1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
from __future__ import absolute_import
import logging
from twisted.internet import defer, threads
from leap.common.events import (server as events_server)
from leap.soledad.common.errors import InvalidAuthTokenError
from leap.auth import SRPAuth
from pixelated.config import credentials
from pixelated.config import leap_config
from pixelated.bitmask_libraries.certs import LeapCertificate
from pixelated.bitmask_libraries.provider import LeapProvider
from pixelated.config.sessions import LeapSessionFactory
log = logging.getLogger(__name__)
def initialize_leap_provider(provider_hostname, provider_cert, provider_fingerprint, leap_home):
LeapCertificate.set_cert_and_fingerprint(provider_cert,
provider_fingerprint)
leap_config.set_leap_home(leap_home)
provider = LeapProvider(provider_hostname)
provider.download_certificate()
LeapCertificate(provider).setup_ca_bundle()
provider.download_soledad_json()
provider.download_smtp_json()
return provider
@defer.inlineCallbacks
def initialize_leap_multi_user(provider_hostname,
leap_provider_cert,
leap_provider_cert_fingerprint,
credentials_file,
leap_home):
config, provider = initialize_leap_provider(provider_hostname, leap_provider_cert, leap_provider_cert_fingerprint, leap_home)
defer.returnValue((config, provider))
@defer.inlineCallbacks
def create_leap_session(provider, username, password, auth=None):
leap_session = yield LeapSessionFactory(provider).create(username, password, auth)
try:
yield leap_session.first_required_sync()
except InvalidAuthTokenError:
try:
leap_session.close()
except Exception, e:
log.error(e)
leap_session = LeapSessionFactory(provider).create(username, password, auth)
yield leap_session.first_required_sync()
defer.returnValue(leap_session)
@defer.inlineCallbacks
def initialize_leap_single_user(leap_provider_cert,
leap_provider_cert_fingerprint,
credentials_file,
leap_home):
init_monkeypatches()
events_server.ensure_server()
provider, username, password = credentials.read(credentials_file)
config, provider = initialize_leap_provider(provider, leap_provider_cert, leap_provider_cert_fingerprint, leap_home)
try:
auth = yield authenticate(provider, username, password)
except SRPAuthenticationError:
raise UnauthorizedLogin()
leap_session = yield create_leap_session(provider, username, password, auth)
defer.returnValue(leap_session)
def authenticate(provider, user, password):
srp_auth = SRPAuth(provider.api_uri, provider.local_ca_crt)
d = threads.deferToThread(srp_auth.authenticate, user, password)
return d
def init_monkeypatches():
import pixelated.extensions.requests_urllib3
|