PeerTube/server/initializers/installer.ts

130 lines
3.5 KiB
TypeScript
Raw Normal View History

2017-05-15 15:22:03 -05:00
import { join } from 'path'
import config = require('config')
import { each, series } from 'async'
import mkdirp = require('mkdirp')
import passwordGenerator = require('password-generator')
2017-05-22 13:58:25 -05:00
import { database as db } from './database'
2017-05-15 15:22:03 -05:00
import { USER_ROLES, CONFIG, LAST_MIGRATION_VERSION } from './constants'
import { clientsExist, usersExist } from './checker'
2017-05-22 13:58:25 -05:00
import { logger, createCertsIfNotExist, root } from '../helpers'
function installApplication (callback) {
2016-07-18 10:17:52 -05:00
series([
2016-12-11 14:50:51 -06:00
function createDatabase (callbackAsync) {
db.sequelize.sync().asCallback(callbackAsync)
// db.sequelize.sync({ force: true }).asCallback(callbackAsync)
},
function createDirectories (callbackAsync) {
createDirectoriesIfNotExist(callbackAsync)
},
function createCertificates (callbackAsync) {
2017-05-15 15:22:03 -05:00
createCertsIfNotExist(callbackAsync)
},
function createOAuthClient (callbackAsync) {
createOAuthClientIfNotExist(callbackAsync)
},
function createOAuthUser (callbackAsync) {
createOAuthAdminIfNotExist(callbackAsync)
}
], callback)
}
// ---------------------------------------------------------------------------
2017-05-15 15:22:03 -05:00
export {
installApplication
}
// ---------------------------------------------------------------------------
function createDirectoriesIfNotExist (callback) {
const storages = config.get('storage')
2016-07-18 10:17:52 -05:00
each(Object.keys(storages), function (key, callbackEach) {
const dir = storages[key]
2017-05-22 13:58:25 -05:00
mkdirp(join(root(), dir), callbackEach)
}, callback)
}
function createOAuthClientIfNotExist (callback) {
2017-05-15 15:22:03 -05:00
clientsExist(function (err, exist) {
if (err) return callback(err)
// Nothing to do, clients already exist
if (exist === true) return callback(null)
logger.info('Creating a default OAuth Client.')
2016-12-11 14:50:51 -06:00
const id = passwordGenerator(32, false, /[a-z0-9]/)
const secret = passwordGenerator(32, false, /[a-zA-Z0-9]/)
const client = db.OAuthClient.build({
clientId: id,
clientSecret: secret,
2017-05-22 13:58:25 -05:00
grants: [ 'password', 'refresh_token' ],
redirectUris: null
})
2016-12-11 14:50:51 -06:00
client.save().asCallback(function (err, createdClient) {
if (err) return callback(err)
2016-12-11 14:50:51 -06:00
logger.info('Client id: ' + createdClient.clientId)
logger.info('Client secret: ' + createdClient.clientSecret)
return callback(null)
})
})
}
function createOAuthAdminIfNotExist (callback) {
2017-05-15 15:22:03 -05:00
usersExist(function (err, exist) {
if (err) return callback(err)
// Nothing to do, users already exist
if (exist === true) return callback(null)
logger.info('Creating the administrator.')
const username = 'root'
2017-05-15 15:22:03 -05:00
const role = USER_ROLES.ADMIN
const email = CONFIG.ADMIN.EMAIL
const createOptions: { validate?: boolean } = {}
let password = ''
// Do not generate a random password for tests
if (process.env.NODE_ENV === 'test') {
password = 'test'
if (process.env.NODE_APP_INSTANCE) {
password += process.env.NODE_APP_INSTANCE
}
2016-12-28 08:49:23 -06:00
// Our password is weak so do not validate it
createOptions.validate = false
} else {
password = passwordGenerator(8, true)
}
2016-12-28 08:49:23 -06:00
const userData = {
username,
2017-02-18 02:29:59 -06:00
email,
password,
role
2016-12-28 08:49:23 -06:00
}
2016-12-28 08:49:23 -06:00
db.User.create(userData, createOptions).asCallback(function (err, createdUser) {
if (err) return callback(err)
2016-08-25 10:57:37 -05:00
logger.info('Username: ' + username)
logger.info('User password: ' + password)
2016-12-25 02:44:57 -06:00
logger.info('Creating Application table.')
2017-05-15 15:22:03 -05:00
db.Application.create({ migrationVersion: LAST_MIGRATION_VERSION }).asCallback(callback)
})
})
}