1
0
Fork 0
peertube/server/middlewares/validators/shared/videos.ts

251 lines
6.8 KiB
TypeScript
Raw Normal View History

import { Request, Response } from 'express'
import { loadVideo, VideoLoadType } from '@server/lib/model-loaders'
2022-02-11 04:51:33 -05:00
import { isAbleToUploadVideo } from '@server/lib/user'
import { VideoTokensManager } from '@server/lib/video-tokens-manager'
2022-06-22 08:03:50 -04:00
import { authenticatePromise } from '@server/middlewares/auth'
import { VideoModel } from '@server/models/video/video'
import { VideoChannelModel } from '@server/models/video/video-channel'
import { VideoFileModel } from '@server/models/video/video-file'
import {
MUser,
MUserAccountId,
2022-02-11 04:51:33 -05:00
MUserId,
MVideo,
MVideoAccountLight,
MVideoFormattableDetails,
MVideoFullLight,
2021-06-11 08:09:33 -04:00
MVideoId,
MVideoImmutable,
MVideoThumbnail,
MVideoWithRights
2020-06-18 04:45:25 -04:00
} from '@server/types/models'
2022-06-22 03:44:08 -04:00
import { HttpStatusCode, ServerErrorCode, UserRight, VideoPrivacy } from '@shared/models'
2019-07-23 04:40:39 -04:00
async function doesVideoExist (id: number | string, res: Response, fetchType: VideoLoadType = 'all') {
2019-07-23 04:40:39 -04:00
const userId = res.locals.oauth ? res.locals.oauth.token.User.id : undefined
const video = await loadVideo(id, fetchType, userId)
2019-07-23 04:40:39 -04:00
2022-06-22 03:44:08 -04:00
if (!video) {
res.fail({
status: HttpStatusCode.NOT_FOUND_404,
message: 'Video not found'
})
2022-06-22 03:44:08 -04:00
2019-07-23 04:40:39 -04:00
return false
}
2019-08-15 05:53:26 -04:00
switch (fetchType) {
case 'for-api':
res.locals.videoAPI = video as MVideoFormattableDetails
break
2019-08-15 05:53:26 -04:00
case 'all':
res.locals.videoAll = video as MVideoFullLight
break
case 'only-immutable-attributes':
res.locals.onlyImmutableVideo = video as MVideoImmutable
break
2019-08-15 05:53:26 -04:00
case 'id':
2021-06-11 08:09:33 -04:00
res.locals.videoId = video as MVideoId
2019-08-15 05:53:26 -04:00
break
case 'only-video':
2019-08-20 07:52:49 -04:00
res.locals.onlyVideo = video as MVideoThumbnail
2019-08-15 05:53:26 -04:00
break
}
2019-07-23 04:40:39 -04:00
return true
}
2022-06-22 03:44:08 -04:00
// ---------------------------------------------------------------------------
async function doesVideoFileOfVideoExist (id: number, videoIdOrUUID: number | string, res: Response) {
if (!await VideoFileModel.doesVideoExistForVideoFile(id, videoIdOrUUID)) {
res.fail({
status: HttpStatusCode.NOT_FOUND_404,
message: 'VideoFile matching Video not found'
})
return false
}
return true
}
2022-06-22 03:44:08 -04:00
// ---------------------------------------------------------------------------
2019-08-15 05:53:26 -04:00
async function doesVideoChannelOfAccountExist (channelId: number, user: MUserAccountId, res: Response) {
2021-04-06 11:01:35 -04:00
const videoChannel = await VideoChannelModel.loadAndPopulateAccount(channelId)
2019-07-23 04:40:39 -04:00
2021-04-06 11:01:35 -04:00
if (videoChannel === null) {
res.fail({ message: 'Unknown video "video channel" for this instance.' })
2021-04-06 11:01:35 -04:00
return false
}
// Don't check account id if the user can update any video
if (user.hasRight(UserRight.UPDATE_ANY_VIDEO) === true) {
2019-07-23 04:40:39 -04:00
res.locals.videoChannel = videoChannel
return true
}
2021-04-06 11:01:35 -04:00
if (videoChannel.Account.id !== user.Account.id) {
res.fail({
message: 'Unknown video "video channel" for this account.'
})
2019-07-23 04:40:39 -04:00
return false
}
res.locals.videoChannel = videoChannel
return true
}
2022-06-22 03:44:08 -04:00
// ---------------------------------------------------------------------------
2022-06-22 03:44:08 -04:00
async function checkCanSeeVideo (options: {
req: Request
res: Response
paramId: string
video: MVideo
}) {
const { req, res, video, paramId } = options
2022-06-22 03:44:08 -04:00
if (video.requiresAuth({ urlParamId: paramId, checkBlacklist: true })) {
return checkCanSeeAuthVideo(req, res, video)
2022-06-22 03:44:08 -04:00
}
if (video.privacy === VideoPrivacy.UNLISTED || video.privacy === VideoPrivacy.PUBLIC) {
return true
2022-06-22 03:44:08 -04:00
}
throw new Error('Unknown video privacy when checking video right ' + video.url)
2022-06-22 03:44:08 -04:00
}
async function checkCanSeeAuthVideo (req: Request, res: Response, video: MVideoId | MVideoWithRights) {
2022-06-22 03:44:08 -04:00
const fail = () => {
2022-02-11 04:51:33 -05:00
res.fail({
status: HttpStatusCode.FORBIDDEN_403,
2022-06-22 03:44:08 -04:00
message: 'Cannot fetch information of private/internal/blocked video'
2022-02-11 04:51:33 -05:00
})
return false
}
await authenticatePromise(req, res)
2022-06-22 03:44:08 -04:00
const user = res.locals.oauth?.token.User
if (!user) return fail()
const videoWithRights = (video as MVideoWithRights).VideoChannel?.Account?.userId
? video as MVideoWithRights
2022-06-28 08:57:51 -04:00
: await VideoModel.loadFull(video.id)
2022-06-22 03:44:08 -04:00
const privacy = videoWithRights.privacy
if (privacy === VideoPrivacy.INTERNAL) {
// We know we have a user
return true
}
const isOwnedByUser = videoWithRights.VideoChannel.Account.userId === user.id
2022-06-22 08:03:50 -04:00
if (videoWithRights.isBlacklisted()) {
if (isOwnedByUser || user.hasRight(UserRight.MANAGE_VIDEO_BLACKLIST)) return true
2022-06-22 03:44:08 -04:00
return fail()
}
2022-06-22 08:03:50 -04:00
if (privacy === VideoPrivacy.PRIVATE || privacy === VideoPrivacy.UNLISTED) {
if (isOwnedByUser || user.hasRight(UserRight.SEE_ALL_VIDEOS)) return true
2022-06-22 03:44:08 -04:00
return fail()
}
// Should not happen
return fail()
}
2022-06-22 03:44:08 -04:00
// ---------------------------------------------------------------------------
async function checkCanAccessVideoStaticFiles (options: {
video: MVideo
req: Request
res: Response
paramId: string
}) {
const { video, req, res } = options
if (res.locals.oauth?.token.User) {
return checkCanSeeVideo(options)
}
const videoFileToken = req.query.videoFileToken
if (videoFileToken && VideoTokensManager.Instance.hasToken({ token: videoFileToken, videoUUID: video.uuid })) {
const user = VideoTokensManager.Instance.getUserFromToken({ token: videoFileToken })
res.locals.videoFileToken = { user }
return true
}
if (!video.hasPrivateStaticPath()) return true
res.sendStatus(HttpStatusCode.FORBIDDEN_403)
return false
}
// ---------------------------------------------------------------------------
2020-11-02 09:43:44 -05:00
function checkUserCanManageVideo (user: MUser, video: MVideoAccountLight, right: UserRight, res: Response, onlyOwned = true) {
2019-07-23 04:40:39 -04:00
// Retrieve the user who did the request
2020-11-02 09:43:44 -05:00
if (onlyOwned && video.isOwned() === false) {
res.fail({
status: HttpStatusCode.FORBIDDEN_403,
message: 'Cannot manage a video of another server.'
})
2019-07-23 04:40:39 -04:00
return false
}
// Check if the user can delete the video
// The user can delete it if he has the right
// Or if s/he is the video's account
const account = video.VideoChannel.Account
if (user.hasRight(right) === false && account.userId !== user.id) {
res.fail({
status: HttpStatusCode.FORBIDDEN_403,
message: 'Cannot manage a video of another user.'
})
2019-07-23 04:40:39 -04:00
return false
}
return true
}
2022-06-22 03:44:08 -04:00
// ---------------------------------------------------------------------------
2022-02-11 04:51:33 -05:00
async function checkUserQuota (user: MUserId, videoFileSize: number, res: Response) {
if (await isAbleToUploadVideo(user.id, videoFileSize) === false) {
res.fail({
status: HttpStatusCode.PAYLOAD_TOO_LARGE_413,
message: 'The user video quota is exceeded with this video.',
type: ServerErrorCode.QUOTA_REACHED
})
return false
}
return true
}
2019-07-23 04:40:39 -04:00
// ---------------------------------------------------------------------------
export {
doesVideoChannelOfAccountExist,
doesVideoExist,
doesVideoFileOfVideoExist,
2022-02-11 04:51:33 -05:00
checkCanAccessVideoStaticFiles,
checkUserCanManageVideo,
2022-06-22 03:44:08 -04:00
checkCanSeeVideo,
2022-02-11 04:51:33 -05:00
checkUserQuota
2019-07-23 04:40:39 -04:00
}