diff options
| -rw-r--r-- | client/changes/bug_unlock_shared_if_fails | 2 | ||||
| -rw-r--r-- | client/src/leap/soledad/client/__init__.py | 84 | 
2 files changed, 53 insertions, 33 deletions
diff --git a/client/changes/bug_unlock_shared_if_fails b/client/changes/bug_unlock_shared_if_fails new file mode 100644 index 00000000..fc5716e4 --- /dev/null +++ b/client/changes/bug_unlock_shared_if_fails @@ -0,0 +1,2 @@ +  o Unlock shared_db if anything fails in the bootstrap +    sequence. Fixes #4702.
\ No newline at end of file diff --git a/client/src/leap/soledad/client/__init__.py b/client/src/leap/soledad/client/__init__.py index 62f93b3d..4c1a4195 100644 --- a/client/src/leap/soledad/client/__init__.py +++ b/client/src/leap/soledad/client/__init__.py @@ -315,6 +315,47 @@ class Soledad(object):      # initialization/destruction methods      # +    def _get_or_gen_crypto_secrets(self): +        """ +        Retrieves or generates the crypto secrets. + +        Might raise BootstrapSequenceError +        """ +        doc = self._get_secrets_from_shared_db() + +        if doc: +            logger.info( +                'Found cryptographic secrets in shared recovery ' +                'database.') +            _, mac = self.import_recovery_document(doc.content) +            if mac is False: +                self.put_secrets_in_shared_db() +            self._store_secrets()  # save new secrets in local file +            if self._secret_id is None: +                self._set_secret_id(self._secrets.items()[0][0]) +        else: +            # STAGE 3 - there are no secrets in server also, so +            # generate a secret and store it in remote db. +            logger.info( +                'No cryptographic secrets found, creating new ' +                ' secrets...') +            self._set_secret_id(self._gen_secret()) +            try: +                self._put_secrets_in_shared_db() +            except Exception as ex: +                # storing generated secret in shared db failed for +                # some reason, so we erase the generated secret and +                # raise. +                try: +                    os.unlink(self._secrets_path) +                except OSError as e: +                    if e.errno != errno.ENOENT:  # no such file or directory +                        logger.exception(e) +                logger.exception(ex) +                raise BootstrapSequenceError( +                    'Could not store generated secret in the shared ' +                    'database, bailing out...') +      def _bootstrap(self):          """          Bootstrap local Soledad instance. @@ -342,6 +383,8 @@ class Soledad(object):          self._init_dirs()          self._crypto = SoledadCrypto(self) +        secrets_problem = None +          # STAGE 1 - verify if secrets exist locally          if not self._has_secret():  # try to load from local storage. @@ -360,38 +403,10 @@ class Soledad(object):              except AlreadyLockedError:                  raise BootstrapSequenceError('Database is already locked.') -            doc = self._get_secrets_from_shared_db() -            if doc: -                logger.info( -                    'Found cryptographic secrets in shared recovery ' -                    'database.') -                _, mac = self.import_recovery_document(doc.content) -                if mac is False: -                    self.put_secrets_in_shared_db() -                self._store_secrets()  # save new secrets in local file -                if self._secret_id is None: -                    self._set_secret_id(self._secrets.items()[0][0]) -            else: -                # STAGE 3 - there are no secrets in server also, so -                # generate a secret and store it in remote db. -                logger.info( -                    'No cryptographic secrets found, creating new ' -                    ' secrets...') -                self._set_secret_id(self._gen_secret()) -                try: -                    self._put_secrets_in_shared_db() -                except Exception: -                    # storing generated secret in shared db failed for -                    # some reason, so we erase the generated secret and -                    # raise. -                    try: -                        os.unlink(self._secrets_path) -                    except OSError as e: -                        if errno == 2:  # no such file or directory -                            pass -                    raise BootstrapSequenceError( -                        'Could not store generated secret in the shared ' -                        'database, bailing out...') +            try: +                self._get_or_gen_crypto_secrets() +            except Exception as e: +                secrets_problem = e              # release the lock on shared db              try: @@ -416,7 +431,10 @@ class Soledad(object):              # --- end of atomic operation in shared db ---          # STAGE 4 - local database initialization -        self._init_db() +        if secrets_problem is None: +            self._init_db() +        else: +            raise secrets_problem      def _init_dirs(self):          """  | 
