PeerTube/server/controllers/api/videos/index.ts

475 lines
17 KiB
TypeScript
Raw Normal View History

2017-06-05 14:53:49 -05:00
import * as express from 'express'
import { extname, join } from 'path'
import { VideoCreate, VideoPrivacy, VideoState, VideoUpdate } from '../../../../shared'
import { getVideoFileFPS, getVideoFileResolution } from '../../../helpers/ffmpeg-utils'
import { processImage } from '../../../helpers/image-utils'
2017-12-28 04:16:08 -06:00
import { logger } from '../../../helpers/logger'
2018-09-19 10:02:16 -05:00
import { auditLoggerFactory, getAuditIdFromRes, VideoAuditView } from '../../../helpers/audit-logger'
2018-08-14 08:28:30 -05:00
import { getFormattedObjects, getServerActor } from '../../../helpers/utils'
2017-05-15 15:22:03 -05:00
import {
2018-12-26 03:36:24 -06:00
CONFIG,
MIMETYPES,
PREVIEWS_SIZE,
sequelizeTypescript,
THUMBNAILS_SIZE,
VIDEO_CATEGORIES,
VIDEO_LANGUAGES,
VIDEO_LICENCES,
2017-12-12 10:53:50 -06:00
VIDEO_PRIVACIES
} from '../../../initializers'
2018-05-11 08:10:13 -05:00
import {
changeVideoChannelShare,
federateVideoIfNeeded,
2018-05-11 08:10:13 -05:00
fetchRemoteVideoDescription,
getVideoActivityPubUrl
2018-05-11 08:10:13 -05:00
} from '../../../lib/activitypub'
import { sendCreateView } from '../../../lib/activitypub/send'
import { JobQueue } from '../../../lib/job-queue'
2018-02-23 09:39:51 -06:00
import { Redis } from '../../../lib/redis'
2017-05-15 15:22:03 -05:00
import {
asyncMiddleware,
2018-06-13 07:27:40 -05:00
asyncRetryTransactionMiddleware,
authenticate,
checkVideoFollowConstraints,
2018-07-20 07:35:18 -05:00
commonVideosFiltersValidator,
optionalAuthenticate,
paginationValidator,
setDefaultPagination,
setDefaultSort,
videosAddValidator,
videosGetValidator,
videosRemoveValidator,
videosSortValidator,
videosUpdateValidator
2017-05-15 15:22:03 -05:00
} from '../../../middlewares'
2017-12-12 10:53:50 -06:00
import { TagModel } from '../../../models/video/tag'
import { VideoModel } from '../../../models/video/video'
import { VideoFileModel } from '../../../models/video/video-file'
2017-05-15 15:22:03 -05:00
import { abuseVideoRouter } from './abuse'
import { blacklistRouter } from './blacklist'
2017-12-22 03:50:07 -06:00
import { videoCommentRouter } from './comment'
2017-11-10 10:27:49 -06:00
import { rateVideoRouter } from './rate'
Users can change ownership of their video [#510] (#888) * [#510] Create a new route to get the list of user names To be able to transfer ownership to a user, we need to be able to select him from the list of users. Because the list could be too big, we add a autocomplete feature. This commit does the following: * Add a API endpoint to get a list of user names by searching its name * [#510] The user can choose the next owner of the video To be able to transfer ownership to a user, we need the owner to be able to select the user. The server can autocomplete the name of the user to give the ownership. We add a dialog for the user to actually select it. This commit does the following: * Create a modal for the owner to select the next one * Opens this modal with a button into the menu *more* * Make the dependency injection * [#510] When the user choose the next owner, create a request in database For the change of ownership to happen, we need to store the temporary requests. When the user make the request, save it to database. This commit does the following: * Create the model to persist change ownership requests * Add an API to manage ownership operations * Add a route to persist an ownership request * [#510] A user can fetch its ownership requests sent to him To be able to accept or refuse a change of ownership, the user must be able to fetch them. This commit does the following: * Add an API to list ownership for a user * Add the query to database model * [#510] A user can validate an ownership requests sent to him - server The user can accept or refuse any ownership request that was sent to him. This commit focus only on the server part. This commit does the following: * Add an API for the user to accept or refuse a video ownership * Add validators to ensure security access * Add a query to load a specific video change ownership request * [#510] A user can validate an ownership requests sent to him - web The user can accept or refuse any ownership request that was sent to him. This commit focus only on the web part. This commit does the following: * Add a page to list user ownership changes * Add actions to accept or refuse them * When accepting, show a modal requiring the channel to send the video * Correct lint - to squash * [#510] PR reviews - to squash This commit does the following: * Search parameter for user autocompletion is required from middleware directly * [#510] PR reviews - to squash with creation in database commit This commit does the following: * Add the status attribute in model * Set this attribute on instance creation * Use AccountModel method `loadLocalByName` * [#510] PR reviews - to squash with fetch ownership This commit does the following: * Add the scope `FULL` for database queries with includes * Add classic pagination middlewares * [#510] PR reviews - to squash with ownership validation - server This commit does the following: * Add a middleware to validate whether a user can validate an ownership * Change the ownership status instead of deleting the row * [#510] PR reviews - to squash with ownership validation - client This commit does the following: * Correct indentation of html files with two-spaces indentation * Use event emitter instead of function for accept event * Update the sort of ownership change table for a decreasing order by creation date * Add the status in ownership change table * Use classic method syntax * code style - to squash * Add new user right - to squash * Move the change to my-account instead of video-watch - to squash As requested in pull-request, move the action to change ownership into my videos page. The rest of the logic was not really changed. This commit does the following: - Move the modal into my video page - Create the generic component `button` to keep some styles and logic * [#510] Add tests for the new feature To avoid regression, we add tests for all api of ownership change. This commit does the following: - Create an end-to-end test for ownership change - Divide it to one test per request * [#510] Do not send twice the same request to avoid spam We can send several time the same request to change ownership. However, it will spam the user. To avoid this, we do not save a request already existing in database. This commit does the following: - Check whether the request exist in database - Add tests to verify this new condition * [#510] Change icons Change icons so they remains logic with the rest of the application. This commit does the following: - Add svg for missing icons - Add icons in `my-button` component - Use these new icons * [#510] Add control about the user quota The user should be able to accept a new video only if his quota allows it. This commit does the following: - Update the middleware to control the quota - Add tests verifying the control * Correct merge - Use new modal system - Move button to new directory `buttons` * PR reviews - to squash
2018-09-04 01:57:13 -05:00
import { ownershipVideoRouter } from './ownership'
import { VideoFilter } from '../../../../shared/models/videos/video-query.type'
2018-08-14 08:28:30 -05:00
import { buildNSFWFilter, createReqFiles } from '../../../helpers/express-utils'
import { ScheduleVideoUpdateModel } from '../../../models/video/schedule-video-update'
2018-07-12 12:02:00 -05:00
import { videoCaptionsRouter } from './captions'
import { videoImportsRouter } from './import'
2018-08-14 08:28:30 -05:00
import { resetSequelizeInstance } from '../../../helpers/database-utils'
2018-12-11 07:52:50 -06:00
import { move } from 'fs-extra'
2018-10-05 04:15:06 -05:00
import { watchingRouter } from './watching'
2018-12-26 03:36:24 -06:00
import { Notifier } from '../../../lib/notifier'
2017-05-15 15:22:03 -05:00
const auditLogger = auditLoggerFactory('videos')
2017-05-15 15:22:03 -05:00
const videosRouter = express.Router()
const reqVideoFileAdd = createReqFiles(
[ 'videofile', 'thumbnailfile', 'previewfile' ],
2018-12-11 07:52:50 -06:00
Object.assign({}, MIMETYPES.VIDEO.MIMETYPE_EXT, MIMETYPES.IMAGE.MIMETYPE_EXT),
{
2018-12-04 09:02:49 -06:00
videofile: CONFIG.STORAGE.TMP_DIR,
thumbnailfile: CONFIG.STORAGE.TMP_DIR,
previewfile: CONFIG.STORAGE.TMP_DIR
}
)
const reqVideoFileUpdate = createReqFiles(
[ 'thumbnailfile', 'previewfile' ],
2018-12-11 07:52:50 -06:00
MIMETYPES.IMAGE.MIMETYPE_EXT,
{
2018-12-04 09:02:49 -06:00
thumbnailfile: CONFIG.STORAGE.TMP_DIR,
previewfile: CONFIG.STORAGE.TMP_DIR
}
)
2015-06-09 10:41:40 -05:00
2017-05-15 15:22:03 -05:00
videosRouter.use('/', abuseVideoRouter)
videosRouter.use('/', blacklistRouter)
videosRouter.use('/', rateVideoRouter)
2017-12-22 03:50:07 -06:00
videosRouter.use('/', videoCommentRouter)
2018-07-12 12:02:00 -05:00
videosRouter.use('/', videoCaptionsRouter)
videosRouter.use('/', videoImportsRouter)
Users can change ownership of their video [#510] (#888) * [#510] Create a new route to get the list of user names To be able to transfer ownership to a user, we need to be able to select him from the list of users. Because the list could be too big, we add a autocomplete feature. This commit does the following: * Add a API endpoint to get a list of user names by searching its name * [#510] The user can choose the next owner of the video To be able to transfer ownership to a user, we need the owner to be able to select the user. The server can autocomplete the name of the user to give the ownership. We add a dialog for the user to actually select it. This commit does the following: * Create a modal for the owner to select the next one * Opens this modal with a button into the menu *more* * Make the dependency injection * [#510] When the user choose the next owner, create a request in database For the change of ownership to happen, we need to store the temporary requests. When the user make the request, save it to database. This commit does the following: * Create the model to persist change ownership requests * Add an API to manage ownership operations * Add a route to persist an ownership request * [#510] A user can fetch its ownership requests sent to him To be able to accept or refuse a change of ownership, the user must be able to fetch them. This commit does the following: * Add an API to list ownership for a user * Add the query to database model * [#510] A user can validate an ownership requests sent to him - server The user can accept or refuse any ownership request that was sent to him. This commit focus only on the server part. This commit does the following: * Add an API for the user to accept or refuse a video ownership * Add validators to ensure security access * Add a query to load a specific video change ownership request * [#510] A user can validate an ownership requests sent to him - web The user can accept or refuse any ownership request that was sent to him. This commit focus only on the web part. This commit does the following: * Add a page to list user ownership changes * Add actions to accept or refuse them * When accepting, show a modal requiring the channel to send the video * Correct lint - to squash * [#510] PR reviews - to squash This commit does the following: * Search parameter for user autocompletion is required from middleware directly * [#510] PR reviews - to squash with creation in database commit This commit does the following: * Add the status attribute in model * Set this attribute on instance creation * Use AccountModel method `loadLocalByName` * [#510] PR reviews - to squash with fetch ownership This commit does the following: * Add the scope `FULL` for database queries with includes * Add classic pagination middlewares * [#510] PR reviews - to squash with ownership validation - server This commit does the following: * Add a middleware to validate whether a user can validate an ownership * Change the ownership status instead of deleting the row * [#510] PR reviews - to squash with ownership validation - client This commit does the following: * Correct indentation of html files with two-spaces indentation * Use event emitter instead of function for accept event * Update the sort of ownership change table for a decreasing order by creation date * Add the status in ownership change table * Use classic method syntax * code style - to squash * Add new user right - to squash * Move the change to my-account instead of video-watch - to squash As requested in pull-request, move the action to change ownership into my videos page. The rest of the logic was not really changed. This commit does the following: - Move the modal into my video page - Create the generic component `button` to keep some styles and logic * [#510] Add tests for the new feature To avoid regression, we add tests for all api of ownership change. This commit does the following: - Create an end-to-end test for ownership change - Divide it to one test per request * [#510] Do not send twice the same request to avoid spam We can send several time the same request to change ownership. However, it will spam the user. To avoid this, we do not save a request already existing in database. This commit does the following: - Check whether the request exist in database - Add tests to verify this new condition * [#510] Change icons Change icons so they remains logic with the rest of the application. This commit does the following: - Add svg for missing icons - Add icons in `my-button` component - Use these new icons * [#510] Add control about the user quota The user should be able to accept a new video only if his quota allows it. This commit does the following: - Update the middleware to control the quota - Add tests verifying the control * Correct merge - Use new modal system - Move button to new directory `buttons` * PR reviews - to squash
2018-09-04 01:57:13 -05:00
videosRouter.use('/', ownershipVideoRouter)
2018-10-05 04:15:06 -05:00
videosRouter.use('/', watchingRouter)
2017-05-05 09:53:35 -05:00
2017-05-15 15:22:03 -05:00
videosRouter.get('/categories', listVideoCategories)
videosRouter.get('/licences', listVideoLicences)
videosRouter.get('/languages', listVideoLanguages)
2017-10-31 05:52:52 -05:00
videosRouter.get('/privacies', listVideoPrivacies)
2017-03-22 15:15:55 -05:00
2017-05-15 15:22:03 -05:00
videosRouter.get('/',
paginationValidator,
videosSortValidator,
2018-01-17 03:50:33 -06:00
setDefaultSort,
setDefaultPagination,
optionalAuthenticate,
2018-07-20 07:35:18 -05:00
commonVideosFiltersValidator,
2017-10-25 04:55:06 -05:00
asyncMiddleware(listVideos)
)
2017-05-15 15:22:03 -05:00
videosRouter.put('/:id',
authenticate,
reqVideoFileUpdate,
2017-11-27 10:30:46 -06:00
asyncMiddleware(videosUpdateValidator),
2018-06-13 07:27:40 -05:00
asyncRetryTransactionMiddleware(updateVideo)
2016-12-29 12:07:05 -06:00
)
videosRouter.post('/upload',
2017-05-15 15:22:03 -05:00
authenticate,
reqVideoFileAdd,
2017-12-12 10:53:50 -06:00
asyncMiddleware(videosAddValidator),
2018-06-13 07:27:40 -05:00
asyncRetryTransactionMiddleware(addVideo)
)
2017-10-30 04:16:27 -05:00
videosRouter.get('/:id/description',
2017-11-27 10:30:46 -06:00
asyncMiddleware(videosGetValidator),
2017-10-30 04:16:27 -05:00
asyncMiddleware(getVideoDescription)
)
2017-05-15 15:22:03 -05:00
videosRouter.get('/:id',
2018-10-05 04:15:06 -05:00
optionalAuthenticate,
2017-11-27 10:30:46 -06:00
asyncMiddleware(videosGetValidator),
asyncMiddleware(checkVideoFollowConstraints),
getVideo
)
2017-11-30 02:21:11 -06:00
videosRouter.post('/:id/views',
asyncMiddleware(videosGetValidator),
asyncMiddleware(viewVideo)
)
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
2017-05-15 15:22:03 -05:00
videosRouter.delete('/:id',
authenticate,
2017-11-27 10:30:46 -06:00
asyncMiddleware(videosRemoveValidator),
2018-06-13 07:27:40 -05:00
asyncRetryTransactionMiddleware(removeVideo)
)
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
// ---------------------------------------------------------------------------
2016-01-31 04:23:52 -06:00
2017-05-15 15:22:03 -05:00
export {
videosRouter
}
2016-01-31 04:23:52 -06:00
// ---------------------------------------------------------------------------
2016-01-31 04:23:52 -06:00
2017-08-25 11:36:49 -05:00
function listVideoCategories (req: express.Request, res: express.Response) {
2017-05-15 15:22:03 -05:00
res.json(VIDEO_CATEGORIES)
2017-03-22 15:15:55 -05:00
}
2017-08-25 11:36:49 -05:00
function listVideoLicences (req: express.Request, res: express.Response) {
2017-05-15 15:22:03 -05:00
res.json(VIDEO_LICENCES)
2017-03-27 13:53:11 -05:00
}
2017-08-25 11:36:49 -05:00
function listVideoLanguages (req: express.Request, res: express.Response) {
2017-05-15 15:22:03 -05:00
res.json(VIDEO_LANGUAGES)
2017-04-07 05:13:37 -05:00
}
2017-10-31 05:52:52 -05:00
function listVideoPrivacies (req: express.Request, res: express.Response) {
res.json(VIDEO_PRIVACIES)
}
2018-06-13 07:27:40 -05:00
async function addVideo (req: express.Request, res: express.Response) {
2018-10-01 02:14:00 -05:00
// Processing the video could be long
// Set timeout to 10 minutes
req.setTimeout(1000 * 60 * 10, () => {
logger.error('Upload video has timed out.')
return res.sendStatus(408)
})
2018-06-13 07:27:40 -05:00
const videoPhysicalFile = req.files['videofile'][0]
2017-08-25 11:36:49 -05:00
const videoInfo: VideoCreate = req.body
2017-12-08 03:08:36 -06:00
// Prepare data so we don't block the transaction
const videoData = {
name: videoInfo.name,
remote: false,
category: videoInfo.category,
licence: videoInfo.licence,
language: videoInfo.language,
commentsEnabled: videoInfo.commentsEnabled || false,
waitTranscoding: videoInfo.waitTranscoding || false,
state: CONFIG.TRANSCODING.ENABLED ? VideoState.TO_TRANSCODE : VideoState.PUBLISHED,
nsfw: videoInfo.nsfw || false,
2017-12-08 03:08:36 -06:00
description: videoInfo.description,
support: videoInfo.support,
2017-12-08 03:08:36 -06:00
privacy: videoInfo.privacy,
duration: videoPhysicalFile['duration'], // duration was added by a previous middleware
channelId: res.locals.videoChannel.id
}
2017-12-12 10:53:50 -06:00
const video = new VideoModel(videoData)
video.url = getVideoActivityPubUrl(video) // We use the UUID, so set the URL after building the object
2017-10-25 04:55:06 -05:00
// Build the file object
2018-02-27 08:57:28 -06:00
const { videoFileResolution } = await getVideoFileResolution(videoPhysicalFile.path)
const fps = await getVideoFileFPS(videoPhysicalFile.path)
2017-12-08 03:08:36 -06:00
const videoFileData = {
extname: extname(videoPhysicalFile.filename),
2018-02-27 08:57:28 -06:00
resolution: videoFileResolution,
size: videoPhysicalFile.size,
fps
2017-12-08 03:08:36 -06:00
}
2017-12-12 10:53:50 -06:00
const videoFile = new VideoFileModel(videoFileData)
// Move physical file
2017-12-08 03:08:36 -06:00
const videoDir = CONFIG.STORAGE.VIDEOS_DIR
const destination = join(videoDir, video.getVideoFilename(videoFile))
2018-12-11 07:52:50 -06:00
await move(videoPhysicalFile.path, destination)
2018-02-14 08:33:49 -06:00
// This is important in case if there is another attempt in the retry process
videoPhysicalFile.filename = video.getVideoFilename(videoFile)
2018-02-14 11:40:39 -06:00
videoPhysicalFile.path = destination
// Process thumbnail or create it from the video
const thumbnailField = req.files['thumbnailfile']
if (thumbnailField) {
const thumbnailPhysicalFile = thumbnailField[0]
await processImage(thumbnailPhysicalFile, join(CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName()), THUMBNAILS_SIZE)
} else {
await video.createThumbnail(videoFile)
}
// Process preview or create it from the video
const previewField = req.files['previewfile']
if (previewField) {
const previewPhysicalFile = previewField[0]
await processImage(previewPhysicalFile, join(CONFIG.STORAGE.PREVIEWS_DIR, video.getPreviewName()), PREVIEWS_SIZE)
} else {
await video.createPreview(videoFile)
}
2017-10-25 04:55:06 -05:00
// Create the torrent file
await video.createTorrentAndSetInfoHash(videoFile)
2017-10-25 04:55:06 -05:00
const videoCreated = await sequelizeTypescript.transaction(async t => {
2017-12-08 03:08:36 -06:00
const sequelizeOptions = { transaction: t }
2017-10-25 04:55:06 -05:00
const videoCreated = await video.save(sequelizeOptions)
// Do not forget to add video channel information to the created video
videoCreated.VideoChannel = res.locals.videoChannel
2016-12-24 09:59:17 -06:00
2017-10-25 04:55:06 -05:00
videoFile.videoId = video.id
await videoFile.save(sequelizeOptions)
2017-12-08 03:08:36 -06:00
video.VideoFiles = [ videoFile ]
// Create tags
2018-05-16 02:28:18 -05:00
if (videoInfo.tags !== undefined) {
2017-12-12 10:53:50 -06:00
const tagInstances = await TagModel.findOrCreateTags(videoInfo.tags, t)
2017-10-25 04:55:06 -05:00
2017-12-12 10:53:50 -06:00
await video.$set('Tags', tagInstances, sequelizeOptions)
2017-10-25 04:55:06 -05:00
video.Tags = tagInstances
}
// Schedule an update in the future?
if (videoInfo.scheduleUpdate) {
await ScheduleVideoUpdateModel.create({
videoId: video.id,
updateAt: videoInfo.scheduleUpdate.updateAt,
privacy: videoInfo.scheduleUpdate.privacy || null
}, { transaction: t })
}
await federateVideoIfNeeded(video, true, t)
2017-10-25 04:55:06 -05:00
2018-09-19 10:02:16 -05:00
auditLogger.create(getAuditIdFromRes(res), new VideoAuditView(videoCreated.toFormattedDetailsJSON()))
2017-12-08 01:39:15 -06:00
logger.info('Video with name %s and uuid %s created.', videoInfo.name, videoCreated.uuid)
return videoCreated
})
2018-12-28 06:47:17 -06:00
Notifier.Instance.notifyOnNewVideo(videoCreated)
if (video.state === VideoState.TO_TRANSCODE) {
// Put uuid because we don't have id auto incremented for now
const dataInput = {
videoUUID: videoCreated.uuid,
isNewVideo: true
}
await JobQueue.Instance.createJob({ type: 'video-file', payload: dataInput })
}
2018-06-13 07:27:40 -05:00
return res.json({
video: {
id: videoCreated.id,
uuid: videoCreated.uuid
}
}).end()
}
2017-10-25 04:55:06 -05:00
async function updateVideo (req: express.Request, res: express.Response) {
2017-12-12 10:53:50 -06:00
const videoInstance: VideoModel = res.locals.video
const videoFieldsSave = videoInstance.toJSON()
const oldVideoAuditView = new VideoAuditView(videoInstance.toFormattedDetailsJSON())
2017-08-25 11:36:49 -05:00
const videoInfoToUpdate: VideoUpdate = req.body
2017-10-31 05:52:52 -05:00
const wasPrivateVideo = videoInstance.privacy === VideoPrivacy.PRIVATE
2018-12-26 03:36:24 -06:00
const wasUnlistedVideo = videoInstance.privacy === VideoPrivacy.UNLISTED
2016-12-29 12:07:05 -06:00
// Process thumbnail or create it from the video
if (req.files && req.files['thumbnailfile']) {
const thumbnailPhysicalFile = req.files['thumbnailfile'][0]
await processImage(thumbnailPhysicalFile, join(CONFIG.STORAGE.THUMBNAILS_DIR, videoInstance.getThumbnailName()), THUMBNAILS_SIZE)
}
// Process preview or create it from the video
if (req.files && req.files['previewfile']) {
const previewPhysicalFile = req.files['previewfile'][0]
await processImage(previewPhysicalFile, join(CONFIG.STORAGE.PREVIEWS_DIR, videoInstance.getPreviewName()), PREVIEWS_SIZE)
}
2017-10-25 04:55:06 -05:00
try {
2018-12-28 06:47:17 -06:00
const videoInstanceUpdated = await sequelizeTypescript.transaction(async t => {
const sequelizeOptions = { transaction: t }
2018-05-11 08:10:13 -05:00
const oldVideoChannel = videoInstance.VideoChannel
2016-12-29 12:07:05 -06:00
2017-10-25 04:55:06 -05:00
if (videoInfoToUpdate.name !== undefined) videoInstance.set('name', videoInfoToUpdate.name)
if (videoInfoToUpdate.category !== undefined) videoInstance.set('category', videoInfoToUpdate.category)
if (videoInfoToUpdate.licence !== undefined) videoInstance.set('licence', videoInfoToUpdate.licence)
if (videoInfoToUpdate.language !== undefined) videoInstance.set('language', videoInfoToUpdate.language)
if (videoInfoToUpdate.nsfw !== undefined) videoInstance.set('nsfw', videoInfoToUpdate.nsfw)
if (videoInfoToUpdate.waitTranscoding !== undefined) videoInstance.set('waitTranscoding', videoInfoToUpdate.waitTranscoding)
if (videoInfoToUpdate.support !== undefined) videoInstance.set('support', videoInfoToUpdate.support)
2017-10-25 04:55:06 -05:00
if (videoInfoToUpdate.description !== undefined) videoInstance.set('description', videoInfoToUpdate.description)
2018-01-03 03:12:36 -06:00
if (videoInfoToUpdate.commentsEnabled !== undefined) videoInstance.set('commentsEnabled', videoInfoToUpdate.commentsEnabled)
if (videoInfoToUpdate.privacy !== undefined) {
const newPrivacy = parseInt(videoInfoToUpdate.privacy.toString(), 10)
videoInstance.set('privacy', newPrivacy)
if (wasPrivateVideo === true && newPrivacy !== VideoPrivacy.PRIVATE) {
videoInstance.set('publishedAt', new Date())
}
}
2016-12-29 12:07:05 -06:00
2017-11-20 02:43:39 -06:00
const videoInstanceUpdated = await videoInstance.save(sequelizeOptions)
2016-12-29 12:07:05 -06:00
2018-05-11 08:10:13 -05:00
// Video tags update?
2018-05-16 02:28:18 -05:00
if (videoInfoToUpdate.tags !== undefined) {
2017-12-12 10:53:50 -06:00
const tagInstances = await TagModel.findOrCreateTags(videoInfoToUpdate.tags, t)
2016-12-29 12:07:05 -06:00
2018-05-11 08:10:13 -05:00
await videoInstanceUpdated.$set('Tags', tagInstances, sequelizeOptions)
videoInstanceUpdated.Tags = tagInstances
2017-10-25 04:55:06 -05:00
}
2016-12-24 09:59:17 -06:00
2018-05-11 08:10:13 -05:00
// Video channel update?
if (res.locals.videoChannel && videoInstanceUpdated.channelId !== res.locals.videoChannel.id) {
await videoInstanceUpdated.$set('VideoChannel', res.locals.videoChannel, { transaction: t })
videoInstanceUpdated.VideoChannel = res.locals.videoChannel
2018-05-11 08:10:13 -05:00
if (wasPrivateVideo === false) await changeVideoChannelShare(videoInstanceUpdated, oldVideoChannel, t)
2017-10-31 05:52:52 -05:00
}
// Schedule an update in the future?
if (videoInfoToUpdate.scheduleUpdate) {
await ScheduleVideoUpdateModel.upsert({
videoId: videoInstanceUpdated.id,
updateAt: videoInfoToUpdate.scheduleUpdate.updateAt,
privacy: videoInfoToUpdate.scheduleUpdate.privacy || null
}, { transaction: t })
2018-06-18 03:24:53 -05:00
} else if (videoInfoToUpdate.scheduleUpdate === null) {
await ScheduleVideoUpdateModel.deleteByVideoId(videoInstanceUpdated.id, t)
}
const isNewVideo = wasPrivateVideo && videoInstanceUpdated.privacy !== VideoPrivacy.PRIVATE
// Don't send update if the video was unfederated
if (!videoInstanceUpdated.VideoBlacklist || videoInstanceUpdated.VideoBlacklist.unfederated === false) {
await federateVideoIfNeeded(videoInstanceUpdated, isNewVideo, t)
}
auditLogger.update(
2018-09-19 10:02:16 -05:00
getAuditIdFromRes(res),
new VideoAuditView(videoInstanceUpdated.toFormattedDetailsJSON()),
oldVideoAuditView
)
logger.info('Video with name %s and uuid %s updated.', videoInstance.name, videoInstance.uuid)
2018-12-28 06:47:17 -06:00
return videoInstanceUpdated
})
2018-12-28 06:47:17 -06:00
if (wasUnlistedVideo || wasPrivateVideo) {
Notifier.Instance.notifyOnNewVideo(videoInstanceUpdated)
}
2017-10-25 04:55:06 -05:00
} catch (err) {
// Force fields we want to update
// If the transaction is retried, sequelize will think the object has not changed
// So it will skip the SQL request, even if the last one was ROLLBACKed!
2017-10-25 04:55:06 -05:00
resetSequelizeInstance(videoInstance, videoFieldsSave)
throw err
2017-10-25 04:55:06 -05:00
}
2018-06-13 07:27:40 -05:00
return res.type('json').status(204).end()
}
2015-06-09 10:41:40 -05:00
2017-11-30 02:21:11 -06:00
function getVideo (req: express.Request, res: express.Response) {
const videoInstance = res.locals.video
if (videoInstance.isOutdated()) {
2019-01-14 04:30:15 -06:00
JobQueue.Instance.createJob({ type: 'activitypub-refresher', payload: { type: 'video', url: videoInstance.url } })
.catch(err => logger.error('Cannot create AP refresher job for video %s.', videoInstance.url, { err }))
}
2017-11-30 02:21:11 -06:00
return res.json(videoInstance.toFormattedDetailsJSON())
}
async function viewVideo (req: express.Request, res: express.Response) {
const videoInstance = res.locals.video
2018-03-29 03:58:24 -05:00
const ip = req.ip
2018-08-29 09:26:25 -05:00
const exists = await Redis.Instance.isVideoIPViewExists(ip, videoInstance.uuid)
2018-02-23 09:39:51 -06:00
if (exists) {
logger.debug('View for ip %s and video %s already exists.', ip, videoInstance.uuid)
return res.status(204).end()
}
2018-08-29 09:26:25 -05:00
await Promise.all([
Redis.Instance.addVideoView(videoInstance.id),
Redis.Instance.setIPVideoView(ip, videoInstance.uuid)
])
2018-02-23 09:39:51 -06:00
2018-09-14 09:51:35 -05:00
const serverActor = await getServerActor()
2018-12-03 02:14:56 -06:00
await sendCreateView(serverActor, videoInstance, undefined)
2017-11-30 02:21:11 -06:00
return res.status(204).end()
}
2015-06-09 10:41:40 -05:00
2017-10-30 04:16:27 -05:00
async function getVideoDescription (req: express.Request, res: express.Response) {
const videoInstance = res.locals.video
let description = ''
if (videoInstance.isOwned()) {
description = videoInstance.description
} else {
2017-11-10 10:27:49 -06:00
description = await fetchRemoteVideoDescription(videoInstance)
2017-10-30 04:16:27 -05:00
}
return res.json({ description })
}
async function listVideos (req: express.Request, res: express.Response) {
2018-04-24 10:05:32 -05:00
const resultList = await VideoModel.listForApi({
start: req.query.start,
count: req.query.count,
sort: req.query.sort,
includeLocalVideos: true,
2018-07-20 07:35:18 -05:00
categoryOneOf: req.query.categoryOneOf,
licenceOneOf: req.query.licenceOneOf,
languageOneOf: req.query.languageOneOf,
tagsOneOf: req.query.tagsOneOf,
tagsAllOf: req.query.tagsAllOf,
nsfw: buildNSFWFilter(res, req.query.nsfw),
2018-04-24 10:05:32 -05:00
filter: req.query.filter as VideoFilter,
2018-10-05 04:15:06 -05:00
withFiles: false,
user: res.locals.oauth ? res.locals.oauth.token.User : undefined
2018-04-24 10:05:32 -05:00
})
2017-10-25 04:55:06 -05:00
return res.json(getFormattedObjects(resultList.data, resultList.total))
}
2016-01-31 04:23:52 -06:00
2017-10-25 04:55:06 -05:00
async function removeVideo (req: express.Request, res: express.Response) {
2017-12-12 10:53:50 -06:00
const videoInstance: VideoModel = res.locals.video
2017-12-12 10:53:50 -06:00
await sequelizeTypescript.transaction(async t => {
2017-10-25 04:55:06 -05:00
await videoInstance.destroy({ transaction: t })
})
2017-10-25 04:55:06 -05:00
2018-09-19 10:02:16 -05:00
auditLogger.delete(getAuditIdFromRes(res), new VideoAuditView(videoInstance.toFormattedDetailsJSON()))
2017-10-25 04:55:06 -05:00
logger.info('Video with name %s and uuid %s deleted.', videoInstance.name, videoInstance.uuid)
2018-06-13 07:27:40 -05:00
return res.type('json').status(204).end()
}