2022-05-03 08:18:48 +02:00
|
|
|
import { ensureDir, readdir, remove } from 'fs-extra'
|
2021-08-27 14:32:44 +02:00
|
|
|
import passwordGenerator from 'password-generator'
|
2022-05-03 08:23:59 +02:00
|
|
|
import { join } from 'path'
|
2022-08-03 15:08:36 +02:00
|
|
|
import { isTestOrDevInstance } from '@server/helpers/core-utils'
|
2023-04-21 14:55:10 +02:00
|
|
|
import { generateRunnerRegistrationToken } from '@server/helpers/token-generator'
|
2022-08-03 15:08:36 +02:00
|
|
|
import { getNodeABIVersion } from '@server/helpers/version'
|
2023-04-21 14:55:10 +02:00
|
|
|
import { RunnerRegistrationTokenModel } from '@server/models/runner/runner-registration-token'
|
2021-12-24 10:14:47 +01:00
|
|
|
import { UserRole } from '@shared/models'
|
2017-12-28 11:16:08 +01:00
|
|
|
import { logger } from '../helpers/logger'
|
2022-03-04 10:57:36 +01:00
|
|
|
import { buildUser, createApplicationActor, createUserAccountAndChannelAndPlaylist } from '../lib/user'
|
2017-12-12 17:53:50 +01:00
|
|
|
import { ApplicationModel } from '../models/application/application'
|
|
|
|
import { OAuthClientModel } from '../models/oauth/oauth-client'
|
2018-09-24 13:07:33 +02:00
|
|
|
import { applicationExist, clientsExist, usersExist } from './checker-after-init'
|
2021-08-27 14:32:44 +02:00
|
|
|
import { CONFIG } from './config'
|
2022-10-12 16:09:02 +02:00
|
|
|
import { DIRECTORIES, FILES_CACHE, LAST_MIGRATION_VERSION } from './constants'
|
2017-12-12 17:53:50 +01:00
|
|
|
import { sequelizeTypescript } from './database'
|
2017-07-05 13:26:25 +02:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
async function installApplication () {
|
2017-11-14 10:57:56 +01:00
|
|
|
try {
|
2018-11-19 15:21:09 +01:00
|
|
|
await Promise.all([
|
|
|
|
// Database related
|
|
|
|
sequelizeTypescript.sync()
|
|
|
|
.then(() => {
|
|
|
|
return Promise.all([
|
|
|
|
createApplicationIfNotExist(),
|
|
|
|
createOAuthClientIfNotExist(),
|
2023-04-21 14:55:10 +02:00
|
|
|
createOAuthAdminIfNotExist(),
|
|
|
|
createRunnerRegistrationTokenIfNotExist()
|
2018-11-19 15:21:09 +01:00
|
|
|
])
|
|
|
|
}),
|
|
|
|
|
|
|
|
// Directories
|
2019-03-19 10:53:53 +01:00
|
|
|
removeCacheAndTmpDirectories()
|
2018-11-19 15:21:09 +01:00
|
|
|
.then(() => createDirectoriesIfNotExist())
|
|
|
|
])
|
2017-11-14 10:57:56 +01:00
|
|
|
} catch (err) {
|
2018-03-26 15:54:13 +02:00
|
|
|
logger.error('Cannot install application.', { err })
|
2018-01-10 17:18:12 +01:00
|
|
|
process.exit(-1)
|
2017-11-14 10:57:56 +01:00
|
|
|
}
|
2016-03-21 21:11:26 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
|
2017-05-15 22:22:03 +02:00
|
|
|
export {
|
|
|
|
installApplication
|
|
|
|
}
|
2016-03-21 21:11:26 +01:00
|
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
|
2019-03-19 10:53:53 +01:00
|
|
|
function removeCacheAndTmpDirectories () {
|
2019-03-19 14:23:17 +01:00
|
|
|
const cacheDirectories = Object.keys(FILES_CACHE)
|
|
|
|
.map(k => FILES_CACHE[k].DIRECTORY)
|
2017-07-12 11:56:02 +02:00
|
|
|
|
2017-11-10 17:27:49 +01:00
|
|
|
const tasks: Promise<any>[] = []
|
2017-07-12 11:56:02 +02:00
|
|
|
|
|
|
|
// Cache directories
|
2022-12-30 10:12:20 +01:00
|
|
|
for (const dir of cacheDirectories) {
|
2022-05-03 08:18:48 +02:00
|
|
|
tasks.push(removeDirectoryOrContent(dir))
|
2017-10-25 16:03:33 +02:00
|
|
|
}
|
2017-07-12 11:56:02 +02:00
|
|
|
|
2022-05-03 08:18:48 +02:00
|
|
|
tasks.push(removeDirectoryOrContent(CONFIG.STORAGE.TMP_DIR))
|
2019-03-19 10:53:53 +01:00
|
|
|
|
2017-07-12 11:56:02 +02:00
|
|
|
return Promise.all(tasks)
|
|
|
|
}
|
|
|
|
|
2022-05-03 08:18:48 +02:00
|
|
|
async function removeDirectoryOrContent (dir: string) {
|
|
|
|
try {
|
|
|
|
await remove(dir)
|
|
|
|
} catch (err) {
|
|
|
|
logger.debug('Cannot remove directory %s. Removing content instead.', dir, { err })
|
|
|
|
|
|
|
|
const files = await readdir(dir)
|
|
|
|
|
|
|
|
for (const file of files) {
|
2022-05-03 08:23:59 +02:00
|
|
|
await remove(join(dir, file))
|
2022-05-03 08:18:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-05 13:26:25 +02:00
|
|
|
function createDirectoriesIfNotExist () {
|
2017-09-04 20:07:54 +02:00
|
|
|
const storage = CONFIG.STORAGE
|
2019-03-19 14:23:17 +01:00
|
|
|
const cacheDirectories = Object.keys(FILES_CACHE)
|
|
|
|
.map(k => FILES_CACHE[k].DIRECTORY)
|
2016-03-21 21:11:26 +01:00
|
|
|
|
2018-08-27 16:23:34 +02:00
|
|
|
const tasks: Promise<void>[] = []
|
2017-10-25 16:03:33 +02:00
|
|
|
for (const key of Object.keys(storage)) {
|
2017-09-04 20:07:54 +02:00
|
|
|
const dir = storage[key]
|
2018-08-27 16:23:34 +02:00
|
|
|
tasks.push(ensureDir(dir))
|
2017-10-25 16:03:33 +02:00
|
|
|
}
|
2017-07-12 11:56:02 +02:00
|
|
|
|
|
|
|
// Cache directories
|
2022-12-30 10:12:20 +01:00
|
|
|
for (const dir of cacheDirectories) {
|
2018-08-27 16:23:34 +02:00
|
|
|
tasks.push(ensureDir(dir))
|
2017-10-25 16:03:33 +02:00
|
|
|
}
|
2016-03-21 21:11:26 +01:00
|
|
|
|
2022-10-12 16:09:02 +02:00
|
|
|
tasks.push(ensureDir(DIRECTORIES.HLS_STREAMING_PLAYLIST.PRIVATE))
|
|
|
|
tasks.push(ensureDir(DIRECTORIES.HLS_STREAMING_PLAYLIST.PUBLIC))
|
|
|
|
tasks.push(ensureDir(DIRECTORIES.VIDEOS.PUBLIC))
|
|
|
|
tasks.push(ensureDir(DIRECTORIES.VIDEOS.PRIVATE))
|
2019-01-29 08:37:25 +01:00
|
|
|
|
2021-05-10 11:13:41 +02:00
|
|
|
// Resumable upload directory
|
2022-10-12 16:09:02 +02:00
|
|
|
tasks.push(ensureDir(DIRECTORIES.RESUMABLE_UPLOAD))
|
2021-05-10 11:13:41 +02:00
|
|
|
|
2017-07-05 13:26:25 +02:00
|
|
|
return Promise.all(tasks)
|
|
|
|
}
|
2016-03-21 21:11:26 +01:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
async function createOAuthClientIfNotExist () {
|
2017-12-12 17:53:50 +01:00
|
|
|
const exist = await clientsExist()
|
2017-10-25 16:03:33 +02:00
|
|
|
// Nothing to do, clients already exist
|
|
|
|
if (exist === true) return undefined
|
2016-07-01 16:03:53 +02:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
logger.info('Creating a default OAuth Client.')
|
2016-03-21 21:11:26 +01:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
const id = passwordGenerator(32, false, /[a-z0-9]/)
|
|
|
|
const secret = passwordGenerator(32, false, /[a-zA-Z0-9]/)
|
2017-12-12 17:53:50 +01:00
|
|
|
const client = new OAuthClientModel({
|
2017-10-25 16:03:33 +02:00
|
|
|
clientId: id,
|
|
|
|
clientSecret: secret,
|
|
|
|
grants: [ 'password', 'refresh_token' ],
|
|
|
|
redirectUris: null
|
2016-03-21 21:11:26 +01:00
|
|
|
})
|
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
const createdClient = await client.save()
|
|
|
|
logger.info('Client id: ' + createdClient.clientId)
|
|
|
|
logger.info('Client secret: ' + createdClient.clientSecret)
|
2016-03-21 21:11:26 +01:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
return undefined
|
|
|
|
}
|
2016-03-21 21:11:26 +01:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
async function createOAuthAdminIfNotExist () {
|
2017-12-12 17:53:50 +01:00
|
|
|
const exist = await usersExist()
|
2017-10-25 16:03:33 +02:00
|
|
|
// Nothing to do, users already exist
|
|
|
|
if (exist === true) return undefined
|
2016-06-30 21:58:48 +02:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
logger.info('Creating the administrator.')
|
2016-06-30 21:58:48 +02:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
const username = 'root'
|
2017-10-27 16:55:03 +02:00
|
|
|
const role = UserRole.ADMINISTRATOR
|
2017-10-25 16:03:33 +02:00
|
|
|
const email = CONFIG.ADMIN.EMAIL
|
|
|
|
let validatePassword = true
|
|
|
|
let password = ''
|
2016-12-28 15:49:23 +01:00
|
|
|
|
2022-07-26 09:31:26 +02:00
|
|
|
// Do not generate a random password for test and dev environments
|
|
|
|
if (isTestOrDevInstance()) {
|
2017-10-25 16:03:33 +02:00
|
|
|
password = 'test'
|
2016-03-21 21:11:26 +01:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
if (process.env.NODE_APP_INSTANCE) {
|
|
|
|
password += process.env.NODE_APP_INSTANCE
|
2016-12-28 15:49:23 +01:00
|
|
|
}
|
2016-07-01 16:03:53 +02:00
|
|
|
|
2017-10-25 16:03:33 +02:00
|
|
|
// Our password is weak so do not validate it
|
|
|
|
validatePassword = false
|
2019-05-15 00:18:48 +02:00
|
|
|
} else if (process.env.PT_INITIAL_ROOT_PASSWORD) {
|
|
|
|
password = process.env.PT_INITIAL_ROOT_PASSWORD
|
2017-10-25 16:03:33 +02:00
|
|
|
} else {
|
2018-03-29 10:58:24 +02:00
|
|
|
password = passwordGenerator(16, true)
|
2017-10-25 16:03:33 +02:00
|
|
|
}
|
|
|
|
|
2022-03-04 10:57:36 +01:00
|
|
|
const user = buildUser({
|
2017-10-25 16:03:33 +02:00
|
|
|
username,
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
role,
|
2022-03-04 10:57:36 +01:00
|
|
|
emailVerified: true,
|
2018-08-28 09:01:35 +02:00
|
|
|
videoQuota: -1,
|
|
|
|
videoQuotaDaily: -1
|
2022-03-04 10:57:36 +01:00
|
|
|
})
|
2017-10-25 16:03:33 +02:00
|
|
|
|
2019-06-07 16:59:53 +02:00
|
|
|
await createUserAccountAndChannelAndPlaylist({ userToCreate: user, channelNames: undefined, validateUser: validatePassword })
|
2017-10-25 16:03:33 +02:00
|
|
|
logger.info('Username: ' + username)
|
|
|
|
logger.info('User password: ' + password)
|
2017-11-10 17:27:49 +01:00
|
|
|
}
|
2017-10-25 16:03:33 +02:00
|
|
|
|
2017-11-10 17:27:49 +01:00
|
|
|
async function createApplicationIfNotExist () {
|
2017-12-12 17:53:50 +01:00
|
|
|
const exist = await applicationExist()
|
2017-11-14 17:31:26 +01:00
|
|
|
// Nothing to do, application already exist
|
|
|
|
if (exist === true) return undefined
|
|
|
|
|
2017-11-10 17:27:49 +01:00
|
|
|
logger.info('Creating application account.')
|
2017-11-16 18:40:50 +01:00
|
|
|
|
2017-12-14 17:38:41 +01:00
|
|
|
const application = await ApplicationModel.create({
|
2022-08-03 15:08:36 +02:00
|
|
|
migrationVersion: LAST_MIGRATION_VERSION,
|
|
|
|
nodeVersion: process.version,
|
|
|
|
nodeABIVersion: getNodeABIVersion()
|
2017-12-14 17:38:41 +01:00
|
|
|
})
|
2017-11-17 09:12:03 +01:00
|
|
|
|
2017-12-14 17:38:41 +01:00
|
|
|
return createApplicationActor(application.id)
|
2016-03-21 21:11:26 +01:00
|
|
|
}
|
2023-04-21 14:55:10 +02:00
|
|
|
|
|
|
|
async function createRunnerRegistrationTokenIfNotExist () {
|
|
|
|
const total = await RunnerRegistrationTokenModel.countTotal()
|
|
|
|
if (total !== 0) return undefined
|
|
|
|
|
|
|
|
const token = new RunnerRegistrationTokenModel({
|
|
|
|
registrationToken: generateRunnerRegistrationToken()
|
|
|
|
})
|
|
|
|
|
|
|
|
await token.save()
|
|
|
|
}
|