1
0
Fork 0
peertube/server/controllers/api/videos/index.ts

427 lines
13 KiB
TypeScript
Raw Normal View History

2017-06-05 19:53:49 +00:00
import * as express from 'express'
2017-06-10 20:15:25 +00:00
import * as Sequelize from 'sequelize'
2017-06-05 19:53:49 +00:00
import * as fs from 'fs'
import * as multer from 'multer'
import * as path from 'path'
2017-05-15 20:22:03 +00:00
import { waterfall } from 'async'
2017-05-22 18:58:25 +00:00
import { database as db } from '../../../initializers/database'
2017-05-15 20:22:03 +00:00
import {
CONFIG,
REQUEST_VIDEO_QADU_TYPES,
REQUEST_VIDEO_EVENT_TYPES,
VIDEO_CATEGORIES,
VIDEO_LICENCES,
VIDEO_LANGUAGES
} from '../../../initializers'
import {
addEventToRemoteVideo,
quickAndDirtyUpdateVideoToFriends,
addVideoToFriends,
updateVideoToFriends
} from '../../../lib'
import {
authenticate,
paginationValidator,
videosSortValidator,
setVideosSort,
setPagination,
setVideosSearch,
videosUpdateValidator,
videosSearchValidator,
videosAddValidator,
videosGetValidator,
videosRemoveValidator
} from '../../../middlewares'
import {
logger,
commitTransaction,
retryTransactionWrapper,
rollbackTransaction,
startSerializableTransaction,
generateRandomString,
getFormatedObjects
} from '../../../helpers'
import { abuseVideoRouter } from './abuse'
import { blacklistRouter } from './blacklist'
import { rateVideoRouter } from './rate'
const videosRouter = express.Router()
// multer configuration
2016-03-16 21:29:27 +00:00
const storage = multer.diskStorage({
destination: function (req, file, cb) {
2017-05-15 20:22:03 +00:00
cb(null, CONFIG.STORAGE.VIDEOS_DIR)
},
filename: function (req, file, cb) {
2016-03-16 21:29:27 +00:00
let extension = ''
if (file.mimetype === 'video/webm') extension = 'webm'
else if (file.mimetype === 'video/mp4') extension = 'mp4'
else if (file.mimetype === 'video/ogg') extension = 'ogv'
2017-05-15 20:22:03 +00:00
generateRandomString(16, function (err, randomString) {
const fieldname = err ? undefined : randomString
cb(null, fieldname + '.' + extension)
})
}
})
const reqFiles = multer({ storage: storage }).fields([{ name: 'videofile', maxCount: 1 }])
2015-06-09 15:41:40 +00:00
2017-05-15 20:22:03 +00:00
videosRouter.use('/', abuseVideoRouter)
videosRouter.use('/', blacklistRouter)
videosRouter.use('/', rateVideoRouter)
2017-05-05 14:53:35 +00:00
2017-05-15 20:22:03 +00:00
videosRouter.get('/categories', listVideoCategories)
videosRouter.get('/licences', listVideoLicences)
videosRouter.get('/languages', listVideoLanguages)
2017-03-22 20:15:55 +00:00
2017-05-15 20:22:03 +00:00
videosRouter.get('/',
paginationValidator,
videosSortValidator,
setVideosSort,
setPagination,
listVideos
)
2017-05-15 20:22:03 +00:00
videosRouter.put('/:id',
authenticate,
videosUpdateValidator,
updateVideoRetryWrapper
2016-12-29 18:07:05 +00:00
)
2017-05-15 20:22:03 +00:00
videosRouter.post('/',
authenticate,
reqFiles,
2017-05-15 20:22:03 +00:00
videosAddValidator,
addVideoRetryWrapper
)
2017-05-15 20:22:03 +00:00
videosRouter.get('/:id',
videosGetValidator,
getVideo
)
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 19:22:10 +00:00
2017-05-15 20:22:03 +00:00
videosRouter.delete('/:id',
authenticate,
videosRemoveValidator,
removeVideo
)
Add ability for an administrator to remove any video (#61) * Add ability for an admin to remove every video on the pod. * Server: add BlacklistedVideos relation. * Server: Insert in BlacklistedVideos relation upon deletion of a video. * Server: Modify BlacklistedVideos schema to add Pod id information. * Server: Moving insertion of a blacklisted video from the `afterDestroy` hook into the process of deletion of a video. To avoid inserting a video when it is removed on its origin pod. When a video is removed on its origin pod, the `afterDestroy` hook is fire, but no request is made on the delete('/:videoId') interface. Hence, we insert into `BlacklistedVideos` only on request on delete('/:videoId') (if requirements for insertion are met). * Server: Add removeVideoFromBlacklist hook on deletion of a video. We are going to proceed in another way :). We will add a new route : /:videoId/blacklist to blacklist a video. We do not blacklist a video upon its deletion now (to distinguish a video blacklist from a regular video delete) When we blacklist a video, the video remains in the DB, so we don't have any concern about its update. It just doesn't appear in the video list. When we remove a video, we then have to remove it from the blacklist too. We could also remove a video from the blacklist to 'unremove' it and make it appear again in the video list (will be another feature). * Server: Add handler for new route post(/:videoId/blacklist) * Client: Add isBlacklistable method * Client: Update isRemovableBy method. * Client: Move 'Delete video' feature from the video-list to the video-watch module. * Server: Exclude blacklisted videos from the video list * Server: Use findAll() in BlacklistedVideos.list() method * Server: Fix addVideoToBlacklist function. * Client: Add blacklist feature. * Server: Use JavaScript Standard Style. * Server: In checkUserCanDeleteVideo, move the callback call inside the db callback function * Server: Modify BlacklistVideo relation * Server: Modifiy Videos methods. * Server: Add checkVideoIsBlacklistable method * Server: Rewrite addVideoToBlacklist method * Server: Fix checkVideoIsBlacklistable method * Server: Add return to addVideoToBlacklist method
2017-04-26 19:22:10 +00:00
2017-05-15 20:22:03 +00:00
videosRouter.get('/search/:value',
videosSearchValidator,
paginationValidator,
videosSortValidator,
setVideosSort,
setPagination,
setVideosSearch,
searchVideos
)
2015-06-09 15:41:40 +00:00
// ---------------------------------------------------------------------------
2016-01-31 10:23:52 +00:00
2017-05-15 20:22:03 +00:00
export {
videosRouter
}
2016-01-31 10:23:52 +00:00
// ---------------------------------------------------------------------------
2016-01-31 10:23:52 +00:00
2017-06-10 20:15:25 +00:00
function listVideoCategories (req: express.Request, res: express.Response, next: express.NextFunction) {
2017-05-15 20:22:03 +00:00
res.json(VIDEO_CATEGORIES)
2017-03-22 20:15:55 +00:00
}
2017-06-10 20:15:25 +00:00
function listVideoLicences (req: express.Request, res: express.Response, next: express.NextFunction) {
2017-05-15 20:22:03 +00:00
res.json(VIDEO_LICENCES)
2017-03-27 18:53:11 +00:00
}
2017-06-10 20:15:25 +00:00
function listVideoLanguages (req: express.Request, res: express.Response, next: express.NextFunction) {
2017-05-15 20:22:03 +00:00
res.json(VIDEO_LANGUAGES)
2017-04-07 10:13:37 +00:00
}
// Wrapper to video add that retry the function if there is a database error
// We need this because we run the transaction in SERIALIZABLE isolation that can fail
2017-06-10 20:15:25 +00:00
function addVideoRetryWrapper (req: express.Request, res: express.Response, next: express.NextFunction) {
const options = {
arguments: [ req, res, req.files.videofile[0] ],
errorMessage: 'Cannot insert the video with many retries.'
}
2017-05-15 20:22:03 +00:00
retryTransactionWrapper(addVideo, options, function (err) {
if (err) return next(err)
// TODO : include Location of the new video -> 201
return res.type('json').status(204).end()
})
}
2017-06-10 20:15:25 +00:00
function addVideo (req: express.Request, res: express.Response, videoFile: Express.Multer.File, finalCallback: (err: Error) => void) {
const videoInfos = req.body
2016-07-18 15:17:52 +00:00
waterfall([
2017-05-15 20:22:03 +00:00
startSerializableTransaction,
2016-12-24 15:59:17 +00:00
2017-01-17 19:38:45 +00:00
function findOrCreateAuthor (t, callback) {
const user = res.locals.oauth.token.User
2016-12-11 20:50:51 +00:00
2016-12-29 17:02:03 +00:00
const name = user.username
// null because it is OUR pod
const podId = null
const userId = user.id
2016-12-29 17:02:03 +00:00
db.Author.findOrCreateAuthor(name, podId, userId, t, function (err, authorInstance) {
2017-01-17 19:38:45 +00:00
return callback(err, t, authorInstance)
2016-12-24 15:59:17 +00:00
})
},
2017-01-17 19:38:45 +00:00
function findOrCreateTags (t, author, callback) {
2016-12-24 15:59:17 +00:00
const tags = videoInfos.tags
2016-12-29 17:02:03 +00:00
db.Tag.findOrCreateTags(tags, t, function (err, tagInstances) {
2017-01-17 19:38:45 +00:00
return callback(err, t, author, tagInstances)
2016-12-11 20:50:51 +00:00
})
},
2017-01-17 19:38:45 +00:00
function createVideoObject (t, author, tagInstances, callback) {
const videoData = {
name: videoInfos.name,
remoteId: null,
extname: path.extname(videoFile.filename),
2017-03-22 20:15:55 +00:00
category: videoInfos.category,
2017-03-27 18:53:11 +00:00
licence: videoInfos.licence,
2017-04-07 10:13:37 +00:00
language: videoInfos.language,
2017-03-28 19:19:46 +00:00
nsfw: videoInfos.nsfw,
description: videoInfos.description,
2017-06-10 20:15:25 +00:00
duration: videoFile['duration'], // duration was added by a previous middleware
2017-03-08 20:35:43 +00:00
authorId: author.id
}
2016-12-11 20:50:51 +00:00
const video = db.Video.build(videoData)
2017-01-17 19:38:45 +00:00
return callback(null, t, author, tagInstances, video)
},
2016-12-11 20:50:51 +00:00
// Set the videoname the same as the id
2017-01-17 19:38:45 +00:00
function renameVideoFile (t, author, tagInstances, video, callback) {
2017-05-15 20:22:03 +00:00
const videoDir = CONFIG.STORAGE.VIDEOS_DIR
const source = path.join(videoDir, videoFile.filename)
2016-11-11 14:20:03 +00:00
const destination = path.join(videoDir, video.getVideoFilename())
fs.rename(source, destination, function (err) {
2017-01-17 19:38:45 +00:00
if (err) return callback(err)
// This is important in case if there is another attempt
videoFile.filename = video.getVideoFilename()
2017-01-17 19:38:45 +00:00
return callback(null, t, author, tagInstances, video)
})
},
2017-01-17 19:38:45 +00:00
function insertVideoIntoDB (t, author, tagInstances, video, callback) {
2016-12-24 15:59:17 +00:00
const options = { transaction: t }
// Add tags association
video.save(options).asCallback(function (err, videoCreated) {
2017-01-17 19:38:45 +00:00
if (err) return callback(err)
2016-12-24 15:59:17 +00:00
2016-12-11 20:50:51 +00:00
// Do not forget to add Author informations to the created video
videoCreated.Author = author
2017-01-17 19:38:45 +00:00
return callback(err, t, tagInstances, videoCreated)
2016-05-03 20:41:46 +00:00
})
},
2017-01-17 19:38:45 +00:00
function associateTagsToVideo (t, tagInstances, video, callback) {
2016-12-24 15:59:17 +00:00
const options = { transaction: t }
video.setTags(tagInstances, options).asCallback(function (err) {
video.Tags = tagInstances
2017-01-17 19:38:45 +00:00
return callback(err, t, video)
2016-12-24 15:59:17 +00:00
})
},
2017-01-17 19:38:45 +00:00
function sendToFriends (t, video, callback) {
// Let transcoding job send the video to friends because the videofile extension might change
2017-05-15 20:22:03 +00:00
if (CONFIG.TRANSCODING.ENABLED === true) return callback(null, t)
2016-12-29 18:07:05 +00:00
video.toAddRemoteJSON(function (err, remoteVideo) {
2017-01-17 19:38:45 +00:00
if (err) return callback(err)
// Now we'll add the video's meta data to our friends
2017-05-15 20:22:03 +00:00
addVideoToFriends(remoteVideo, t, function (err) {
2017-01-17 19:38:45 +00:00
return callback(err, t)
})
})
2017-01-17 19:38:45 +00:00
},
2017-05-15 20:22:03 +00:00
commitTransaction
2017-06-10 20:15:25 +00:00
], function andFinally (err: Error, t: Sequelize.Transaction) {
2016-12-29 18:07:05 +00:00
if (err) {
// This is just a debug because we will retry the insert
logger.debug('Cannot insert the video.', { error: err })
2017-05-15 20:22:03 +00:00
return rollbackTransaction(err, t, finalCallback)
2016-12-29 18:07:05 +00:00
}
2017-01-17 19:38:45 +00:00
logger.info('Video with name %s created.', videoInfos.name)
return finalCallback(null)
2016-12-29 18:07:05 +00:00
})
}
2017-06-10 20:15:25 +00:00
function updateVideoRetryWrapper (req: express.Request, res: express.Response, next: express.NextFunction) {
const options = {
arguments: [ req, res ],
errorMessage: 'Cannot update the video with many retries.'
}
2017-05-15 20:22:03 +00:00
retryTransactionWrapper(updateVideo, options, function (err) {
if (err) return next(err)
// TODO : include Location of the new video -> 201
return res.type('json').status(204).end()
})
}
2017-06-10 20:15:25 +00:00
function updateVideo (req: express.Request, res: express.Response, finalCallback: (err: Error) => void) {
const videoInstance = res.locals.video
const videoFieldsSave = videoInstance.toJSON()
2016-12-29 18:07:05 +00:00
const videoInfosToUpdate = req.body
waterfall([
2017-05-15 20:22:03 +00:00
startSerializableTransaction,
2016-12-29 18:07:05 +00:00
function findOrCreateTags (t, callback) {
if (videoInfosToUpdate.tags) {
db.Tag.findOrCreateTags(videoInfosToUpdate.tags, t, function (err, tagInstances) {
return callback(err, t, tagInstances)
})
} else {
return callback(null, t, null)
}
},
function updateVideoIntoDB (t, tagInstances, callback) {
const options = {
transaction: t
}
2016-12-29 18:07:05 +00:00
if (videoInfosToUpdate.name !== undefined) videoInstance.set('name', videoInfosToUpdate.name)
if (videoInfosToUpdate.category !== undefined) videoInstance.set('category', videoInfosToUpdate.category)
if (videoInfosToUpdate.licence !== undefined) videoInstance.set('licence', videoInfosToUpdate.licence)
if (videoInfosToUpdate.language !== undefined) videoInstance.set('language', videoInfosToUpdate.language)
if (videoInfosToUpdate.nsfw !== undefined) videoInstance.set('nsfw', videoInfosToUpdate.nsfw)
if (videoInfosToUpdate.description !== undefined) videoInstance.set('description', videoInfosToUpdate.description)
2016-12-29 18:07:05 +00:00
videoInstance.save(options).asCallback(function (err) {
return callback(err, t, tagInstances)
})
},
function associateTagsToVideo (t, tagInstances, callback) {
if (tagInstances) {
const options = { transaction: t }
videoInstance.setTags(tagInstances, options).asCallback(function (err) {
videoInstance.Tags = tagInstances
return callback(err, t)
})
} else {
return callback(null, t)
}
},
function sendToFriends (t, callback) {
const json = videoInstance.toUpdateRemoteJSON()
// Now we'll update the video's meta data to our friends
2017-05-15 20:22:03 +00:00
updateVideoToFriends(json, t, function (err) {
return callback(err, t)
})
2017-01-17 19:38:45 +00:00
},
2017-05-15 20:22:03 +00:00
commitTransaction
2016-12-29 18:07:05 +00:00
2017-06-10 20:15:25 +00:00
], function andFinally (err: Error, t: Sequelize.Transaction) {
if (err) {
logger.debug('Cannot update the video.', { error: err })
2016-12-24 15:59:17 +00:00
// Force fields we want to update
// If the transaction is retried, sequelize will think the object has not changed
// So it will skip the SQL request, even if the last one was ROLLBACKed!
Object.keys(videoFieldsSave).forEach(function (key) {
const value = videoFieldsSave[key]
videoInstance.set(key, value)
})
2017-05-15 20:22:03 +00:00
return rollbackTransaction(err, t, finalCallback)
}
2017-06-12 19:31:58 +00:00
logger.info('Video with name %s updated.', videoInstance.name)
2017-01-17 19:38:45 +00:00
return finalCallback(null)
})
}
2015-06-09 15:41:40 +00:00
2017-06-10 20:15:25 +00:00
function getVideo (req: express.Request, res: express.Response, next: express.NextFunction) {
const videoInstance = res.locals.video
if (videoInstance.isOwned()) {
// The increment is done directly in the database, not using the instance value
videoInstance.increment('views').asCallback(function (err) {
if (err) {
logger.error('Cannot add view to video %d.', videoInstance.id)
return
}
// FIXME: make a real view system
// For example, only add a view when a user watch a video during 30s etc
2017-03-08 20:35:43 +00:00
const qaduParams = {
videoId: videoInstance.id,
2017-05-15 20:22:03 +00:00
type: REQUEST_VIDEO_QADU_TYPES.VIEWS
2017-03-08 20:35:43 +00:00
}
2017-05-15 20:22:03 +00:00
quickAndDirtyUpdateVideoToFriends(qaduParams)
})
2017-02-26 17:57:33 +00:00
} else {
// Just send the event to our friends
2017-03-08 20:35:43 +00:00
const eventParams = {
videoId: videoInstance.id,
2017-05-15 20:22:03 +00:00
type: REQUEST_VIDEO_EVENT_TYPES.VIEWS
2017-03-08 20:35:43 +00:00
}
2017-05-15 20:22:03 +00:00
addEventToRemoteVideo(eventParams)
}
// Do not wait the view system
res.json(videoInstance.toFormatedJSON())
}
2015-06-09 15:41:40 +00:00
2017-06-10 20:15:25 +00:00
function listVideos (req: express.Request, res: express.Response, next: express.NextFunction) {
2016-12-11 20:50:51 +00:00
db.Video.listForApi(req.query.start, req.query.count, req.query.sort, function (err, videosList, videosTotal) {
if (err) return next(err)
2016-01-31 10:23:52 +00:00
2017-05-15 20:22:03 +00:00
res.json(getFormatedObjects(videosList, videosTotal))
})
}
2016-01-31 10:23:52 +00:00
2017-06-10 20:15:25 +00:00
function removeVideo (req: express.Request, res: express.Response, next: express.NextFunction) {
const videoInstance = res.locals.video
2015-06-09 15:41:40 +00:00
videoInstance.destroy().asCallback(function (err) {
if (err) {
logger.error('Errors when removed the video.', { error: err })
return next(err)
}
return res.type('json').status(204).end()
})
}
2015-06-09 15:41:40 +00:00
2017-06-10 20:15:25 +00:00
function searchVideos (req: express.Request, res: express.Response, next: express.NextFunction) {
2016-12-24 15:59:17 +00:00
db.Video.searchAndPopulateAuthorAndPodAndTags(
req.params.value, req.query.field, req.query.start, req.query.count, req.query.sort,
function (err, videosList, videosTotal) {
if (err) return next(err)
2015-06-09 15:41:40 +00:00
2017-05-15 20:22:03 +00:00
res.json(getFormatedObjects(videosList, videosTotal))
2016-12-24 15:59:17 +00:00
}
)
}