From f0a1df3075923f976017bc299383533f5c04292d Mon Sep 17 00:00:00 2001 From: "Kali Kaneko (leap communications)" Date: Sun, 7 May 2017 16:10:37 +0200 Subject: [refactor] rename pixelated module --- src/leap/bitmask/mua/__init__.py | 0 src/leap/bitmask/mua/pixelizer.py | 230 ++++++++++++++++++++++++++++++++++++++ 2 files changed, 230 insertions(+) create mode 100644 src/leap/bitmask/mua/__init__.py create mode 100644 src/leap/bitmask/mua/pixelizer.py (limited to 'src/leap/bitmask/mua') diff --git a/src/leap/bitmask/mua/__init__.py b/src/leap/bitmask/mua/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/src/leap/bitmask/mua/pixelizer.py b/src/leap/bitmask/mua/pixelizer.py new file mode 100644 index 00000000..ed69afb2 --- /dev/null +++ b/src/leap/bitmask/mua/pixelizer.py @@ -0,0 +1,230 @@ +# -*- coding: utf-8 -*- +# pix.py +# Copyright (C) 2016 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see . +""" +Pixelated plugin integration. +""" +import json +import os +import sys + +from twisted.internet import defer, reactor +from twisted.logger import Logger + +from leap.common.config import get_path_prefix +from leap.bitmask.mail.mail import Account +from leap.bitmask.keymanager import KeyNotFound + +try: + from pixelated.adapter.mailstore import LeapMailStore + from pixelated.adapter.welcome_mail import add_welcome_mail + from pixelated.application import SingleUserServicesFactory + from pixelated.application import UserAgentMode + from pixelated.application import start_site + from pixelated.bitmask_libraries.smtp import LeapSMTPConfig + from pixelated.config.sessions import SessionCache + from pixelated.config import services + from pixelated.resources.root_resource import RootResource + import pixelated_www + HAS_PIXELATED = True +except ImportError as exc: + HAS_PIXELATED = False + + +log = Logger() + + +# TODO +# [ ] pre-authenticate + + +def start_pixelated_user_agent(userid, soledad, keymanager): + + leap_session = LeapSessionAdapter( + userid, soledad, keymanager) + + config = Config() + leap_home = os.path.join(get_path_prefix(), 'leap') + config.leap_home = leap_home + leap_session.config = config + + services_factory = SingleUserServicesFactory( + UserAgentMode(is_single_user=True)) + + if getattr(sys, 'frozen', False): + # we are running in a |PyInstaller| bundle + static_folder = os.path.join(sys._MEIPASS, 'pixelated_www') + else: + static_folder = os.path.abspath(pixelated_www.__path__[0]) + + resource = RootResource(services_factory, static_folder=static_folder) + + config.host = 'localhost' + config.port = 9090 + config.sslkey = None + config.sslcert = None + config.manhole = False + + d = leap_session.account.callWhenReady( + lambda _: _start_in_single_user_mode( + leap_session, config, + resource, services_factory)) + return d + + +def get_smtp_config(provider): + config_path = os.path.join( + get_path_prefix(), 'leap', 'providers', provider, 'smtp-service.json') + json_config = json.loads(open(config_path).read()) + chosen_host = json_config['hosts'].keys()[0] + hostname = json_config['hosts'][chosen_host]['hostname'] + port = json_config['hosts'][chosen_host]['port'] + + config = Config() + config.host = hostname + config.port = port + return config + + +class NickNym(object): + + def __init__(self, keymanager, userid): + self._email = userid + self.keymanager = keymanager + + @defer.inlineCallbacks + def generate_openpgp_key(self): + key_present = yield self._key_exists(self._email) + if not key_present: + yield self._gen_key() + yield self._send_key_to_leap() + + @defer.inlineCallbacks + def _key_exists(self, email): + try: + yield self.fetch_key(email, private=True, fetch_remote=False) + defer.returnValue(True) + except KeyNotFound: + defer.returnValue(False) + + def fetch_key(self, email, private=False, fetch_remote=True): + return self.keymanager.get_key( + email, private=private, fetch_remote=fetch_remote) + + def get_key(self, *args, **kw): + return self.keymanager.get_key(*args, **kw) + + def _gen_key(self): + return self.keymanager.gen_key() + + def _send_key_to_leap(self): + return self.keymanager.send_key() + + +class LeapSessionAdapter(object): + + def __init__(self, userid, soledad, keymanager): + + self.userid = userid + self.soledad = soledad + + # XXX this needs to be converged with our public apis. + _n = NickNym(keymanager, userid) + self.nicknym = self.keymanager = _n + self.mail_store = LeapMailStore(soledad) + + self.user_auth = Config() + self.user_auth.uuid = soledad.uuid + + self.fresh_account = False + self.incoming_mail_fetcher = None + self.account = Account(soledad, userid) + + username, provider = userid.split('@') + smtp_client_cert = os.path.join( + get_path_prefix(), + 'leap', 'providers', provider, 'keys', + 'client', + 'smtp_{username}.pem'.format( + username=username)) + + _prov = Config() + _prov.server_name = provider + self.provider = _prov + + assert(os.path.isfile(smtp_client_cert)) + + smtp_config = get_smtp_config(provider) + smtp_host = smtp_config.host + smtp_port = smtp_config.port + + self.smtp_config = LeapSMTPConfig( + userid, + smtp_client_cert, smtp_host, smtp_port) + + def account_email(self): + return self.userid + + def close(self): + pass + + @property + def is_closed(self): + return self._is_closed + + def remove_from_cache(self): + key = SessionCache.session_key(self.provider, self.userid) + SessionCache.remove_session(key) + + def sync(self): + return self.soledad.sync() + + +class Config(object): + pass + + +def _start_in_single_user_mode(leap_session, config, resource, + services_factory): + start_site(config, resource) + reactor.callLater( + # workaround for #8798 + # we need to make pixelated initialization a bit behind + # the own leap initialization, because otherwise the inbox is created + # without the needed callbacks for IMAP compatibility. + # This should be better addressed at pixelated code, by using the mail + # api to create the collection. + 3, start_user_agent_in_single_user_mode, + resource, services_factory, + leap_session.config.leap_home, leap_session) + + +@defer.inlineCallbacks +def start_user_agent_in_single_user_mode(root_resource, + services_factory, + leap_home, leap_session): + log.info('Pixelated bootstrap done, loading services for user %s' + % leap_session.user_auth.uuid) + _services = services.Services(leap_session) + yield _services.setup() + + if leap_session.fresh_account: + yield add_welcome_mail(leap_session.mail_store) + + services_factory.add_session(leap_session.user_auth.uuid, _services) + + root_resource.initialize(provider=leap_session.provider) + log.info('Done, the Pixelated User Agent is ready to be used') -- cgit v1.2.3