blob: f2c025ba37fd9f73da8bbfda11ea06c282c581cf (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
|
from __future__ import absolute_import
import random
from pixelated.config import credentials
from leap.common.events import server as events_server
from pixelated.bitmask_libraries.config import LeapConfig
from pixelated.bitmask_libraries.certs import LeapCertificate
from pixelated.bitmask_libraries.provider import LeapProvider
from pixelated.bitmask_libraries.session import LeapSessionFactory
def initialize_leap(leap_provider_cert,
leap_provider_cert_fingerprint,
credentials_file,
organization_mode,
leap_home):
init_monkeypatches()
events_server.ensure_server(random.randrange(8000, 11999))
provider, username, password = credentials.read(organization_mode, credentials_file)
LeapCertificate.set_cert_and_fingerprint(leap_provider_cert, leap_provider_cert_fingerprint)
config = LeapConfig(leap_home=leap_home)
provider = LeapProvider(provider, config)
LeapCertificate(provider).setup_ca_bundle()
leap_session = LeapSessionFactory(provider).create(username, password)
leap_session.soledad_session.soledad.sync(defer_decryption=False)
leap_session.nicknym.generate_openpgp_key()
leap_session.start_background_jobs()
return leap_session
def init_monkeypatches():
import pixelated.extensions.protobuf_socket
import pixelated.extensions.sqlcipher_wal
import pixelated.extensions.esmtp_sender_factory
import pixelated.extensions.incoming_decrypt_header
import pixelated.extensions.soledad_sync_exception
import pixelated.extensions.keymanager_fetch_key
import pixelated.extensions.requests_urllib3
import pixelated.extensions.shared_db
|