+ await authenticatePromise(req, res)
+
+ const user = res.locals.oauth?.token.User
+ if (!user) return fail()
+
+ const videoWithRights = (video as MVideoWithRights).VideoChannel?.Account?.userId
+ ? video as MVideoWithRights
+ : await VideoModel.loadFull(video.id)
+
+ const privacy = videoWithRights.privacy
+
+ if (privacy === VideoPrivacy.INTERNAL) {
+ // We know we have a user
+ return true
+ }
+
+ const isOwnedByUser = videoWithRights.VideoChannel.Account.userId === user.id
+
+ if (videoWithRights.isBlacklisted()) {
+ if (isOwnedByUser || user.hasRight(UserRight.MANAGE_VIDEO_BLACKLIST)) return true
+
+ return fail()
+ }
+
+ if (privacy === VideoPrivacy.PRIVATE || privacy === VideoPrivacy.UNLISTED) {
+ if (isOwnedByUser || user.hasRight(UserRight.SEE_ALL_VIDEOS)) return true
+
+ return fail()
+ }
+
+ // Should not happen
+ return fail()
+}
+
+// ---------------------------------------------------------------------------
+
+async function checkCanAccessVideoStaticFiles (options: {
+ video: MVideo
+ req: Request
+ res: Response
+ paramId: string
+}) {
+ const { video, req, res } = options
+
+ if (res.locals.oauth?.token.User) {
+ return checkCanSeeVideo(options)
+ }
+
+ const videoFileToken = req.query.videoFileToken
+ if (videoFileToken && VideoTokensManager.Instance.hasToken({ token: videoFileToken, videoUUID: video.uuid })) {
+ const user = VideoTokensManager.Instance.getUserFromToken({ token: videoFileToken })
+
+ res.locals.videoFileToken = { user }
+ return true
+ }
+
+ if (!video.hasPrivateStaticPath()) return true
+
+ res.sendStatus(HttpStatusCode.FORBIDDEN_403)
+ return false