PeerTube/server/models/user/user.ts

217 lines
4.6 KiB
TypeScript
Raw Normal View History

2017-05-15 22:22:03 +02:00
import { values } from 'lodash'
2017-05-22 20:58:25 +02:00
import * as Sequelize from 'sequelize'
2017-05-15 22:22:03 +02:00
2017-06-16 09:45:46 +02:00
import { getSort } from '../utils'
import { USER_ROLES } from '../../initializers'
2017-05-15 22:22:03 +02:00
import {
cryptPassword,
comparePassword,
isUserPasswordValid,
isUserUsernameValid,
isUserDisplayNSFWValid
2017-06-16 09:45:46 +02:00
} from '../../helpers'
2017-06-16 09:45:46 +02:00
import { addMethodsToModel } from '../utils'
2017-05-22 20:58:25 +02:00
import {
UserInstance,
UserAttributes,
UserMethods
} from './user-interface'
let User: Sequelize.Model<UserInstance, UserAttributes>
let isPasswordMatch: UserMethods.IsPasswordMatch
let toFormatedJSON: UserMethods.ToFormatedJSON
let isAdmin: UserMethods.IsAdmin
let countTotal: UserMethods.CountTotal
let getByUsername: UserMethods.GetByUsername
let list: UserMethods.List
let listForApi: UserMethods.ListForApi
let loadById: UserMethods.LoadById
let loadByUsername: UserMethods.LoadByUsername
let loadByUsernameOrEmail: UserMethods.LoadByUsernameOrEmail
2017-06-11 17:35:32 +02:00
export default function (sequelize: Sequelize.Sequelize, DataTypes: Sequelize.DataTypes) {
User = sequelize.define<UserInstance, UserAttributes>('User',
2016-12-11 21:50:51 +01:00
{
password: {
2016-12-28 15:49:23 +01:00
type: DataTypes.STRING,
allowNull: false,
validate: {
passwordValid: function (value) {
2017-05-15 22:22:03 +02:00
const res = isUserPasswordValid(value)
2016-12-28 15:49:23 +01:00
if (res === false) throw new Error('Password not valid.')
}
}
2016-12-11 21:50:51 +01:00
},
username: {
2016-12-28 15:49:23 +01:00
type: DataTypes.STRING,
allowNull: false,
validate: {
usernameValid: function (value) {
2017-05-15 22:22:03 +02:00
const res = isUserUsernameValid(value)
2016-12-28 15:49:23 +01:00
if (res === false) throw new Error('Username not valid.')
}
}
2016-12-11 21:50:51 +01:00
},
2017-02-18 09:29:59 +01:00
email: {
2017-02-18 11:56:28 +01:00
type: DataTypes.STRING(400),
2017-02-18 09:29:59 +01:00
allowNull: false,
validate: {
isEmail: true
}
},
2017-04-03 21:24:36 +02:00
displayNSFW: {
type: DataTypes.BOOLEAN,
allowNull: false,
defaultValue: false,
validate: {
nsfwValid: function (value) {
2017-05-15 22:22:03 +02:00
const res = isUserDisplayNSFWValid(value)
2017-04-03 21:24:36 +02:00
if (res === false) throw new Error('Display NSFW is not valid.')
}
}
},
2016-12-11 21:50:51 +01:00
role: {
2017-05-15 22:22:03 +02:00
type: DataTypes.ENUM(values(USER_ROLES)),
2016-12-28 15:49:23 +01:00
allowNull: false
2016-12-11 21:50:51 +01:00
}
},
{
2016-12-29 09:33:28 +01:00
indexes: [
{
2017-02-16 19:24:34 +01:00
fields: [ 'username' ],
unique: true
2017-02-18 09:29:59 +01:00
},
{
fields: [ 'email' ],
unique: true
2016-12-29 09:33:28 +01:00
}
],
2016-12-11 21:50:51 +01:00
hooks: {
beforeCreate: beforeCreateOrUpdate,
beforeUpdate: beforeCreateOrUpdate
}
}
)
2017-05-22 20:58:25 +02:00
const classMethods = [
associate,
countTotal,
getByUsername,
list,
listForApi,
loadById,
loadByUsername,
loadByUsernameOrEmail
]
const instanceMethods = [
isPasswordMatch,
toFormatedJSON,
isAdmin
]
addMethodsToModel(User, classMethods, instanceMethods)
2016-12-11 21:50:51 +01:00
return User
}
2017-06-10 22:15:25 +02:00
function beforeCreateOrUpdate (user: UserInstance) {
return cryptPassword(user.password).then(hash => {
user.password = hash
return undefined
2016-08-25 17:57:37 +02:00
})
2016-12-11 21:50:51 +01:00
}
2016-08-25 17:57:37 +02:00
// ------------------------------ METHODS ------------------------------
isPasswordMatch = function (this: UserInstance, password: string) {
return comparePassword(password, this.password)
2016-08-25 17:57:37 +02:00
}
2017-06-11 11:02:35 +02:00
toFormatedJSON = function (this: UserInstance) {
2016-08-25 17:57:37 +02:00
return {
2016-12-11 21:50:51 +01:00
id: this.id,
2016-08-25 17:57:37 +02:00
username: this.username,
2017-02-18 09:29:59 +01:00
email: this.email,
2017-04-03 21:24:36 +02:00
displayNSFW: this.displayNSFW,
role: this.role,
2016-12-11 21:50:51 +01:00
createdAt: this.createdAt
2016-08-25 17:57:37 +02:00
}
}
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 21:22:10 +02:00
isAdmin = function (this: UserInstance) {
2017-05-15 22:22:03 +02:00
return this.role === USER_ROLES.ADMIN
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 21:22:10 +02:00
}
2016-08-25 17:57:37 +02:00
// ------------------------------ STATICS ------------------------------
2016-12-11 21:50:51 +01:00
function associate (models) {
2017-05-22 20:58:25 +02:00
User.hasOne(models.Author, {
foreignKey: 'userId',
onDelete: 'cascade'
})
2017-05-22 20:58:25 +02:00
User.hasMany(models.OAuthToken, {
2016-12-11 21:50:51 +01:00
foreignKey: 'userId',
onDelete: 'cascade'
})
}
countTotal = function () {
return this.count()
}
2017-06-10 22:15:25 +02:00
getByUsername = function (username: string) {
2016-12-11 21:50:51 +01:00
const query = {
where: {
username: username
}
}
2017-05-22 20:58:25 +02:00
return User.findOne(query)
}
list = function () {
return User.findAll()
}
listForApi = function (start: number, count: number, sort: string) {
2016-12-11 21:50:51 +01:00
const query = {
offset: start,
limit: count,
2017-05-15 22:22:03 +02:00
order: [ getSort(sort) ]
2016-12-11 21:50:51 +01:00
}
return User.findAndCountAll(query).then(({ rows, count }) => {
return {
data: rows,
total: count
}
2016-12-11 21:50:51 +01:00
})
}
loadById = function (id: number) {
return User.findById(id)
}
loadByUsername = function (username: string) {
2016-12-11 21:50:51 +01:00
const query = {
where: {
username: username
}
}
return User.findOne(query)
}
2017-02-18 09:29:59 +01:00
loadByUsernameOrEmail = function (username: string, email: string) {
2017-02-18 09:29:59 +01:00
const query = {
where: {
$or: [ { username }, { email } ]
}
}
return User.findOne(query)
2017-02-18 09:29:59 +01:00
}