import 'dart:io'; import 'package:dio/dio.dart'; import 'package:selfprivacy/config/get_it_config.dart'; import 'package:selfprivacy/logic/api_maps/api_map.dart'; import 'package:selfprivacy/logic/models/hive/backblaze_credential.dart'; class BackblazeApiAuth { BackblazeApiAuth({required this.authorizationToken, required this.apiUrl}); final String authorizationToken; final String apiUrl; } class BackblazeApplicationKey { BackblazeApplicationKey( {required this.applicationKeyId, required this.applicationKey}); final String applicationKeyId; final String applicationKey; } class BackblazeApi extends ApiMap { BackblazeApi({this.hasLogger = false, this.isWithToken = true}); BaseOptions get options { var options = BaseOptions(baseUrl: rootAddress); if (isWithToken) { var backblazeCredential = getIt().backblazeCredential; var token = backblazeCredential!.applicationKey; options.headers = {'Authorization': 'Basic $token'}; } if (validateStatus != null) { options.validateStatus = validateStatus!; } return options; } @override String rootAddress = 'https://api.backblazeb2.com/b2api/v2/'; String apiPrefix = '/b2api/v2'; Future getAuthorizationToken() async { var client = await getClient(); var backblazeCredential = getIt().backblazeCredential; if (backblazeCredential == null) { throw Exception('Backblaze credential is null'); } final String encodedApiKey = encodedBackblazeKey( backblazeCredential.keyId, backblazeCredential.applicationKey); var response = await client.get( 'b2_authorize_account', options: Options(headers: {'Authorization': 'Basic $encodedApiKey'}), ); if (response.statusCode != 200) { throw Exception('code: ${response.statusCode}'); } return BackblazeApiAuth( authorizationToken: response.data['authorizationToken'], apiUrl: response.data['apiUrl'], ); } Future isValid(String encodedApiKey) async { var client = await getClient(); Response response = await client.get( 'b2_authorize_account', options: Options(headers: {'Authorization': 'Basic $encodedApiKey'}), ); close(client); if (response.statusCode == HttpStatus.ok) { if (response.data['allowed']['capabilities'].contains('listBuckets')) { return true; } return false; } else if (response.statusCode == HttpStatus.unauthorized) { return false; } else { throw Exception('code: ${response.statusCode}'); } } // Create bucket Future createBucket(String bucketName) async { final auth = await getAuthorizationToken(); var backblazeCredential = getIt().backblazeCredential; var client = await getClient(); client.options.baseUrl = auth.apiUrl; var response = await client.post( '$apiPrefix/b2_create_bucket', data: { 'accountId': backblazeCredential!.keyId, 'bucketName': bucketName, 'bucketType': 'allPrivate', 'lifecycleRules': [ { "daysFromHidingToDeleting": 30, "daysFromUploadingToHiding": null, "fileNamePrefix": "" } ], }, options: Options( headers: {'Authorization': auth.authorizationToken}, ), ); close(client); if (response.statusCode == HttpStatus.ok) { return response.data['bucketId']; } else { throw Exception('code: ${response.statusCode}'); } } // Create a limited capability key with access to the given bucket Future createKey(String bucketId) async { final auth = await getAuthorizationToken(); var client = await getClient(); client.options.baseUrl = auth.apiUrl; var response = await client.post( '$apiPrefix/b2_create_key', data: { 'accountId': getIt().backblazeCredential!.keyId, 'bucketId': bucketId, 'capabilities': ['listBuckets', 'listFiles', 'readFiles', 'writeFiles'], 'keyName': 'selfprivacy-restricted-server-key', }, options: Options( headers: {'Authorization': auth.authorizationToken}, ), ); close(client); if (response.statusCode == HttpStatus.ok) { return BackblazeApplicationKey( applicationKeyId: response.data['applicationKeyId'], applicationKey: response.data['applicationKey']); } else { throw Exception('code: ${response.statusCode}'); } } @override bool hasLogger; @override bool isWithToken; }