selfprivacy.org.app/lib/logic/api_maps/hetzner.dart

96 lines
3 KiB
Dart
Raw Normal View History

2021-01-19 08:38:02 +00:00
import 'dart:convert';
2021-01-06 17:35:57 +00:00
import 'dart:io';
import 'package:dio/dio.dart';
import 'package:flutter/foundation.dart';
import 'package:selfprivacy/logic/api_maps/api_map.dart';
import 'package:selfprivacy/logic/models/server_details.dart';
import 'package:selfprivacy/logic/models/user.dart';
2021-02-17 14:30:02 +00:00
import 'package:selfprivacy/utils/password_generator2.dart';
2021-01-06 17:35:57 +00:00
class HetznerApi extends ApiMap {
HetznerApi([String token]) {
if (token != null) {
2021-01-19 12:05:40 +00:00
loggedClient.options = BaseOptions(
headers: {'Authorization': 'Bearer $token'},
baseUrl: rootAddress,
);
2021-01-06 17:35:57 +00:00
}
}
@override
2021-01-14 21:48:05 +00:00
String rootAddress = 'https://api.hetzner.cloud/v1/servers';
2021-01-06 17:35:57 +00:00
Future<bool> isValid(String token) async {
var options = Options(
headers: {'Authorization': 'Bearer $token'},
validateStatus: (status) {
return status == HttpStatus.ok || status == HttpStatus.unauthorized;
},
);
2021-01-14 21:48:05 +00:00
Response response = await loggedClient.get(rootAddress, options: options);
2021-01-06 17:35:57 +00:00
if (response.statusCode == HttpStatus.ok) {
return true;
} else if (response.statusCode == HttpStatus.unauthorized) {
return false;
} else {
2021-01-13 16:45:46 +00:00
throw Exception('code: ${response.statusCode}');
2021-01-06 17:35:57 +00:00
}
}
Future<HetznerServerDetails> createServer({
2021-02-02 18:24:56 +00:00
@required String cloudFlareKey,
2021-01-06 17:35:57 +00:00
@required User rootUser,
@required String domainName,
}) async {
2021-02-17 14:30:02 +00:00
var dbPassword = getRandomString(40);
2021-01-19 08:38:02 +00:00
var data = jsonDecode(
2021-02-17 11:36:20 +00:00
'''{"name":"selfprivacy-server","server_type":"cx11","start_after_create":false,"image":"ubuntu-20.04", "volumes":[],"networks":[],"user_data":"#cloud-config\\nruncmd:\\n- curl https://git.selfprivacy.org/ilchub/selfprivacy-nixos-infect/raw/branch/master/nixos-infect | PROVIDER=hetzner NIX_CHANNEL=nixos-20.09 DOMAIN=$domainName LUSER=${rootUser.login} PASSWORD=${rootUser.password} HASHED_PASSWORD=${rootUser.hashPassword} CF_TOKEN=$cloudFlareKey DB_PASSWORD=$dbPassword bash 2>&1 | tee /tmp/infect.log","labels":{},"automount":false}''',
2021-02-02 18:24:56 +00:00
);
2021-01-19 08:38:02 +00:00
2021-01-14 21:48:05 +00:00
Response response = await loggedClient.post(
2021-01-06 17:35:57 +00:00
rootAddress,
data: data,
);
return HetznerServerDetails(
id: response.data['server']['id'],
ip4: response.data['server']['public_net']['ipv4']['ip'],
2021-01-19 12:05:40 +00:00
createTime: DateTime.now(),
);
}
2021-02-15 18:58:29 +00:00
Future<void> deleteSelfprivacyServer({
@required String cloudFlareKey,
}) async {
Response response = await loggedClient.get(rootAddress);
List list = response.data['servers'];
var server = list.firstWhere((el) => el['name'] == 'selfprivacy-server');
return await loggedClient.delete('$rootAddress/${server['id']}');
}
2021-01-19 12:05:40 +00:00
Future<HetznerServerDetails> startServer({
HetznerServerDetails server,
}) async {
await loggedClient.post('/${server.id}/actions/poweron');
return server.copyWith(
2021-01-06 19:25:53 +00:00
startTime: DateTime.now(),
2021-01-06 17:35:57 +00:00
);
}
2021-02-03 19:51:07 +00:00
2021-02-03 20:26:38 +00:00
Future<HetznerServerDetails> restart({
2021-02-03 19:51:07 +00:00
HetznerServerDetails server,
}) async {
await loggedClient.post('/${server.id}/actions/poweron');
return server.copyWith(
startTime: DateTime.now(),
);
}
2021-01-06 17:35:57 +00:00
}