PeerTube/server/initializers/installer.ts

128 lines
3.4 KiB
TypeScript
Raw Normal View History

2017-06-05 21:53:49 +02:00
import * as passwordGenerator from 'password-generator'
import * as Promise from 'bluebird'
2017-05-22 20:58:25 +02:00
import { database as db } from './database'
2017-07-12 11:56:02 +02:00
import { USER_ROLES, CONFIG, LAST_MIGRATION_VERSION, CACHE } from './constants'
2017-05-15 22:22:03 +02:00
import { clientsExist, usersExist } from './checker'
2017-07-12 14:58:34 +02:00
import { logger, createCertsIfNotExist, mkdirpPromise, rimrafPromise } from '../helpers'
function installApplication () {
return db.sequelize.sync()
2017-07-12 11:56:02 +02:00
.then(() => removeCacheDirectories())
.then(() => createDirectoriesIfNotExist())
.then(() => createCertsIfNotExist())
.then(() => createOAuthClientIfNotExist())
.then(() => createOAuthAdminIfNotExist())
}
// ---------------------------------------------------------------------------
2017-05-15 22:22:03 +02:00
export {
installApplication
}
// ---------------------------------------------------------------------------
2017-07-12 11:56:02 +02:00
function removeCacheDirectories () {
const cacheDirectories = CACHE.DIRECTORIES
const tasks = []
// Cache directories
Object.keys(cacheDirectories).forEach(key => {
const dir = cacheDirectories[key]
tasks.push(rimrafPromise(dir))
})
return Promise.all(tasks)
}
function createDirectoriesIfNotExist () {
2017-09-04 20:07:54 +02:00
const storage = CONFIG.STORAGE
2017-07-12 11:56:02 +02:00
const cacheDirectories = CACHE.DIRECTORIES
const tasks = []
2017-09-04 20:07:54 +02:00
Object.keys(storage).forEach(key => {
const dir = storage[key]
2017-07-12 11:56:02 +02:00
tasks.push(mkdirpPromise(dir))
})
// Cache directories
Object.keys(cacheDirectories).forEach(key => {
const dir = cacheDirectories[key]
tasks.push(mkdirpPromise(dir))
})
return Promise.all(tasks)
}
function createOAuthClientIfNotExist () {
2017-08-26 09:17:20 +02:00
return clientsExist(db.OAuthClient).then(exist => {
// Nothing to do, clients already exist
if (exist === true) return undefined
logger.info('Creating a default OAuth Client.')
2016-12-11 21:50:51 +01:00
const id = passwordGenerator(32, false, /[a-z0-9]/)
const secret = passwordGenerator(32, false, /[a-zA-Z0-9]/)
const client = db.OAuthClient.build({
clientId: id,
clientSecret: secret,
2017-05-22 20:58:25 +02:00
grants: [ 'password', 'refresh_token' ],
redirectUris: null
})
return client.save().then(createdClient => {
2016-12-11 21:50:51 +01:00
logger.info('Client id: ' + createdClient.clientId)
logger.info('Client secret: ' + createdClient.clientSecret)
return undefined
})
})
}
function createOAuthAdminIfNotExist () {
2017-08-26 09:17:20 +02:00
return usersExist(db.User).then(exist => {
// Nothing to do, users already exist
if (exist === true) return undefined
logger.info('Creating the administrator.')
const username = 'root'
2017-05-15 22:22:03 +02:00
const role = USER_ROLES.ADMIN
const email = CONFIG.ADMIN.EMAIL
const createOptions: { validate?: boolean } = {}
let password = ''
// Do not generate a random password for tests
if (process.env.NODE_ENV === 'test') {
password = 'test'
if (process.env.NODE_APP_INSTANCE) {
password += process.env.NODE_APP_INSTANCE
}
2016-12-28 15:49:23 +01:00
// Our password is weak so do not validate it
createOptions.validate = false
} else {
password = passwordGenerator(8, true)
}
2016-12-28 15:49:23 +01:00
const userData = {
username,
2017-02-18 09:29:59 +01:00
email,
password,
2017-09-04 20:07:54 +02:00
role,
videoQuota: -1
2016-12-28 15:49:23 +01:00
}
return db.User.create(userData, createOptions).then(createdUser => {
2016-08-25 17:57:37 +02:00
logger.info('Username: ' + username)
logger.info('User password: ' + password)
2016-12-25 09:44:57 +01:00
logger.info('Creating Application table.')
return db.Application.create({ migrationVersion: LAST_MIGRATION_VERSION })
})
})
}