PeerTube/server/models/video.ts

922 lines
24 KiB
TypeScript
Raw Normal View History

2017-06-05 14:53:49 -05:00
import * as safeBuffer from 'safe-buffer'
2017-05-15 15:22:03 -05:00
const Buffer = safeBuffer.Buffer
2017-06-05 14:53:49 -05:00
import * as createTorrent from 'create-torrent'
import * as ffmpeg from 'fluent-ffmpeg'
import * as fs from 'fs'
import * as magnetUtil from 'magnet-uri'
2017-05-15 15:22:03 -05:00
import { map, values } from 'lodash'
import { parallel, series } from 'async'
2017-06-05 14:53:49 -05:00
import * as parseTorrent from 'parse-torrent'
2017-05-15 15:22:03 -05:00
import { join } from 'path'
2017-05-22 13:58:25 -05:00
import * as Sequelize from 'sequelize'
2017-05-15 15:22:03 -05:00
2017-05-22 13:58:25 -05:00
import { database as db } from '../initializers/database'
2017-06-10 15:15:25 -05:00
import { VideoTagInstance } from './video-tag-interface'
2017-05-15 15:22:03 -05:00
import {
logger,
isVideoNameValid,
isVideoCategoryValid,
isVideoLicenceValid,
isVideoLanguageValid,
isVideoNSFWValid,
isVideoDescriptionValid,
isVideoInfoHashValid,
isVideoDurationValid
} from '../helpers'
import {
CONSTRAINTS_FIELDS,
CONFIG,
REMOTE_SCHEME,
STATIC_PATHS,
VIDEO_CATEGORIES,
VIDEO_LICENCES,
VIDEO_LANGUAGES,
THUMBNAILS_SIZE
} from '../initializers'
import { JobScheduler, removeVideoToFriends } from '../lib'
2017-05-22 13:58:25 -05:00
import { addMethodsToModel, getSort } from './utils'
import {
VideoClass,
VideoInstance,
VideoAttributes,
VideoMethods
} from './video-interface'
let Video: Sequelize.Model<VideoInstance, VideoAttributes>
let generateMagnetUri: VideoMethods.GenerateMagnetUri
let getVideoFilename: VideoMethods.GetVideoFilename
let getThumbnailName: VideoMethods.GetThumbnailName
let getPreviewName: VideoMethods.GetPreviewName
let getTorrentName: VideoMethods.GetTorrentName
let isOwned: VideoMethods.IsOwned
let toFormatedJSON: VideoMethods.ToFormatedJSON
let toAddRemoteJSON: VideoMethods.ToAddRemoteJSON
let toUpdateRemoteJSON: VideoMethods.ToUpdateRemoteJSON
let transcodeVideofile: VideoMethods.TranscodeVideofile
let generateThumbnailFromData: VideoMethods.GenerateThumbnailFromData
let getDurationFromFile: VideoMethods.GetDurationFromFile
let list: VideoMethods.List
let listForApi: VideoMethods.ListForApi
let loadByHostAndRemoteId: VideoMethods.LoadByHostAndRemoteId
let listOwnedAndPopulateAuthorAndTags: VideoMethods.ListOwnedAndPopulateAuthorAndTags
let listOwnedByAuthor: VideoMethods.ListOwnedByAuthor
let load: VideoMethods.Load
let loadAndPopulateAuthor: VideoMethods.LoadAndPopulateAuthor
let loadAndPopulateAuthorAndPodAndTags: VideoMethods.LoadAndPopulateAuthorAndPodAndTags
let searchAndPopulateAuthorAndPodAndTags: VideoMethods.SearchAndPopulateAuthorAndPodAndTags
export default function (sequelize, DataTypes) {
Video = sequelize.define('Video',
2016-12-11 14:50:51 -06:00
{
id: {
type: DataTypes.UUID,
defaultValue: DataTypes.UUIDV4,
2016-12-28 08:49:23 -06:00
primaryKey: true,
validate: {
isUUID: 4
}
},
2016-12-11 14:50:51 -06:00
name: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
nameValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoNameValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video name is not valid.')
}
}
2016-11-11 04:52:24 -06:00
},
2016-12-11 14:50:51 -06:00
extname: {
2017-05-15 15:22:03 -05:00
type: DataTypes.ENUM(values(CONSTRAINTS_FIELDS.VIDEOS.EXTNAME)),
2016-12-28 08:49:23 -06:00
allowNull: false
2016-12-11 14:50:51 -06:00
},
remoteId: {
2016-12-28 08:49:23 -06:00
type: DataTypes.UUID,
allowNull: true,
validate: {
isUUID: 4
}
2016-12-11 14:50:51 -06:00
},
2017-03-22 15:15:55 -05:00
category: {
type: DataTypes.INTEGER,
allowNull: false,
validate: {
categoryValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoCategoryValid(value)
2017-03-22 15:15:55 -05:00
if (res === false) throw new Error('Video category is not valid.')
}
}
},
2017-03-27 13:53:11 -05:00
licence: {
type: DataTypes.INTEGER,
allowNull: false,
2017-04-07 05:13:37 -05:00
defaultValue: null,
2017-03-27 13:53:11 -05:00
validate: {
licenceValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoLicenceValid(value)
2017-03-27 13:53:11 -05:00
if (res === false) throw new Error('Video licence is not valid.')
}
}
},
2017-04-07 05:13:37 -05:00
language: {
type: DataTypes.INTEGER,
allowNull: true,
validate: {
languageValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoLanguageValid(value)
2017-04-07 05:13:37 -05:00
if (res === false) throw new Error('Video language is not valid.')
}
}
},
2017-03-28 14:19:46 -05:00
nsfw: {
type: DataTypes.BOOLEAN,
allowNull: false,
validate: {
nsfwValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoNSFWValid(value)
2017-03-28 14:19:46 -05:00
if (res === false) throw new Error('Video nsfw attribute is not valid.')
}
}
},
2016-12-11 14:50:51 -06:00
description: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
descriptionValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoDescriptionValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video description is not valid.')
}
}
2016-12-11 14:50:51 -06:00
},
infoHash: {
2016-12-28 08:49:23 -06:00
type: DataTypes.STRING,
allowNull: false,
validate: {
infoHashValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoInfoHashValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video info hash is not valid.')
}
}
2016-12-11 14:50:51 -06:00
},
duration: {
2016-12-28 08:49:23 -06:00
type: DataTypes.INTEGER,
allowNull: false,
validate: {
durationValid: function (value) {
2017-05-15 15:22:03 -05:00
const res = isVideoDurationValid(value)
2016-12-28 08:49:23 -06:00
if (res === false) throw new Error('Video duration is not valid.')
}
}
},
views: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
2017-03-08 14:35:43 -06:00
},
likes: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
},
dislikes: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
}
2016-12-11 14:50:51 -06:00
},
{
2016-12-29 02:33:28 -06:00
indexes: [
{
fields: [ 'authorId' ]
},
{
fields: [ 'remoteId' ]
},
{
fields: [ 'name' ]
},
{
fields: [ 'createdAt' ]
},
{
fields: [ 'duration' ]
},
{
fields: [ 'infoHash' ]
},
{
fields: [ 'views' ]
2017-03-08 14:35:43 -06:00
},
{
fields: [ 'likes' ]
2016-12-29 02:33:28 -06:00
}
],
2016-12-11 14:50:51 -06:00
hooks: {
2016-12-28 08:49:23 -06:00
beforeValidate,
2016-12-11 14:50:51 -06:00
beforeCreate,
afterDestroy
}
}
)
2017-05-22 13:58:25 -05:00
const classMethods = [
associate,
generateThumbnailFromData,
getDurationFromFile,
list,
listForApi,
listOwnedAndPopulateAuthorAndTags,
listOwnedByAuthor,
load,
loadByHostAndRemoteId,
loadAndPopulateAuthor,
loadAndPopulateAuthorAndPodAndTags,
searchAndPopulateAuthorAndPodAndTags
]
const instanceMethods = [
generateMagnetUri,
getVideoFilename,
getThumbnailName,
getPreviewName,
getTorrentName,
isOwned,
toFormatedJSON,
toAddRemoteJSON,
toUpdateRemoteJSON,
transcodeVideofile,
removeFromBlacklist
]
addMethodsToModel(Video, classMethods, instanceMethods)
2016-12-11 14:50:51 -06:00
return Video
}
2017-06-10 15:15:25 -05:00
function beforeValidate (video: VideoInstance) {
// Put a fake infoHash if it does not exists yet
if (video.isOwned() && !video.infoHash) {
2016-12-28 08:49:23 -06:00
// 40 hexa length
video.infoHash = '0123456789abcdef0123456789abcdef01234567'
}
}
2016-12-11 14:50:51 -06:00
2017-06-10 15:15:25 -05:00
function beforeCreate (video: VideoInstance, options: { transaction: Sequelize.Transaction }) {
2017-05-22 13:58:25 -05:00
return new Promise(function (resolve, reject) {
const tasks = []
2017-01-17 14:42:47 -06:00
2017-05-22 13:58:25 -05:00
if (video.isOwned()) {
const videoPath = join(CONFIG.STORAGE.VIDEOS_DIR, video.getVideoFilename())
tasks.push(
2017-05-22 13:58:25 -05:00
function createVideoTorrent (callback) {
createTorrentFromVideo(video, videoPath, callback)
},
function createVideoThumbnail (callback) {
createThumbnail(video, videoPath, callback)
},
2017-05-22 13:58:25 -05:00
function createVideoPreview (callback) {
createPreview(video, videoPath, callback)
}
)
2017-05-22 13:58:25 -05:00
if (CONFIG.TRANSCODING.ENABLED === true) {
tasks.push(
function createVideoTranscoderJob (callback) {
const dataInput = {
id: video.id
}
2016-11-16 14:16:41 -06:00
2017-05-22 13:58:25 -05:00
JobScheduler.Instance.createJob(options.transaction, 'videoTranscoder', dataInput, callback)
}
)
}
2017-05-22 13:58:25 -05:00
return parallel(tasks, function (err) {
if (err) return reject(err)
2016-12-11 14:50:51 -06:00
2017-05-22 13:58:25 -05:00
return resolve()
})
2016-12-11 14:50:51 -06:00
}
2017-05-22 13:58:25 -05:00
return resolve()
})
}
2017-06-10 15:15:25 -05:00
function afterDestroy (video: VideoInstance) {
2017-05-22 13:58:25 -05:00
return new Promise(function (resolve, reject) {
const tasks = []
2016-12-11 14:50:51 -06:00
tasks.push(
2017-05-22 13:58:25 -05:00
function (callback) {
removeThumbnail(video, callback)
}
)
2017-05-22 13:58:25 -05:00
if (video.isOwned()) {
tasks.push(
function removeVideoFile (callback) {
removeFile(video, callback)
},
2017-05-22 13:58:25 -05:00
function removeVideoTorrent (callback) {
removeTorrent(video, callback)
},
2017-05-22 13:58:25 -05:00
function removeVideoPreview (callback) {
removePreview(video, callback)
},
2017-05-22 13:58:25 -05:00
function notifyFriends (callback) {
const params = {
remoteId: video.id
}
2017-05-22 13:58:25 -05:00
removeVideoToFriends(params)
2016-12-11 14:50:51 -06:00
2017-05-22 13:58:25 -05:00
return callback()
}
)
}
parallel(tasks, function (err) {
if (err) return reject(err)
return resolve()
})
})
2016-12-11 14:50:51 -06:00
}
// ------------------------------ METHODS ------------------------------
2016-12-11 14:50:51 -06:00
function associate (models) {
2017-05-22 13:58:25 -05:00
Video.belongsTo(models.Author, {
2016-12-11 14:50:51 -06:00
foreignKey: {
name: 'authorId',
allowNull: false
},
onDelete: 'cascade'
})
2016-12-24 09:59:17 -06:00
2017-05-22 13:58:25 -05:00
Video.belongsToMany(models.Tag, {
2016-12-24 09:59:17 -06:00
foreignKey: 'videoId',
through: models.VideoTag,
onDelete: 'cascade'
})
2017-01-04 13:59:23 -06:00
2017-05-22 13:58:25 -05:00
Video.hasMany(models.VideoAbuse, {
2017-01-04 13:59:23 -06:00
foreignKey: {
name: 'videoId',
allowNull: false
},
onDelete: 'cascade'
})
2016-12-11 14:50:51 -06:00
}
2017-05-22 13:58:25 -05:00
generateMagnetUri = function () {
2017-05-15 15:22:03 -05:00
let baseUrlHttp
let baseUrlWs
2016-11-11 08:20:03 -06:00
if (this.isOwned()) {
2017-05-15 15:22:03 -05:00
baseUrlHttp = CONFIG.WEBSERVER.URL
baseUrlWs = CONFIG.WEBSERVER.WS + '://' + CONFIG.WEBSERVER.HOSTNAME + ':' + CONFIG.WEBSERVER.PORT
2016-11-11 08:20:03 -06:00
} else {
2017-05-15 15:22:03 -05:00
baseUrlHttp = REMOTE_SCHEME.HTTP + '://' + this.Author.Pod.host
baseUrlWs = REMOTE_SCHEME.WS + '://' + this.Author.Pod.host
2016-11-11 08:20:03 -06:00
}
2017-05-15 15:22:03 -05:00
const xs = baseUrlHttp + STATIC_PATHS.TORRENTS + this.getTorrentName()
2017-06-10 15:15:25 -05:00
const announce = [ baseUrlWs + '/tracker/socket' ]
2017-05-15 15:22:03 -05:00
const urlList = [ baseUrlHttp + STATIC_PATHS.WEBSEED + this.getVideoFilename() ]
2016-11-11 08:20:03 -06:00
const magnetHash = {
xs,
announce,
urlList,
2016-12-11 14:50:51 -06:00
infoHash: this.infoHash,
2016-11-11 08:20:03 -06:00
name: this.name
}
return magnetUtil.encode(magnetHash)
}
2017-05-22 13:58:25 -05:00
getVideoFilename = function () {
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + this.extname
2016-11-11 08:20:03 -06:00
return this.remoteId + this.extname
}
2017-05-22 13:58:25 -05:00
getThumbnailName = function () {
2016-11-11 08:20:03 -06:00
// We always have a copy of the thumbnail
2016-12-11 14:50:51 -06:00
return this.id + '.jpg'
}
2017-05-22 13:58:25 -05:00
getPreviewName = function () {
2016-11-11 08:20:03 -06:00
const extension = '.jpg'
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + extension
2016-11-11 08:20:03 -06:00
return this.remoteId + extension
}
2017-05-22 13:58:25 -05:00
getTorrentName = function () {
2016-11-11 08:20:03 -06:00
const extension = '.torrent'
2016-12-11 14:50:51 -06:00
if (this.isOwned()) return this.id + extension
2016-11-11 08:20:03 -06:00
return this.remoteId + extension
}
2017-05-22 13:58:25 -05:00
isOwned = function () {
return this.remoteId === null
}
2017-05-22 13:58:25 -05:00
toFormatedJSON = function () {
2016-12-11 14:50:51 -06:00
let podHost
if (this.Author.Pod) {
podHost = this.Author.Pod.host
} else {
// It means it's our video
2017-05-15 15:22:03 -05:00
podHost = CONFIG.WEBSERVER.HOST
2016-12-11 14:50:51 -06:00
}
2017-03-22 15:15:55 -05:00
// Maybe our pod is not up to date and there are new categories since our version
2017-05-15 15:22:03 -05:00
let categoryLabel = VIDEO_CATEGORIES[this.category]
2017-03-22 15:15:55 -05:00
if (!categoryLabel) categoryLabel = 'Misc'
2017-03-27 13:53:11 -05:00
// Maybe our pod is not up to date and there are new licences since our version
2017-05-15 15:22:03 -05:00
let licenceLabel = VIDEO_LICENCES[this.licence]
2017-03-27 13:53:11 -05:00
if (!licenceLabel) licenceLabel = 'Unknown'
2017-04-07 05:13:37 -05:00
// Language is an optional attribute
2017-05-15 15:22:03 -05:00
let languageLabel = VIDEO_LANGUAGES[this.language]
2017-04-07 05:13:37 -05:00
if (!languageLabel) languageLabel = 'Unknown'
const json = {
2016-12-11 14:50:51 -06:00
id: this.id,
name: this.name,
2017-03-22 15:15:55 -05:00
category: this.category,
categoryLabel,
2017-03-27 13:53:11 -05:00
licence: this.licence,
licenceLabel,
2017-04-07 05:13:37 -05:00
language: this.language,
languageLabel,
2017-03-28 14:19:46 -05:00
nsfw: this.nsfw,
description: this.description,
2016-12-11 14:50:51 -06:00
podHost,
isLocal: this.isOwned(),
2016-11-11 08:20:03 -06:00
magnetUri: this.generateMagnetUri(),
2016-12-11 14:50:51 -06:00
author: this.Author.name,
duration: this.duration,
views: this.views,
2017-03-08 14:35:43 -06:00
likes: this.likes,
dislikes: this.dislikes,
2016-12-24 09:59:17 -06:00
tags: map(this.Tags, 'name'),
2017-05-15 15:22:03 -05:00
thumbnailPath: join(STATIC_PATHS.THUMBNAILS, this.getThumbnailName()),
createdAt: this.createdAt,
updatedAt: this.updatedAt
}
return json
}
2017-06-10 15:15:25 -05:00
toAddRemoteJSON = function (callback: VideoMethods.ToAddRemoteJSONCallback) {
// Get thumbnail data to send to the other pod
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, this.getThumbnailName())
2017-05-22 13:58:25 -05:00
fs.readFile(thumbnailPath, (err, thumbnailData) => {
if (err) {
logger.error('Cannot read the thumbnail of the video')
return callback(err)
}
const remoteVideo = {
2017-05-22 13:58:25 -05:00
name: this.name,
category: this.category,
licence: this.licence,
language: this.language,
nsfw: this.nsfw,
description: this.description,
infoHash: this.infoHash,
remoteId: this.id,
author: this.Author.name,
duration: this.duration,
thumbnailData: thumbnailData.toString('binary'),
2017-06-10 15:15:25 -05:00
tags: map<VideoTagInstance, string>(this.Tags, 'name'),
2017-05-22 13:58:25 -05:00
createdAt: this.createdAt,
updatedAt: this.updatedAt,
extname: this.extname,
views: this.views,
likes: this.likes,
dislikes: this.dislikes
}
return callback(null, remoteVideo)
})
}
2017-06-10 15:15:25 -05:00
toUpdateRemoteJSON = function () {
2016-12-29 12:07:05 -06:00
const json = {
name: this.name,
2017-03-22 15:15:55 -05:00
category: this.category,
2017-03-27 13:53:11 -05:00
licence: this.licence,
2017-04-07 05:13:37 -05:00
language: this.language,
2017-03-28 14:19:46 -05:00
nsfw: this.nsfw,
2016-12-29 12:07:05 -06:00
description: this.description,
infoHash: this.infoHash,
remoteId: this.id,
author: this.Author.name,
duration: this.duration,
2017-06-10 15:15:25 -05:00
tags: map<VideoTagInstance, string>(this.Tags, 'name'),
2016-12-29 12:07:05 -06:00
createdAt: this.createdAt,
updatedAt: this.updatedAt,
extname: this.extname,
2017-03-08 14:35:43 -06:00
views: this.views,
likes: this.likes,
dislikes: this.dislikes
2016-12-29 12:07:05 -06:00
}
return json
}
2017-06-10 15:15:25 -05:00
transcodeVideofile = function (finalCallback: VideoMethods.TranscodeVideofileCallback) {
const video = this
2017-05-15 15:22:03 -05:00
const videosDirectory = CONFIG.STORAGE.VIDEOS_DIR
const newExtname = '.mp4'
2017-05-15 15:22:03 -05:00
const videoInputPath = join(videosDirectory, video.getVideoFilename())
const videoOutputPath = join(videosDirectory, video.id + '-transcoded' + newExtname)
ffmpeg(videoInputPath)
.output(videoOutputPath)
.videoCodec('libx264')
2017-05-15 15:22:03 -05:00
.outputOption('-threads ' + CONFIG.TRANSCODING.THREADS)
.outputOption('-movflags faststart')
.on('error', finalCallback)
.on('end', function () {
series([
function removeOldFile (callback) {
fs.unlink(videoInputPath, callback)
},
function moveNewFile (callback) {
// Important to do this before getVideoFilename() to take in account the new file extension
video.set('extname', newExtname)
2017-05-15 15:22:03 -05:00
const newVideoPath = join(videosDirectory, video.getVideoFilename())
fs.rename(videoOutputPath, newVideoPath, callback)
},
function torrent (callback) {
2017-05-15 15:22:03 -05:00
const newVideoPath = join(videosDirectory, video.getVideoFilename())
createTorrentFromVideo(video, newVideoPath, callback)
},
function videoExtension (callback) {
video.save().asCallback(callback)
}
2017-06-10 15:15:25 -05:00
], function (err: Error) {
if (err) {
2017-06-10 15:15:25 -05:00
// Autodesctruction...
video.destroy().asCallback(function (err) {
if (err) logger.error('Cannot destruct video after transcoding failure.', { error: err })
})
return finalCallback(err)
}
return finalCallback(null)
})
})
.run()
}
// ------------------------------ STATICS ------------------------------
2017-06-10 15:15:25 -05:00
generateThumbnailFromData = function (video: VideoInstance, thumbnailData: string, callback: VideoMethods.GenerateThumbnailFromDataCallback) {
2016-11-16 14:16:41 -06:00
// Creating the thumbnail for a remote video
const thumbnailName = video.getThumbnailName()
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, thumbnailName)
fs.writeFile(thumbnailPath, Buffer.from(thumbnailData, 'binary'), function (err) {
2016-11-16 14:16:41 -06:00
if (err) return callback(err)
return callback(null, thumbnailName)
})
}
2017-06-10 15:15:25 -05:00
getDurationFromFile = function (videoPath: string, callback: VideoMethods.GetDurationFromFileCallback) {
ffmpeg.ffprobe(videoPath, function (err, metadata) {
if (err) return callback(err)
return callback(null, Math.floor(metadata.format.duration))
})
}
2017-06-10 15:15:25 -05:00
list = function (callback: VideoMethods.ListCallback) {
2017-05-22 13:58:25 -05:00
return Video.findAll().asCallback(callback)
2016-12-25 02:44:57 -06:00
}
2017-06-10 15:15:25 -05:00
listForApi = function (start: number, count: number, sort: string, callback: VideoMethods.ListForApiCallback) {
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
// Exclude Blakclisted videos from the list
2016-12-11 14:50:51 -06:00
const query = {
2017-05-22 13:58:25 -05:00
distinct: true,
2016-12-11 14:50:51 -06:00
offset: start,
limit: count,
2017-05-22 13:58:25 -05:00
order: [ getSort(sort), [ Video['sequelize'].models.Tag, 'name', 'ASC' ] ],
2016-12-11 14:50:51 -06:00
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
include: [ { model: Video['sequelize'].models.Pod, required: false } ]
2016-12-24 09:59:17 -06:00
},
2017-05-22 13:58:25 -05:00
Video['sequelize'].models.Tag
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
],
2017-05-22 13:58:25 -05:00
where: createBaseVideosWhere()
2016-12-11 14:50:51 -06:00
}
2017-05-22 13:58:25 -05:00
return Video.findAndCountAll(query).asCallback(function (err, result) {
2016-12-11 14:50:51 -06:00
if (err) return callback(err)
return callback(null, result.rows, result.count)
})
}
2017-06-10 15:15:25 -05:00
loadByHostAndRemoteId = function (fromHost: string, remoteId: string, callback: VideoMethods.LoadByHostAndRemoteIdCallback) {
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: remoteId
},
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
2016-12-11 14:50:51 -06:00
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Pod,
2016-12-24 09:59:17 -06:00
required: true,
2016-12-11 14:50:51 -06:00
where: {
host: fromHost
}
}
]
}
]
}
2017-05-22 13:58:25 -05:00
return Video.findOne(query).asCallback(callback)
}
2017-06-10 15:15:25 -05:00
listOwnedAndPopulateAuthorAndTags = function (callback: VideoMethods.ListOwnedAndPopulateAuthorAndTagsCallback) {
// If remoteId is null this is *our* video
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: null
},
2017-05-22 13:58:25 -05:00
include: [ Video['sequelize'].models.Author, Video['sequelize'].models.Tag ]
2016-12-11 14:50:51 -06:00
}
2017-05-22 13:58:25 -05:00
return Video.findAll(query).asCallback(callback)
}
2017-06-10 15:15:25 -05:00
listOwnedByAuthor = function (author: string, callback: VideoMethods.ListOwnedByAuthorCallback) {
2016-12-11 14:50:51 -06:00
const query = {
where: {
remoteId: null
},
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
2016-12-11 14:50:51 -06:00
where: {
name: author
}
}
]
}
2017-05-22 13:58:25 -05:00
return Video.findAll(query).asCallback(callback)
}
2017-06-10 15:15:25 -05:00
load = function (id: string, callback: VideoMethods.LoadCallback) {
2017-05-22 13:58:25 -05:00
return Video.findById(id).asCallback(callback)
2016-12-11 14:50:51 -06:00
}
2017-06-10 15:15:25 -05:00
loadAndPopulateAuthor = function (id: string, callback: VideoMethods.LoadAndPopulateAuthorCallback) {
2016-12-11 14:50:51 -06:00
const options = {
2017-05-22 13:58:25 -05:00
include: [ Video['sequelize'].models.Author ]
2016-12-11 14:50:51 -06:00
}
2017-05-22 13:58:25 -05:00
return Video.findById(id, options).asCallback(callback)
2016-12-11 14:50:51 -06:00
}
2017-06-10 15:15:25 -05:00
loadAndPopulateAuthorAndPodAndTags = function (id: string, callback: VideoMethods.LoadAndPopulateAuthorAndPodAndTagsCallback) {
2016-12-11 14:50:51 -06:00
const options = {
include: [
{
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
include: [ { model: Video['sequelize'].models.Pod, required: false } ]
2016-12-24 09:59:17 -06:00
},
2017-05-22 13:58:25 -05:00
Video['sequelize'].models.Tag
2016-12-11 14:50:51 -06:00
]
}
2017-05-22 13:58:25 -05:00
return Video.findById(id, options).asCallback(callback)
}
2017-06-10 15:15:25 -05:00
searchAndPopulateAuthorAndPodAndTags = function (
value: string,
field: string,
start: number,
count: number,
sort: string,
callback: VideoMethods.SearchAndPopulateAuthorAndPodAndTagsCallback
) {
2017-05-15 15:22:03 -05:00
const podInclude: any = {
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Pod,
2016-12-24 09:59:17 -06:00
required: false
2016-12-11 14:50:51 -06:00
}
2016-12-24 09:59:17 -06:00
2017-05-15 15:22:03 -05:00
const authorInclude: any = {
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Author,
2016-12-11 14:50:51 -06:00
include: [
podInclude
]
}
2017-05-15 15:22:03 -05:00
const tagInclude: any = {
2017-05-22 13:58:25 -05:00
model: Video['sequelize'].models.Tag
2016-12-24 09:59:17 -06:00
}
2017-05-15 15:22:03 -05:00
const query: any = {
2017-05-22 13:58:25 -05:00
distinct: true,
where: createBaseVideosWhere(),
2016-12-11 14:50:51 -06:00
offset: start,
limit: count,
2017-05-22 13:58:25 -05:00
order: [ getSort(sort), [ Video['sequelize'].models.Tag, 'name', 'ASC' ] ]
2016-12-11 14:50:51 -06:00
}
// Make an exact search with the magnet
2016-11-11 08:24:36 -06:00
if (field === 'magnetUri') {
const infoHash = magnetUtil.decode(value).infoHash
2016-12-11 14:50:51 -06:00
query.where.infoHash = infoHash
2016-11-11 08:24:36 -06:00
} else if (field === 'tags') {
2017-05-22 13:58:25 -05:00
const escapedValue = Video['sequelize'].escape('%' + value + '%')
query.where.id.$in = Video['sequelize'].literal(
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
'(SELECT "VideoTags"."videoId" FROM "Tags" INNER JOIN "VideoTags" ON "Tags"."id" = "VideoTags"."tagId" WHERE name LIKE ' + escapedValue + ')'
)
2016-12-24 09:59:17 -06:00
} else if (field === 'host') {
// FIXME: Include our pod? (not stored in the database)
podInclude.where = {
host: {
$like: '%' + value + '%'
2016-12-11 14:50:51 -06:00
}
}
2016-12-24 09:59:17 -06:00
podInclude.required = true
2016-12-11 14:50:51 -06:00
} else if (field === 'author') {
2016-12-24 09:59:17 -06:00
authorInclude.where = {
name: {
2016-12-11 14:50:51 -06:00
$like: '%' + value + '%'
}
}
2016-12-24 09:59:17 -06:00
// authorInclude.or = true
} else {
2016-12-11 14:50:51 -06:00
query.where[field] = {
$like: '%' + value + '%'
}
}
2016-12-24 09:59:17 -06:00
query.include = [
authorInclude, tagInclude
]
if (tagInclude.where) {
2017-05-22 13:58:25 -05:00
// query.include.push([ Video['sequelize'].models.Tag ])
2016-12-24 09:59:17 -06:00
}
2017-05-22 13:58:25 -05:00
return Video.findAndCountAll(query).asCallback(function (err, result) {
2016-12-11 14:50:51 -06:00
if (err) return callback(err)
return callback(null, result.rows, result.count)
})
}
// ---------------------------------------------------------------------------
function createBaseVideosWhere () {
return {
id: {
2017-05-22 13:58:25 -05:00
$notIn: Video['sequelize'].literal(
'(SELECT "BlacklistedVideos"."videoId" FROM "BlacklistedVideos")'
)
}
}
}
2017-06-10 15:15:25 -05:00
function removeThumbnail (video: VideoInstance, callback: (err: Error) => void) {
2017-05-15 15:22:03 -05:00
const thumbnailPath = join(CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName())
2017-01-17 14:42:47 -06:00
fs.unlink(thumbnailPath, callback)
}
2017-06-10 15:15:25 -05:00
function removeFile (video: VideoInstance, callback: (err: Error) => void) {
2017-05-15 15:22:03 -05:00
const filePath = join(CONFIG.STORAGE.VIDEOS_DIR, video.getVideoFilename())
2017-01-17 14:42:47 -06:00
fs.unlink(filePath, callback)
}
2017-06-10 15:15:25 -05:00
function removeTorrent (video: VideoInstance, callback: (err: Error) => void) {
2017-05-15 15:22:03 -05:00
const torrenPath = join(CONFIG.STORAGE.TORRENTS_DIR, video.getTorrentName())
2017-01-17 14:42:47 -06:00
fs.unlink(torrenPath, callback)
}
2017-06-10 15:15:25 -05:00
function removePreview (video: VideoInstance, callback: (err: Error) => void) {
2016-11-11 04:52:24 -06:00
// Same name than video thumnail
2017-05-15 15:22:03 -05:00
fs.unlink(CONFIG.STORAGE.PREVIEWS_DIR + video.getPreviewName(), callback)
2016-11-11 04:52:24 -06:00
}
2017-06-10 15:15:25 -05:00
function createTorrentFromVideo (video: VideoInstance, videoPath: string, callback: (err: Error) => void) {
const options = {
announceList: [
2017-05-15 15:22:03 -05:00
[ CONFIG.WEBSERVER.WS + '://' + CONFIG.WEBSERVER.HOSTNAME + ':' + CONFIG.WEBSERVER.PORT + '/tracker/socket' ]
],
urlList: [
2017-05-15 15:22:03 -05:00
CONFIG.WEBSERVER.URL + STATIC_PATHS.WEBSEED + video.getVideoFilename()
]
}
createTorrent(videoPath, options, function (err, torrent) {
if (err) return callback(err)
2017-05-15 15:22:03 -05:00
const filePath = join(CONFIG.STORAGE.TORRENTS_DIR, video.getTorrentName())
fs.writeFile(filePath, torrent, function (err) {
if (err) return callback(err)
const parsedTorrent = parseTorrent(torrent)
video.set('infoHash', parsedTorrent.infoHash)
video.validate().asCallback(callback)
})
})
}
2017-06-10 15:15:25 -05:00
function createPreview (video: VideoInstance, videoPath: string, callback: (err: Error) => void) {
generateImage(video, videoPath, CONFIG.STORAGE.PREVIEWS_DIR, video.getPreviewName(), null, callback)
2016-11-11 04:52:24 -06:00
}
2017-06-10 15:15:25 -05:00
function createThumbnail (video: VideoInstance, videoPath: string, callback: (err: Error) => void) {
2017-05-15 15:22:03 -05:00
generateImage(video, videoPath, CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName(), THUMBNAILS_SIZE, callback)
}
2017-06-10 15:15:25 -05:00
type GenerateImageCallback = (err: Error, imageName: string) => void
function generateImage (video: VideoInstance, videoPath: string, folder: string, imageName: string, size: string, callback?: GenerateImageCallback) {
2017-05-15 15:22:03 -05:00
const options: any = {
2016-11-11 08:20:03 -06:00
filename: imageName,
count: 1,
folder
}
2017-06-10 15:15:25 -05:00
if (size) {
options.size = size
}
ffmpeg(videoPath)
.on('error', callback)
.on('end', function () {
2016-11-11 08:20:03 -06:00
callback(null, imageName)
})
.thumbnail(options)
}
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
2017-06-10 15:15:25 -05:00
function removeFromBlacklist (video: VideoInstance, callback: (err: Error) => void) {
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
// Find the blacklisted video
db.BlacklistedVideo.loadByVideoId(video.id, function (err, video) {
// If an error occured, stop here
if (err) {
logger.error('Error when fetching video from blacklist.', { error: err })
return callback(err)
}
// If we found the video, remove it from the blacklist
if (video) {
video.destroy().asCallback(callback)
} else {
// If haven't found it, simply ignore it and do nothing
2017-06-10 15:15:25 -05:00
return callback(null)
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 14:22:10 -05:00
}
})
}