1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
|
from pixelated.config.config import Config
from pixelated.config.config_ua import config_user_agent
from pixelated.config.dispatcher import config_dispatcher
from leap.common.events import server as events_server
import pixelated.bitmask_libraries.certs as certs
from pixelated.bitmask_libraries.session import open_leap_session
def initialize_leap(leap_provider_cert,
leap_provider_cert_fingerprint,
config_file,
dispatcher,
dispatcher_stdin,
leap_home):
init_monkeypatches()
provider, user, password = gather_credentials(dispatcher,
dispatcher_stdin,
config_file)
init_leap_cert(leap_provider_cert, leap_provider_cert_fingerprint)
events_server.ensure_server(port=8090)
leap_session = create_leap_session(provider, user, password, leap_home)
return leap_session
def gather_credentials(dispatcher, dispatcher_stdin, config_file):
if dispatcher or dispatcher_stdin:
return config_dispatcher(dispatcher)
else:
return config_user_agent(config_file)
def create_leap_session(provider, username, password, leap_home):
leap_session = open_leap_session(username,
password,
provider,
leap_home)
leap_session.soledad_session.soledad.sync(defer_decryption=False)
leap_session.nicknym.generate_openpgp_key()
return leap_session
def init_leap_cert(leap_provider_cert, leap_provider_cert_fingerprint):
if leap_provider_cert_fingerprint is None:
certs.LEAP_CERT = leap_provider_cert or True
certs.LEAP_FINGERPRINT = None
else:
certs.LEAP_FINGERPRINT = leap_provider_cert_fingerprint
certs.LEAP_CERT = False
def init_monkeypatches():
import pixelated.support.ext_protobuf
import pixelated.support.ext_sqlcipher
import pixelated.support.ext_esmtp_sender_factory
import pixelated.support.ext_fetch
import pixelated.support.ext_sync
import pixelated.support.ext_keymanager_fetch_key
import pixelated.support.ext_requests_urllib3
|