PeerTube/server/models/video.ts

874 lines
21 KiB
TypeScript
Raw Normal View History

2017-05-15 15:22:03 -05:00
import safeBuffer = require('safe-buffer')
const Buffer = safeBuffer.Buffer
import createTorrent = require('create-torrent')
import ffmpeg = require('fluent-ffmpeg')
import fs = require('fs')
import magnetUtil = require('magnet-uri')
import { map, values } from 'lodash'
import { parallel, series } from 'async'
import parseTorrent = require('parse-torrent')
import { join } from 'path'
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
const db = require('../initializers/database')
2017-05-15 15:22:03 -05:00
import {
logger,
isVideoNameValid,
isVideoCategoryValid,
isVideoLicenceValid,
isVideoLanguageValid,
isVideoNSFWValid,
isVideoDescriptionValid,
isVideoInfoHashValid,
isVideoDurationValid
} from '../helpers'
import {
CONSTRAINTS_FIELDS,
CONFIG,
REMOTE_SCHEME,
STATIC_PATHS,
VIDEO_CATEGORIES,
VIDEO_LICENCES,
VIDEO_LANGUAGES,
THUMBNAILS_SIZE
} from '../initializers'
import { JobScheduler, removeVideoToFriends } from '../lib'
import { getSort } from './utils'
// ---------------------------------------------------------------------------
2016-12-11 14:50:51 -06:00
module.exports = function (sequelize, DataTypes) {
const Video = sequelize.define('Video',
{
id: {
type: DataTypes.UUID,
defaultValue: DataTypes.UUIDV4,
2016-12-28 08:49:23 -06:00
primaryKey: true,
validate: {
isUUID: 4
}
},
2016-12-11 14:50:51 -06:00
name: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
nameValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoNameValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video name is not valid.')
}
}
2016-11-11 04:52:24 -06:00
},
2016-12-11 14:50:51 -06:00
extname: {
2017-05-15 15:22:03 -05:00
type: DataTypes.ENUM(values(CONSTRAINTS_FIELDS.VIDEOS.EXTNAME)),
2016-12-28 08:49:23 -06:00
allowNull: false
2016-12-11 14:50:51 -06:00
},
remoteId: {
2016-12-28 08:49:23 -06:00
type: DataTypes.UUID,
allowNull: true,
validate: {
isUUID: 4
}
2016-12-11 14:50:51 -06:00
},
2017-03-22 15:15:55 -05:00
category: {
type: DataTypes.INTEGER,
allowNull: false,
validate: {
categoryValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoCategoryValid(value)
2017-03-22 15:15:55 -05:00
if (res === false) throw new Error('Video category is not valid.')
}
}
},
2017-03-27 13:53:11 -05:00
licence: {
type: DataTypes.INTEGER,
allowNull: false,
2017-04-07 05:13:37 -05:00
defaultValue: null,
2017-03-27 13:53:11 -05:00
validate: {
licenceValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoLicenceValid(value)
2017-03-27 13:53:11 -05:00
if (res === false) throw new Error('Video licence is not valid.')
}
}
},
2017-04-07 05:13:37 -05:00
language: {
type: DataTypes.INTEGER,
allowNull: true,
validate: {
languageValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoLanguageValid(value)
2017-04-07 05:13:37 -05:00
if (res === false) throw new Error('Video language is not valid.')
}
}
},
2017-03-28 14:19:46 -05:00
nsfw: {
type: DataTypes.BOOLEAN,
allowNull: false,
validate: {
nsfwValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoNSFWValid(value)
2017-03-28 14:19:46 -05:00
if (res === false) throw new Error('Video nsfw attribute is not valid.')
}
}
},
2016-12-11 14:50:51 -06:00
description: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
descriptionValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoDescriptionValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video description is not valid.')
}
}
2016-12-11 14:50:51 -06:00
},
infoHash: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
infoHashValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoInfoHashValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video info hash is not valid.')
}
}
2016-12-11 14:50:51 -06:00
},
duration: {
2016-12-28 08:49:23 -06:00
type: DataTypes.INTEGER,
allowNull: false,
validate: {
durationValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoDurationValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video duration is not valid.')
}
}
},
views: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
2017-03-08 14:35:43 -06:00
},
likes: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
},
dislikes: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
}
2016-12-11 14:50:51 -06:00
},
{
2016-12-29 02:33:28 -06:00
indexes: [
{
fields: [ 'authorId' ]
},
{
fields: [ 'remoteId' ]
},
{
fields: [ 'name' ]
},
{
fields: [ 'createdAt' ]
},
{
fields: [ 'duration' ]
},
{
fields: [ 'infoHash' ]
},
{
fields: [ 'views' ]
2017-03-08 14:35:43 -06:00
},
{
fields: [ 'likes' ]
2016-12-29 02:33:28 -06:00
}
],
2016-12-11 14:50:51 -06:00
classMethods: {
associate,
generateThumbnailFromData,
2016-12-11 14:50:51 -06:00
getDurationFromFile,
2016-12-25 02:44:57 -06:00
list,
2016-12-11 14:50:51 -06:00
listForApi,
2016-12-24 09:59:17 -06:00
listOwnedAndPopulateAuthorAndTags,
2016-12-11 14:50:51 -06:00
listOwnedByAuthor,
load,
loadByHostAndRemoteId,
2016-12-11 14:50:51 -06:00
loadAndPopulateAuthor,
2016-12-24 09:59:17 -06:00
loadAndPopulateAuthorAndPodAndTags,
searchAndPopulateAuthorAndPodAndTags
2016-12-11 14:50:51 -06:00
},
instanceMethods: {
generateMagnetUri,
getVideoFilename,
getThumbnailName,
getPreviewName,
getTorrentName,
isOwned,
toFormatedJSON,
2016-12-29 12:07:05 -06:00
toAddRemoteJSON,
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
toUpdateRemoteJSON,
transcodeVideofile,
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
removeFromBlacklist
2016-12-11 14:50:51 -06:00
},
hooks: {
2016-12-28 08:49:23 -06:00
beforeValidate,
2016-12-11 14:50:51 -06:00
beforeCreate,
afterDestroy
}
}
)
2016-12-11 14:50:51 -06:00
return Video
}
2016-12-28 08:49:23 -06:00
function beforeValidate (video, options, next) {
// Put a fake infoHash if it does not exists yet
if (video.isOwned() && !video.infoHash) {
2016-12-28 08:49:23 -06:00
// 40 hexa length
video.infoHash = '0123456789abcdef0123456789abcdef01234567'
}
return next(null)
}
2016-12-11 14:50:51 -06:00
function beforeCreate (video, options, next) {
const tasks = []
if (video.isOwned()) {
2017-05-15 15:22:03 -05:00
const videoPath = join(CONFIG.STORAGE.VIDEOS_DIR, video.getVideoFilename())
tasks.push(
2017-01-17 14:42:47 -06:00
function createVideoTorrent (callback) {
createTorrentFromVideo(video, videoPath, callback)
},
2017-01-17 14:42:47 -06:00
function createVideoThumbnail (callback) {
createThumbnail(video, videoPath, callback)
2016-11-11 04:52:24 -06:00
},
2017-01-17 14:42:47 -06:00
function createVideoPreview (callback) {
createPreview(video, videoPath, callback)
}
)
2017-05-15 15:22:03 -05:00
if (CONFIG.TRANSCODING.ENABLED === true) {
tasks.push(
function createVideoTranscoderJob (callback) {
const dataInput = {
id: video.id
}
2017-05-15 15:22:03 -05:00
JobScheduler.Instance.createJob(options.transaction, 'videoTranscoder', dataInput, callback)
}
)
}
2016-11-16 14:16:41 -06:00
return parallel(tasks, next)
}
2016-11-16 14:16:41 -06:00
return next()
2016-12-11 14:50:51 -06:00
}
2016-12-11 14:50:51 -06:00
function afterDestroy (video, options, next) {
const tasks = []
tasks.push(
function (callback) {
removeThumbnail(video, callback)
}
)
if (video.isOwned()) {
tasks.push(
2017-01-17 14:42:47 -06:00
function removeVideoFile (callback) {
2016-12-11 14:50:51 -06:00
removeFile(video, callback)
},
2017-01-17 14:42:47 -06:00
function removeVideoTorrent (callback) {
2016-12-11 14:50:51 -06:00
removeTorrent(video, callback)
},
2017-01-17 14:42:47 -06:00
function removeVideoPreview (callback) {
2016-12-11 14:50:51 -06:00
removePreview(video, callback)
},
2017-01-17 14:42:47 -06:00
function removeVideoToFriends (callback) {
const params = {
remoteId: video.id
}
2017-05-15 15:22:03 -05:00
removeVideoToFriends(params)
return callback()
2016-12-11 14:50:51 -06:00
}
)
}
parallel(tasks, next)
}
// ------------------------------ METHODS ------------------------------
2016-12-11 14:50:51 -06:00
function associate (models) {
this.belongsTo(models.Author, {
foreignKey: {
name: 'authorId',
allowNull: false
},
onDelete: 'cascade'
})
2016-12-24 09:59:17 -06:00
this.belongsToMany(models.Tag, {
foreignKey: 'videoId',
through: models.VideoTag,
onDelete: 'cascade'
})
2017-01-04 13:59:23 -06:00
this.hasMany(models.VideoAbuse, {
foreignKey: {
name: 'videoId',
allowNull: false
},
onDelete: 'cascade'
})
2016-12-11 14:50:51 -06:00
}
2016-11-11 08:20:03 -06:00
function generateMagnetUri () {
2017-05-15 15:22:03 -05:00
let baseUrlHttp
let baseUrlWs
2016-11-11 08:20:03 -06:00
if (this.isOwned()) {
2017-05-15 15:22:03 -05:00
baseUrlHttp = CONFIG.WEBSERVER.URL
baseUrlWs = CONFIG.WEBSERVER.WS + '://' + CONFIG.WEBSERVER.HOSTNAME + ':' + CONFIG.WEBSERVER.PORT
2016-11-11 08:20:03 -06:00
} else {
2017-05-15 15:22:03 -05:00
baseUrlHttp = REMOTE_SCHEME.HTTP + '://' + this.Author.Pod.host
baseUrlWs = REMOTE_SCHEME.WS + '://' + this.Author.Pod.host
2016-11-11 08:20:03 -06:00
}
2017-05-15 15:22:03 -05:00
const xs = baseUrlHttp + STATIC_PATHS.TORRENTS + this.getTorrentName()
2016-11-11 08:20:03 -06:00
const announce = baseUrlWs + '/tracker/socket'
2017-05-15 15:22:03 -05:00
const urlList = [ baseUrlHttp + STATIC_PATHS.WEBSEED + this.getVideoFilename() ]
2016-11-11 08:20:03 -06:00
const magnetHash = {
xs,
announce,
urlList,
2016-12-11 14:50:51 -06:00
infoHash: this.infoHash,
2016-11-11 08:20:03 -06:00
name: this.name
}
return magnetUtil.encode(magnetHash)
}
2016-11-11 08:20:03 -06:00
function getVideoFilename () {
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + this.extname
2016-11-11 08:20:03 -06:00
return this.remoteId + this.extname
}
function getThumbnailName () {
// We always have a copy of the thumbnail
2016-12-11 14:50:51 -06:00
return this.id + '.jpg'
}
2016-11-11 08:20:03 -06:00
function getPreviewName () {
const extension = '.jpg'
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + extension
2016-11-11 08:20:03 -06:00
return this.remoteId + extension
}
function getTorrentName () {
2016-11-11 08:20:03 -06:00
const extension = '.torrent'
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + extension
2016-11-11 08:20:03 -06:00
return this.remoteId + extension
}
function isOwned () {
return this.remoteId === null
}
function toFormatedJSON () {
2016-12-11 14:50:51 -06:00
let podHost
if (this.Author.Pod) {
podHost = this.Author.Pod.host
} else {
// It means it's our video
2017-05-15 15:22:03 -05:00
podHost = CONFIG.WEBSERVER.HOST
2016-12-11 14:50:51 -06:00
}
2017-03-22 15:15:55 -05:00
// Maybe our pod is not up to date and there are new categories since our version
2017-05-15 15:22:03 -05:00
let categoryLabel = VIDEO_CATEGORIES[this.category]
2017-03-22 15:15:55 -05:00
if (!categoryLabel) categoryLabel = 'Misc'
2017-03-27 13:53:11 -05:00
// Maybe our pod is not up to date and there are new licences since our version
2017-05-15 15:22:03 -05:00
let licenceLabel = VIDEO_LICENCES[this.licence]
2017-03-27 13:53:11 -05:00
if (!licenceLabel) licenceLabel = 'Unknown'
2017-04-07 05:13:37 -05:00
// Language is an optional attribute
2017-05-15 15:22:03 -05:00
let languageLabel = VIDEO_LANGUAGES[this.language]
2017-04-07 05:13:37 -05:00
if (!languageLabel) languageLabel = 'Unknown'
const json = {
2016-12-11 14:50:51 -06:00
id: this.id,
name: this.name,
2017-03-22 15:15:55 -05:00
category: this.category,
categoryLabel,
2017-03-27 13:53:11 -05:00
licence: this.licence,
licenceLabel,
2017-04-07 05:13:37 -05:00
language: this.language,
languageLabel,
2017-03-28 14:19:46 -05:00
nsfw: this.nsfw,
description: this.description,
2016-12-11 14:50:51 -06:00
podHost,
isLocal: this.isOwned(),
2016-11-11 08:20:03 -06:00
magnetUri: this.generateMagnetUri(),
2016-12-11 14:50:51 -06:00
author: this.Author.name,
duration: this.duration,
views: this.views,
2017-03-08 14:35:43 -06:00
likes: this.likes,
dislikes: this.dislikes,
2016-12-24 09:59:17 -06:00
tags: map(this.Tags, 'name'),
2017-05-15 15:22:03 -05:00
thumbnailPath: join(STATIC_PATHS.THUMBNAILS, this.getThumbnailName()),
createdAt: this.createdAt,
updatedAt: this.updatedAt
}
return json
}
2016-12-29 12:07:05 -06:00
function toAddRemoteJSON (callback) {
const self = this
// Get thumbnail data to send to the other pod
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, this.getThumbnailName())
fs.readFile(thumbnailPath, function (err, thumbnailData) {
if (err) {
logger.error('Cannot read the thumbnail of the video')
return callback(err)
}
const remoteVideo = {
name: self.name,
2017-03-22 15:15:55 -05:00
category: self.category,
2017-03-27 13:53:11 -05:00
licence: self.licence,
2017-04-07 05:13:37 -05:00
language: self.language,
2017-03-28 14:19:46 -05:00
nsfw: self.nsfw,
description: self.description,
2016-12-11 14:50:51 -06:00
infoHash: self.infoHash,
remoteId: self.id,
author: self.Author.name,
duration: self.duration,
thumbnailData: thumbnailData.toString('binary'),
2016-12-24 09:59:17 -06:00
tags: map(self.Tags, 'name'),
2016-12-11 14:50:51 -06:00
createdAt: self.createdAt,
updatedAt: self.updatedAt,
extname: self.extname,
2017-03-08 14:35:43 -06:00
views: self.views,
likes: self.likes,
dislikes: self.dislikes
}
return callback(null, remoteVideo)
})
}
2016-12-29 12:07:05 -06:00
function toUpdateRemoteJSON (callback) {
const json = {
name: this.name,
2017-03-22 15:15:55 -05:00
category: this.category,
2017-03-27 13:53:11 -05:00
licence: this.licence,
2017-04-07 05:13:37 -05:00
language: this.language,
2017-03-28 14:19:46 -05:00
nsfw: this.nsfw,
2016-12-29 12:07:05 -06:00
description: this.description,
infoHash: this.infoHash,
remoteId: this.id,
author: this.Author.name,
duration: this.duration,
tags: map(this.Tags, 'name'),
createdAt: this.createdAt,
updatedAt: this.updatedAt,
extname: this.extname,
2017-03-08 14:35:43 -06:00
views: this.views,
likes: this.likes,
dislikes: this.dislikes
2016-12-29 12:07:05 -06:00
}
return json
}
function transcodeVideofile (finalCallback) {
const video = this
2017-05-15 15:22:03 -05:00
const videosDirectory = CONFIG.STORAGE.VIDEOS_DIR
const newExtname = '.mp4'
2017-05-15 15:22:03 -05:00
const videoInputPath = join(videosDirectory, video.getVideoFilename())
const videoOutputPath = join(videosDirectory, video.id + '-transcoded' + newExtname)
ffmpeg(videoInputPath)
.output(videoOutputPath)
.videoCodec('libx264')
2017-05-15 15:22:03 -05:00
.outputOption('-threads ' + CONFIG.TRANSCODING.THREADS)
.outputOption('-movflags faststart')
.on('error', finalCallback)
.on('end', function () {
series([
function removeOldFile (callback) {
fs.unlink(videoInputPath, callback)
},
function moveNewFile (callback) {
// Important to do this before getVideoFilename() to take in account the new file extension
video.set('extname', newExtname)
2017-05-15 15:22:03 -05:00
const newVideoPath = join(videosDirectory, video.getVideoFilename())
fs.rename(videoOutputPath, newVideoPath, callback)
},
function torrent (callback) {
2017-05-15 15:22:03 -05:00
const newVideoPath = join(videosDirectory, video.getVideoFilename())
createTorrentFromVideo(video, newVideoPath, callback)
},
function videoExtension (callback) {
video.save().asCallback(callback)
}
], function (err) {
if (err) {
// Autodescruction...
video.destroy().asCallback(function (err) {
if (err) logger.error('Cannot destruct video after transcoding failure.', { error: err })
})
return finalCallback(err)
}
return finalCallback(null)
})
})
.run()
}
// ------------------------------ STATICS ------------------------------
function generateThumbnailFromData (video, thumbnailData, callback) {
2016-11-16 14:16:41 -06:00
// Creating the thumbnail for a remote video
const thumbnailName = video.getThumbnailName()
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, thumbnailName)
fs.writeFile(thumbnailPath, Buffer.from(thumbnailData, 'binary'), function (err) {
2016-11-16 14:16:41 -06:00
if (err) return callback(err)
return callback(null, thumbnailName)
})
}
function getDurationFromFile (videoPath, callback) {
ffmpeg.ffprobe(videoPath, function (err, metadata) {
if (err) return callback(err)
return callback(null, Math.floor(metadata.format.duration))
})
}
2016-12-25 02:44:57 -06:00
function list (callback) {
2017-02-08 13:34:01 -06:00
return this.findAll().asCallback(callback)
2016-12-25 02:44:57 -06:00
}
function listForApi (start, count, sort, callback) {
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
// Exclude Blakclisted videos from the list
2016-12-11 14:50:51 -06:00
const query = {
offset: start,
limit: count,
2016-12-24 09:59:17 -06:00
distinct: true, // For the count, a video can have many tags
2017-05-15 15:22:03 -05:00
order: [ getSort(sort), [ this.sequelize.models.Tag, 'name', 'ASC' ] ],
2016-12-11 14:50:51 -06:00
include: [
{
model: this.sequelize.models.Author,
2016-12-24 09:59:17 -06:00
include: [ { model: this.sequelize.models.Pod, required: false } ]
},
this.sequelize.models.Tag
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
],
where: createBaseVideosWhere.call(this)
2016-12-11 14:50:51 -06:00
}
return this.findAndCountAll(query).asCallback(function (err, result) {
if (err) return callback(err)
return callback(null, result.rows, result.count)
})
}
function loadByHostAndRemoteId (fromHost, remoteId, callback) {
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: remoteId
},
include: [
{
model: this.sequelize.models.Author,
include: [
{
model: this.sequelize.models.Pod,
2016-12-24 09:59:17 -06:00
required: true,
2016-12-11 14:50:51 -06:00
where: {
host: fromHost
}
}
]
}
]
}
return this.findOne(query).asCallback(callback)
}
2016-12-24 09:59:17 -06:00
function listOwnedAndPopulateAuthorAndTags (callback) {
// If remoteId is null this is *our* video
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: null
},
2016-12-24 09:59:17 -06:00
include: [ this.sequelize.models.Author, this.sequelize.models.Tag ]
2016-12-11 14:50:51 -06:00
}
return this.findAll(query).asCallback(callback)
}
function listOwnedByAuthor (author, callback) {
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: null
},
include: [
{
model: this.sequelize.models.Author,
where: {
name: author
}
}
]
}
2016-12-11 14:50:51 -06:00
return this.findAll(query).asCallback(callback)
}
function load (id, callback) {
2016-12-11 14:50:51 -06:00
return this.findById(id).asCallback(callback)
}
function loadAndPopulateAuthor (id, callback) {
const options = {
include: [ this.sequelize.models.Author ]
}
return this.findById(id, options).asCallback(callback)
}
2016-12-24 09:59:17 -06:00
function loadAndPopulateAuthorAndPodAndTags (id, callback) {
2016-12-11 14:50:51 -06:00
const options = {
include: [
{
model: this.sequelize.models.Author,
2016-12-24 09:59:17 -06:00
include: [ { model: this.sequelize.models.Pod, required: false } ]
},
this.sequelize.models.Tag
2016-12-11 14:50:51 -06:00
]
}
return this.findById(id, options).asCallback(callback)
}
2016-12-24 09:59:17 -06:00
function searchAndPopulateAuthorAndPodAndTags (value, field, start, count, sort, callback) {
2017-05-15 15:22:03 -05:00
const podInclude: any = {
2016-12-24 09:59:17 -06:00
model: this.sequelize.models.Pod,
required: false
2016-12-11 14:50:51 -06:00
}
2016-12-24 09:59:17 -06:00
2017-05-15 15:22:03 -05:00
const authorInclude: any = {
2016-12-11 14:50:51 -06:00
model: this.sequelize.models.Author,
include: [
podInclude
]
}
2017-05-15 15:22:03 -05:00
const tagInclude: any = {
2016-12-24 09:59:17 -06:00
model: this.sequelize.models.Tag
}
2017-05-15 15:22:03 -05:00
const query: any = {
where: createBaseVideosWhere.call(this),
2016-12-11 14:50:51 -06:00
offset: start,
limit: count,
2016-12-24 09:59:17 -06:00
distinct: true, // For the count, a video can have many tags
2017-05-15 15:22:03 -05:00
order: [ getSort(sort), [ this.sequelize.models.Tag, 'name', 'ASC' ] ]
2016-12-11 14:50:51 -06:00
}
// Make an exact search with the magnet
2016-11-11 08:24:36 -06:00
if (field === 'magnetUri') {
const infoHash = magnetUtil.decode(value).infoHash
2016-12-11 14:50:51 -06:00
query.where.infoHash = infoHash
2016-11-11 08:24:36 -06:00
} else if (field === 'tags') {
2016-12-24 09:59:17 -06:00
const escapedValue = this.sequelize.escape('%' + value + '%')
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
query.where.id.$in = this.sequelize.literal(
'(SELECT "VideoTags"."videoId" FROM "Tags" INNER JOIN "VideoTags" ON "Tags"."id" = "VideoTags"."tagId" WHERE name LIKE ' + escapedValue + ')'
)
2016-12-24 09:59:17 -06:00
} else if (field === 'host') {
// FIXME: Include our pod? (not stored in the database)
podInclude.where = {
host: {
$like: '%' + value + '%'
2016-12-11 14:50:51 -06:00
}
}
2016-12-24 09:59:17 -06:00
podInclude.required = true
2016-12-11 14:50:51 -06:00
} else if (field === 'author') {
2016-12-24 09:59:17 -06:00
authorInclude.where = {
name: {
2016-12-11 14:50:51 -06:00
$like: '%' + value + '%'
}
}
2016-12-24 09:59:17 -06:00
// authorInclude.or = true
} else {
2016-12-11 14:50:51 -06:00
query.where[field] = {
$like: '%' + value + '%'
}
}
2016-12-24 09:59:17 -06:00
query.include = [
authorInclude, tagInclude
]
if (tagInclude.where) {
// query.include.push([ this.sequelize.models.Tag ])
}
2016-12-11 14:50:51 -06:00
return this.findAndCountAll(query).asCallback(function (err, result) {
if (err) return callback(err)
return callback(null, result.rows, result.count)
})
}
// ---------------------------------------------------------------------------
function createBaseVideosWhere () {
return {
id: {
$notIn: this.sequelize.literal(
'(SELECT "BlacklistedVideos"."videoId" FROM "BlacklistedVideos")'
)
}
}
}
function removeThumbnail (video, callback) {
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName())
2017-01-17 14:42:47 -06:00
fs.unlink(thumbnailPath, callback)
}
function removeFile (video, callback) {
2017-05-15 15:22:03 -05:00
const filePath = join(CONFIG.STORAGE.VIDEOS_DIR, video.getVideoFilename())
2017-01-17 14:42:47 -06:00
fs.unlink(filePath, callback)
}
function removeTorrent (video, callback) {
2017-05-15 15:22:03 -05:00
const torrenPath = join(CONFIG.STORAGE.TORRENTS_DIR, video.getTorrentName())
2017-01-17 14:42:47 -06:00
fs.unlink(torrenPath, callback)
}
2016-11-11 04:52:24 -06:00
function removePreview (video, callback) {
// Same name than video thumnail
2017-05-15 15:22:03 -05:00
fs.unlink(CONFIG.STORAGE.PREVIEWS_DIR + video.getPreviewName(), callback)
2016-11-11 04:52:24 -06:00
}
function createTorrentFromVideo (video, videoPath, callback) {
const options = {
announceList: [
2017-05-15 15:22:03 -05:00
[ CONFIG.WEBSERVER.WS + '://' + CONFIG.WEBSERVER.HOSTNAME + ':' + CONFIG.WEBSERVER.PORT + '/tracker/socket' ]
],
urlList: [
2017-05-15 15:22:03 -05:00
CONFIG.WEBSERVER.URL + STATIC_PATHS.WEBSEED + video.getVideoFilename()
]
}
createTorrent(videoPath, options, function (err, torrent) {
if (err) return callback(err)
2017-05-15 15:22:03 -05:00
const filePath = join(CONFIG.STORAGE.TORRENTS_DIR, video.getTorrentName())
fs.writeFile(filePath, torrent, function (err) {
if (err) return callback(err)
const parsedTorrent = parseTorrent(torrent)
video.set('infoHash', parsedTorrent.infoHash)
video.validate().asCallback(callback)
})
})
}
function createPreview (video, videoPath, callback) {
2017-05-15 15:22:03 -05:00
generateImage(video, videoPath, CONFIG.STORAGE.PREVIEWS_DIR, video.getPreviewName(), callback)
2016-11-11 04:52:24 -06:00
}
function createThumbnail (video, videoPath, callback) {
2017-05-15 15:22:03 -05:00
generateImage(video, videoPath, CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName(), THUMBNAILS_SIZE, callback)
}
2017-05-15 15:22:03 -05:00
function generateImage (video, videoPath, folder, imageName, size, callback?) {
const options: any = {
2016-11-11 08:20:03 -06:00
filename: imageName,
count: 1,
folder
}
if (!callback) {
callback = size
} else {
options.size = size
}
ffmpeg(videoPath)
.on('error', callback)
.on('end', function () {
2016-11-11 08:20:03 -06:00
callback(null, imageName)
})
.thumbnail(options)
}
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
function removeFromBlacklist (video, callback) {
// Find the blacklisted video
db.BlacklistedVideo.loadByVideoId(video.id, function (err, video) {
// If an error occured, stop here
if (err) {
logger.error('Error when fetching video from blacklist.', { error: err })
return callback(err)
}
// If we found the video, remove it from the blacklist
if (video) {
video.destroy().asCallback(callback)
} else {
// If haven't found it, simply ignore it and do nothing
return callback()
}
})
}