1
0
Fork 0
peertube/server/initializers/installer.ts

126 lines
3.3 KiB
TypeScript
Raw Normal View History

2017-06-05 19:53:49 +00:00
import * as passwordGenerator from 'password-generator'
import * as Bluebird from 'bluebird'
2017-05-22 18:58:25 +00:00
import { database as db } from './database'
2017-07-12 09:56:02 +00:00
import { USER_ROLES, CONFIG, LAST_MIGRATION_VERSION, CACHE } from './constants'
2017-05-15 20:22:03 +00:00
import { clientsExist, usersExist } from './checker'
2017-07-12 12:58:34 +00:00
import { logger, createCertsIfNotExist, mkdirpPromise, rimrafPromise } from '../helpers'
2017-10-24 17:41:09 +00:00
import { createUserAuthorAndChannel } from '../lib'
async function installApplication () {
await db.sequelize.sync()
await removeCacheDirectories()
await createDirectoriesIfNotExist()
await createCertsIfNotExist()
await createOAuthClientIfNotExist()
await createOAuthAdminIfNotExist()
}
// ---------------------------------------------------------------------------
2017-05-15 20:22:03 +00:00
export {
installApplication
}
// ---------------------------------------------------------------------------
2017-07-12 09:56:02 +00:00
function removeCacheDirectories () {
const cacheDirectories = CACHE.DIRECTORIES
const tasks: Bluebird<any>[] = []
2017-07-12 09:56:02 +00:00
// Cache directories
for (const key of Object.keys(cacheDirectories)) {
2017-07-12 09:56:02 +00:00
const dir = cacheDirectories[key]
tasks.push(rimrafPromise(dir))
}
2017-07-12 09:56:02 +00:00
return Promise.all(tasks)
}
function createDirectoriesIfNotExist () {
2017-09-04 18:07:54 +00:00
const storage = CONFIG.STORAGE
2017-07-12 09:56:02 +00:00
const cacheDirectories = CACHE.DIRECTORIES
const tasks = []
for (const key of Object.keys(storage)) {
2017-09-04 18:07:54 +00:00
const dir = storage[key]
2017-07-12 09:56:02 +00:00
tasks.push(mkdirpPromise(dir))
}
2017-07-12 09:56:02 +00:00
// Cache directories
for (const key of Object.keys(cacheDirectories)) {
2017-07-12 09:56:02 +00:00
const dir = cacheDirectories[key]
tasks.push(mkdirpPromise(dir))
}
return Promise.all(tasks)
}
async function createOAuthClientIfNotExist () {
const exist = await clientsExist(db.OAuthClient)
// Nothing to do, clients already exist
if (exist === true) return undefined
logger.info('Creating a default OAuth Client.')
const id = passwordGenerator(32, false, /[a-z0-9]/)
const secret = passwordGenerator(32, false, /[a-zA-Z0-9]/)
const client = db.OAuthClient.build({
clientId: id,
clientSecret: secret,
grants: [ 'password', 'refresh_token' ],
redirectUris: null
})
const createdClient = await client.save()
logger.info('Client id: ' + createdClient.clientId)
logger.info('Client secret: ' + createdClient.clientSecret)
return undefined
}
async function createOAuthAdminIfNotExist () {
const exist = await usersExist(db.User)
// Nothing to do, users already exist
if (exist === true) return undefined
logger.info('Creating the administrator.')
const username = 'root'
const role = USER_ROLES.ADMIN
const email = CONFIG.ADMIN.EMAIL
let validatePassword = true
let password = ''
2016-12-28 14:49:23 +00:00
// Do not generate a random password for tests
if (process.env.NODE_ENV === 'test') {
password = 'test'
if (process.env.NODE_APP_INSTANCE) {
password += process.env.NODE_APP_INSTANCE
2016-12-28 14:49:23 +00:00
}
// Our password is weak so do not validate it
validatePassword = false
} else {
password = passwordGenerator(8, true)
}
const userData = {
username,
email,
password,
role,
videoQuota: -1
}
const user = db.User.build(userData)
await createUserAuthorAndChannel(user, validatePassword)
logger.info('Username: ' + username)
logger.info('User password: ' + password)
logger.info('Creating Application table.')
await db.Application.create({ migrationVersion: LAST_MIGRATION_VERSION })
}