]> git.immae.eu Git - github/Chocobozzz/PeerTube.git/blob - server/middlewares/validators/videos/video-imports.ts
Add missing job types to admin panel
[github/Chocobozzz/PeerTube.git] / server / middlewares / validators / videos / video-imports.ts
1 import express from 'express'
2 import { body, param } from 'express-validator'
3 import { isResolvingToUnicastOnly } from '@server/helpers/dns'
4 import { isPreImportVideoAccepted } from '@server/lib/moderation'
5 import { Hooks } from '@server/lib/plugins/hooks'
6 import { MUserAccountId, MVideoImport } from '@server/types/models'
7 import { HttpStatusCode, UserRight, VideoImportState } from '@shared/models'
8 import { VideoImportCreate } from '@shared/models/videos/import/video-import-create.model'
9 import { isIdValid, toIntOrNull } from '../../../helpers/custom-validators/misc'
10 import { isVideoImportTargetUrlValid, isVideoImportTorrentFile } from '../../../helpers/custom-validators/video-imports'
11 import { isVideoMagnetUriValid, isVideoNameValid } from '../../../helpers/custom-validators/videos'
12 import { cleanUpReqFiles } from '../../../helpers/express-utils'
13 import { logger } from '../../../helpers/logger'
14 import { CONFIG } from '../../../initializers/config'
15 import { CONSTRAINTS_FIELDS } from '../../../initializers/constants'
16 import { areValidationErrors, doesVideoChannelOfAccountExist, doesVideoImportExist } from '../shared'
17 import { getCommonVideoEditAttributes } from './videos'
18
19 const videoImportAddValidator = getCommonVideoEditAttributes().concat([
20 body('channelId')
21 .customSanitizer(toIntOrNull)
22 .custom(isIdValid).withMessage('Should have correct video channel id'),
23 body('targetUrl')
24 .optional()
25 .custom(isVideoImportTargetUrlValid).withMessage('Should have a valid video import target URL'),
26 body('magnetUri')
27 .optional()
28 .custom(isVideoMagnetUriValid).withMessage('Should have a valid video magnet URI'),
29 body('torrentfile')
30 .custom((value, { req }) => isVideoImportTorrentFile(req.files))
31 .withMessage(
32 'This torrent file is not supported or too large. Please, make sure it is of the following type: ' +
33 CONSTRAINTS_FIELDS.VIDEO_IMPORTS.TORRENT_FILE.EXTNAME.join(', ')
34 ),
35 body('name')
36 .optional()
37 .custom(isVideoNameValid).withMessage(
38 `Should have a video name between ${CONSTRAINTS_FIELDS.VIDEOS.NAME.min} and ${CONSTRAINTS_FIELDS.VIDEOS.NAME.max} characters long`
39 ),
40
41 async (req: express.Request, res: express.Response, next: express.NextFunction) => {
42 logger.debug('Checking videoImportAddValidator parameters', { parameters: req.body })
43
44 const user = res.locals.oauth.token.User
45 const torrentFile = req.files?.['torrentfile'] ? req.files['torrentfile'][0] : undefined
46
47 if (areValidationErrors(req, res)) return cleanUpReqFiles(req)
48
49 if (CONFIG.IMPORT.VIDEOS.HTTP.ENABLED !== true && req.body.targetUrl) {
50 cleanUpReqFiles(req)
51
52 return res.fail({
53 status: HttpStatusCode.CONFLICT_409,
54 message: 'HTTP import is not enabled on this instance.'
55 })
56 }
57
58 if (CONFIG.IMPORT.VIDEOS.TORRENT.ENABLED !== true && (req.body.magnetUri || torrentFile)) {
59 cleanUpReqFiles(req)
60
61 return res.fail({
62 status: HttpStatusCode.CONFLICT_409,
63 message: 'Torrent/magnet URI import is not enabled on this instance.'
64 })
65 }
66
67 if (!await doesVideoChannelOfAccountExist(req.body.channelId, user, res)) return cleanUpReqFiles(req)
68
69 // Check we have at least 1 required param
70 if (!req.body.targetUrl && !req.body.magnetUri && !torrentFile) {
71 cleanUpReqFiles(req)
72
73 return res.fail({ message: 'Should have a magnetUri or a targetUrl or a torrent file.' })
74 }
75
76 if (req.body.targetUrl) {
77 const hostname = new URL(req.body.targetUrl).hostname
78
79 if (await isResolvingToUnicastOnly(hostname) !== true) {
80 cleanUpReqFiles(req)
81
82 return res.fail({
83 status: HttpStatusCode.FORBIDDEN_403,
84 message: 'Cannot use non unicast IP as targetUrl.'
85 })
86 }
87 }
88
89 if (!await isImportAccepted(req, res)) return cleanUpReqFiles(req)
90
91 return next()
92 }
93 ])
94
95 const videoImportDeleteValidator = [
96 param('id')
97 .custom(isIdValid).withMessage('Should have correct import id'),
98
99 async (req: express.Request, res: express.Response, next: express.NextFunction) => {
100 logger.debug('Checking videoImportDeleteValidator parameters', { parameters: req.params })
101
102 if (areValidationErrors(req, res)) return
103
104 if (!await doesVideoImportExist(parseInt(req.params.id), res)) return
105 if (!checkUserCanManageImport(res.locals.oauth.token.user, res.locals.videoImport, res)) return
106
107 if (res.locals.videoImport.state === VideoImportState.PENDING) {
108 return res.fail({
109 status: HttpStatusCode.CONFLICT_409,
110 message: 'Cannot delete a pending video import. Cancel it or wait for the end of the import first.'
111 })
112 }
113
114 return next()
115 }
116 ]
117
118 const videoImportCancelValidator = [
119 param('id')
120 .custom(isIdValid).withMessage('Should have correct import id'),
121
122 async (req: express.Request, res: express.Response, next: express.NextFunction) => {
123 logger.debug('Checking videoImportCancelValidator parameters', { parameters: req.params })
124
125 if (areValidationErrors(req, res)) return
126
127 if (!await doesVideoImportExist(parseInt(req.params.id), res)) return
128 if (!checkUserCanManageImport(res.locals.oauth.token.user, res.locals.videoImport, res)) return
129
130 if (res.locals.videoImport.state !== VideoImportState.PENDING) {
131 return res.fail({
132 status: HttpStatusCode.CONFLICT_409,
133 message: 'Cannot cancel a non pending video import.'
134 })
135 }
136
137 return next()
138 }
139 ]
140
141 // ---------------------------------------------------------------------------
142
143 export {
144 videoImportAddValidator,
145 videoImportCancelValidator,
146 videoImportDeleteValidator
147 }
148
149 // ---------------------------------------------------------------------------
150
151 async function isImportAccepted (req: express.Request, res: express.Response) {
152 const body: VideoImportCreate = req.body
153 const hookName = body.targetUrl
154 ? 'filter:api.video.pre-import-url.accept.result'
155 : 'filter:api.video.pre-import-torrent.accept.result'
156
157 // Check we accept this video
158 const acceptParameters = {
159 videoImportBody: body,
160 user: res.locals.oauth.token.User
161 }
162 const acceptedResult = await Hooks.wrapFun(
163 isPreImportVideoAccepted,
164 acceptParameters,
165 hookName
166 )
167
168 if (!acceptedResult || acceptedResult.accepted !== true) {
169 logger.info('Refused to import video.', { acceptedResult, acceptParameters })
170
171 res.fail({
172 status: HttpStatusCode.FORBIDDEN_403,
173 message: acceptedResult.errorMessage || 'Refused to import video'
174 })
175 return false
176 }
177
178 return true
179 }
180
181 function checkUserCanManageImport (user: MUserAccountId, videoImport: MVideoImport, res: express.Response) {
182 if (user.hasRight(UserRight.MANAGE_VIDEO_IMPORTS) === false && videoImport.userId !== user.id) {
183 res.fail({
184 status: HttpStatusCode.FORBIDDEN_403,
185 message: 'Cannot manage video import of another user'
186 })
187 return false
188 }
189
190 return true
191 }