summaryrefslogtreecommitdiff
path: root/service/pixelated/config/leap.py
blob: 91c8db1f9ed4e024454d28ec132d984bb6725256 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
from __future__ import absolute_import
import logging
from twisted.internet import defer, threads
from leap.common.events import (server as events_server)
from leap.soledad.common.errors import InvalidAuthTokenError
from leap.auth import SRPAuth

from pixelated.config import credentials
from pixelated.config import leap_config
from pixelated.bitmask_libraries.certs import LeapCertificate
from pixelated.bitmask_libraries.provider import LeapProvider
from pixelated.config.sessions import LeapSessionFactory

log = logging.getLogger(__name__)


def initialize_leap_provider(provider_hostname, provider_cert, provider_fingerprint, leap_home):
    LeapCertificate.set_cert_and_fingerprint(provider_cert,
                                             provider_fingerprint)
    leap_config.set_leap_home(leap_home)
    provider = LeapProvider(provider_hostname)
    provider.download_certificate()
    LeapCertificate(provider).setup_ca_bundle()
    provider.download_soledad_json()
    provider.download_smtp_json()
    return provider


@defer.inlineCallbacks
def initialize_leap_multi_user(provider_hostname,
                               leap_provider_cert,
                               leap_provider_cert_fingerprint,
                               credentials_file,
                               leap_home):

    config, provider = initialize_leap_provider(provider_hostname, leap_provider_cert, leap_provider_cert_fingerprint, leap_home)

    defer.returnValue((config, provider))


@defer.inlineCallbacks
def create_leap_session(provider, username, password, auth=None):
    leap_session = yield LeapSessionFactory(provider).create(username, password, auth)
    try:
        yield leap_session.first_required_sync()
    except InvalidAuthTokenError:
        try:
            leap_session.close()
        except Exception, e:
            log.error(e)
        leap_session = LeapSessionFactory(provider).create(username, password, auth)
        yield leap_session.first_required_sync()

    defer.returnValue(leap_session)


@defer.inlineCallbacks
def initialize_leap_single_user(leap_provider_cert,
                                leap_provider_cert_fingerprint,
                                credentials_file,
                                leap_home):

    init_monkeypatches()
    events_server.ensure_server()

    provider, username, password = credentials.read(credentials_file)

    config, provider = initialize_leap_provider(provider, leap_provider_cert, leap_provider_cert_fingerprint, leap_home)

    try:
        auth = yield authenticate(provider, username, password)
    except SRPAuthenticationError:
        raise UnauthorizedLogin()

    leap_session = yield create_leap_session(provider, username, password, auth)

    defer.returnValue(leap_session)


def authenticate(provider, user, password):
    srp_auth = SRPAuth(provider.api_uri, provider.local_ca_crt)
    d = threads.deferToThread(srp_auth.authenticate, user, password)
    return d


def init_monkeypatches():
    import pixelated.extensions.requests_urllib3