summaryrefslogtreecommitdiff
path: root/service/pixelated/config/leap.py
blob: f2c025ba37fd9f73da8bbfda11ea06c282c581cf (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
from __future__ import absolute_import
import random
from pixelated.config import credentials
from leap.common.events import server as events_server
from pixelated.bitmask_libraries.config import LeapConfig
from pixelated.bitmask_libraries.certs import LeapCertificate
from pixelated.bitmask_libraries.provider import LeapProvider
from pixelated.bitmask_libraries.session import LeapSessionFactory


def initialize_leap(leap_provider_cert,
                    leap_provider_cert_fingerprint,
                    credentials_file,
                    organization_mode,
                    leap_home):
    init_monkeypatches()
    events_server.ensure_server(random.randrange(8000, 11999))
    provider, username, password = credentials.read(organization_mode, credentials_file)
    LeapCertificate.set_cert_and_fingerprint(leap_provider_cert, leap_provider_cert_fingerprint)

    config = LeapConfig(leap_home=leap_home)
    provider = LeapProvider(provider, config)
    LeapCertificate(provider).setup_ca_bundle()
    leap_session = LeapSessionFactory(provider).create(username, password)

    leap_session.soledad_session.soledad.sync(defer_decryption=False)
    leap_session.nicknym.generate_openpgp_key()
    leap_session.start_background_jobs()
    return leap_session


def init_monkeypatches():
    import pixelated.extensions.protobuf_socket
    import pixelated.extensions.sqlcipher_wal
    import pixelated.extensions.esmtp_sender_factory
    import pixelated.extensions.incoming_decrypt_header
    import pixelated.extensions.soledad_sync_exception
    import pixelated.extensions.keymanager_fetch_key
    import pixelated.extensions.requests_urllib3
    import pixelated.extensions.shared_db