diff options
author | Bruno Wagner Goncalves <bwagner@thoughtworks.com> | 2014-08-20 15:43:50 -0300 |
---|---|---|
committer | Bruno Wagner Goncalves <bwagner@thoughtworks.com> | 2014-08-20 18:27:01 -0300 |
commit | 31289cb156540a95dfe51737d9fd4e1a7393f2f2 (patch) | |
tree | 238480ca562c9c65e1aeaaeaebe063549b3718f4 /service/app/bitmask_libraries | |
parent | 02df978f9faa4a00b07d2c70d3bd47a25287d0e1 (diff) |
Added setup.py and changed app to pixelated because it will be a package
Diffstat (limited to 'service/app/bitmask_libraries')
-rw-r--r-- | service/app/bitmask_libraries/__init__.py | 0 | ||||
-rw-r--r-- | service/app/bitmask_libraries/auth.py | 27 | ||||
-rw-r--r-- | service/app/bitmask_libraries/certs.py | 33 | ||||
-rw-r--r-- | service/app/bitmask_libraries/config.py | 67 | ||||
-rw-r--r-- | service/app/bitmask_libraries/leap_srp.py | 131 | ||||
-rw-r--r-- | service/app/bitmask_libraries/nicknym.py | 35 | ||||
-rw-r--r-- | service/app/bitmask_libraries/provider.py | 111 | ||||
-rw-r--r-- | service/app/bitmask_libraries/session.py | 156 | ||||
-rw-r--r-- | service/app/bitmask_libraries/smtp.py | 81 | ||||
-rw-r--r-- | service/app/bitmask_libraries/soledad.py | 95 |
10 files changed, 0 insertions, 736 deletions
diff --git a/service/app/bitmask_libraries/__init__.py b/service/app/bitmask_libraries/__init__.py deleted file mode 100644 index e69de29b..00000000 --- a/service/app/bitmask_libraries/__init__.py +++ /dev/null diff --git a/service/app/bitmask_libraries/auth.py b/service/app/bitmask_libraries/auth.py deleted file mode 100644 index 0b963587..00000000 --- a/service/app/bitmask_libraries/auth.py +++ /dev/null @@ -1,27 +0,0 @@ -from .leap_srp import LeapSecureRemotePassword -from .certs import which_bundle - -USE_PASSWORD = None - - -class LeapCredentials(object): - def __init__(self, user_name, password, db_passphrase=USE_PASSWORD): - self.user_name = user_name - self.password = password - self.db_passphrase = db_passphrase if db_passphrase is not None else password - - -class LeapAuthenticator(object): - def __init__(self, provider): - self._provider = provider - - def authenticate(self, credentials): - config = self._provider.config - srp = LeapSecureRemotePassword(ca_bundle=which_bundle(self._provider), timeout_in_s=config.timeout_in_s) - srp_session = srp.authenticate(self._provider.api_uri, credentials.user_name, credentials.password) - return srp_session - - def register(self, credentials): - config = self._provider.config - srp = LeapSecureRemotePassword(ca_bundle=which_bundle(self._provider), timeout_in_s=config.timeout_in_s) - srp.register(self._provider.api_uri, credentials.user_name, credentials.password) diff --git a/service/app/bitmask_libraries/certs.py b/service/app/bitmask_libraries/certs.py deleted file mode 100644 index 22a95591..00000000 --- a/service/app/bitmask_libraries/certs.py +++ /dev/null @@ -1,33 +0,0 @@ -import os - -from leap.common import ca_bundle - -from .config import AUTO_DETECT_CA_BUNDLE - - -def which_bundle(provider): - return LeapCertificate(provider).auto_detect_ca_bundle() - - -class LeapCertificate(object): - def __init__(self, provider): - self._config = provider.config - self._server_name = provider.server_name - self._certs_home = self._config.certs_home - - def auto_detect_ca_bundle(self): - if self._config.ca_cert_bundle == AUTO_DETECT_CA_BUNDLE: - local_cert = self._local_server_cert() - if local_cert: - return local_cert - else: - return ca_bundle.where() - else: - return self._config.ca_cert_bundle - - def _local_server_cert(self): - cert_file = os.path.join(self._certs_home, '%s.ca.crt' % self._server_name) - if os.path.isfile(cert_file): - return cert_file - else: - return None diff --git a/service/app/bitmask_libraries/config.py b/service/app/bitmask_libraries/config.py deleted file mode 100644 index 63524389..00000000 --- a/service/app/bitmask_libraries/config.py +++ /dev/null @@ -1,67 +0,0 @@ -import os -from os.path import expanduser -from distutils.spawn import find_executable - - -def discover_gpg_binary(): - path = find_executable('gpg') - if path is None: - raise Exception('Did not find a gpg executable!') - - if os.path.islink(path): - path = os.path.realpath(path) - - return path - - -DEFAULT_LEAP_HOME = os.path.join(expanduser("~"), '.leap') - -SYSTEM_CA_BUNDLE = True -AUTO_DETECT_CA_BUNDLE = None - - -class LeapConfig(object): - """ - LEAP client configuration - - """ - - def __init__(self, leap_home=DEFAULT_LEAP_HOME, ca_cert_bundle=AUTO_DETECT_CA_BUNDLE, verify_ssl=True, - fetch_interval_in_s=30, - timeout_in_s=15, start_background_jobs=True, gpg_binary=discover_gpg_binary(), certs_home=None): - """ - Constructor. - - :param server_name: The LEAP server name, e.g. demo.leap.se - :type server_name: str - - :param user_name: The LEAP account user name, normally the first part of your email, e.g. foobar for foobar@demo.leap.se - :type user_name: str - - :param user_password: The LEAP account password - :type user_password: str - - :param db_passphrase: The passphrase used to encrypt the local soledad database - :type db_passphrase: str - - :param verify_ssl: Set to false to disable strict SSL certificate validation - :type verify_ssl: bool - - :param fetch_interval_in_s: Polling interval for fetching incoming mail from LEAP server - :type fetch_interval_in_s: int - - :param timeout_in_s: Timeout for network operations, e.g. HTTP calls - :type timeout_in_s: int - - :param gpg_binary: Path to the GPG binary (must not be a symlink) - :type gpg_binary: str - - """ - self.leap_home = leap_home - self.certs_home = certs_home - self.ca_cert_bundle = ca_cert_bundle - self.verify_ssl = verify_ssl - self.timeout_in_s = timeout_in_s - self.start_background_jobs = start_background_jobs - self.gpg_binary = gpg_binary - self.fetch_interval_in_s = fetch_interval_in_s diff --git a/service/app/bitmask_libraries/leap_srp.py b/service/app/bitmask_libraries/leap_srp.py deleted file mode 100644 index 2590e731..00000000 --- a/service/app/bitmask_libraries/leap_srp.py +++ /dev/null @@ -1,131 +0,0 @@ -import binascii -import json -import requests - -from requests import Session -from srp import User, srp, create_salted_verification_key -from requests.exceptions import HTTPError, SSLError, Timeout -from config import SYSTEM_CA_BUNDLE - -REGISTER_USER_LOGIN_KEY = 'user[login]' -REGISTER_USER_VERIFIER_KEY = 'user[password_verifier]' -REGISTER_USER_SALT_KEY = 'user[password_salt]' - - -class LeapAuthException(Exception): - def __init__(self, *args, **kwargs): - super(LeapAuthException, self).__init__(*args, **kwargs) - - -class LeapSRPSession(object): - def __init__(self, user_name, api_server_name, uuid, token, session_id, api_version='1'): - self.user_name = user_name - self.api_server_name = api_server_name - self.uuid = uuid - self.token = token - self.session_id = session_id - self.api_version = api_version - - def __str__(self): - return 'LeapSRPSession(%s, %s, %s, %s, %s, %s)' % (self.user_name, self.api_server_name, self.uuid, self.token, self.session_id, self.api_version) - - -class LeapSecureRemotePassword(object): - def __init__(self, hash_alg=srp.SHA256, ng_type=srp.NG_1024, ca_bundle=SYSTEM_CA_BUNDLE, timeout_in_s=15, - leap_api_version='1'): - - self.hash_alg = hash_alg - self.ng_type = ng_type - self.timeout_in_s = timeout_in_s - self.ca_bundle = ca_bundle - self.leap_api_version = leap_api_version - - def authenticate(self, api_uri, username, password): - session = Session() - try: - return self._authenticate_with_session(session, api_uri, username, password) - except Timeout, e: - raise LeapAuthException(e) - finally: - session.close() - - def _authenticate_with_session(self, http_session, api_uri, username, password): - try: - srp_user = User(username.encode('utf-8'), password.encode('utf-8'), self.hash_alg, self.ng_type) - - salt, B_challenge = self._begin_authentication(srp_user, http_session, api_uri) - M2_verfication_code, leap_session = self._process_challenge(srp_user, http_session, api_uri, salt, - B_challenge) - self._verify_session(srp_user, M2_verfication_code) - - return leap_session - except (HTTPError, SSLError), e: - raise LeapAuthException(e) - - def _begin_authentication(self, user, session, api_uri): - _, A = user.start_authentication() - - auth_data = { - "login": user.get_username(), - "A": binascii.hexlify(A) - } - session_url = '%s/%s/sessions' % (api_uri, self.leap_api_version) - response = session.post(session_url, data=auth_data, verify=self.ca_bundle, timeout=self.timeout_in_s) - response.raise_for_status() - json_content = json.loads(response.content) - - salt = _safe_unhexlify(json_content.get('salt')) - B = _safe_unhexlify(json_content.get('B')) - - return salt, B - - def _process_challenge(self, user, session, api_uri, salt, B): - M = user.process_challenge(salt, B) - - auth_data = { - "client_auth": binascii.hexlify(M) - } - - auth_url = '%s/%s/sessions/%s' % (api_uri, self.leap_api_version, user.get_username()) - response = session.put(auth_url, data=auth_data, verify=self.ca_bundle, timeout=self.timeout_in_s) - response.raise_for_status() - auth_json = json.loads(response.content) - - M2 = _safe_unhexlify(auth_json.get('M2')) - uuid = auth_json.get('id') - token = auth_json.get('token') - session_id = response.cookies.get('_session_id') - - return M2, LeapSRPSession(user.get_username(), api_uri, uuid, token, session_id) - - def _verify_session(self, user, M2): - user.verify_session(M2) - if not user.authenticated(): - raise LeapAuthException() - - def register(self, api_uri, username, password): - try: - salt, verifier = create_salted_verification_key(username, password, self.hash_alg, self.ng_type) - return self._post_registration_data(api_uri, username, salt, verifier) - except (HTTPError, SSLError, Timeout), e: - raise LeapAuthException(e) - - def _post_registration_data(self, api_uri, username, salt, verifier): - users_url = '%s/%s/users' % (api_uri, self.leap_api_version) - - user_data = { - REGISTER_USER_LOGIN_KEY: username, - REGISTER_USER_SALT_KEY: binascii.hexlify(salt), - REGISTER_USER_VERIFIER_KEY: binascii.hexlify(verifier) - } - - response = requests.post(users_url, data=user_data, verify=self.ca_bundle, timeout=self.timeout_in_s) - response.raise_for_status() - reg_json = json.loads(response.content) - - return reg_json['ok'] - - -def _safe_unhexlify(hex_str): - return binascii.unhexlify(hex_str) \ - if (len(hex_str) % 2 == 0) else binascii.unhexlify('0' + hex_str) diff --git a/service/app/bitmask_libraries/nicknym.py b/service/app/bitmask_libraries/nicknym.py deleted file mode 100644 index c4939e9a..00000000 --- a/service/app/bitmask_libraries/nicknym.py +++ /dev/null @@ -1,35 +0,0 @@ -from leap.keymanager import KeyManager, openpgp, KeyNotFound -from .certs import which_bundle - - -class NickNym(object): - def __init__(self, provider, config, soledad_session, srp_session): - nicknym_url = _discover_nicknym_server(provider) - self._email = '%s@%s' % (srp_session.user_name, provider.domain) - self.keymanager = KeyManager('%s@%s' % (srp_session.user_name, provider.domain), nicknym_url, - soledad_session.soledad, - srp_session.token, which_bundle(provider), provider.api_uri, - provider.api_version, - srp_session.uuid, config.gpg_binary) - - def generate_openpgp_key(self): - if not self._key_exists(self._email): - self._gen_key() - self._send_key_to_leap() - - def _key_exists(self, email): - try: - self.keymanager.get_key(email, openpgp.OpenPGPKey, private=True, fetch_remote=False) - return True - except KeyNotFound: - return False - - def _gen_key(self): - self.keymanager.gen_key(openpgp.OpenPGPKey) - - def _send_key_to_leap(self): - self.keymanager.send_key(openpgp.OpenPGPKey) - - -def _discover_nicknym_server(provider): - return 'https://nicknym.%s:6425/' % provider.domain diff --git a/service/app/bitmask_libraries/provider.py b/service/app/bitmask_libraries/provider.py deleted file mode 100644 index b130af89..00000000 --- a/service/app/bitmask_libraries/provider.py +++ /dev/null @@ -1,111 +0,0 @@ -import json - -from leap.common.certs import get_digest -import requests - -from .certs import which_bundle - - -class LeapProvider(object): - def __init__(self, server_name, config): - self.server_name = server_name - self.config = config - - self.provider_json = self.fetch_provider_json() - - @property - def api_uri(self): - return self.provider_json.get('api_uri') - - @property - def ca_cert_fingerprint(self): - return self.provider_json.get('ca_cert_fingerprint') - - @property - def ca_cert_uri(self): - return self.provider_json.get('ca_cert_uri') - - @property - def api_version(self): - return self.provider_json.get('api_version') - - @property - def domain(self): - return self.provider_json.get('domain') - - @property - def services(self): - return self.provider_json.get('services') - - def __hash__(self): - return hash(self.server_name) - - def __eq__(self, other): - return self.server_name == other.server_name - - def ensure_supports_mx(self): - if 'mx' not in self.services: - raise Exception - - def download_certificate_to(self, filename): - """ - Downloads the server certificate, validates it against the provided fingerprint and stores it to file - """ - cert = self.fetch_valid_certificate() - with open(filename, 'w') as out: - out.write(cert) - - def fetch_valid_certificate(self): - cert = self._fetch_certificate() - self.validate_certificate(cert) - return cert - - def _fetch_certificate(self): - session = requests.session() - try: - cert_url = '%s/ca.crt' % self._provider_base_url() - response = session.get(cert_url, verify=which_bundle(self), timeout=self.config.timeout_in_s) - response.raise_for_status() - - cert_data = response.content - return cert_data - finally: - session.close() - - def validate_certificate(self, cert_data=None): - if cert_data is None: - cert_data = self._fetch_certificate() - - parts = str(self.ca_cert_fingerprint).split(':') - method = parts[0].strip() - fingerprint = parts[1].strip() - - digest = get_digest(cert_data, method) - - if fingerprint.strip() != digest: - raise Exception('Certificate fingerprints don\'t match') - - def fetch_provider_json(self): - url = '%s/provider.json' % self._provider_base_url() - response = requests.get(url, verify=which_bundle(self), timeout=self.config.timeout_in_s) - response.raise_for_status() - - json_data = json.loads(response.content) - return json_data - - def fetch_soledad_json(self): - service_url = "%s/%s/config/soledad-service.json" % ( - self.api_uri, self.api_version) - response = requests.get(service_url, verify=which_bundle(self), timeout=self.config.timeout_in_s) - response.raise_for_status() - return json.loads(response.content) - - def fetch_smtp_json(self): - service_url = '%s/%s/config/smtp-service.json' % ( - self.api_uri, self.api_version) - response = requests.get(service_url, verify=which_bundle(self), timeout=self.config.timeout_in_s) - response.raise_for_status() - return json.loads(response.content) - - def _provider_base_url(self): - return 'https://%s' % self.server_name diff --git a/service/app/bitmask_libraries/session.py b/service/app/bitmask_libraries/session.py deleted file mode 100644 index 4e1dd397..00000000 --- a/service/app/bitmask_libraries/session.py +++ /dev/null @@ -1,156 +0,0 @@ -import os -import errno -import traceback -from leap.mail.imap.fetch import LeapIncomingMail -from leap.mail.imap.account import SoledadBackedAccount -import sys -from leap.mail.imap.memorystore import MemoryStore -from leap.mail.imap.soledadstore import SoledadStore -from twisted.internet import reactor -from .nicknym import NickNym - -from .auth import LeapAuthenticator -from .soledad import SoledadSessionFactory, SoledadSession -from .smtp import LeapSmtp - -SESSIONS = {} - - -class LeapSession(object): - """ - A LEAP session. - - - Properties: - - - ``leap_config`` the configuration for this session (LeapClientConfig). - - - ``srp_session`` the secure remote password session to authenticate with LEAP. See http://en.wikipedia.org/wiki/Secure_Remote_Password_protocol (LeapSecureRemotePassword) - - - ``soledad_session`` the soledad session. See https://leap.se/soledad (LeapSecureRemotePassword) - - - ``nicknym`` the nicknym instance. See https://leap.se/nicknym (NickNym) - - - ``account`` the actual leap mail account. Implements Twisted imap4.IAccount and imap4.INamespacePresenter (SoledadBackedAccount) - - - ``incoming_mail_fetcher`` Background job for fetching incoming mails from LEAP server (LeapIncomingMail) - """ - - def __init__(self, provider, srp_session, soledad_session, nicknym, soledad_account, incoming_mail_fetcher): - """ - Constructor. - - :param leap_config: The config for this LEAP session - :type leap_config: LeapConfig - - """ - self.config = provider.config - self.provider = provider - self.srp_session = srp_session - self.soledad_session = soledad_session - self.nicknym = nicknym - self.account = soledad_account - self.incoming_mail_fetcher = incoming_mail_fetcher - - if self.config.start_background_jobs: - self.start_background_jobs() - - def account_email(self): - domain = self.provider.domain - name = self.srp_session.user_name - return '%s@%s' % (name, domain) - - def close(self): - self.stop_background_jobs() - - def start_background_jobs(self): - reactor.callFromThread(self.incoming_mail_fetcher.start_loop) - - def stop_background_jobs(self): - reactor.callFromThread(self.incoming_mail_fetcher.stop) - - def sync(self): - try: - self.soledad_session.sync() - except: - traceback.print_exc(file=sys.stderr) - raise - - -class LeapSessionFactory(object): - def __init__(self, provider): - self._provider = provider - self._config = provider.config - - def create(self, credentials): - key = self._session_key(credentials) - session = self._lookup_session(key) - if not session: - session = self._create_new_session(credentials) - self._remember_session(key, session) - - return session - - def _create_new_session(self, credentials): - self._create_dir(self._provider.config.leap_home) - self._provider.download_certificate_to('%s/ca.crt' % self._provider.config.leap_home) - - auth = LeapAuthenticator(self._provider).authenticate(credentials) - soledad = SoledadSessionFactory.create(self._provider, auth, credentials.db_passphrase) - - nicknym = self._create_nicknym(auth, soledad) - account = self._create_account(auth, soledad) - incoming_mail_fetcher = self._create_incoming_mail_fetcher(nicknym, soledad, - account, auth) - - smtp = self._create_smtp_service(nicknym, auth) - smtp.start() - - session = LeapSession(self._provider, auth, soledad, nicknym, account, incoming_mail_fetcher) - - return session - - def _lookup_session(self, key): - global SESSIONS - if key in SESSIONS: - return SESSIONS[key] - else: - return None - - def _remember_session(self, key, session): - global SESSIONS - SESSIONS[key] = session - - def _session_key(self, credentials): - return hash((self._provider, credentials.user_name)) - - def _create_dir(self, path): - try: - os.makedirs(path) - except OSError as exc: - if exc.errno == errno.EEXIST and os.path.isdir(path): - pass - else: - raise - - def _create_soledad_session(self, srp_session, db_passphrase): - return SoledadSession(self._provider, db_passphrase, srp_session) - - def _create_nicknym(self, srp_session, soledad_session): - return NickNym(self._provider, self._config, soledad_session, srp_session) - - def _create_account(self, srp_session, soledad_session): - memstore = MemoryStore(permanent_store=SoledadStore(soledad_session.soledad)) - return SoledadBackedAccount(srp_session.uuid, soledad_session.soledad, memstore) - - def _create_incoming_mail_fetcher(self, nicknym, soledad_session, account, auth): - return LeapIncomingMail(nicknym.keymanager, soledad_session.soledad, account, - self._config.fetch_interval_in_s, self._account_email(auth)) - - def _create_smtp_service(self, nicknym, auth): - return LeapSmtp(self._provider, nicknym.keymanager, auth) - - def _account_email(self, auth): - domain = self._provider.domain - name = auth.user_name - return '%s@%s' % (name, domain) diff --git a/service/app/bitmask_libraries/smtp.py b/service/app/bitmask_libraries/smtp.py deleted file mode 100644 index f07a4838..00000000 --- a/service/app/bitmask_libraries/smtp.py +++ /dev/null @@ -1,81 +0,0 @@ -import os -import requests -from .certs import which_bundle -from leap.mail.smtp import setup_smtp_gateway -import random - - -class LeapSmtp(object): - - SMTP_PORT = 2014 - - def __init__(self, provider, keymanager=None, leap_srp_session=None): - self._provider = provider - self._keymanager = keymanager - self._srp_session = leap_srp_session - self._hostname, self._port = self._discover_smtp_server() - self._smtp_port = None - self._smtp_service = None - self._twisted_port = 10000 + int(random.random() * 5000) - - def smtp_info(self): - return ('localhost', LeapSmtp.SMTP_PORT) - - def _discover_smtp_server(self): - json_data = self._provider.fetch_smtp_json() - hosts = json_data['hosts'] - hostname = hosts.keys()[0] - host = hosts[hostname] - - hostname = host['hostname'] - port = host['port'] - - return hostname, port - - def _download_client_certificates(self): - cert_path = self._client_cert_path() - - if not os.path.exists(os.path.dirname(cert_path)): - os.makedirs(os.path.dirname(cert_path)) - - session = requests.session() - cert_url = '%s/%s/cert' % (self._provider.api_uri, self._provider.api_version) - cookies = {"_session_id": self._srp_session.session_id} - - response = requests.get(cert_url, verify=which_bundle(self._provider), cookies=cookies, timeout=self._provider.config.timeout_in_s) - response.raise_for_status() - - client_cert = response.content - - with open(cert_path, 'w') as f: - f.write(client_cert) - - def _client_cert_path(self): - return os.path.join( - self._provider.config.leap_home, - "providers", - self._provider.domain, - "keys", "client", "smtp.pem") - - def start(self): - self._download_client_certificates() - cert_path = self._client_cert_path() - email = '%s@%s' % (self._srp_session.user_name, self._provider.domain) - - self._smtp_service, self._smtp_port = setup_smtp_gateway( - port=(self._twisted_port), - userid=email, - keymanager=self._keymanager, - smtp_host=self._hostname.encode('UTF-8'), - smtp_port=self._port, - smtp_cert=cert_path, - smtp_key=cert_path, - encrypted_only=False - ) - - def stop(self): - if self._smtp_service is not None: - self._smtp_port.stopListening() - self._smtp_service.doStop() - self._smtp_port = None - self._smtp_service = None diff --git a/service/app/bitmask_libraries/soledad.py b/service/app/bitmask_libraries/soledad.py deleted file mode 100644 index 132e671f..00000000 --- a/service/app/bitmask_libraries/soledad.py +++ /dev/null @@ -1,95 +0,0 @@ -import json -import os -import errno -from leap.keymanager import KeyManager -from leap.soledad.client import Soledad -from leap.soledad.common.crypto import WrongMac, UnknownMacMethod, MacMethods -import requests -import sys -import time -from .certs import which_bundle - -SOLEDAD_TIMEOUT = 120 -SOLEDAD_CERT = '/tmp/ca.crt' - - -class SoledadDiscoverException(Exception): - def __init__(self, *args, **kwargs): - super(SoledadDiscoverException, self).__init__(*args, **kwargs) - - -class SoledadWrongPassphraseException(Exception): - def __init__(self, *args, **kwargs): - super(SoledadWrongPassphraseException, self).__init__(*args, **kwargs) - - -class LeapKeyManager(object): - def __init__(self, soledad, leap_session, nicknym_url): - provider = leap_session.provider - self.keymanager = KeyManager(leap_session.account_email(), nicknym_url, soledad, - leap_session.session_id, leap_session.leap_home + '/ca.crt', provider.api_uri, leap_session.api_version, - leap_session.uuid, leap_session.leap_config.gpg_binary) - - -class SoledadSessionFactory(object): - @classmethod - def create(cls, provider, srp_session, encryption_passphrase): - return SoledadSession(provider, encryption_passphrase, srp_session) - - -class SoledadSession(object): - def __init__(self, provider, encryption_passphrase, leap_srp_session): - self.provider = provider - self.config = provider.config - self.leap_srp_session = leap_srp_session - - self.soledad = self._init_soledad(encryption_passphrase) - - def _init_soledad(self, encryption_passphrase): - try: - server_url = self._discover_soledad_server() - - self._create_database_dir() - secrets = self._secrets_path() - local_db = self._local_db_path() - - return Soledad(self.leap_srp_session.uuid, unicode(encryption_passphrase), secrets, - local_db, server_url, which_bundle(self.provider), self.leap_srp_session.token) - - except (WrongMac, UnknownMacMethod, MacMethods), e: - raise SoledadWrongPassphraseException(e) - - def _leap_path(self): - return "%s/soledad" % self.config.leap_home - - def _secrets_path(self): - return "%s/%s.secret" % (self._leap_path(), self.leap_srp_session.uuid) - - def _local_db_path(self): - return "%s/%s.db" % (self._leap_path(), self.leap_srp_session.uuid) - - def _create_database_dir(self): - try: - os.makedirs(self._leap_path()) - except OSError as exc: - if exc.errno == errno.EEXIST and os.path.isdir(self._leap_path()): - pass - else: - raise - - def sync(self): - if self.soledad.need_sync(self.soledad.server_url): - self.soledad.sync() - - def _discover_soledad_server(self): - try: - json_data = self.provider.fetch_soledad_json() - - hosts = json_data['hosts'] - host = hosts.keys()[0] - server_url = 'https://%s:%d/user-%s' % \ - (hosts[host]['hostname'], hosts[host]['port'], - self.leap_srp_session.uuid) - return server_url - except Exception, e: - raise SoledadDiscoverException(e) |