X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=server%2Fmiddlewares%2Fvalidators%2Fshared%2Fvideos.ts;h=ebbfc0a0a9242232c349dd070c612b4ac5d51549;hb=2f061e065ab43cc0b73595b619639a92952aeeba;hp=39aab6df7207aae0bf24c1c37dcef2132076b717;hpb=ff9d43f62a4f4737c5bfe955883b48c5440f323a;p=github%2FChocobozzz%2FPeerTube.git diff --git a/server/middlewares/validators/shared/videos.ts b/server/middlewares/validators/shared/videos.ts index 39aab6df7..ebbfc0a0a 100644 --- a/server/middlewares/validators/shared/videos.ts +++ b/server/middlewares/validators/shared/videos.ts @@ -1,8 +1,8 @@ import { Request, Response } from 'express' -import { isUUIDValid } from '@server/helpers/custom-validators/misc' import { loadVideo, VideoLoadType } from '@server/lib/model-loaders' import { isAbleToUploadVideo } from '@server/lib/user' -import { authenticatePromiseIfNeeded } from '@server/middlewares/auth' +import { VideoTokensManager } from '@server/lib/video-tokens-manager' +import { authenticatePromise } from '@server/middlewares/auth' import { VideoModel } from '@server/models/video/video' import { VideoChannelModel } from '@server/models/video/video-channel' import { VideoFileModel } from '@server/models/video/video-file' @@ -108,26 +108,21 @@ async function checkCanSeeVideo (options: { res: Response paramId: string video: MVideo - authenticateInQuery?: boolean // default false }) { - const { req, res, video, paramId, authenticateInQuery = false } = options + const { req, res, video, paramId } = options - if (video.requiresAuth()) { - return checkCanSeeAuthVideo(req, res, video, authenticateInQuery) + if (video.requiresAuth({ urlParamId: paramId, checkBlacklist: true })) { + return checkCanSeeAuthVideo(req, res, video) } - if (video.privacy === VideoPrivacy.UNLISTED) { - if (isUUIDValid(paramId)) return true - - return checkCanSeeAuthVideo(req, res, video, authenticateInQuery) + if (video.privacy === VideoPrivacy.UNLISTED || video.privacy === VideoPrivacy.PUBLIC) { + return true } - if (video.privacy === VideoPrivacy.PUBLIC) return true - - throw new Error('Fatal error when checking video right ' + video.url) + throw new Error('Unknown video privacy when checking video right ' + video.url) } -async function checkCanSeeAuthVideo (req: Request, res: Response, video: MVideoId | MVideoWithRights, authenticateInQuery = false) { +async function checkCanSeeAuthVideo (req: Request, res: Response, video: MVideoId | MVideoWithRights) { const fail = () => { res.fail({ status: HttpStatusCode.FORBIDDEN_403, @@ -137,14 +132,14 @@ async function checkCanSeeAuthVideo (req: Request, res: Response, video: MVideoI return false } - await authenticatePromiseIfNeeded(req, res, authenticateInQuery) + await authenticatePromise(req, res) const user = res.locals.oauth?.token.User if (!user) return fail() const videoWithRights = (video as MVideoWithRights).VideoChannel?.Account?.userId ? video as MVideoWithRights - : await VideoModel.loadAndPopulateAccountAndServerAndTags(video.id) + : await VideoModel.loadFull(video.id) const privacy = videoWithRights.privacy @@ -154,14 +149,15 @@ async function checkCanSeeAuthVideo (req: Request, res: Response, video: MVideoI } const isOwnedByUser = videoWithRights.VideoChannel.Account.userId === user.id - if (privacy === VideoPrivacy.PRIVATE || privacy === VideoPrivacy.UNLISTED) { - if (isOwnedByUser && user.hasRight(UserRight.SEE_ALL_VIDEOS)) return true + + if (videoWithRights.isBlacklisted()) { + if (isOwnedByUser || user.hasRight(UserRight.MANAGE_VIDEO_BLACKLIST)) return true return fail() } - if (videoWithRights.isBlacklisted()) { - if (isOwnedByUser || user.hasRight(UserRight.MANAGE_VIDEO_BLACKLIST)) return true + if (privacy === VideoPrivacy.PRIVATE || privacy === VideoPrivacy.UNLISTED) { + if (isOwnedByUser || user.hasRight(UserRight.SEE_ALL_VIDEOS)) return true return fail() } @@ -172,6 +168,36 @@ async function checkCanSeeAuthVideo (req: Request, res: Response, video: MVideoI // --------------------------------------------------------------------------- +async function checkCanAccessVideoStaticFiles (options: { + video: MVideo + req: Request + res: Response + paramId: string +}) { + const { video, req, res } = options + + if (res.locals.oauth?.token.User) { + return checkCanSeeVideo(options) + } + + if (!video.hasPrivateStaticPath()) return true + + const videoFileToken = req.query.videoFileToken + if (!videoFileToken) { + res.sendStatus(HttpStatusCode.FORBIDDEN_403) + return false + } + + if (VideoTokensManager.Instance.hasToken({ token: videoFileToken, videoUUID: video.uuid })) { + return true + } + + res.sendStatus(HttpStatusCode.FORBIDDEN_403) + return false +} + +// --------------------------------------------------------------------------- + function checkUserCanManageVideo (user: MUser, video: MVideoAccountLight, right: UserRight, res: Response, onlyOwned = true) { // Retrieve the user who did the request if (onlyOwned && video.isOwned() === false) { @@ -219,6 +245,7 @@ export { doesVideoExist, doesVideoFileOfVideoExist, + checkCanAccessVideoStaticFiles, checkUserCanManageVideo, checkCanSeeVideo, checkUserQuota