PeerTube/server/initializers/installer.js

130 lines
3.5 KiB
JavaScript
Raw Normal View History

'use strict'
const config = require('config')
2016-07-18 17:17:52 +02:00
const each = require('async/each')
const mkdirp = require('mkdirp')
const passwordGenerator = require('password-generator')
const path = require('path')
2016-07-18 17:17:52 +02:00
const series = require('async/series')
const checker = require('./checker')
const constants = require('./constants')
2016-12-11 21:50:51 +01:00
const db = require('./database')
const logger = require('../helpers/logger')
2016-07-01 16:22:36 +02:00
const peertubeCrypto = require('../helpers/peertube-crypto')
const installer = {
installApplication
}
function installApplication (callback) {
2016-07-18 17:17:52 +02:00
series([
2016-12-11 21:50:51 +01:00
function createDatabase (callbackAsync) {
db.sequelize.sync().asCallback(callbackAsync)
// db.sequelize.sync({ force: true }).asCallback(callbackAsync)
},
function createDirectories (callbackAsync) {
createDirectoriesIfNotExist(callbackAsync)
},
function createCertificates (callbackAsync) {
peertubeCrypto.createCertsIfNotExist(callbackAsync)
},
function createOAuthClient (callbackAsync) {
createOAuthClientIfNotExist(callbackAsync)
},
function createOAuthUser (callbackAsync) {
createOAuthAdminIfNotExist(callbackAsync)
}
], callback)
}
// ---------------------------------------------------------------------------
module.exports = installer
// ---------------------------------------------------------------------------
function createDirectoriesIfNotExist (callback) {
const storages = config.get('storage')
2016-07-18 17:17:52 +02:00
each(Object.keys(storages), function (key, callbackEach) {
const dir = storages[key]
mkdirp(path.join(__dirname, '..', '..', dir), callbackEach)
}, callback)
}
function createOAuthClientIfNotExist (callback) {
checker.clientsExist(function (err, exist) {
if (err) return callback(err)
// Nothing to do, clients already exist
if (exist === true) return callback(null)
logger.info('Creating a default OAuth Client.')
2016-12-11 21:50:51 +01:00
const id = passwordGenerator(32, false, /[a-z0-9]/)
const secret = passwordGenerator(32, false, /[a-zA-Z0-9]/)
const client = db.OAuthClient.build({
clientId: id,
clientSecret: secret,
2016-07-20 16:23:58 +02:00
grants: [ 'password', 'refresh_token' ]
})
2016-12-11 21:50:51 +01:00
client.save().asCallback(function (err, createdClient) {
if (err) return callback(err)
2016-12-11 21:50:51 +01:00
logger.info('Client id: ' + createdClient.clientId)
logger.info('Client secret: ' + createdClient.clientSecret)
return callback(null)
})
})
}
function createOAuthAdminIfNotExist (callback) {
checker.usersExist(function (err, exist) {
if (err) return callback(err)
// Nothing to do, users already exist
if (exist === true) return callback(null)
logger.info('Creating the administrator.')
const username = 'root'
const role = constants.USER_ROLES.ADMIN
let password = ''
// Do not generate a random password for tests
if (process.env.NODE_ENV === 'test') {
password = 'test'
if (process.env.NODE_APP_INSTANCE) {
password += process.env.NODE_APP_INSTANCE
}
} else {
password = passwordGenerator(8, true)
}
2016-12-11 21:50:51 +01:00
const user = db.User.build({
username,
password,
role
})
2016-12-11 21:50:51 +01:00
user.save().asCallback(function (err, createdUser) {
if (err) return callback(err)
2016-08-25 17:57:37 +02:00
logger.info('Username: ' + username)
logger.info('User password: ' + password)
2016-09-26 23:10:32 +02:00
logger.info('Creating Application collection.')
2016-12-11 21:50:51 +01:00
const application = db.Application.build({ sqlSchemaVersion: constants.LAST_SQL_SCHEMA_VERSION })
application.save().asCallback(callback)
})
})
}