aboutsummaryrefslogtreecommitdiffhomepage
path: root/server/initializers/installer.ts
blob: 10b74b85fd50cb8b2334f52716d4e4fc2522b21d (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
import * as passwordGenerator from 'password-generator'
import * as Promise from 'bluebird'

import { database as db } from './database'
import { USER_ROLES, CONFIG, LAST_MIGRATION_VERSION, CACHE } from './constants'
import { clientsExist, usersExist } from './checker'
import { logger, createCertsIfNotExist, mkdirpPromise, rimrafPromise } from '../helpers'

function installApplication () {
  return db.sequelize.sync()
    .then(() => removeCacheDirectories())
    .then(() => createDirectoriesIfNotExist())
    .then(() => createCertsIfNotExist())
    .then(() => createOAuthClientIfNotExist())
    .then(() => createOAuthAdminIfNotExist())
}

// ---------------------------------------------------------------------------

export {
  installApplication
}

// ---------------------------------------------------------------------------

function removeCacheDirectories () {
  const cacheDirectories = CACHE.DIRECTORIES

  const tasks = []

  // Cache directories
  Object.keys(cacheDirectories).forEach(key => {
    const dir = cacheDirectories[key]
    tasks.push(rimrafPromise(dir))
  })

  return Promise.all(tasks)
}

function createDirectoriesIfNotExist () {
  const storage = CONFIG.STORAGE
  const cacheDirectories = CACHE.DIRECTORIES

  const tasks = []
  Object.keys(storage).forEach(key => {
    const dir = storage[key]
    tasks.push(mkdirpPromise(dir))
  })

  // Cache directories
  Object.keys(cacheDirectories).forEach(key => {
    const dir = cacheDirectories[key]
    tasks.push(mkdirpPromise(dir))
  })

  return Promise.all(tasks)
}

function createOAuthClientIfNotExist () {
  return clientsExist(db.OAuthClient).then(exist => {
    // Nothing to do, clients already exist
    if (exist === true) return undefined

    logger.info('Creating a default OAuth Client.')

    const id = passwordGenerator(32, false, /[a-z0-9]/)
    const secret = passwordGenerator(32, false, /[a-zA-Z0-9]/)
    const client = db.OAuthClient.build({
      clientId: id,
      clientSecret: secret,
      grants: [ 'password', 'refresh_token' ],
      redirectUris: null
    })

    return client.save().then(createdClient => {
      logger.info('Client id: ' + createdClient.clientId)
      logger.info('Client secret: ' + createdClient.clientSecret)

      return undefined
    })
  })
}

function createOAuthAdminIfNotExist () {
  return usersExist(db.User).then(exist => {
    // Nothing to do, users already exist
    if (exist === true) return undefined

    logger.info('Creating the administrator.')

    const username = 'root'
    const role = USER_ROLES.ADMIN
    const email = CONFIG.ADMIN.EMAIL
    const createOptions: { validate?: boolean } = {}
    let password = ''

    // Do not generate a random password for tests
    if (process.env.NODE_ENV === 'test') {
      password = 'test'

      if (process.env.NODE_APP_INSTANCE) {
        password += process.env.NODE_APP_INSTANCE
      }

      // Our password is weak so do not validate it
      createOptions.validate = false
    } else {
      password = passwordGenerator(8, true)
    }

    const userData = {
      username,
      email,
      password,
      role,
      videoQuota: -1
    }

    return db.User.create(userData, createOptions).then(createdUser => {
      logger.info('Username: ' + username)
      logger.info('User password: ' + password)

      logger.info('Creating Application table.')
      return db.Application.create({ migrationVersion: LAST_MIGRATION_VERSION })
    })
  })
}