PeerTube/server/controllers/api/videos/index.ts

527 lines
19 KiB
TypeScript
Raw Normal View History

2017-06-05 14:53:49 -05:00
import * as express from 'express'
import { move } from 'fs-extra'
import { extname } from 'path'
import toInt from 'validator/lib/toInt'
import { addOptimizeOrMergeAudioJob } from '@server/helpers/video'
import { createTorrentAndSetInfoHash } from '@server/helpers/webtorrent'
import { changeVideoChannelShare } from '@server/lib/activitypub/share'
2020-11-20 04:21:08 -06:00
import { getLocalVideoActivityPubUrl } from '@server/lib/activitypub/url'
2020-11-10 07:41:20 -06:00
import { LiveManager } from '@server/lib/live-manager'
2020-09-17 03:00:46 -05:00
import { buildLocalVideoFromReq, buildVideoThumbnailsFromReq, setVideoTags } from '@server/lib/video'
import { getVideoFilePath } from '@server/lib/video-paths'
import { getServerActor } from '@server/models/application/application'
2020-11-06 03:57:40 -06:00
import { MVideoFullLight } from '@server/types/models'
2020-09-17 03:00:46 -05:00
import { VideoCreate, VideoState, VideoUpdate } from '../../../../shared'
import { VideoFilter } from '../../../../shared/models/videos/video-query.type'
import { auditLoggerFactory, getAuditIdFromRes, VideoAuditView } from '../../../helpers/audit-logger'
import { resetSequelizeInstance } from '../../../helpers/database-utils'
import { buildNSFWFilter, createReqFiles, getCountVideos } from '../../../helpers/express-utils'
2020-11-20 10:16:55 -06:00
import { getMetadataFromFile, getVideoFileFPS, getVideoFileResolution } from '../../../helpers/ffprobe-utils'
2017-12-28 04:16:08 -06:00
import { logger } from '../../../helpers/logger'
2020-04-23 02:32:53 -05:00
import { getFormattedObjects } from '../../../helpers/utils'
import { CONFIG } from '../../../initializers/config'
2019-05-17 04:56:12 -05:00
import {
DEFAULT_AUDIO_RESOLUTION,
MIMETYPES,
VIDEO_CATEGORIES,
VIDEO_LANGUAGES,
VIDEO_LICENCES,
2020-01-31 09:56:52 -06:00
VIDEO_PRIVACIES
2019-05-17 04:56:12 -05:00
} from '../../../initializers/constants'
import { sequelizeTypescript } from '../../../initializers/database'
import { sendView } from '../../../lib/activitypub/send/send-view'
2020-04-23 02:32:53 -05:00
import { federateVideoIfNeeded, fetchRemoteVideoDescription } from '../../../lib/activitypub/videos'
import { JobQueue } from '../../../lib/job-queue'
import { Notifier } from '../../../lib/notifier'
import { Hooks } from '../../../lib/plugins/hooks'
2018-02-23 09:39:51 -06:00
import { Redis } from '../../../lib/redis'
2020-09-17 03:00:46 -05:00
import { generateVideoMiniature } from '../../../lib/thumbnail'
import { autoBlacklistVideoIfNeeded } from '../../../lib/video-blacklist'
2017-05-15 15:22:03 -05:00
import {
asyncMiddleware,
2018-06-13 07:27:40 -05:00
asyncRetryTransactionMiddleware,
authenticate,
checkVideoFollowConstraints,
2018-07-20 07:35:18 -05:00
commonVideosFiltersValidator,
optionalAuthenticate,
paginationValidator,
setDefaultPagination,
setDefaultVideosSort,
2020-04-03 08:41:39 -05:00
videoFileMetadataGetValidator,
videosAddValidator,
2019-01-29 01:37:25 -06:00
videosCustomGetValidator,
videosGetValidator,
videosRemoveValidator,
videosSortValidator,
2020-04-03 08:41:39 -05:00
videosUpdateValidator
2017-05-15 15:22:03 -05:00
} from '../../../middlewares'
import { ScheduleVideoUpdateModel } from '../../../models/video/schedule-video-update'
2017-12-12 10:53:50 -06:00
import { VideoModel } from '../../../models/video/video'
import { VideoFileModel } from '../../../models/video/video-file'
2017-05-15 15:22:03 -05:00
import { blacklistRouter } from './blacklist'
2018-07-12 12:02:00 -05:00
import { videoCaptionsRouter } from './captions'
import { videoCommentRouter } from './comment'
import { videoImportsRouter } from './import'
import { liveRouter } from './live'
import { ownershipVideoRouter } from './ownership'
import { rateVideoRouter } from './rate'
2018-10-05 04:15:06 -05:00
import { watchingRouter } from './watching'
import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
2017-05-15 15:22:03 -05:00
const auditLogger = auditLoggerFactory('videos')
2017-05-15 15:22:03 -05:00
const videosRouter = express.Router()
const reqVideoFileAdd = createReqFiles(
[ 'videofile', 'thumbnailfile', 'previewfile' ],
2018-12-11 07:52:50 -06:00
Object.assign({}, MIMETYPES.VIDEO.MIMETYPE_EXT, MIMETYPES.IMAGE.MIMETYPE_EXT),
{
2018-12-04 09:02:49 -06:00
videofile: CONFIG.STORAGE.TMP_DIR,
thumbnailfile: CONFIG.STORAGE.TMP_DIR,
previewfile: CONFIG.STORAGE.TMP_DIR
}
)
const reqVideoFileUpdate = createReqFiles(
[ 'thumbnailfile', 'previewfile' ],
2018-12-11 07:52:50 -06:00
MIMETYPES.IMAGE.MIMETYPE_EXT,
{
2018-12-04 09:02:49 -06:00
thumbnailfile: CONFIG.STORAGE.TMP_DIR,
previewfile: CONFIG.STORAGE.TMP_DIR
}
)
2015-06-09 10:41:40 -05:00
2017-05-15 15:22:03 -05:00
videosRouter.use('/', blacklistRouter)
videosRouter.use('/', rateVideoRouter)
2017-12-22 03:50:07 -06:00
videosRouter.use('/', videoCommentRouter)
2018-07-12 12:02:00 -05:00
videosRouter.use('/', videoCaptionsRouter)
videosRouter.use('/', videoImportsRouter)
Users can change ownership of their video [#510] (#888) * [#510] Create a new route to get the list of user names To be able to transfer ownership to a user, we need to be able to select him from the list of users. Because the list could be too big, we add a autocomplete feature. This commit does the following: * Add a API endpoint to get a list of user names by searching its name * [#510] The user can choose the next owner of the video To be able to transfer ownership to a user, we need the owner to be able to select the user. The server can autocomplete the name of the user to give the ownership. We add a dialog for the user to actually select it. This commit does the following: * Create a modal for the owner to select the next one * Opens this modal with a button into the menu *more* * Make the dependency injection * [#510] When the user choose the next owner, create a request in database For the change of ownership to happen, we need to store the temporary requests. When the user make the request, save it to database. This commit does the following: * Create the model to persist change ownership requests * Add an API to manage ownership operations * Add a route to persist an ownership request * [#510] A user can fetch its ownership requests sent to him To be able to accept or refuse a change of ownership, the user must be able to fetch them. This commit does the following: * Add an API to list ownership for a user * Add the query to database model * [#510] A user can validate an ownership requests sent to him - server The user can accept or refuse any ownership request that was sent to him. This commit focus only on the server part. This commit does the following: * Add an API for the user to accept or refuse a video ownership * Add validators to ensure security access * Add a query to load a specific video change ownership request * [#510] A user can validate an ownership requests sent to him - web The user can accept or refuse any ownership request that was sent to him. This commit focus only on the web part. This commit does the following: * Add a page to list user ownership changes * Add actions to accept or refuse them * When accepting, show a modal requiring the channel to send the video * Correct lint - to squash * [#510] PR reviews - to squash This commit does the following: * Search parameter for user autocompletion is required from middleware directly * [#510] PR reviews - to squash with creation in database commit This commit does the following: * Add the status attribute in model * Set this attribute on instance creation * Use AccountModel method `loadLocalByName` * [#510] PR reviews - to squash with fetch ownership This commit does the following: * Add the scope `FULL` for database queries with includes * Add classic pagination middlewares * [#510] PR reviews - to squash with ownership validation - server This commit does the following: * Add a middleware to validate whether a user can validate an ownership * Change the ownership status instead of deleting the row * [#510] PR reviews - to squash with ownership validation - client This commit does the following: * Correct indentation of html files with two-spaces indentation * Use event emitter instead of function for accept event * Update the sort of ownership change table for a decreasing order by creation date * Add the status in ownership change table * Use classic method syntax * code style - to squash * Add new user right - to squash * Move the change to my-account instead of video-watch - to squash As requested in pull-request, move the action to change ownership into my videos page. The rest of the logic was not really changed. This commit does the following: - Move the modal into my video page - Create the generic component `button` to keep some styles and logic * [#510] Add tests for the new feature To avoid regression, we add tests for all api of ownership change. This commit does the following: - Create an end-to-end test for ownership change - Divide it to one test per request * [#510] Do not send twice the same request to avoid spam We can send several time the same request to change ownership. However, it will spam the user. To avoid this, we do not save a request already existing in database. This commit does the following: - Check whether the request exist in database - Add tests to verify this new condition * [#510] Change icons Change icons so they remains logic with the rest of the application. This commit does the following: - Add svg for missing icons - Add icons in `my-button` component - Use these new icons * [#510] Add control about the user quota The user should be able to accept a new video only if his quota allows it. This commit does the following: - Update the middleware to control the quota - Add tests verifying the control * Correct merge - Use new modal system - Move button to new directory `buttons` * PR reviews - to squash
2018-09-04 01:57:13 -05:00
videosRouter.use('/', ownershipVideoRouter)
2018-10-05 04:15:06 -05:00
videosRouter.use('/', watchingRouter)
videosRouter.use('/', liveRouter)
2017-05-05 09:53:35 -05:00
2017-05-15 15:22:03 -05:00
videosRouter.get('/categories', listVideoCategories)
videosRouter.get('/licences', listVideoLicences)
videosRouter.get('/languages', listVideoLanguages)
2017-10-31 05:52:52 -05:00
videosRouter.get('/privacies', listVideoPrivacies)
2017-03-22 15:15:55 -05:00
2017-05-15 15:22:03 -05:00
videosRouter.get('/',
paginationValidator,
videosSortValidator,
setDefaultVideosSort,
setDefaultPagination,
optionalAuthenticate,
2018-07-20 07:35:18 -05:00
commonVideosFiltersValidator,
2017-10-25 04:55:06 -05:00
asyncMiddleware(listVideos)
)
2017-05-15 15:22:03 -05:00
videosRouter.put('/:id',
authenticate,
reqVideoFileUpdate,
2017-11-27 10:30:46 -06:00
asyncMiddleware(videosUpdateValidator),
2018-06-13 07:27:40 -05:00
asyncRetryTransactionMiddleware(updateVideo)
2016-12-29 12:07:05 -06:00
)
videosRouter.post('/upload',
2017-05-15 15:22:03 -05:00
authenticate,
reqVideoFileAdd,
2017-12-12 10:53:50 -06:00
asyncMiddleware(videosAddValidator),
2018-06-13 07:27:40 -05:00
asyncRetryTransactionMiddleware(addVideo)
)
2017-10-30 04:16:27 -05:00
videosRouter.get('/:id/description',
2017-11-27 10:30:46 -06:00
asyncMiddleware(videosGetValidator),
2017-10-30 04:16:27 -05:00
asyncMiddleware(getVideoDescription)
)
videosRouter.get('/:id/metadata/:videoFileId',
asyncMiddleware(videoFileMetadataGetValidator),
asyncMiddleware(getVideoFileMetadata)
)
2017-05-15 15:22:03 -05:00
videosRouter.get('/:id',
2018-10-05 04:15:06 -05:00
optionalAuthenticate,
2019-01-29 01:37:25 -06:00
asyncMiddleware(videosCustomGetValidator('only-video-with-rights')),
asyncMiddleware(checkVideoFollowConstraints),
2019-01-29 01:37:25 -06:00
asyncMiddleware(getVideo)
)
2017-11-30 02:21:11 -06:00
videosRouter.post('/:id/views',
2020-02-04 09:14:33 -06:00
asyncMiddleware(videosCustomGetValidator('only-immutable-attributes')),
2017-11-30 02:21:11 -06:00
asyncMiddleware(viewVideo)
)
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
2017-05-15 15:22:03 -05:00
videosRouter.delete('/:id',
authenticate,
2017-11-27 10:30:46 -06:00
asyncMiddleware(videosRemoveValidator),
2018-06-13 07:27:40 -05:00
asyncRetryTransactionMiddleware(removeVideo)
)
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
// ---------------------------------------------------------------------------
2016-01-31 04:23:52 -06:00
2017-05-15 15:22:03 -05:00
export {
videosRouter
}
2016-01-31 04:23:52 -06:00
// ---------------------------------------------------------------------------
2016-01-31 04:23:52 -06:00
2017-08-25 11:36:49 -05:00
function listVideoCategories (req: express.Request, res: express.Response) {
2017-05-15 15:22:03 -05:00
res.json(VIDEO_CATEGORIES)
2017-03-22 15:15:55 -05:00
}
2017-08-25 11:36:49 -05:00
function listVideoLicences (req: express.Request, res: express.Response) {
2017-05-15 15:22:03 -05:00
res.json(VIDEO_LICENCES)
2017-03-27 13:53:11 -05:00
}
2017-08-25 11:36:49 -05:00
function listVideoLanguages (req: express.Request, res: express.Response) {
2017-05-15 15:22:03 -05:00
res.json(VIDEO_LANGUAGES)
2017-04-07 05:13:37 -05:00
}
2017-10-31 05:52:52 -05:00
function listVideoPrivacies (req: express.Request, res: express.Response) {
res.json(VIDEO_PRIVACIES)
}
2018-06-13 07:27:40 -05:00
async function addVideo (req: express.Request, res: express.Response) {
2020-12-03 07:10:54 -06:00
// Uploading the video could be long
// Set timeout to 10 minutes, as Express's default is 2 minutes
2018-10-01 02:14:00 -05:00
req.setTimeout(1000 * 60 * 10, () => {
logger.error('Upload video has timed out.')
return res.sendStatus(HttpStatusCode.REQUEST_TIMEOUT_408)
2018-10-01 02:14:00 -05:00
})
2018-06-13 07:27:40 -05:00
const videoPhysicalFile = req.files['videofile'][0]
2017-08-25 11:36:49 -05:00
const videoInfo: VideoCreate = req.body
2020-09-17 03:00:46 -05:00
const videoData = buildLocalVideoFromReq(videoInfo, res.locals.videoChannel.id)
videoData.state = CONFIG.TRANSCODING.ENABLED ? VideoState.TO_TRANSCODE : VideoState.PUBLISHED
videoData.duration = videoPhysicalFile['duration'] // duration was added by a previous middleware
2020-11-02 08:43:44 -06:00
const video = new VideoModel(videoData) as MVideoFullLight
2020-11-20 04:21:08 -06:00
video.url = getLocalVideoActivityPubUrl(video) // We use the UUID, so set the URL after building the object
2017-10-25 04:55:06 -05:00
const videoFile = new VideoFileModel({
2017-12-08 03:08:36 -06:00
extname: extname(videoPhysicalFile.filename),
size: videoPhysicalFile.size,
videoStreamingPlaylistId: null,
2020-11-20 10:16:55 -06:00
metadata: await getMetadataFromFile(videoPhysicalFile.path)
})
if (videoFile.isAudio()) {
videoFile.resolution = DEFAULT_AUDIO_RESOLUTION
} else {
2019-05-16 09:55:34 -05:00
videoFile.fps = await getVideoFileFPS(videoPhysicalFile.path)
videoFile.resolution = (await getVideoFileResolution(videoPhysicalFile.path)).videoFileResolution
}
// Move physical file
const destination = getVideoFilePath(video, videoFile)
2018-12-11 07:52:50 -06:00
await move(videoPhysicalFile.path, destination)
2018-02-14 08:33:49 -06:00
// This is important in case if there is another attempt in the retry process
videoPhysicalFile.filename = getVideoFilePath(video, videoFile)
2018-02-14 11:40:39 -06:00
videoPhysicalFile.path = destination
2020-09-17 03:00:46 -05:00
const [ thumbnailModel, previewModel ] = await buildVideoThumbnailsFromReq({
video,
files: req.files,
fallback: type => generateVideoMiniature(video, videoFile, type)
})
2017-10-25 04:55:06 -05:00
// Create the torrent file
await createTorrentAndSetInfoHash(video, videoFile)
2017-10-25 04:55:06 -05:00
2019-07-23 05:04:15 -05:00
const { videoCreated } = await sequelizeTypescript.transaction(async t => {
2017-12-08 03:08:36 -06:00
const sequelizeOptions = { transaction: t }
2017-10-25 04:55:06 -05:00
2019-08-15 04:53:26 -05:00
const videoCreated = await video.save(sequelizeOptions) as MVideoFullLight
2019-04-23 02:50:57 -05:00
await videoCreated.addAndSaveThumbnail(thumbnailModel, t)
await videoCreated.addAndSaveThumbnail(previewModel, t)
2017-10-25 04:55:06 -05:00
// Do not forget to add video channel information to the created video
videoCreated.VideoChannel = res.locals.videoChannel
2016-12-24 09:59:17 -06:00
2017-10-25 04:55:06 -05:00
videoFile.videoId = video.id
await videoFile.save(sequelizeOptions)
2017-12-08 03:08:36 -06:00
video.VideoFiles = [ videoFile ]
2020-09-17 03:00:46 -05:00
await setVideoTags({ video, tags: videoInfo.tags, transaction: t })
2017-10-25 04:55:06 -05:00
// Schedule an update in the future?
if (videoInfo.scheduleUpdate) {
await ScheduleVideoUpdateModel.create({
videoId: video.id,
updateAt: videoInfo.scheduleUpdate.updateAt,
privacy: videoInfo.scheduleUpdate.privacy || null
}, { transaction: t })
}
2019-07-23 05:04:15 -05:00
await autoBlacklistVideoIfNeeded({
2019-07-22 04:14:58 -05:00
video,
user: res.locals.oauth.token.User,
isRemote: false,
isNew: true,
transaction: t
})
2019-07-23 05:04:15 -05:00
await federateVideoIfNeeded(video, true, t)
2017-10-25 04:55:06 -05:00
2018-09-19 10:02:16 -05:00
auditLogger.create(getAuditIdFromRes(res), new VideoAuditView(videoCreated.toFormattedDetailsJSON()))
2017-12-08 01:39:15 -06:00
logger.info('Video with name %s and uuid %s created.', videoInfo.name, videoCreated.uuid)
2019-07-23 05:04:15 -05:00
return { videoCreated }
2017-12-08 01:39:15 -06:00
})
2019-07-23 05:04:15 -05:00
Notifier.Instance.notifyOnNewVideoIfNeeded(videoCreated)
2018-12-28 06:47:17 -06:00
if (video.state === VideoState.TO_TRANSCODE) {
2020-04-03 08:41:39 -05:00
await addOptimizeOrMergeAudioJob(videoCreated, videoFile)
}
2019-07-18 07:28:37 -05:00
Hooks.runAction('action:api.video.uploaded', { video: videoCreated })
2018-06-13 07:27:40 -05:00
return res.json({
video: {
id: videoCreated.id,
uuid: videoCreated.uuid
}
})
}
2017-10-25 04:55:06 -05:00
async function updateVideo (req: express.Request, res: express.Response) {
2019-08-15 04:53:26 -05:00
const videoInstance = res.locals.videoAll
const videoFieldsSave = videoInstance.toJSON()
const oldVideoAuditView = new VideoAuditView(videoInstance.toFormattedDetailsJSON())
2017-08-25 11:36:49 -05:00
const videoInfoToUpdate: VideoUpdate = req.body
2019-12-12 08:47:47 -06:00
const wasConfidentialVideo = videoInstance.isConfidential()
const hadPrivacyForFederation = videoInstance.hasPrivacyForFederation()
2016-12-29 12:07:05 -06:00
2020-09-17 03:00:46 -05:00
const [ thumbnailModel, previewModel ] = await buildVideoThumbnailsFromReq({
video: videoInstance,
files: req.files,
fallback: () => Promise.resolve(undefined),
automaticallyGenerated: false
})
2017-10-25 04:55:06 -05:00
try {
2018-12-28 06:47:17 -06:00
const videoInstanceUpdated = await sequelizeTypescript.transaction(async t => {
const sequelizeOptions = { transaction: t }
2018-05-11 08:10:13 -05:00
const oldVideoChannel = videoInstance.VideoChannel
2016-12-29 12:07:05 -06:00
2019-07-22 04:14:58 -05:00
if (videoInfoToUpdate.name !== undefined) videoInstance.name = videoInfoToUpdate.name
if (videoInfoToUpdate.category !== undefined) videoInstance.category = videoInfoToUpdate.category
if (videoInfoToUpdate.licence !== undefined) videoInstance.licence = videoInfoToUpdate.licence
if (videoInfoToUpdate.language !== undefined) videoInstance.language = videoInfoToUpdate.language
if (videoInfoToUpdate.nsfw !== undefined) videoInstance.nsfw = videoInfoToUpdate.nsfw
if (videoInfoToUpdate.waitTranscoding !== undefined) videoInstance.waitTranscoding = videoInfoToUpdate.waitTranscoding
if (videoInfoToUpdate.support !== undefined) videoInstance.support = videoInfoToUpdate.support
if (videoInfoToUpdate.description !== undefined) videoInstance.description = videoInfoToUpdate.description
if (videoInfoToUpdate.commentsEnabled !== undefined) videoInstance.commentsEnabled = videoInfoToUpdate.commentsEnabled
if (videoInfoToUpdate.downloadEnabled !== undefined) videoInstance.downloadEnabled = videoInfoToUpdate.downloadEnabled
2019-02-11 07:09:23 -06:00
if (videoInfoToUpdate.originallyPublishedAt !== undefined && videoInfoToUpdate.originallyPublishedAt !== null) {
2019-04-18 04:28:17 -05:00
videoInstance.originallyPublishedAt = new Date(videoInfoToUpdate.originallyPublishedAt)
2019-01-12 07:45:23 -06:00
}
2019-12-12 08:47:47 -06:00
let isNewVideo = false
if (videoInfoToUpdate.privacy !== undefined) {
2019-12-12 08:47:47 -06:00
isNewVideo = videoInstance.isNewVideo(videoInfoToUpdate.privacy)
2019-12-12 08:47:47 -06:00
const newPrivacy = parseInt(videoInfoToUpdate.privacy.toString(), 10)
videoInstance.setPrivacy(newPrivacy)
2019-12-12 08:47:47 -06:00
// Unfederate the video if the new privacy is not compatible with federation
if (hadPrivacyForFederation && !videoInstance.hasPrivacyForFederation()) {
await VideoModel.sendDelete(videoInstance, { transaction: t })
}
}
2016-12-29 12:07:05 -06:00
2019-08-15 04:53:26 -05:00
const videoInstanceUpdated = await videoInstance.save(sequelizeOptions) as MVideoFullLight
2016-12-29 12:07:05 -06:00
2019-04-23 02:50:57 -05:00
if (thumbnailModel) await videoInstanceUpdated.addAndSaveThumbnail(thumbnailModel, t)
if (previewModel) await videoInstanceUpdated.addAndSaveThumbnail(previewModel, t)
2018-05-11 08:10:13 -05:00
// Video tags update?
2020-09-17 03:00:46 -05:00
await setVideoTags({
video: videoInstanceUpdated,
tags: videoInfoToUpdate.tags,
transaction: t,
defaultValue: videoInstanceUpdated.Tags
})
2016-12-24 09:59:17 -06:00
2018-05-11 08:10:13 -05:00
// Video channel update?
if (res.locals.videoChannel && videoInstanceUpdated.channelId !== res.locals.videoChannel.id) {
await videoInstanceUpdated.$set('VideoChannel', res.locals.videoChannel, { transaction: t })
videoInstanceUpdated.VideoChannel = res.locals.videoChannel
2018-05-11 08:10:13 -05:00
2019-12-12 08:47:47 -06:00
if (hadPrivacyForFederation === true) await changeVideoChannelShare(videoInstanceUpdated, oldVideoChannel, t)
2017-10-31 05:52:52 -05:00
}
// Schedule an update in the future?
if (videoInfoToUpdate.scheduleUpdate) {
await ScheduleVideoUpdateModel.upsert({
videoId: videoInstanceUpdated.id,
updateAt: videoInfoToUpdate.scheduleUpdate.updateAt,
privacy: videoInfoToUpdate.scheduleUpdate.privacy || null
}, { transaction: t })
2018-06-18 03:24:53 -05:00
} else if (videoInfoToUpdate.scheduleUpdate === null) {
await ScheduleVideoUpdateModel.deleteByVideoId(videoInstanceUpdated.id, t)
}
2019-07-22 04:14:58 -05:00
await autoBlacklistVideoIfNeeded({
video: videoInstanceUpdated,
user: res.locals.oauth.token.User,
isRemote: false,
isNew: false,
transaction: t
})
2019-07-23 05:04:15 -05:00
await federateVideoIfNeeded(videoInstanceUpdated, isNewVideo, t)
auditLogger.update(
2018-09-19 10:02:16 -05:00
getAuditIdFromRes(res),
new VideoAuditView(videoInstanceUpdated.toFormattedDetailsJSON()),
oldVideoAuditView
)
logger.info('Video with name %s and uuid %s updated.', videoInstance.name, videoInstance.uuid)
2018-12-28 06:47:17 -06:00
return videoInstanceUpdated
})
2018-12-28 06:47:17 -06:00
2019-12-12 08:47:47 -06:00
if (wasConfidentialVideo) {
2019-07-23 05:04:15 -05:00
Notifier.Instance.notifyOnNewVideoIfNeeded(videoInstanceUpdated)
2018-12-28 06:47:17 -06:00
}
2019-07-18 07:28:37 -05:00
Hooks.runAction('action:api.video.updated', { video: videoInstanceUpdated, body: req.body })
2017-10-25 04:55:06 -05:00
} catch (err) {
// Force fields we want to update
// If the transaction is retried, sequelize will think the object has not changed
// So it will skip the SQL request, even if the last one was ROLLBACKed!
2017-10-25 04:55:06 -05:00
resetSequelizeInstance(videoInstance, videoFieldsSave)
throw err
2017-10-25 04:55:06 -05:00
}
2018-06-13 07:27:40 -05:00
return res.type('json')
.status(HttpStatusCode.NO_CONTENT_204)
.end()
}
2015-06-09 10:41:40 -05:00
2019-01-29 01:37:25 -06:00
async function getVideo (req: express.Request, res: express.Response) {
// We need more attributes
const userId: number = res.locals.oauth ? res.locals.oauth.token.User.id : null
2019-07-18 07:28:37 -05:00
2019-07-19 10:30:41 -05:00
const video = await Hooks.wrapPromiseFun(
VideoModel.loadForGetAPI,
2019-08-15 04:53:26 -05:00
{ id: res.locals.onlyVideoWithRights.id, userId },
2019-07-18 07:28:37 -05:00
'filter:api.video.get.result'
)
2017-11-30 02:21:11 -06:00
2019-01-29 01:37:25 -06:00
if (video.isOutdated()) {
JobQueue.Instance.createJob({ type: 'activitypub-refresher', payload: { type: 'video', url: video.url } })
}
2019-01-29 01:37:25 -06:00
return res.json(video.toFormattedDetailsJSON())
2017-11-30 02:21:11 -06:00
}
async function viewVideo (req: express.Request, res: express.Response) {
2020-11-06 09:42:23 -06:00
const immutableVideoAttrs = res.locals.onlyImmutableVideo
2018-03-29 03:58:24 -05:00
const ip = req.ip
2020-11-06 09:42:23 -06:00
const exists = await Redis.Instance.doesVideoIPViewExist(ip, immutableVideoAttrs.uuid)
2018-02-23 09:39:51 -06:00
if (exists) {
2020-11-06 09:42:23 -06:00
logger.debug('View for ip %s and video %s already exists.', ip, immutableVideoAttrs.uuid)
return res.sendStatus(HttpStatusCode.NO_CONTENT_204)
2018-02-23 09:39:51 -06:00
}
2020-11-06 09:42:23 -06:00
const video = await VideoModel.load(immutableVideoAttrs.id)
2018-02-23 09:39:51 -06:00
2020-11-06 09:42:23 -06:00
const promises: Promise<any>[] = [
Redis.Instance.setIPVideoView(ip, video.uuid, video.isLive)
]
2020-11-06 09:42:23 -06:00
let federateView = true
2019-07-18 07:28:37 -05:00
2020-11-06 09:42:23 -06:00
// Increment our live manager
if (video.isLive && video.isOwned()) {
LiveManager.Instance.addViewTo(video.id)
// Views of our local live will be sent by our live manager
federateView = false
}
// Increment our video views cache counter
if (!video.isLive) {
promises.push(Redis.Instance.addVideoView(video.id))
}
if (federateView) {
const serverActor = await getServerActor()
promises.push(sendView(serverActor, video, undefined))
}
await Promise.all(promises)
Hooks.runAction('action:api.video.viewed', { video, ip })
return res.sendStatus(HttpStatusCode.NO_CONTENT_204)
}
2015-06-09 10:41:40 -05:00
2017-10-30 04:16:27 -05:00
async function getVideoDescription (req: express.Request, res: express.Response) {
2019-08-15 04:53:26 -05:00
const videoInstance = res.locals.videoAll
2017-10-30 04:16:27 -05:00
let description = ''
if (videoInstance.isOwned()) {
description = videoInstance.description
} else {
2017-11-10 10:27:49 -06:00
description = await fetchRemoteVideoDescription(videoInstance)
2017-10-30 04:16:27 -05:00
}
return res.json({ description })
}
async function getVideoFileMetadata (req: express.Request, res: express.Response) {
const videoFile = await VideoFileModel.loadWithMetadata(toInt(req.params.videoFileId))
2020-06-26 01:37:26 -05:00
return res.json(videoFile.metadata)
}
async function listVideos (req: express.Request, res: express.Response) {
2020-01-08 07:15:16 -06:00
const countVideos = getCountVideos(req)
2019-07-18 07:28:37 -05:00
const apiOptions = await Hooks.wrapObject({
2018-04-24 10:05:32 -05:00
start: req.query.start,
count: req.query.count,
sort: req.query.sort,
includeLocalVideos: true,
2018-07-20 07:35:18 -05:00
categoryOneOf: req.query.categoryOneOf,
licenceOneOf: req.query.licenceOneOf,
languageOneOf: req.query.languageOneOf,
tagsOneOf: req.query.tagsOneOf,
tagsAllOf: req.query.tagsAllOf,
nsfw: buildNSFWFilter(res, req.query.nsfw),
2018-04-24 10:05:32 -05:00
filter: req.query.filter as VideoFilter,
2018-10-05 04:15:06 -05:00
withFiles: false,
2020-01-08 07:15:16 -06:00
user: res.locals.oauth ? res.locals.oauth.token.User : undefined,
countVideos
2019-07-18 07:28:37 -05:00
}, 'filter:api.videos.list.params')
2019-07-19 10:30:41 -05:00
const resultList = await Hooks.wrapPromiseFun(
VideoModel.listForApi,
apiOptions,
2019-07-18 07:28:37 -05:00
'filter:api.videos.list.result'
)
2017-10-25 04:55:06 -05:00
return res.json(getFormattedObjects(resultList.data, resultList.total))
}
2016-01-31 04:23:52 -06:00
2017-10-25 04:55:06 -05:00
async function removeVideo (req: express.Request, res: express.Response) {
2019-08-15 04:53:26 -05:00
const videoInstance = res.locals.videoAll
2017-12-12 10:53:50 -06:00
await sequelizeTypescript.transaction(async t => {
2017-10-25 04:55:06 -05:00
await videoInstance.destroy({ transaction: t })
})
2017-10-25 04:55:06 -05:00
2018-09-19 10:02:16 -05:00
auditLogger.delete(getAuditIdFromRes(res), new VideoAuditView(videoInstance.toFormattedDetailsJSON()))
2017-10-25 04:55:06 -05:00
logger.info('Video with name %s and uuid %s deleted.', videoInstance.name, videoInstance.uuid)
2018-06-13 07:27:40 -05:00
2019-07-18 07:28:37 -05:00
Hooks.runAction('action:api.video.deleted', { video: videoInstance })
return res.type('json')
.status(HttpStatusCode.NO_CONTENT_204)
.end()
}