PeerTube/server/models/video.js

785 lines
20 KiB
JavaScript
Raw Normal View History

'use strict'
const Buffer = require('safe-buffer').Buffer
const createTorrent = require('create-torrent')
const ffmpeg = require('fluent-ffmpeg')
const fs = require('fs')
2016-11-11 17:20:03 +03:00
const magnetUtil = require('magnet-uri')
2016-12-24 18:59:17 +03:00
const map = require('lodash/map')
2016-07-18 18:17:52 +03:00
const parallel = require('async/parallel')
const parseTorrent = require('parse-torrent')
const pathUtils = require('path')
2016-12-28 17:49:23 +03:00
const values = require('lodash/values')
const constants = require('../initializers/constants')
const logger = require('../helpers/logger')
const friends = require('../lib/friends')
const modelUtils = require('./utils')
2016-12-28 17:49:23 +03:00
const customVideosValidators = require('../helpers/custom-validators').videos
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 22:22:10 +03:00
const db = require('../initializers/database')
// ---------------------------------------------------------------------------
2016-12-11 23:50:51 +03:00
module.exports = function (sequelize, DataTypes) {
const Video = sequelize.define('Video',
{
id: {
type: DataTypes.UUID,
defaultValue: DataTypes.UUIDV4,
2016-12-28 17:49:23 +03:00
primaryKey: true,
validate: {
isUUID: 4
}
},
2016-12-11 23:50:51 +03:00
name: {
2016-12-28 17:49:23 +03:00
type: DataTypes.STRING,
allowNull: false,
validate: {
nameValid: function (value) {
const res = customVideosValidators.isVideoNameValid(value)
if (res === false) throw new Error('Video name is not valid.')
}
}
2016-11-11 13:52:24 +03:00
},
2016-12-11 23:50:51 +03:00
extname: {
2016-12-28 17:49:23 +03:00
type: DataTypes.ENUM(values(constants.CONSTRAINTS_FIELDS.VIDEOS.EXTNAME)),
allowNull: false
2016-12-11 23:50:51 +03:00
},
remoteId: {
2016-12-28 17:49:23 +03:00
type: DataTypes.UUID,
allowNull: true,
validate: {
isUUID: 4
}
2016-12-11 23:50:51 +03:00
},
2017-03-22 23:15:55 +03:00
category: {
type: DataTypes.INTEGER,
allowNull: false,
validate: {
categoryValid: function (value) {
const res = customVideosValidators.isVideoCategoryValid(value)
if (res === false) throw new Error('Video category is not valid.')
}
}
},
2017-03-27 21:53:11 +03:00
licence: {
type: DataTypes.INTEGER,
allowNull: false,
2017-04-07 13:13:37 +03:00
defaultValue: null,
2017-03-27 21:53:11 +03:00
validate: {
licenceValid: function (value) {
const res = customVideosValidators.isVideoLicenceValid(value)
if (res === false) throw new Error('Video licence is not valid.')
}
}
},
2017-04-07 13:13:37 +03:00
language: {
type: DataTypes.INTEGER,
allowNull: true,
validate: {
languageValid: function (value) {
const res = customVideosValidators.isVideoLanguageValid(value)
if (res === false) throw new Error('Video language is not valid.')
}
}
},
2017-03-28 22:19:46 +03:00
nsfw: {
type: DataTypes.BOOLEAN,
allowNull: false,
validate: {
nsfwValid: function (value) {
const res = customVideosValidators.isVideoNSFWValid(value)
if (res === false) throw new Error('Video nsfw attribute is not valid.')
}
}
},
2016-12-11 23:50:51 +03:00
description: {
2016-12-28 17:49:23 +03:00
type: DataTypes.STRING,
allowNull: false,
validate: {
descriptionValid: function (value) {
const res = customVideosValidators.isVideoDescriptionValid(value)
if (res === false) throw new Error('Video description is not valid.')
}
}
2016-12-11 23:50:51 +03:00
},
infoHash: {
2016-12-28 17:49:23 +03:00
type: DataTypes.STRING,
allowNull: false,
validate: {
infoHashValid: function (value) {
const res = customVideosValidators.isVideoInfoHashValid(value)
if (res === false) throw new Error('Video info hash is not valid.')
}
}
2016-12-11 23:50:51 +03:00
},
duration: {
2016-12-28 17:49:23 +03:00
type: DataTypes.INTEGER,
allowNull: false,
validate: {
durationValid: function (value) {
const res = customVideosValidators.isVideoDurationValid(value)
if (res === false) throw new Error('Video duration is not valid.')
}
}
},
views: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
2017-03-08 23:35:43 +03:00
},
likes: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
},
dislikes: {
type: DataTypes.INTEGER,
allowNull: false,
defaultValue: 0,
validate: {
min: 0,
isInt: true
}
}
2016-12-11 23:50:51 +03:00
},
{
2016-12-29 11:33:28 +03:00
indexes: [
{
fields: [ 'authorId' ]
},
{
fields: [ 'remoteId' ]
},
{
fields: [ 'name' ]
},
{
fields: [ 'createdAt' ]
},
{
fields: [ 'duration' ]
},
{
fields: [ 'infoHash' ]
},
{
fields: [ 'views' ]
2017-03-08 23:35:43 +03:00
},
{
fields: [ 'likes' ]
2016-12-29 11:33:28 +03:00
}
],
2016-12-11 23:50:51 +03:00
classMethods: {
associate,
generateThumbnailFromData,
2016-12-11 23:50:51 +03:00
getDurationFromFile,
2016-12-25 11:44:57 +03:00
list,
2016-12-11 23:50:51 +03:00
listForApi,
2016-12-24 18:59:17 +03:00
listOwnedAndPopulateAuthorAndTags,
2016-12-11 23:50:51 +03:00
listOwnedByAuthor,
load,
loadByHostAndRemoteId,
2016-12-11 23:50:51 +03:00
loadAndPopulateAuthor,
2016-12-24 18:59:17 +03:00
loadAndPopulateAuthorAndPodAndTags,
searchAndPopulateAuthorAndPodAndTags
2016-12-11 23:50:51 +03:00
},
instanceMethods: {
generateMagnetUri,
getVideoFilename,
getThumbnailName,
getPreviewName,
getTorrentName,
isOwned,
toFormatedJSON,
2016-12-29 21:07:05 +03:00
toAddRemoteJSON,
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 22:22:10 +03:00
toUpdateRemoteJSON,
removeFromBlacklist
2016-12-11 23:50:51 +03:00
},
hooks: {
2016-12-28 17:49:23 +03:00
beforeValidate,
2016-12-11 23:50:51 +03:00
beforeCreate,
afterDestroy
}
}
)
2016-12-11 23:50:51 +03:00
return Video
}
2016-12-28 17:49:23 +03:00
function beforeValidate (video, options, next) {
// Put a fake infoHash if it does not exists yet
if (video.isOwned() && !video.infoHash) {
2016-12-28 17:49:23 +03:00
// 40 hexa length
video.infoHash = '0123456789abcdef0123456789abcdef01234567'
}
return next(null)
}
2016-12-11 23:50:51 +03:00
function beforeCreate (video, options, next) {
const tasks = []
if (video.isOwned()) {
2016-11-11 17:20:03 +03:00
const videoPath = pathUtils.join(constants.CONFIG.STORAGE.VIDEOS_DIR, video.getVideoFilename())
tasks.push(
2017-01-17 23:42:47 +03:00
function createVideoTorrent (callback) {
2016-10-17 22:10:29 +03:00
const options = {
announceList: [
[ constants.CONFIG.WEBSERVER.WS + '://' + constants.CONFIG.WEBSERVER.HOSTNAME + ':' + constants.CONFIG.WEBSERVER.PORT + '/tracker/socket' ]
2016-10-17 22:10:29 +03:00
],
urlList: [
2016-11-11 17:20:03 +03:00
constants.CONFIG.WEBSERVER.URL + constants.STATIC_PATHS.WEBSEED + video.getVideoFilename()
2016-10-17 22:10:29 +03:00
]
}
createTorrent(videoPath, options, function (err, torrent) {
if (err) return callback(err)
2017-01-17 23:42:47 +03:00
const filePath = pathUtils.join(constants.CONFIG.STORAGE.TORRENTS_DIR, video.getTorrentName())
fs.writeFile(filePath, torrent, function (err) {
if (err) return callback(err)
const parsedTorrent = parseTorrent(torrent)
2016-12-28 17:49:23 +03:00
video.set('infoHash', parsedTorrent.infoHash)
video.validate().asCallback(callback)
})
})
},
2017-01-17 23:42:47 +03:00
function createVideoThumbnail (callback) {
createThumbnail(video, videoPath, callback)
2016-11-11 13:52:24 +03:00
},
2017-01-17 23:42:47 +03:00
function createVIdeoPreview (callback) {
createPreview(video, videoPath, callback)
}
)
2016-11-16 23:16:41 +03:00
return parallel(tasks, next)
}
2016-11-16 23:16:41 +03:00
return next()
2016-12-11 23:50:51 +03:00
}
2016-12-11 23:50:51 +03:00
function afterDestroy (video, options, next) {
const tasks = []
tasks.push(
function (callback) {
removeThumbnail(video, callback)
}
)
if (video.isOwned()) {
tasks.push(
2017-01-17 23:42:47 +03:00
function removeVideoFile (callback) {
2016-12-11 23:50:51 +03:00
removeFile(video, callback)
},
2017-01-17 23:42:47 +03:00
function removeVideoTorrent (callback) {
2016-12-11 23:50:51 +03:00
removeTorrent(video, callback)
},
2017-01-17 23:42:47 +03:00
function removeVideoPreview (callback) {
2016-12-11 23:50:51 +03:00
removePreview(video, callback)
},
2017-01-17 23:42:47 +03:00
function removeVideoToFriends (callback) {
const params = {
remoteId: video.id
}
friends.removeVideoToFriends(params)
return callback()
2016-12-11 23:50:51 +03:00
}
)
}
parallel(tasks, next)
}
// ------------------------------ METHODS ------------------------------
2016-12-11 23:50:51 +03:00
function associate (models) {
this.belongsTo(models.Author, {
foreignKey: {
name: 'authorId',
allowNull: false
},
onDelete: 'cascade'
})
2016-12-24 18:59:17 +03:00
this.belongsToMany(models.Tag, {
foreignKey: 'videoId',
through: models.VideoTag,
onDelete: 'cascade'
})
2017-01-04 22:59:23 +03:00
this.hasMany(models.VideoAbuse, {
foreignKey: {
name: 'videoId',
allowNull: false
},
onDelete: 'cascade'
})
2016-12-11 23:50:51 +03:00
}
2016-11-11 17:20:03 +03:00
function generateMagnetUri () {
let baseUrlHttp, baseUrlWs
if (this.isOwned()) {
baseUrlHttp = constants.CONFIG.WEBSERVER.URL
baseUrlWs = constants.CONFIG.WEBSERVER.WS + '://' + constants.CONFIG.WEBSERVER.HOSTNAME + ':' + constants.CONFIG.WEBSERVER.PORT
} else {
2016-12-11 23:50:51 +03:00
baseUrlHttp = constants.REMOTE_SCHEME.HTTP + '://' + this.Author.Pod.host
baseUrlWs = constants.REMOTE_SCHEME.WS + '://' + this.Author.Pod.host
2016-11-11 17:20:03 +03:00
}
const xs = baseUrlHttp + constants.STATIC_PATHS.TORRENTS + this.getTorrentName()
const announce = baseUrlWs + '/tracker/socket'
const urlList = [ baseUrlHttp + constants.STATIC_PATHS.WEBSEED + this.getVideoFilename() ]
const magnetHash = {
xs,
announce,
urlList,
2016-12-11 23:50:51 +03:00
infoHash: this.infoHash,
2016-11-11 17:20:03 +03:00
name: this.name
}
return magnetUtil.encode(magnetHash)
}
2016-11-11 17:20:03 +03:00
function getVideoFilename () {
2016-12-11 23:50:51 +03:00
if (this.isOwned()) return this.id + this.extname
2016-11-11 17:20:03 +03:00
return this.remoteId + this.extname
}
function getThumbnailName () {
// We always have a copy of the thumbnail
2016-12-11 23:50:51 +03:00
return this.id + '.jpg'
}
2016-11-11 17:20:03 +03:00
function getPreviewName () {
const extension = '.jpg'
2016-12-11 23:50:51 +03:00
if (this.isOwned()) return this.id + extension
2016-11-11 17:20:03 +03:00
return this.remoteId + extension
}
function getTorrentName () {
2016-11-11 17:20:03 +03:00
const extension = '.torrent'
2016-12-11 23:50:51 +03:00
if (this.isOwned()) return this.id + extension
2016-11-11 17:20:03 +03:00
return this.remoteId + extension
}
function isOwned () {
return this.remoteId === null
}
function toFormatedJSON () {
2016-12-11 23:50:51 +03:00
let podHost
if (this.Author.Pod) {
podHost = this.Author.Pod.host
} else {
// It means it's our video
podHost = constants.CONFIG.WEBSERVER.HOST
}
2017-03-22 23:15:55 +03:00
// Maybe our pod is not up to date and there are new categories since our version
let categoryLabel = constants.VIDEO_CATEGORIES[this.category]
if (!categoryLabel) categoryLabel = 'Misc'
2017-03-27 21:53:11 +03:00
// Maybe our pod is not up to date and there are new licences since our version
let licenceLabel = constants.VIDEO_LICENCES[this.licence]
if (!licenceLabel) licenceLabel = 'Unknown'
2017-04-07 13:13:37 +03:00
// Language is an optional attribute
let languageLabel = constants.VIDEO_LANGUAGES[this.language]
if (!languageLabel) languageLabel = 'Unknown'
const json = {
2016-12-11 23:50:51 +03:00
id: this.id,
name: this.name,
2017-03-22 23:15:55 +03:00
category: this.category,
categoryLabel,
2017-03-27 21:53:11 +03:00
licence: this.licence,
licenceLabel,
2017-04-07 13:13:37 +03:00
language: this.language,
languageLabel,
2017-03-28 22:19:46 +03:00
nsfw: this.nsfw,
description: this.description,
2016-12-11 23:50:51 +03:00
podHost,
isLocal: this.isOwned(),
2016-11-11 17:20:03 +03:00
magnetUri: this.generateMagnetUri(),
2016-12-11 23:50:51 +03:00
author: this.Author.name,
duration: this.duration,
views: this.views,
2017-03-08 23:35:43 +03:00
likes: this.likes,
dislikes: this.dislikes,
2016-12-24 18:59:17 +03:00
tags: map(this.Tags, 'name'),
2017-01-12 15:08:47 +03:00
thumbnailPath: pathUtils.join(constants.STATIC_PATHS.THUMBNAILS, this.getThumbnailName()),
createdAt: this.createdAt,
updatedAt: this.updatedAt
}
return json
}
2016-12-29 21:07:05 +03:00
function toAddRemoteJSON (callback) {
const self = this
// Get thumbnail data to send to the other pod
2016-11-11 17:20:03 +03:00
const thumbnailPath = pathUtils.join(constants.CONFIG.STORAGE.THUMBNAILS_DIR, this.getThumbnailName())
fs.readFile(thumbnailPath, function (err, thumbnailData) {
if (err) {
logger.error('Cannot read the thumbnail of the video')
return callback(err)
}
const remoteVideo = {
name: self.name,
2017-03-22 23:15:55 +03:00
category: self.category,
2017-03-27 21:53:11 +03:00
licence: self.licence,
2017-04-07 13:13:37 +03:00
language: self.language,
2017-03-28 22:19:46 +03:00
nsfw: self.nsfw,
description: self.description,
2016-12-11 23:50:51 +03:00
infoHash: self.infoHash,
remoteId: self.id,
author: self.Author.name,
duration: self.duration,
thumbnailData: thumbnailData.toString('binary'),
2016-12-24 18:59:17 +03:00
tags: map(self.Tags, 'name'),
2016-12-11 23:50:51 +03:00
createdAt: self.createdAt,
updatedAt: self.updatedAt,
extname: self.extname,
2017-03-08 23:35:43 +03:00
views: self.views,
likes: self.likes,
dislikes: self.dislikes
}
return callback(null, remoteVideo)
})
}
2016-12-29 21:07:05 +03:00
function toUpdateRemoteJSON (callback) {
const json = {
name: this.name,
2017-03-22 23:15:55 +03:00
category: this.category,
2017-03-27 21:53:11 +03:00
licence: this.licence,
2017-04-07 13:13:37 +03:00
language: this.language,
2017-03-28 22:19:46 +03:00
nsfw: this.nsfw,
2016-12-29 21:07:05 +03:00
description: this.description,
infoHash: this.infoHash,
remoteId: this.id,
author: this.Author.name,
duration: this.duration,
tags: map(this.Tags, 'name'),
createdAt: this.createdAt,
updatedAt: this.updatedAt,
extname: this.extname,
2017-03-08 23:35:43 +03:00
views: this.views,
likes: this.likes,
dislikes: this.dislikes
2016-12-29 21:07:05 +03:00
}
return json
}
// ------------------------------ STATICS ------------------------------
function generateThumbnailFromData (video, thumbnailData, callback) {
2016-11-16 23:16:41 +03:00
// Creating the thumbnail for a remote video
const thumbnailName = video.getThumbnailName()
2017-01-17 23:42:47 +03:00
const thumbnailPath = pathUtils.join(constants.CONFIG.STORAGE.THUMBNAILS_DIR, thumbnailName)
fs.writeFile(thumbnailPath, Buffer.from(thumbnailData, 'binary'), function (err) {
2016-11-16 23:16:41 +03:00
if (err) return callback(err)
return callback(null, thumbnailName)
})
}
function getDurationFromFile (videoPath, callback) {
ffmpeg.ffprobe(videoPath, function (err, metadata) {
if (err) return callback(err)
return callback(null, Math.floor(metadata.format.duration))
})
}
2016-12-25 11:44:57 +03:00
function list (callback) {
2017-02-08 22:34:01 +03:00
return this.findAll().asCallback(callback)
2016-12-25 11:44:57 +03:00
}
function listForApi (start, count, sort, callback) {
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 22:22:10 +03:00
// Exclude Blakclisted videos from the list
2016-12-11 23:50:51 +03:00
const query = {
offset: start,
limit: count,
2016-12-24 18:59:17 +03:00
distinct: true, // For the count, a video can have many tags
order: [ modelUtils.getSort(sort), [ this.sequelize.models.Tag, 'name', 'ASC' ] ],
2016-12-11 23:50:51 +03:00
include: [
{
model: this.sequelize.models.Author,
2016-12-24 18:59:17 +03:00
include: [ { model: this.sequelize.models.Pod, required: false } ]
},
this.sequelize.models.Tag
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 22:22:10 +03:00
],
where: {
id: { $notIn: this.sequelize.literal(
'(SELECT "BlacklistedVideos"."videoId" FROM "BlacklistedVideos")'
)}
}
2016-12-11 23:50:51 +03:00
}
return this.findAndCountAll(query).asCallback(function (err, result) {
if (err) return callback(err)
return callback(null, result.rows, result.count)
})
}
function loadByHostAndRemoteId (fromHost, remoteId, callback) {
2016-12-11 23:50:51 +03:00
const query = {
where: {
remoteId: remoteId
},
include: [
{
model: this.sequelize.models.Author,
include: [
{
model: this.sequelize.models.Pod,
2016-12-24 18:59:17 +03:00
required: true,
2016-12-11 23:50:51 +03:00
where: {
host: fromHost
}
}
]
}
]
}
return this.findOne(query).asCallback(callback)
}
2016-12-24 18:59:17 +03:00
function listOwnedAndPopulateAuthorAndTags (callback) {
// If remoteId is null this is *our* video
2016-12-11 23:50:51 +03:00
const query = {
where: {
remoteId: null
},
2016-12-24 18:59:17 +03:00
include: [ this.sequelize.models.Author, this.sequelize.models.Tag ]
2016-12-11 23:50:51 +03:00
}
return this.findAll(query).asCallback(callback)
}
function listOwnedByAuthor (author, callback) {
2016-12-11 23:50:51 +03:00
const query = {
where: {
remoteId: null
},
include: [
{
model: this.sequelize.models.Author,
where: {
name: author
}
}
]
}
2016-12-11 23:50:51 +03:00
return this.findAll(query).asCallback(callback)
}
function load (id, callback) {
2016-12-11 23:50:51 +03:00
return this.findById(id).asCallback(callback)
}
function loadAndPopulateAuthor (id, callback) {
const options = {
include: [ this.sequelize.models.Author ]
}
return this.findById(id, options).asCallback(callback)
}
2016-12-24 18:59:17 +03:00
function loadAndPopulateAuthorAndPodAndTags (id, callback) {
2016-12-11 23:50:51 +03:00
const options = {
include: [
{
model: this.sequelize.models.Author,
2016-12-24 18:59:17 +03:00
include: [ { model: this.sequelize.models.Pod, required: false } ]
},
this.sequelize.models.Tag
2016-12-11 23:50:51 +03:00
]
}
return this.findById(id, options).asCallback(callback)
}
2016-12-24 18:59:17 +03:00
function searchAndPopulateAuthorAndPodAndTags (value, field, start, count, sort, callback) {
2016-12-11 23:50:51 +03:00
const podInclude = {
2016-12-24 18:59:17 +03:00
model: this.sequelize.models.Pod,
required: false
2016-12-11 23:50:51 +03:00
}
2016-12-24 18:59:17 +03:00
2016-12-11 23:50:51 +03:00
const authorInclude = {
model: this.sequelize.models.Author,
include: [
podInclude
]
}
2016-12-24 18:59:17 +03:00
const tagInclude = {
model: this.sequelize.models.Tag
}
2016-12-11 23:50:51 +03:00
const query = {
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 22:22:10 +03:00
where: {
id: { $notIn: this.sequelize.literal(
'(SELECT "BlacklistedVideos"."videoId" FROM "BlacklistedVideos")'
)}
},
2016-12-11 23:50:51 +03:00
offset: start,
limit: count,
2016-12-24 18:59:17 +03:00
distinct: true, // For the count, a video can have many tags
order: [ modelUtils.getSort(sort), [ this.sequelize.models.Tag, 'name', 'ASC' ] ]
2016-12-11 23:50:51 +03:00
}
// Make an exact search with the magnet
2016-11-11 17:24:36 +03:00
if (field === 'magnetUri') {
const infoHash = magnetUtil.decode(value).infoHash
2016-12-11 23:50:51 +03:00
query.where.infoHash = infoHash
2016-11-11 17:24:36 +03:00
} else if (field === 'tags') {
2016-12-24 18:59:17 +03:00
const escapedValue = this.sequelize.escape('%' + value + '%')
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 22:22:10 +03:00
query.where.id.$in = this.sequelize.literal(
'(SELECT "VideoTags"."videoId" FROM "Tags" INNER JOIN "VideoTags" ON "Tags"."id" = "VideoTags"."tagId" WHERE name LIKE ' + escapedValue + ')'
)
2016-12-24 18:59:17 +03:00
} else if (field === 'host') {
// FIXME: Include our pod? (not stored in the database)
podInclude.where = {
host: {
$like: '%' + value + '%'
2016-12-11 23:50:51 +03:00
}
}
2016-12-24 18:59:17 +03:00
podInclude.required = true
2016-12-11 23:50:51 +03:00
} else if (field === 'author') {
2016-12-24 18:59:17 +03:00
authorInclude.where = {
name: {
2016-12-11 23:50:51 +03:00
$like: '%' + value + '%'
}
}
2016-12-24 18:59:17 +03:00
// authorInclude.or = true
} else {
2016-12-11 23:50:51 +03:00
query.where[field] = {
$like: '%' + value + '%'
}
}
2016-12-24 18:59:17 +03:00
query.include = [
authorInclude, tagInclude
]
if (tagInclude.where) {
// query.include.push([ this.sequelize.models.Tag ])
}
2016-12-11 23:50:51 +03:00
return this.findAndCountAll(query).asCallback(function (err, result) {
if (err) return callback(err)
return callback(null, result.rows, result.count)
})
}
// ---------------------------------------------------------------------------
function removeThumbnail (video, callback) {
2017-01-17 23:42:47 +03:00
const thumbnailPath = pathUtils.join(constants.CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName())
fs.unlink(thumbnailPath, callback)
}
function removeFile (video, callback) {
2017-01-17 23:42:47 +03:00
const filePath = pathUtils.join(constants.CONFIG.STORAGE.VIDEOS_DIR, video.getVideoFilename())
fs.unlink(filePath, callback)
}
function removeTorrent (video, callback) {
2017-01-17 23:42:47 +03:00
const torrenPath = pathUtils.join(constants.CONFIG.STORAGE.TORRENTS_DIR, video.getTorrentName())
fs.unlink(torrenPath, callback)
}
2016-11-11 13:52:24 +03:00
function removePreview (video, callback) {
// Same name than video thumnail
2016-11-11 17:20:03 +03:00
fs.unlink(constants.CONFIG.STORAGE.PREVIEWS_DIR + video.getPreviewName(), callback)
2016-11-11 13:52:24 +03:00
}
function createPreview (video, videoPath, callback) {
2016-11-11 17:20:03 +03:00
generateImage(video, videoPath, constants.CONFIG.STORAGE.PREVIEWS_DIR, video.getPreviewName(), callback)
2016-11-11 13:52:24 +03:00
}
function createThumbnail (video, videoPath, callback) {
2016-11-11 17:20:03 +03:00
generateImage(video, videoPath, constants.CONFIG.STORAGE.THUMBNAILS_DIR, video.getThumbnailName(), constants.THUMBNAILS_SIZE, callback)
}
2016-11-11 17:20:03 +03:00
function generateImage (video, videoPath, folder, imageName, size, callback) {
const options = {
2016-11-11 17:20:03 +03:00
filename: imageName,
count: 1,
folder
}
if (!callback) {
callback = size
} else {
options.size = size
}
ffmpeg(videoPath)
.on('error', callback)
.on('end', function () {
2016-11-11 17:20:03 +03:00
callback(null, imageName)
})
.thumbnail(options)
}
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 22:22:10 +03:00
function removeFromBlacklist (video, callback) {
// Find the blacklisted video
db.BlacklistedVideo.loadByVideoId(video.id, function (err, video) {
// If an error occured, stop here
if (err) {
logger.error('Error when fetching video from blacklist.', { error: err })
return callback(err)
}
// If we found the video, remove it from the blacklist
if (video) {
video.destroy().asCallback(callback)
} else {
// If haven't found it, simply ignore it and do nothing
return callback()
}
})
}