blob: 6c089628f5f6ba87173da22c03519aa4d5df5bff (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
|
import os
from datetime import datetime
from time import mktime
from leap.common.certs import get_cert_time_boundaries
from leap.common.config import get_path_prefix
# TODO use privilege.py module, plenty of checks in there for pkexec and
# friends.
class ImproperlyConfigured(Exception):
pass
def is_service_ready(provider):
if not _has_valid_cert(provider):
raise ImproperlyConfigured('Missing VPN certificate')
return True
def cert_expires(provider):
path = get_vpn_cert_path(provider)
with open(path, 'r') as f:
cert = f.read()
_, to = get_cert_time_boundaries(cert)
expiry_date = datetime.fromtimestamp(mktime(to))
return expiry_date
def get_vpn_cert_path(provider):
return os.path.join(get_path_prefix(),
'leap', 'providers', provider,
'keys', 'client', 'openvpn.pem')
def _has_valid_cert(provider):
cert_path = get_vpn_cert_path(provider)
has_file = os.path.isfile(cert_path)
if not has_file:
return False
expiry = cert_expires(provider)
if datetime.now() > expiry:
return False
return True
|