82f9f88c0f
Introduced a typed Claims struct in core/auth to replace the raw map[string]any approach used for JWT claims throughout the codebase. This provides compile-time safety and better readability when creating, validating, and extracting JWT tokens. Also upgraded lestrrat-go/jwx from v2 to v3 and go-chi/jwtauth to v5.4.0, adapting all callers to the new API where token accessor methods now return tuples instead of bare values. Updated all affected handlers, middleware, and tests. Signed-off-by: Deluan <deluan@navidrome.org>
96 lines
2.7 KiB
Go
96 lines
2.7 KiB
Go
package public
|
|
|
|
import (
|
|
"errors"
|
|
"io"
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/navidrome/navidrome/core/auth"
|
|
"github.com/navidrome/navidrome/log"
|
|
"github.com/navidrome/navidrome/utils/req"
|
|
)
|
|
|
|
func (pub *Router) handleStream(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
p := req.Params(r)
|
|
tokenId, _ := p.String(":id")
|
|
info, err := decodeStreamInfo(tokenId)
|
|
if err != nil {
|
|
log.Error(ctx, "Error parsing shared stream info", err)
|
|
http.Error(w, "invalid request", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
stream, err := pub.streamer.NewStream(ctx, info.id, info.format, info.bitrate, 0)
|
|
if err != nil {
|
|
log.Error(ctx, "Error starting shared stream", err)
|
|
http.Error(w, "invalid request", http.StatusInternalServerError)
|
|
}
|
|
|
|
// Make sure the stream will be closed at the end, to avoid leakage
|
|
defer func() {
|
|
if err := stream.Close(); err != nil && log.IsGreaterOrEqualTo(log.LevelDebug) {
|
|
log.Error("Error closing shared stream", "id", info.id, "file", stream.Name(), err)
|
|
}
|
|
}()
|
|
|
|
w.Header().Set("X-Content-Type-Options", "nosniff")
|
|
w.Header().Set("X-Content-Duration", strconv.FormatFloat(float64(stream.Duration()), 'G', -1, 32))
|
|
|
|
if stream.Seekable() {
|
|
http.ServeContent(w, r, stream.Name(), stream.ModTime(), stream)
|
|
} else {
|
|
// If the stream doesn't provide a size (i.e. is not seekable), we can't support ranges/content-length
|
|
w.Header().Set("Accept-Ranges", "none")
|
|
w.Header().Set("Content-Type", stream.ContentType())
|
|
|
|
estimateContentLength := p.BoolOr("estimateContentLength", false)
|
|
|
|
// if Client requests the estimated content-length, send it
|
|
if estimateContentLength {
|
|
length := strconv.Itoa(stream.EstimatedContentLength())
|
|
log.Trace(ctx, "Estimated content-length", "contentLength", length)
|
|
w.Header().Set("Content-Length", length)
|
|
}
|
|
|
|
if r.Method == http.MethodHead {
|
|
go func() { _, _ = io.Copy(io.Discard, stream) }()
|
|
} else {
|
|
c, err := io.Copy(w, stream)
|
|
if log.IsGreaterOrEqualTo(log.LevelDebug) {
|
|
if err != nil {
|
|
log.Error(ctx, "Error sending shared transcoded file", "id", info.id, err)
|
|
} else {
|
|
log.Trace(ctx, "Success sending shared transcode file", "id", info.id, "size", c)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
type shareTrackInfo struct {
|
|
id string
|
|
format string
|
|
bitrate int
|
|
}
|
|
|
|
func decodeStreamInfo(tokenString string) (shareTrackInfo, error) {
|
|
token, err := auth.TokenAuth.Decode(tokenString)
|
|
if err != nil {
|
|
return shareTrackInfo{}, err
|
|
}
|
|
if token == nil {
|
|
return shareTrackInfo{}, errors.New("unauthorized")
|
|
}
|
|
c := auth.ClaimsFromToken(token)
|
|
if c.ID == "" {
|
|
return shareTrackInfo{}, errors.New("required claim \"id\" not found")
|
|
}
|
|
return shareTrackInfo{
|
|
id: c.ID,
|
|
format: c.Format,
|
|
bitrate: c.BitRate,
|
|
}, nil
|
|
}
|