1
0
Fork 0
peertube/server/initializers/installer.js

135 lines
3.6 KiB
JavaScript
Raw Normal View History

'use strict'
const config = require('config')
2016-07-18 11:17:52 -04:00
const each = require('async/each')
const mkdirp = require('mkdirp')
const passwordGenerator = require('password-generator')
const path = require('path')
2016-07-18 11:17:52 -04:00
const series = require('async/series')
const checker = require('./checker')
const constants = require('./constants')
2016-12-11 15:50:51 -05:00
const db = require('./database')
const logger = require('../helpers/logger')
2016-07-01 10:22:36 -04:00
const peertubeCrypto = require('../helpers/peertube-crypto')
const installer = {
installApplication
}
function installApplication (callback) {
2016-07-18 11:17:52 -04:00
series([
2016-12-11 15:50:51 -05:00
function createDatabase (callbackAsync) {
db.sequelize.sync().asCallback(callbackAsync)
// db.sequelize.sync({ force: true }).asCallback(callbackAsync)
},
function createDirectories (callbackAsync) {
createDirectoriesIfNotExist(callbackAsync)
},
function createCertificates (callbackAsync) {
peertubeCrypto.createCertsIfNotExist(callbackAsync)
},
function createOAuthClient (callbackAsync) {
createOAuthClientIfNotExist(callbackAsync)
},
function createOAuthUser (callbackAsync) {
createOAuthAdminIfNotExist(callbackAsync)
}
], callback)
}
// ---------------------------------------------------------------------------
module.exports = installer
// ---------------------------------------------------------------------------
function createDirectoriesIfNotExist (callback) {
const storages = config.get('storage')
2016-07-18 11:17:52 -04:00
each(Object.keys(storages), function (key, callbackEach) {
const dir = storages[key]
mkdirp(path.join(__dirname, '..', '..', dir), callbackEach)
}, callback)
}
function createOAuthClientIfNotExist (callback) {
checker.clientsExist(function (err, exist) {
if (err) return callback(err)
// Nothing to do, clients already exist
if (exist === true) return callback(null)
logger.info('Creating a default OAuth Client.')
2016-12-11 15:50:51 -05:00
const id = passwordGenerator(32, false, /[a-z0-9]/)
const secret = passwordGenerator(32, false, /[a-zA-Z0-9]/)
const client = db.OAuthClient.build({
clientId: id,
clientSecret: secret,
2016-07-20 10:23:58 -04:00
grants: [ 'password', 'refresh_token' ]
})
2016-12-11 15:50:51 -05:00
client.save().asCallback(function (err, createdClient) {
if (err) return callback(err)
2016-12-11 15:50:51 -05:00
logger.info('Client id: ' + createdClient.clientId)
logger.info('Client secret: ' + createdClient.clientSecret)
return callback(null)
})
})
}
function createOAuthAdminIfNotExist (callback) {
checker.usersExist(function (err, exist) {
if (err) return callback(err)
// Nothing to do, users already exist
if (exist === true) return callback(null)
logger.info('Creating the administrator.')
const username = 'root'
const role = constants.USER_ROLES.ADMIN
2017-02-18 03:29:59 -05:00
const email = constants.CONFIG.ADMIN.EMAIL
2016-12-28 09:49:23 -05:00
const createOptions = {}
let password = ''
// Do not generate a random password for tests
if (process.env.NODE_ENV === 'test') {
password = 'test'
if (process.env.NODE_APP_INSTANCE) {
password += process.env.NODE_APP_INSTANCE
}
2016-12-28 09:49:23 -05:00
// Our password is weak so do not validate it
createOptions.validate = false
} else {
password = passwordGenerator(8, true)
}
2016-12-28 09:49:23 -05:00
const userData = {
username,
2017-02-18 03:29:59 -05:00
email,
password,
role
2016-12-28 09:49:23 -05:00
}
2016-12-28 09:49:23 -05:00
db.User.create(userData, createOptions).asCallback(function (err, createdUser) {
if (err) return callback(err)
2016-08-25 11:57:37 -04:00
logger.info('Username: ' + username)
logger.info('User password: ' + password)
2016-12-25 03:44:57 -05:00
logger.info('Creating Application table.')
db.Application.create({ migrationVersion: constants.LAST_MIGRATION_VERSION }).asCallback(callback)
})
})
}