summaryrefslogtreecommitdiff
path: root/src/leap/gui/firstrun/providersetup.py
blob: 5b50db87faa77b62df97acf61a1103f7cd4850f2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
"""
Provider Setup Validation Page,
used if First Run Wizard
"""
import logging

from PyQt4 import QtGui

from leap.base import auth
from leap.gui.progress import ValidationPage

from leap.gui.constants import APP_LOGO, pause_for_user

logger = logging.getLogger(__name__)


class ProviderSetupValidationPage(ValidationPage):
    def __init__(self, parent=None):
        super(ProviderSetupValidationPage, self).__init__(parent)
        is_signup = self.field("is_signup")
        self.is_signup = is_signup

        self.setTitle("Setting up provider")
        #self.setSubTitle(
            #"auto configuring provider...")

        self.setPixmap(
            QtGui.QWizard.LogoPixmap,
            QtGui.QPixmap(APP_LOGO))

    def _do_checks(self, update_signal=None):
        """
        executes actual checks in a separate thread
        """
        full_domain = self.field('provider_domain')
        wizard = self.wizard()
        pconfig = wizard.providerconfig

        #pCertChecker = wizard.providercertchecker
        #certchecker = pCertChecker(domain=full_domain)
        pCertChecker = wizard.providercertchecker(
            domain=full_domain)

        update_signal.emit('head_sentinel', 0)

        ######################################
        if not self.is_signup:
            # We come from login page.
            # We try a call to an authenticated
            # page here as a mean to catch
            # srp authentication errors while
            # we are still at one page's reach
            # of the login credentials input page.
            # (so we're able to go back an correct)

            step = "fetch_eipcert"
            update_signal.emit('validating credentials', 20)

            unamek = 'login_userName'
            passwk = 'login_userPassword'

            username = self.field(unamek)
            password = self.field(passwk)
            credentials = username, password

            #################
            # FIXME #BUG #638
            verify = False

            try:
                pCertChecker.download_new_client_cert(
                    credentials=credentials,
                    verify=verify)

            except auth.SRPAuthenticationError as exc:
                self.set_error(
                    step,
                    "Authentication error: %s" % exc.message)
                return False

            #pause_for_user()

        #######################################

        update_signal.emit('Fetching CA certificate', 30)
        #pause_for_user()

        if pconfig:
            ca_cert_uri = pconfig.get('ca_cert_uri').geturl()
        else:
            ca_cert_uri = None

        # XXX check scheme == "https"
        # XXX passing verify == False because
        # we have trusted right before.
        # We should check it's the same domain!!!
        # (Check with the trusted fingerprints dict
        # or something smart)

        pCertChecker.download_ca_cert(
            uri=ca_cert_uri,
            verify=False)
        #pause_for_user()

        update_signal.emit('Checking CA fingerprint', 66)
        #ca_cert_fingerprint = pconfig.get('ca_cert_fingerprint', None)

        # XXX get fingerprint dict (types)
        #sha256_fpr = ca_cert_fingerprint.split('=')[1]

        #validate_fpr = pCertChecker.check_ca_cert_fingerprint(
            #fingerprint=sha256_fpr)
        #if not validate_fpr:
            # XXX update validationMsg
            # should catch exception
            #return False

        update_signal.emit('Validating api certificate', 90)

        #api_uri = pconfig.get('api_uri', None)
        #try:
            #api_cert_verified = pCertChecker.verify_api_https(api_uri)
        #except requests.exceptions.SSLError as exc:
            #logger.error('BUG #638. %s' % exc.message)
            # XXX RAISE! See #638
            # bypassing until the hostname is fixed.
            # We probably should raise yet-another-warning
            # here saying user that the hostname "XX.XX.XX.XX' does not
            # match 'foo.bar.baz'
            #api_cert_verified = True

        #if not api_cert_verified:
            # XXX update validationMsg
            # should catch exception
            #return False

        #pause_for_user()
        #ca_cert_path = checker.ca_cert_path

        self.set_done()
        update_signal.emit('end_sentinel', 100)
        #pause_for_user()

    def _do_validation(self):
        """
        called after _do_checks has finished
        (connected to checker thread finished signal)
        """
        prevpage = "providerselection" if self.is_signup else "login"
        wizard = self.wizard()

        if self.errors:
            logger.debug('going back with errors')
            name, first_error = self.pop_first_error()
            wizard.set_validation_error(
                prevpage,
                first_error)
            # XXX don't go back, signal error
            #self.go_back()
        else:
            logger.debug('should be going next, wait on user')
            #self.go_next()

    def nextId(self):
        wizard = self.wizard()
        if not wizard:
            return
        is_signup = self.field('is_signup')
        if is_signup is True:
            next_ = 'signup'
        if is_signup is False:
            # XXX bad name. change to connect again.
            next_ = 'signupvalidation'
        return wizard.get_page_index(next_)