isVideoPrivacyValid
} from '../../helpers'
import { UserRight, VideoPrivacy } from '../../../shared'
+import { authenticate } from '../oauth'
const videosAddValidator = [
body('videofile').custom((value, { req }) => isVideoFile(req.files)).withMessage(
const videoFile: Express.Multer.File = req.files['videofile'][0]
const user = res.locals.oauth.token.User
- return db.VideoChannel.loadByIdAndAuthor(req.body.channelId, user.Author.id)
+ return db.VideoChannel.loadByIdAndAccount(req.body.channelId, user.Account.id)
.then(videoChannel => {
if (!videoChannel) {
res.status(400)
- .json({ error: 'Unknown video video channel for this author.' })
+ .json({ error: 'Unknown video video channel for this account.' })
.end()
return undefined
body('licence').optional().custom(isVideoLicenceValid).withMessage('Should have a valid licence'),
body('language').optional().custom(isVideoLanguageValid).withMessage('Should have a valid language'),
body('nsfw').optional().custom(isVideoNSFWValid).withMessage('Should have a valid NSFW attribute'),
- body('privacy').custom(isVideoPrivacyValid).withMessage('Should have correct video privacy'),
+ body('privacy').optional().custom(isVideoPrivacyValid).withMessage('Should have correct video privacy'),
body('description').optional().custom(isVideoDescriptionValid).withMessage('Should have a valid description'),
body('tags').optional().custom(isVideoTagsValid).withMessage('Should have correct tags'),
// We need to make additional checks
if (video.isOwned() === false) {
return res.status(403)
- .json({ error: 'Cannot update video of another pod' })
+ .json({ error: 'Cannot update video of another server' })
.end()
}
- if (video.VideoChannel.Author.userId !== res.locals.oauth.token.User.id) {
+ if (video.VideoChannel.Account.userId !== res.locals.oauth.token.User.id) {
return res.status(403)
.json({ error: 'Cannot update video of another user' })
.end()
logger.debug('Checking videosGet parameters', { parameters: req.params })
checkErrors(req, res, () => {
- checkVideoExists(req.params.id, res, next)
+ checkVideoExists(req.params.id, res, () => {
+ const video = res.locals.video
+
+ // Video is not private, anyone can access it
+ if (video.privacy !== VideoPrivacy.PRIVATE) return next()
+
+ authenticate(req, res, () => {
+ if (video.VideoChannel.Account.userId !== res.locals.oauth.token.User.id) {
+ return res.status(403)
+ .json({ error: 'Cannot get this private video of another user' })
+ .end()
+ }
+
+ next()
+ })
+ })
})
}
]
function checkUserCanDeleteVideo (userId: number, res: express.Response, callback: () => void) {
// Retrieve the user who did the request
- db.User.loadById(userId)
- .then(user => {
- if (res.locals.video.isOwned() === false) {
- return res.status(403)
- .json({ error: 'Cannot remove video of another pod, blacklist it' })
- .end()
- }
-
- // Check if the user can delete the video
- // The user can delete it if s/he is an admin
- // Or if s/he is the video's author
- if (user.hasRight(UserRight.REMOVE_ANY_VIDEO) === false && res.locals.video.Author.userId !== res.locals.oauth.token.User.id) {
- return res.status(403)
- .json({ error: 'Cannot remove video of another user' })
- .end()
- }
-
- // If we reach this comment, we can delete the video
- callback()
- })
- .catch(err => {
- logger.error('Error in video request validator.', err)
- return res.sendStatus(500)
- })
+ if (res.locals.video.isOwned() === false) {
+ return res.status(403)
+ .json({ error: 'Cannot remove video of another server, blacklist it' })
+ .end()
+ }
+
+ // Check if the user can delete the video
+ // The user can delete it if s/he is an admin
+ // Or if s/he is the video's account
+ const account = res.locals.video.VideoChannel.Account
+ const user = res.locals.oauth.token.User
+ if (user.hasRight(UserRight.REMOVE_ANY_VIDEO) === false && account.userId !== user.id) {
+ return res.status(403)
+ .json({ error: 'Cannot remove video of another user' })
+ .end()
+ }
+
+ // If we reach this comment, we can delete the video
+ callback()
}