import { Request, Response } from 'express'
-import { isUUIDValid } from '@server/helpers/custom-validators/misc'
import { loadVideo, VideoLoadType } from '@server/lib/model-loaders'
import { isAbleToUploadVideo } from '@server/lib/user'
-import { authenticatePromiseIfNeeded } from '@server/middlewares/auth'
+import { VideoTokensManager } from '@server/lib/video-tokens-manager'
+import { authenticatePromise } from '@server/middlewares/auth'
import { VideoModel } from '@server/models/video/video'
import { VideoChannelModel } from '@server/models/video/video-channel'
import { VideoFileModel } from '@server/models/video/video-file'
res: Response
paramId: string
video: MVideo
- authenticateInQuery?: boolean // default false
}) {
- const { req, res, video, paramId, authenticateInQuery = false } = options
+ const { req, res, video, paramId } = options
- if (video.requiresAuth()) {
- return checkCanSeeAuthVideo(req, res, video, authenticateInQuery)
+ if (video.requiresAuth({ urlParamId: paramId, checkBlacklist: true })) {
+ return checkCanSeeAuthVideo(req, res, video)
}
- if (video.privacy === VideoPrivacy.UNLISTED) {
- if (isUUIDValid(paramId)) return true
-
- return checkCanSeeAuthVideo(req, res, video, authenticateInQuery)
+ if (video.privacy === VideoPrivacy.UNLISTED || video.privacy === VideoPrivacy.PUBLIC) {
+ return true
}
- if (video.privacy === VideoPrivacy.PUBLIC) return true
-
- throw new Error('Fatal error when checking video right ' + video.url)
+ throw new Error('Unknown video privacy when checking video right ' + video.url)
}
-async function checkCanSeeAuthVideo (req: Request, res: Response, video: MVideoId | MVideoWithRights, authenticateInQuery = false) {
+async function checkCanSeeAuthVideo (req: Request, res: Response, video: MVideoId | MVideoWithRights) {
const fail = () => {
res.fail({
status: HttpStatusCode.FORBIDDEN_403,
return false
}
- await authenticatePromiseIfNeeded(req, res, authenticateInQuery)
+ await authenticatePromise(req, res)
const user = res.locals.oauth?.token.User
if (!user) return fail()
const videoWithRights = (video as MVideoWithRights).VideoChannel?.Account?.userId
? video as MVideoWithRights
- : await VideoModel.loadAndPopulateAccountAndServerAndTags(video.id)
+ : await VideoModel.loadFull(video.id)
const privacy = videoWithRights.privacy
}
const isOwnedByUser = videoWithRights.VideoChannel.Account.userId === user.id
- if (privacy === VideoPrivacy.PRIVATE || privacy === VideoPrivacy.UNLISTED) {
- if (isOwnedByUser && user.hasRight(UserRight.SEE_ALL_VIDEOS)) return true
+
+ if (videoWithRights.isBlacklisted()) {
+ if (isOwnedByUser || user.hasRight(UserRight.MANAGE_VIDEO_BLACKLIST)) return true
return fail()
}
- if (videoWithRights.isBlacklisted()) {
- if (isOwnedByUser || user.hasRight(UserRight.MANAGE_VIDEO_BLACKLIST)) return true
+ if (privacy === VideoPrivacy.PRIVATE || privacy === VideoPrivacy.UNLISTED) {
+ if (isOwnedByUser || user.hasRight(UserRight.SEE_ALL_VIDEOS)) return true
return fail()
}
// ---------------------------------------------------------------------------
+async function checkCanAccessVideoStaticFiles (options: {
+ video: MVideo
+ req: Request
+ res: Response
+ paramId: string
+}) {
+ const { video, req, res } = options
+
+ if (res.locals.oauth?.token.User) {
+ return checkCanSeeVideo(options)
+ }
+
+ if (!video.hasPrivateStaticPath()) return true
+
+ const videoFileToken = req.query.videoFileToken
+ if (!videoFileToken) {
+ res.sendStatus(HttpStatusCode.FORBIDDEN_403)
+ return false
+ }
+
+ if (VideoTokensManager.Instance.hasToken({ token: videoFileToken, videoUUID: video.uuid })) {
+ return true
+ }
+
+ res.sendStatus(HttpStatusCode.FORBIDDEN_403)
+ return false
+}
+
+// ---------------------------------------------------------------------------
+
function checkUserCanManageVideo (user: MUser, video: MVideoAccountLight, right: UserRight, res: Response, onlyOwned = true) {
// Retrieve the user who did the request
if (onlyOwned && video.isOwned() === false) {
doesVideoExist,
doesVideoFileOfVideoExist,
+ checkCanAccessVideoStaticFiles,
checkUserCanManageVideo,
checkCanSeeVideo,
checkUserQuota