1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
|
# -*- coding: utf-8 -*-
# service.py
# Copyright (C) 2015 LEAP
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
"""
Bonafide Service.
"""
import os
from collections import defaultdict
from leap.common.config import get_path_prefix
from leap.common.service_hooks import HookableService
from leap.bonafide._protocol import BonafideProtocol
from twisted.internet import defer
from twisted.python import log
_preffix = get_path_prefix()
class BonafideService(HookableService):
def __init__(self, basedir=None):
if not basedir:
basedir = os.path.join(_preffix, 'leap')
self._basedir = os.path.expanduser(basedir)
self._bonafide = BonafideProtocol()
self.service_hooks = defaultdict(list)
# XXX this is a quick hack to get a ref
# to the latest authenticated user.
self._active_user = None
def startService(self):
log.msg('Starting Bonafide Service')
super(BonafideService, self).startService()
# Commands
def do_authenticate(self, username, password):
def notify_passphrase_entry(username, password):
data = dict(username=username, password=password)
self.trigger_hook('on_passphrase_entry', **data)
def notify_bonafide_auth(result):
if not result:
log.msg("Authentication hook did not return anything")
return
token, uuid = result
data = dict(username=username, token=token, uuid=uuid,
password=password)
self.trigger_hook('on_bonafide_auth', **data)
self._active_user = username
return result
# XXX I still have doubts from where it's best to trigger this.
# We probably should wait for BOTH deferreds and
# handle local and remote authentication success together
# (and fail if either one fails). Going with fire-and-forget for
# now, but needs needs improvement.
notify_passphrase_entry(username, password)
d = self._bonafide.do_authenticate(username, password)
d.addCallback(notify_bonafide_auth)
d.addCallback(lambda response: {
'srp_token': response[0], 'uuid': response[1]})
return d
def do_signup(self, username, password):
d = self._bonafide.do_signup(username, password)
d.addCallback(lambda response: {'signup': 'ok', 'user': response})
return d
def do_logout(self, username, password):
if not username:
username = self._active_user
def reset_active(passthrough):
self._active_user = None
return passthrough
d = self._bonafide.do_logout(username, password)
d.addCallback(reset_active)
d.addCallback(lambda response: {'logout': 'ok'})
return d
def do_get_smtp_cert(self, username=None):
if not username:
username = self._active_user
if not username:
return defer.fail(
RuntimeError('No active user, cannot get SMTP cert.'))
d = self._bonafide.do_get_smtp_cert(username)
d.addCallback(lambda response: (username, response))
return d
def do_get_active_user(self):
user = self._active_user
return defer.succeed(user)
|