1
0
Fork 0
peertube/server/models/user.ts

222 lines
5.1 KiB
TypeScript
Raw Normal View History

2017-05-15 16:22:03 -04:00
import { values } from 'lodash'
2017-05-22 14:58:25 -04:00
import * as Sequelize from 'sequelize'
2017-05-15 16:22:03 -04:00
import { getSort } from './utils'
import { USER_ROLES } from '../initializers'
import {
cryptPassword,
comparePassword,
isUserPasswordValid,
isUserUsernameValid,
isUserDisplayNSFWValid
} from '../helpers'
2017-05-22 14:58:25 -04:00
import { addMethodsToModel } from './utils'
import {
UserClass,
UserInstance,
UserAttributes,
UserMethods
} from './user-interface'
let User: Sequelize.Model<UserInstance, UserAttributes>
let isPasswordMatch: UserMethods.IsPasswordMatch
let toFormatedJSON: UserMethods.ToFormatedJSON
let isAdmin: UserMethods.IsAdmin
let countTotal: UserMethods.CountTotal
let getByUsername: UserMethods.GetByUsername
let list: UserMethods.List
let listForApi: UserMethods.ListForApi
let loadById: UserMethods.LoadById
let loadByUsername: UserMethods.LoadByUsername
let loadByUsernameOrEmail: UserMethods.LoadByUsernameOrEmail
2017-06-11 11:35:32 -04:00
export default function (sequelize: Sequelize.Sequelize, DataTypes: Sequelize.DataTypes) {
User = sequelize.define<UserInstance, UserAttributes>('User',
2016-12-11 15:50:51 -05:00
{
password: {
2016-12-28 09:49:23 -05:00
type: DataTypes.STRING,
allowNull: false,
validate: {
passwordValid: function (value) {
2017-05-15 16:22:03 -04:00
const res = isUserPasswordValid(value)
2016-12-28 09:49:23 -05:00
if (res === false) throw new Error('Password not valid.')
}
}
2016-12-11 15:50:51 -05:00
},
username: {
2016-12-28 09:49:23 -05:00
type: DataTypes.STRING,
allowNull: false,
validate: {
usernameValid: function (value) {
2017-05-15 16:22:03 -04:00
const res = isUserUsernameValid(value)
2016-12-28 09:49:23 -05:00
if (res === false) throw new Error('Username not valid.')
}
}
2016-12-11 15:50:51 -05:00
},
2017-02-18 03:29:59 -05:00
email: {
2017-02-18 05:56:28 -05:00
type: DataTypes.STRING(400),
2017-02-18 03:29:59 -05:00
allowNull: false,
validate: {
isEmail: true
}
},
2017-04-03 15:24:36 -04:00
displayNSFW: {
type: DataTypes.BOOLEAN,
allowNull: false,
defaultValue: false,
validate: {
nsfwValid: function (value) {
2017-05-15 16:22:03 -04:00
const res = isUserDisplayNSFWValid(value)
2017-04-03 15:24:36 -04:00
if (res === false) throw new Error('Display NSFW is not valid.')
}
}
},
2016-12-11 15:50:51 -05:00
role: {
2017-05-15 16:22:03 -04:00
type: DataTypes.ENUM(values(USER_ROLES)),
2016-12-28 09:49:23 -05:00
allowNull: false
2016-12-11 15:50:51 -05:00
}
},
{
2016-12-29 03:33:28 -05:00
indexes: [
{
2017-02-16 13:24:34 -05:00
fields: [ 'username' ],
unique: true
2017-02-18 03:29:59 -05:00
},
{
fields: [ 'email' ],
unique: true
2016-12-29 03:33:28 -05:00
}
],
2016-12-11 15:50:51 -05:00
hooks: {
beforeCreate: beforeCreateOrUpdate,
beforeUpdate: beforeCreateOrUpdate
}
}
)
2017-05-22 14:58:25 -04:00
const classMethods = [
associate,
countTotal,
getByUsername,
list,
listForApi,
loadById,
loadByUsername,
loadByUsernameOrEmail
]
const instanceMethods = [
isPasswordMatch,
toFormatedJSON,
isAdmin
]
addMethodsToModel(User, classMethods, instanceMethods)
2016-12-11 15:50:51 -05:00
return User
}
2017-06-10 16:15:25 -04:00
function beforeCreateOrUpdate (user: UserInstance) {
2017-05-22 14:58:25 -04:00
return new Promise(function (resolve, reject) {
cryptPassword(user.password, function (err, hash) {
if (err) return reject(err)
2016-08-25 11:57:37 -04:00
2017-05-22 14:58:25 -04:00
user.password = hash
2016-08-25 11:57:37 -04:00
2017-05-22 14:58:25 -04:00
return resolve()
})
2016-08-25 11:57:37 -04:00
})
2016-12-11 15:50:51 -05:00
}
2016-08-25 11:57:37 -04:00
// ------------------------------ METHODS ------------------------------
2017-06-10 16:15:25 -04:00
isPasswordMatch = function (password: string, callback: UserMethods.IsPasswordMatchCallback) {
2017-05-15 16:22:03 -04:00
return comparePassword(password, this.password, callback)
2016-08-25 11:57:37 -04:00
}
2017-06-11 05:02:35 -04:00
toFormatedJSON = function (this: UserInstance) {
2016-08-25 11:57:37 -04:00
return {
2016-12-11 15:50:51 -05:00
id: this.id,
2016-08-25 11:57:37 -04:00
username: this.username,
2017-02-18 03:29:59 -05:00
email: this.email,
2017-04-03 15:24:36 -04:00
displayNSFW: this.displayNSFW,
role: this.role,
2016-12-11 15:50:51 -05:00
createdAt: this.createdAt
2016-08-25 11:57:37 -04:00
}
}
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 15:22:10 -04:00
2017-05-22 14:58:25 -04:00
isAdmin = function () {
2017-05-15 16:22:03 -04:00
return this.role === USER_ROLES.ADMIN
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 15:22:10 -04:00
}
2016-08-25 11:57:37 -04:00
// ------------------------------ STATICS ------------------------------
2016-12-11 15:50:51 -05:00
function associate (models) {
2017-05-22 14:58:25 -04:00
User.hasOne(models.Author, {
foreignKey: 'userId',
onDelete: 'cascade'
})
2017-05-22 14:58:25 -04:00
User.hasMany(models.OAuthToken, {
2016-12-11 15:50:51 -05:00
foreignKey: 'userId',
onDelete: 'cascade'
})
}
2017-06-10 16:15:25 -04:00
countTotal = function (callback: UserMethods.CountTotalCallback) {
2016-12-11 15:50:51 -05:00
return this.count().asCallback(callback)
}
2017-06-10 16:15:25 -04:00
getByUsername = function (username: string) {
2016-12-11 15:50:51 -05:00
const query = {
where: {
username: username
}
}
2017-05-22 14:58:25 -04:00
return User.findOne(query)
}
2017-06-10 16:15:25 -04:00
list = function (callback: UserMethods.ListCallback) {
2017-05-22 14:58:25 -04:00
return User.find().asCallback(callback)
}
2017-06-10 16:15:25 -04:00
listForApi = function (start: number, count: number, sort: string, callback: UserMethods.ListForApiCallback) {
2016-12-11 15:50:51 -05:00
const query = {
offset: start,
limit: count,
2017-05-15 16:22:03 -04:00
order: [ getSort(sort) ]
2016-12-11 15:50:51 -05:00
}
2017-05-22 14:58:25 -04:00
return User.findAndCountAll(query).asCallback(function (err, result) {
2016-12-11 15:50:51 -05:00
if (err) return callback(err)
return callback(null, result.rows, result.count)
})
}
2017-06-10 16:15:25 -04:00
loadById = function (id: number, callback: UserMethods.LoadByIdCallback) {
2017-05-22 14:58:25 -04:00
return User.findById(id).asCallback(callback)
}
2017-06-10 16:15:25 -04:00
loadByUsername = function (username: string, callback: UserMethods.LoadByUsernameCallback) {
2016-12-11 15:50:51 -05:00
const query = {
where: {
username: username
}
}
2017-05-22 14:58:25 -04:00
return User.findOne(query).asCallback(callback)
}
2017-02-18 03:29:59 -05:00
2017-06-10 16:15:25 -04:00
loadByUsernameOrEmail = function (username: string, email: string, callback: UserMethods.LoadByUsernameOrEmailCallback) {
2017-02-18 03:29:59 -05:00
const query = {
where: {
$or: [ { username }, { email } ]
}
}
2017-05-22 14:58:25 -04:00
return User.findOne(query).asCallback(callback)
2017-02-18 03:29:59 -05:00
}