect via username and password:
client.auth.connect_to_address('server_url')
client.auth.login('server_url', 'username', 'password')
You can then generate a token:
credentials = client.auth.credentials.get_credentials()
server = credentials["Servers"][0]
server["username"] = 'username'
json.dumps(server)
And if you wish then use that token to authenticate in future:
json.loads(credentials)
client.authenticate({"Servers": [credentials]}, discover=False)
You can also authenticate using an API key, which is generated on the server. This is different to a device AccessToken, and is set by not configuring a device name, or a device id:
client.config.data["app.name"] = 'your_brilliant_app'
client.config.data["app.version"] = '0.0.1'
client.authenticate({"Servers": [{"AccessToken": <API key here>, "address": <Server Address>}]}, discover=False)
The API is accessed via the jellyfin
attribute of the client. Return values
are a dictionary with 3 members, "Items", "TotalRecordCount" and "StartIndex"
The easiest way to fetch media objects is by calling search_media_items
, like
so:
client.jellyfin.search_media_items(
term="And Now for Something Completely Different", media="Videos")
For details on what the individual API calls do or how to do a certain task, you will probably find the Jellyfin MPV Shim and Jellyfin Kodi repositories useful.
The test suite is run via tox
, and you can install it from PyPi.
tox -elint
tox -epy39
tox -elint,py311
websocket.py
(now a dependency to websocket_client
).helper
(from Jellyfin Kodi) and kodi_six
.has_attribute
directly to __init__.py
.get_season
for fetching season metadata.get_audio_stream
to read an audio stream into a filesearch_media_items
to search for media itemsaudio_url
to return the URL to an audio fileaid=None, sid=None, start_time_ticks=None, is_playback=True
to API call get_play_info
.six
module.remote_
API calls to remote control another sessionitem_played
API methodWhen contributing, please maintain backward compatibility with existing calls in the API. Adding parameters is fine, but please make sure that they have default options to prevent existing software from breaking. Please also add your changes to the Changes from Jellyfin Kodi section.
If you would like to produce documentation for this API, I would also be interested in accepting pull requests for documentation.
FAQs
Python API client for Jellyfin
We found that jellyfin-apiclient-python demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.