selfprivacy.org.app/lib/logic/api_maps/hetzner.dart

95 lines
3.0 KiB
Dart
Raw Normal View History

2021-01-19 10:38:02 +02:00
import 'dart:convert';
2021-01-06 19:35:57 +02:00
import 'dart:io';
import 'package:dio/dio.dart';
import 'package:selfprivacy/logic/api_maps/api_map.dart';
import 'package:selfprivacy/logic/models/server_details.dart';
import 'package:selfprivacy/logic/models/user.dart';
2021-02-17 16:30:02 +02:00
import 'package:selfprivacy/utils/password_generator2.dart';
2021-01-06 19:35:57 +02:00
class HetznerApi extends ApiMap {
2021-03-15 17:39:44 +02:00
HetznerApi([String? token]) {
2021-01-06 19:35:57 +02:00
if (token != null) {
2021-01-19 14:05:40 +02:00
loggedClient.options = BaseOptions(
headers: {'Authorization': 'Bearer $token'},
2021-03-15 17:39:44 +02:00
baseUrl: rootAddress!,
2021-01-19 14:05:40 +02:00
);
2021-01-06 19:35:57 +02:00
}
}
@override
2021-03-15 17:39:44 +02:00
String? rootAddress = 'https://api.hetzner.cloud/v1/servers';
2021-01-06 19:35:57 +02:00
Future<bool> isValid(String token) async {
var options = Options(
headers: {'Authorization': 'Bearer $token'},
validateStatus: (status) {
return status == HttpStatus.ok || status == HttpStatus.unauthorized;
},
);
2021-03-15 17:39:44 +02:00
Response response = await loggedClient.get(rootAddress!, options: options);
2021-01-06 19:35:57 +02:00
if (response.statusCode == HttpStatus.ok) {
return true;
} else if (response.statusCode == HttpStatus.unauthorized) {
return false;
} else {
2021-01-13 18:45:46 +02:00
throw Exception('code: ${response.statusCode}');
2021-01-06 19:35:57 +02:00
}
}
Future<HetznerServerDetails> createServer({
2021-03-15 17:39:44 +02:00
required String? cloudFlareKey,
required User rootUser,
required String? domainName,
2021-01-06 19:35:57 +02:00
}) async {
2021-02-17 16:30:02 +02:00
var dbPassword = getRandomString(40);
2021-01-19 10:38:02 +02:00
var data = jsonDecode(
2021-02-17 13:36:20 +02:00
'''{"name":"selfprivacy-server","server_type":"cx11","start_after_create":false,"image":"ubuntu-20.04", "volumes":[],"networks":[],"user_data":"#cloud-config\\nruncmd:\\n- curl https://git.selfprivacy.org/ilchub/selfprivacy-nixos-infect/raw/branch/master/nixos-infect | PROVIDER=hetzner NIX_CHANNEL=nixos-20.09 DOMAIN=$domainName LUSER=${rootUser.login} PASSWORD=${rootUser.password} HASHED_PASSWORD=${rootUser.hashPassword} CF_TOKEN=$cloudFlareKey DB_PASSWORD=$dbPassword bash 2>&1 | tee /tmp/infect.log","labels":{},"automount":false}''',
2021-02-02 20:24:56 +02:00
);
2021-01-19 10:38:02 +02:00
2021-01-14 23:48:05 +02:00
Response response = await loggedClient.post(
2021-03-15 17:39:44 +02:00
rootAddress!,
2021-01-06 19:35:57 +02:00
data: data,
);
return HetznerServerDetails(
id: response.data['server']['id'],
ip4: response.data['server']['public_net']['ipv4']['ip'],
2021-01-19 14:05:40 +02:00
createTime: DateTime.now(),
);
}
2021-02-15 20:58:29 +02:00
Future<void> deleteSelfprivacyServer({
2021-03-15 17:39:44 +02:00
required String? cloudFlareKey,
2021-02-15 20:58:29 +02:00
}) async {
2021-03-15 17:39:44 +02:00
Response response = await loggedClient.get(rootAddress!);
2021-02-15 20:58:29 +02:00
List list = response.data['servers'];
var server = list.firstWhere((el) => el['name'] == 'selfprivacy-server');
2021-03-15 17:39:44 +02:00
await loggedClient.delete('$rootAddress/${server['id']}');
2021-02-15 20:58:29 +02:00
}
2021-01-19 14:05:40 +02:00
Future<HetznerServerDetails> startServer({
2021-03-15 17:39:44 +02:00
required HetznerServerDetails server,
2021-01-19 14:05:40 +02:00
}) async {
await loggedClient.post('/${server.id}/actions/poweron');
return server.copyWith(
2021-01-06 21:25:53 +02:00
startTime: DateTime.now(),
2021-01-06 19:35:57 +02:00
);
}
2021-02-03 21:51:07 +02:00
2021-02-03 22:26:38 +02:00
Future<HetznerServerDetails> restart({
2021-03-15 17:39:44 +02:00
required HetznerServerDetails server,
2021-02-03 21:51:07 +02:00
}) async {
await loggedClient.post('/${server.id}/actions/poweron');
return server.copyWith(
startTime: DateTime.now(),
);
}
2021-01-06 19:35:57 +02:00
}