PeerTube/server/models/video/video.ts

869 lines
22 KiB
TypeScript
Raw Normal View History

2017-06-05 14:53:49 -05:00
import * as safeBuffer from 'safe-buffer'
2017-05-15 15:22:03 -05:00
const Buffer = safeBuffer.Buffer
2017-06-05 14:53:49 -05:00
import * as ffmpeg from 'fluent-ffmpeg'
import * as magnetUtil from 'magnet-uri'
2017-05-15 15:22:03 -05:00
import { map, values } from 'lodash'
2017-06-05 14:53:49 -05:00
import * as parseTorrent from 'parse-torrent'
2017-05-15 15:22:03 -05:00
import { join } from 'path'
2017-05-22 13:58:25 -05:00
import * as Sequelize from 'sequelize'
import * as Promise from 'bluebird'
2017-05-15 15:22:03 -05:00
2017-06-16 02:45:46 -05:00
import { database as db } from '../../initializers/database'
import { TagInstance } from './tag-interface'
2017-05-15 15:22:03 -05:00
import {
logger,
isVideoNameValid,
isVideoCategoryValid,
isVideoLicenceValid,
isVideoLanguageValid,
isVideoNSFWValid,
isVideoDescriptionValid,
isVideoInfoHashValid,
isVideoDurationValid,
readFileBufferPromise,
unlinkPromise,
renamePromise,
writeFilePromise,
createTorrentPromise
2017-06-16 02:45:46 -05:00
} from '../../helpers'
2017-05-15 15:22:03 -05:00
import {
CONSTRAINTS_FIELDS,
CONFIG,
REMOTE_SCHEME,
STATIC_PATHS,
VIDEO_CATEGORIES,
VIDEO_LICENCES,
VIDEO_LANGUAGES,
THUMBNAILS_SIZE
2017-06-16 02:45:46 -05:00
} from '../../initializers'
import { JobScheduler, removeVideoToFriends } from '../../lib'
2017-06-16 02:45:46 -05:00
import { addMethodsToModel, getSort } from '../utils'
2017-05-22 13:58:25 -05:00
import {
VideoInstance,
VideoAttributes,
VideoMethods
} from './video-interface'
let Video: Sequelize.Model<VideoInstance, VideoAttributes>
let generateMagnetUri: VideoMethods.GenerateMagnetUri
let getVideoFilename: VideoMethods.GetVideoFilename
let getThumbnailName: VideoMethods.GetThumbnailName
let getPreviewName: VideoMethods.GetPreviewName
let getTorrentName: VideoMethods.GetTorrentName
let isOwned: VideoMethods.IsOwned
let toFormatedJSON: VideoMethods.ToFormatedJSON
let toAddRemoteJSON: VideoMethods.ToAddRemoteJSON
let toUpdateRemoteJSON: VideoMethods.ToUpdateRemoteJSON
let transcodeVideofile: VideoMethods.TranscodeVideofile
let generateThumbnailFromData: VideoMethods.GenerateThumbnailFromData
let getDurationFromFile: VideoMethods.GetDurationFromFile
let list: VideoMethods.List
let listForApi: VideoMethods.ListForApi
let loadByHostAndRemoteId: VideoMethods.LoadByHostAndRemoteId
let listOwnedAndPopulateAuthorAndTags: VideoMethods.ListOwnedAndPopulateAuthorAndTags
let listOwnedByAuthor: VideoMethods.ListOwnedByAuthor
let load: VideoMethods.Load
let loadAndPopulateAuthor: VideoMethods.LoadAndPopulateAuthor
let loadAndPopulateAuthorAndPodAndTags: VideoMethods.LoadAndPopulateAuthorAndPodAndTags
let searchAndPopulateAuthorAndPodAndTags: VideoMethods.SearchAndPopulateAuthorAndPodAndTags
2017-06-11 10:35:32 -05:00
export default function (sequelize: Sequelize.Sequelize, DataTypes: Sequelize.DataTypes) {
Video = sequelize.define<VideoInstance, VideoAttributes>('Video',
2016-12-11 14:50:51 -06:00
{
id: {
type: DataTypes.UUID,
defaultValue: DataTypes.UUIDV4,
2016-12-28 08:49:23 -06:00
primaryKey: true,
validate: {
isUUID: 4
}
},
2016-12-11 14:50:51 -06:00
name: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
nameValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoNameValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video name is not valid.')
}
}
2016-11-11 04:52:24 -06:00
},
2016-12-11 14:50:51 -06:00
extname: {
2017-05-15 15:22:03 -05:00
type: DataTypes.ENUM(values(CONSTRAINTS_FIELDS.VIDEOS.EXTNAME)),
2016-12-28 08:49:23 -06:00
allowNull: false
2016-12-11 14:50:51 -06:00
},
remoteId: {
2016-12-28 08:49:23 -06:00
type: DataTypes.UUID,
allowNull: true,
validate: {
isUUID: 4
}
2016-12-11 14:50:51 -06:00
},
2017-03-22 15:15:55 -05:00
category: {
type: DataTypes.INTEGER,
allowNull: false,
validate: {
categoryValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoCategoryValid(value)
2017-03-22 15:15:55 -05:00
if (res === false) throw new Error('Video category is not valid.')
}
}
},
2017-03-27 13:53:11 -05:00
licence: {
type: DataTypes.INTEGER,
allowNull: false,
2017-04-07 05:13:37 -05:00
defaultValue: null,
2017-03-27 13:53:11 -05:00
validate: {
licenceValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoLicenceValid(value)
2017-03-27 13:53:11 -05:00
if (res === false) throw new Error('Video licence is not valid.')
}
}
},
2017-04-07 05:13:37 -05:00
language: {
type: DataTypes.INTEGER,
allowNull: true,
validate: {
languageValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoLanguageValid(value)
2017-04-07 05:13:37 -05:00
if (res === false) throw new Error('Video language is not valid.')
}
}
},
2017-03-28 14:19:46 -05:00
nsfw: {
type: DataTypes.BOOLEAN,
allowNull: false,
validate: {
nsfwValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoNSFWValid(value)
2017-03-28 14:19:46 -05:00
if (res === false) throw new Error('Video nsfw attribute is not valid.')
}
}
},
2016-12-11 14:50:51 -06:00
description: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
descriptionValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoDescriptionValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video description is not valid.')
}
}
2016-12-11 14:50:51 -06:00
},
infoHash: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
infoHashValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoInfoHashValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video info hash is not valid.')
}
}
2016-12-11 14:50:51 -06:00
},
duration: {
2016-12-28 08:49:23 -06:00
type: DataTypes.INTEGER,
allowNull: false,
validate: {
durationValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoDurationValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video duration is not valid.')
}
}
},
views: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
2017-03-08 14:35:43 -06:00
},
likes: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
},
dislikes: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
}
2016-12-11 14:50:51 -06:00
},
{
2016-12-29 02:33:28 -06:00
indexes: [
{
fields: [ 'authorId' ]
},
{
fields: [ 'remoteId' ]
},
{
fields: [ 'name' ]
},
{
fields: [ 'createdAt' ]
},
{
fields: [ 'duration' ]
},
{
fields: [ 'infoHash' ]
},
{
fields: [ 'views' ]
2017-03-08 14:35:43 -06:00
},
{
fields: [ 'likes' ]
2016-12-29 02:33:28 -06:00
}
],
2016-12-11 14:50:51 -06:00
hooks: {
2016-12-28 08:49:23 -06:00
beforeValidate,
2016-12-11 14:50:51 -06:00
beforeCreate,
afterDestroy
}
}
)
2017-05-22 13:58:25 -05:00
const classMethods = [
associate,
generateThumbnailFromData,
getDurationFromFile,
list,
listForApi,
listOwnedAndPopulateAuthorAndTags,
listOwnedByAuthor,
load,
loadByHostAndRemoteId,
loadAndPopulateAuthor,
loadAndPopulateAuthorAndPodAndTags,
searchAndPopulateAuthorAndPodAndTags,
removeFromBlacklist
2017-05-22 13:58:25 -05:00
]
const instanceMethods = [
generateMagnetUri,
getVideoFilename,
getThumbnailName,
getPreviewName,
getTorrentName,
isOwned,
toFormatedJSON,
toAddRemoteJSON,
toUpdateRemoteJSON,
transcodeVideofile
2017-05-22 13:58:25 -05:00
]
addMethodsToModel(Video, classMethods, instanceMethods)
2016-12-11 14:50:51 -06:00
return Video
}
2017-06-10 15:15:25 -05:00
function beforeValidate (video: VideoInstance) {
// Put a fake infoHash if it does not exists yet
if (video.isOwned() && !video.infoHash) {
2016-12-28 08:49:23 -06:00
// 40 hexa length
video.infoHash = '0123456789abcdef0123456789abcdef01234567'
}
}
2016-12-11 14:50:51 -06:00
2017-06-10 15:15:25 -05:00
function beforeCreate (video: VideoInstance, options: { transaction: Sequelize.Transaction }) {
if (video.isOwned()) {
const videoPath = join(CONFIG.STORAGE.VIDEOS_DIR, video.getVideoFilename())
2017-05-22 13:58:25 -05:00
const tasks = []
2017-01-17 14:42:47 -06:00
tasks.push(
createTorrentFromVideo(video, videoPath),
createThumbnail(video, videoPath),
createPreview(video, videoPath)
)
2016-11-16 14:16:41 -06:00
if (CONFIG.TRANSCODING.ENABLED === true) {
const dataInput = {
id: video.id
2017-05-22 13:58:25 -05:00
}
tasks.push(
JobScheduler.Instance.createJob(options.transaction, 'videoTranscoder', dataInput)
)
2016-12-11 14:50:51 -06:00
}
return Promise.all(tasks)
}
return Promise.resolve()
2017-05-22 13:58:25 -05:00
}
2017-06-10 15:15:25 -05:00
function afterDestroy (video: VideoInstance) {
const tasks = []
tasks.push(
removeThumbnail(video)
)
2016-12-11 14:50:51 -06:00
if (video.isOwned()) {
const removeVideoToFriendsParams = {
remoteId: video.id
2017-05-22 13:58:25 -05:00
}
tasks.push(
removeFile(video),
removeTorrent(video),
removePreview(video),
removeVideoToFriends(removeVideoToFriendsParams)
)
}
2017-05-22 13:58:25 -05:00
return Promise.all(tasks)
2016-12-11 14:50:51 -06:00
}
// ------------------------------ METHODS ------------------------------
2016-12-11 14:50:51 -06:00
function associate (models) {
2017-05-22 13:58:25 -05:00
Video.belongsTo(models.Author, {
2016-12-11 14:50:51 -06:00
foreignKey: {
name: 'authorId',
allowNull: false
},
onDelete: 'cascade'
})
2016-12-24 09:59:17 -06:00
2017-05-22 13:58:25 -05:00
Video.belongsToMany(models.Tag, {
2016-12-24 09:59:17 -06:00
foreignKey: 'videoId',
through: models.VideoTag,
onDelete: 'cascade'
})
2017-01-04 13:59:23 -06:00
2017-05-22 13:58:25 -05:00
Video.hasMany(models.VideoAbuse, {
2017-01-04 13:59:23 -06:00
foreignKey: {
name: 'videoId',
allowNull: false
},
onDelete: 'cascade'
})
2016-12-11 14:50:51 -06:00
}
generateMagnetUri = function (this: VideoInstance) {
2017-05-15 15:22:03 -05:00
let baseUrlHttp
let baseUrlWs
2016-11-11 08:20:03 -06:00
if (this.isOwned()) {
2017-05-15 15:22:03 -05:00
baseUrlHttp = CONFIG.WEBSERVER.URL
baseUrlWs = CONFIG.WEBSERVER.WS + '://' + CONFIG.WEBSERVER.HOSTNAME + ':' + CONFIG.WEBSERVER.PORT
2016-11-11 08:20:03 -06:00
} else {
2017-05-15 15:22:03 -05:00
baseUrlHttp = REMOTE_SCHEME.HTTP + '://' + this.Author.Pod.host
baseUrlWs = REMOTE_SCHEME.WS + '://' + this.Author.Pod.host
2016-11-11 08:20:03 -06:00
}
2017-05-15 15:22:03 -05:00
const xs = baseUrlHttp + STATIC_PATHS.TORRENTS + this.getTorrentName()
2017-06-10 15:15:25 -05:00
const announce = [ baseUrlWs + '/tracker/socket' ]
2017-05-15 15:22:03 -05:00
const urlList = [ baseUrlHttp + STATIC_PATHS.WEBSEED + this.getVideoFilename() ]
2016-11-11 08:20:03 -06:00
const magnetHash = {
xs,
announce,
urlList,
2016-12-11 14:50:51 -06:00
infoHash: this.infoHash,
2016-11-11 08:20:03 -06:00
name: this.name
}
return magnetUtil.encode(magnetHash)
}
getVideoFilename = function (this: VideoInstance) {
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + this.extname
2016-11-11 08:20:03 -06:00
return this.remoteId + this.extname
}
getThumbnailName = function (this: VideoInstance) {
2016-11-11 08:20:03 -06:00
// We always have a copy of the thumbnail
2016-12-11 14:50:51 -06:00
return this.id + '.jpg'
}
getPreviewName = function (this: VideoInstance) {
2016-11-11 08:20:03 -06:00
const extension = '.jpg'
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + extension
2016-11-11 08:20:03 -06:00
return this.remoteId + extension
}
getTorrentName = function (this: VideoInstance) {
2016-11-11 08:20:03 -06:00
const extension = '.torrent'
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + extension
2016-11-11 08:20:03 -06:00
return this.remoteId + extension
}
isOwned = function (this: VideoInstance) {
return this.remoteId === null
}
2017-06-11 04:02:35 -05:00
toFormatedJSON = function (this: VideoInstance) {
2016-12-11 14:50:51 -06:00
let podHost
if (this.Author.Pod) {
podHost = this.Author.Pod.host
} else {
// It means it's our video
2017-05-15 15:22:03 -05:00
podHost = CONFIG.WEBSERVER.HOST
2016-12-11 14:50:51 -06:00
}
2017-03-22 15:15:55 -05:00
// Maybe our pod is not up to date and there are new categories since our version
2017-05-15 15:22:03 -05:00
let categoryLabel = VIDEO_CATEGORIES[this.category]
2017-03-22 15:15:55 -05:00
if (!categoryLabel) categoryLabel = 'Misc'
2017-03-27 13:53:11 -05:00
// Maybe our pod is not up to date and there are new licences since our version
2017-05-15 15:22:03 -05:00
let licenceLabel = VIDEO_LICENCES[this.licence]
2017-03-27 13:53:11 -05:00
if (!licenceLabel) licenceLabel = 'Unknown'
2017-04-07 05:13:37 -05:00
// Language is an optional attribute
2017-05-15 15:22:03 -05:00
let languageLabel = VIDEO_LANGUAGES[this.language]
2017-04-07 05:13:37 -05:00
if (!languageLabel) languageLabel = 'Unknown'
const json = {
2016-12-11 14:50:51 -06:00
id: this.id,
name: this.name,
2017-03-22 15:15:55 -05:00
category: this.category,
categoryLabel,
2017-03-27 13:53:11 -05:00
licence: this.licence,
licenceLabel,
2017-04-07 05:13:37 -05:00
language: this.language,
languageLabel,
2017-03-28 14:19:46 -05:00
nsfw: this.nsfw,
description: this.description,
2016-12-11 14:50:51 -06:00
podHost,
isLocal: this.isOwned(),
2016-11-11 08:20:03 -06:00
magnetUri: this.generateMagnetUri(),
2016-12-11 14:50:51 -06:00
author: this.Author.name,
duration: this.duration,
views: this.views,
2017-03-08 14:35:43 -06:00
likes: this.likes,
dislikes: this.dislikes,
tags: map<TagInstance, string>(this.Tags, 'name'),
2017-05-15 15:22:03 -05:00
thumbnailPath: join(STATIC_PATHS.THUMBNAILS, this.getThumbnailName()),
createdAt: this.createdAt,
updatedAt: this.updatedAt
}
return json
}
toAddRemoteJSON = function (this: VideoInstance) {
// Get thumbnail data to send to the other pod
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, this.getThumbnailName())
return readFileBufferPromise(thumbnailPath).then(thumbnailData => {
const remoteVideo = {
2017-05-22 13:58:25 -05:00
name: this.name,
category: this.category,
licence: this.licence,
language: this.language,
nsfw: this.nsfw,
description: this.description,
infoHash: this.infoHash,
remoteId: this.id,
author: this.Author.name,
duration: this.duration,
thumbnailData: thumbnailData.toString('binary'),
tags: map<TagInstance, string>(this.Tags, 'name'),
2017-05-22 13:58:25 -05:00
createdAt: this.createdAt,
updatedAt: this.updatedAt,
extname: this.extname,
views: this.views,
likes: this.likes,
dislikes: this.dislikes
}
return remoteVideo
})
}
toUpdateRemoteJSON = function (this: VideoInstance) {
2016-12-29 12:07:05 -06:00
const json = {
name: this.name,
2017-03-22 15:15:55 -05:00
category: this.category,
2017-03-27 13:53:11 -05:00
licence: this.licence,
2017-04-07 05:13:37 -05:00
language: this.language,
2017-03-28 14:19:46 -05:00
nsfw: this.nsfw,
2016-12-29 12:07:05 -06:00
description: this.description,
infoHash: this.infoHash,
remoteId: this.id,
author: this.Author.name,
duration: this.duration,
tags: map<TagInstance, string>(this.Tags, 'name'),
2016-12-29 12:07:05 -06:00
createdAt: this.createdAt,
updatedAt: this.updatedAt,
extname: this.extname,
2017-03-08 14:35:43 -06:00
views: this.views,
likes: this.likes,
dislikes: this.dislikes
2016-12-29 12:07:05 -06:00
}
return json
}
transcodeVideofile = function (this: VideoInstance) {
const video = this
2017-05-15 15:22:03 -05:00
const videosDirectory = CONFIG.STORAGE.VIDEOS_DIR
const newExtname = '.mp4'
2017-05-15 15:22:03 -05:00
const videoInputPath = join(videosDirectory, video.getVideoFilename())
const videoOutputPath = join(videosDirectory, video.id + '-transcoded' + newExtname)
return new Promise<void>((res, rej) => {
ffmpeg(videoInputPath)
.output(videoOutputPath)
.videoCodec('libx264')
.outputOption('-threads ' + CONFIG.TRANSCODING.THREADS)
.outputOption('-movflags faststart')
.on('error', rej)
.on('end', () => {
return unlinkPromise(videoInputPath)
.then(() => {
// Important to do this before getVideoFilename() to take in account the new file extension
video.set('extname', newExtname)
const newVideoPath = join(videosDirectory, video.getVideoFilename())
return renamePromise(videoOutputPath, newVideoPath)
})
.then(() => {
const newVideoPath = join(videosDirectory, video.getVideoFilename())
return createTorrentFromVideo(video, newVideoPath)
})
.then(() => {
return video.save()
})
.then(() => {
return res()
})
.catch(err => {
// Autodesctruction...
video.destroy().asCallback(function (err) {
if (err) logger.error('Cannot destruct video after transcoding failure.', { error: err })
})
return rej(err)
})
})
.run()
})
}
// ------------------------------ STATICS ------------------------------
generateThumbnailFromData = function (video: VideoInstance, thumbnailData: string) {
2016-11-16 14:16:41 -06:00
// Creating the thumbnail for a remote video
const thumbnailName = video.getThumbnailName()
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, thumbnailName)
return writeFilePromise(thumbnailPath, Buffer.from(thumbnailData, 'binary')).then(() => {
return thumbnailName
2016-11-16 14:16:41 -06:00
})
}
getDurationFromFile = function (videoPath: string) {
return new Promise<number>((res, rej) => {
ffmpeg.ffprobe(videoPath, function (err, metadata) {
if (err) return rej(err)
return res(Math.floor(metadata.format.duration))
})
})
}
list = function () {
return Video.findAll()
2016-12-25 02:44:57 -06:00
}
listForApi = function (start: number, count: number, sort: string) {
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
// Exclude Blakclisted videos from the list
2016-12-11 14:50:51 -06:00
const query = {
2017-05-22 13:58:25 -05:00
distinct: true,
2016-12-11 14:50:51 -06:00
offset: start,
limit: count,
2017-05-22 13:58:25 -05:00
order: [ getSort(sort), [ Video['sequelize'].models.Tag, 'name', 'ASC' ] ],
2016-12-11 14:50:51 -06:00
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
include: [ { model: Video['sequelize'].models.Pod, required: false } ]
2016-12-24 09:59:17 -06:00
},
2017-05-22 13:58:25 -05:00
Video['sequelize'].models.Tag
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
],
2017-05-22 13:58:25 -05:00
where: createBaseVideosWhere()
2016-12-11 14:50:51 -06:00
}
return Video.findAndCountAll(query).then(({ rows, count }) => {
return {
data: rows,
total: count
}
2016-12-11 14:50:51 -06:00
})
}
loadByHostAndRemoteId = function (fromHost: string, remoteId: string) {
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: remoteId
},
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
2016-12-11 14:50:51 -06:00
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Pod,
2016-12-24 09:59:17 -06:00
required: true,
2016-12-11 14:50:51 -06:00
where: {
host: fromHost
}
}
]
}
]
}
return Video.findOne(query)
}
listOwnedAndPopulateAuthorAndTags = function () {
// If remoteId is null this is *our* video
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: null
},
2017-05-22 13:58:25 -05:00
include: [ Video['sequelize'].models.Author, Video['sequelize'].models.Tag ]
2016-12-11 14:50:51 -06:00
}
return Video.findAll(query)
}
listOwnedByAuthor = function (author: string) {
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: null
},
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
2016-12-11 14:50:51 -06:00
where: {
name: author
}
}
]
}
return Video.findAll(query)
}
load = function (id: string) {
return Video.findById(id)
2016-12-11 14:50:51 -06:00
}
loadAndPopulateAuthor = function (id: string) {
2016-12-11 14:50:51 -06:00
const options = {
2017-05-22 13:58:25 -05:00
include: [ Video['sequelize'].models.Author ]
2016-12-11 14:50:51 -06:00
}
return Video.findById(id, options)
2016-12-11 14:50:51 -06:00
}
loadAndPopulateAuthorAndPodAndTags = function (id: string) {
2016-12-11 14:50:51 -06:00
const options = {
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
include: [ { model: Video['sequelize'].models.Pod, required: false } ]
2016-12-24 09:59:17 -06:00
},
2017-05-22 13:58:25 -05:00
Video['sequelize'].models.Tag
2016-12-11 14:50:51 -06:00
]
}
return Video.findById(id, options)
}
searchAndPopulateAuthorAndPodAndTags = function (value: string, field: string, start: number, count: number, sort: string) {
2017-05-15 15:22:03 -05:00
const podInclude: any = {
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Pod,
2016-12-24 09:59:17 -06:00
required: false
2016-12-11 14:50:51 -06:00
}
2016-12-24 09:59:17 -06:00
2017-05-15 15:22:03 -05:00
const authorInclude: any = {
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
2016-12-11 14:50:51 -06:00
include: [
podInclude
]
}
2017-05-15 15:22:03 -05:00
const tagInclude: any = {
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Tag
2016-12-24 09:59:17 -06:00
}
2017-05-15 15:22:03 -05:00
const query: any = {
2017-05-22 13:58:25 -05:00
distinct: true,
where: createBaseVideosWhere(),
2016-12-11 14:50:51 -06:00
offset: start,
limit: count,
2017-05-22 13:58:25 -05:00
order: [ getSort(sort), [ Video['sequelize'].models.Tag, 'name', 'ASC' ] ]
2016-12-11 14:50:51 -06:00
}
// Make an exact search with the magnet
2016-11-11 08:24:36 -06:00
if (field === 'magnetUri') {
const infoHash = magnetUtil.decode(value).infoHash
2016-12-11 14:50:51 -06:00
query.where.infoHash = infoHash
2016-11-11 08:24:36 -06:00
} else if (field === 'tags') {
2017-05-22 13:58:25 -05:00
const escapedValue = Video['sequelize'].escape('%' + value + '%')
query.where.id.$in = Video['sequelize'].literal(
`(SELECT "VideoTags"."videoId"
FROM "Tags"
INNER JOIN "VideoTags" ON "Tags"."id" = "VideoTags"."tagId"
WHERE name LIKE ${escapedValue}
)`
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
)
2016-12-24 09:59:17 -06:00
} else if (field === 'host') {
// FIXME: Include our pod? (not stored in the database)
podInclude.where = {
host: {
$like: '%' + value + '%'
2016-12-11 14:50:51 -06:00
}
}
2016-12-24 09:59:17 -06:00
podInclude.required = true
2016-12-11 14:50:51 -06:00
} else if (field === 'author') {
2016-12-24 09:59:17 -06:00
authorInclude.where = {
name: {
2016-12-11 14:50:51 -06:00
$like: '%' + value + '%'
}
}
2016-12-24 09:59:17 -06:00
// authorInclude.or = true
} else {
2016-12-11 14:50:51 -06:00
query.where[field] = {
$like: '%' + value + '%'
}
}
2016-12-24 09:59:17 -06:00
query.include = [
authorInclude, tagInclude
]
if (tagInclude.where) {
2017-05-22 13:58:25 -05:00
// query.include.push([ Video['sequelize'].models.Tag ])
2016-12-24 09:59:17 -06:00
}
return Video.findAndCountAll(query).then(({ rows, count }) => {
return {
data: rows,
total: count
}
2016-12-11 14:50:51 -06:00
})
}
// ---------------------------------------------------------------------------
function createBaseVideosWhere () {
return {
id: {
2017-05-22 13:58:25 -05:00
$notIn: Video['sequelize'].literal(
'(SELECT "BlacklistedVideos"."videoId" FROM "BlacklistedVideos")'
)
}
}
}
function removeThumbnail (video: VideoInstance) {
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName())
return unlinkPromise(thumbnailPath)
}
function removeFile (video: VideoInstance) {
2017-05-15 15:22:03 -05:00
const filePath = join(CONFIG.STORAGE.VIDEOS_DIR, video.getVideoFilename())
return unlinkPromise(filePath)
}
function removeTorrent (video: VideoInstance) {
2017-05-15 15:22:03 -05:00
const torrenPath = join(CONFIG.STORAGE.TORRENTS_DIR, video.getTorrentName())
return unlinkPromise(torrenPath)
}
function removePreview (video: VideoInstance) {
2016-11-11 04:52:24 -06:00
// Same name than video thumnail
return unlinkPromise(CONFIG.STORAGE.PREVIEWS_DIR + video.getPreviewName())
2016-11-11 04:52:24 -06:00
}
function createTorrentFromVideo (video: VideoInstance, videoPath: string) {
const options = {
announceList: [
2017-05-15 15:22:03 -05:00
[ CONFIG.WEBSERVER.WS + '://' + CONFIG.WEBSERVER.HOSTNAME + ':' + CONFIG.WEBSERVER.PORT + '/tracker/socket' ]
],
urlList: [
2017-05-15 15:22:03 -05:00
CONFIG.WEBSERVER.URL + STATIC_PATHS.WEBSEED + video.getVideoFilename()
]
}
return createTorrentPromise(videoPath, options)
.then(torrent => {
const filePath = join(CONFIG.STORAGE.TORRENTS_DIR, video.getTorrentName())
return writeFilePromise(filePath, torrent).then(() => torrent)
})
.then(torrent => {
const parsedTorrent = parseTorrent(torrent)
video.set('infoHash', parsedTorrent.infoHash)
return video.validate()
})
}
function createPreview (video: VideoInstance, videoPath: string) {
return generateImage(video, videoPath, CONFIG.STORAGE.PREVIEWS_DIR, video.getPreviewName(), null)
2016-11-11 04:52:24 -06:00
}
function createThumbnail (video: VideoInstance, videoPath: string) {
return generateImage(video, videoPath, CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName(), THUMBNAILS_SIZE)
}
function generateImage (video: VideoInstance, videoPath: string, folder: string, imageName: string, size: string) {
2017-05-15 15:22:03 -05:00
const options: any = {
2016-11-11 08:20:03 -06:00
filename: imageName,
count: 1,
folder
}
2017-06-10 15:15:25 -05:00
if (size) {
options.size = size
}
return new Promise<string>((res, rej) => {
ffmpeg(videoPath)
.on('error', rej)
.on('end', function () {
return res(imageName)
})
.thumbnail(options)
})
}
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
function removeFromBlacklist (video: VideoInstance) {
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
// Find the blacklisted video
return db.BlacklistedVideo.loadByVideoId(video.id).then(video => {
// Not found the video, skip
if (!video) {
return null
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
}
// If we found the video, remove it from the blacklist
return video.destroy()
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
})
}