summaryrefslogtreecommitdiff
path: root/src/pixelated/config/leap.py
diff options
context:
space:
mode:
Diffstat (limited to 'src/pixelated/config/leap.py')
-rw-r--r--src/pixelated/config/leap.py92
1 files changed, 92 insertions, 0 deletions
diff --git a/src/pixelated/config/leap.py b/src/pixelated/config/leap.py
new file mode 100644
index 00000000..dc555287
--- /dev/null
+++ b/src/pixelated/config/leap.py
@@ -0,0 +1,92 @@
+from __future__ import absolute_import
+from leap.common.events import (server as events_server)
+from leap.soledad.common.errors import InvalidAuthTokenError
+
+from pixelated.config import credentials
+from pixelated.bitmask_libraries.config import LeapConfig
+from pixelated.bitmask_libraries.certs import LeapCertificate
+from pixelated.bitmask_libraries.provider import LeapProvider
+from pixelated.bitmask_libraries.session import LeapSessionFactory
+from twisted.internet import defer
+
+import logging
+log = logging.getLogger(__name__)
+
+
+def initialize_leap_provider(provider_hostname, provider_cert, provider_fingerprint, leap_home):
+ LeapCertificate.set_cert_and_fingerprint(provider_cert,
+ provider_fingerprint)
+
+ config = LeapConfig(leap_home=leap_home, start_background_jobs=True)
+ provider = LeapProvider(provider_hostname, config)
+ provider.download_certificate()
+ LeapCertificate(provider).setup_ca_bundle()
+
+ return config, provider
+
+
+@defer.inlineCallbacks
+def initialize_leap_multi_user(provider_hostname,
+ leap_provider_cert,
+ leap_provider_cert_fingerprint,
+ credentials_file,
+ organization_mode,
+ leap_home):
+
+ config, provider = initialize_leap_provider(
+ provider_hostname, leap_provider_cert, leap_provider_cert_fingerprint, leap_home)
+
+ defer.returnValue((config, provider))
+
+
+def _create_session(provider, username, password, auth):
+ return LeapSessionFactory(provider).create(username, password, auth)
+
+
+def _force_close_session(session):
+ try:
+ session.close()
+ except Exception, e:
+ log.error(e)
+
+
+@defer.inlineCallbacks
+def authenticate_user(provider, username, password, initial_sync=True, auth=None):
+ leap_session = _create_session(provider, username, password, auth)
+ try:
+ if initial_sync:
+ yield leap_session.initial_sync()
+ except InvalidAuthTokenError:
+ _force_close_session(leap_session)
+
+ leap_session = _create_session(provider, username, password, auth)
+ if initial_sync:
+ yield leap_session.initial_sync()
+
+ defer.returnValue(leap_session)
+
+
+@defer.inlineCallbacks
+def initialize_leap_single_user(leap_provider_cert,
+ leap_provider_cert_fingerprint,
+ credentials_file,
+ organization_mode,
+ leap_home,
+ initial_sync=True):
+
+ init_monkeypatches()
+ events_server.ensure_server()
+
+ provider, username, password = credentials.read(organization_mode,
+ credentials_file)
+
+ config, provider = initialize_leap_provider(
+ provider, leap_provider_cert, leap_provider_cert_fingerprint, leap_home)
+
+ leap_session = yield authenticate_user(provider, username, password, initial_sync=initial_sync)
+
+ defer.returnValue(leap_session)
+
+
+def init_monkeypatches():
+ import pixelated.extensions.requests_urllib3