def get_vpn_env(kls): """ Returns a dictionary with the custom env for the platform. This is mainly used for setting LD_LIBRARY_PATH to the correct path when distributing a standalone client :rtype: dict """ ld_library_path = os.path.join(get_path_prefix(), "..", "lib") ld_library_path.encode(sys.getfilesystemencoding()) return {"DYLD_LIBRARY_PATH": ld_library_path}
def __init__(self, basepath=None): """ Initialize EIP service """ super(EIPService, self).__init__() self._started = False if basepath is None: self._basepath = get_path_prefix() else: self._basepath = basepath
def get_vpn_env(kls): """ Returns a dictionary with the custom env for the platform. This is mainly used for setting LD_LIBRARY_PATH to the correct path when distributing a standalone client :rtype: dict """ ld_library_path = os.path.join(get_path_prefix(), "..", "lib") ld_library_path.encode(sys.getfilesystemencoding()) return { "LD_LIBRARY_PATH": ld_library_path }
def get_logger(perform_rollover=False): """ Push to the app stack the needed handlers and return a Logger object. :rtype: logbook.Logger """ # NOTE: make sure that the folder exists, the logger is created before # saving settings on the first run. _base = os.path.join(get_path_prefix(), "leap") mkdir_p(_base) bitmask_log_file = os.path.join(_base, 'bitmask.log') # level = logbook.WARNING # if flags.DEBUG: # level = logbook.NOTSET level = logbook.NOTSET # This handler consumes logs not handled by the others null_handler = logbook.NullHandler() null_handler.push_application() file_handler = logbook.RotatingFileHandler(bitmask_log_file, format_string=LOG_FORMAT, bubble=True, max_size=sys.maxint) if perform_rollover: file_handler.perform_rollover() file_handler.push_application() stream_handler = ColorizedStderrHandler(level=level, format_string=LOG_FORMAT, bubble=True) stream_handler.push_application() logger = logbook.Logger('leap') return logger
def test_vpn(): remotes = ( # XXX HACK picked manually from eip-service.json ("198.252.153.84", "1194"), ("46.165.242.169", "1194"), ) prefix = os.path.join(get_path_prefix(), "leap/providers/demo.bitmask.net/keys") cert_path = key_path = prefix + "/client/openvpn.pem" ca_path = prefix + "/ca/cacert.pem" extra_flags = { "auth": "SHA1", "cipher": "AES-128-CBC", "keepalive": "10 30", "tls-cipher": "DHE-RSA-AES128-SHA", "tun-ipv6": "true", } vpn = VPNManager(remotes, cert_path, key_path, ca_path, extra_flags) print("VPN: starting...") vpn_ok = vpn.start() if vpn_ok: print("VPN: started") else: print("VPN: Error starting.") return return wait(1) print "VPN: is up? -> " + str(vpn.is_up()) wait(3) print("VPN: stopping...") vpn_ok = vpn.stop() print("VPN: stopped.") wait(1) print "VPN: is up? -> " + str(vpn.is_up())
def test_vpn(): remotes = ( # XXX HACK picked manually from eip-service.json ("198.252.153.84", "1194"), ("46.165.242.169", "1194"), ) prefix = os.path.join(get_path_prefix(), "leap/providers/demo.bitmask.net/keys") cert_path = key_path = prefix + "/client/openvpn.pem" ca_path = prefix + "/ca/cacert.pem" extra_flags = { "auth": "SHA1", "cipher": "AES-128-CBC", "keepalive": "10 30", "tls-cipher": "DHE-RSA-AES128-SHA", "tun-ipv6": "true", } vpn = VPNManager(remotes, cert_path, key_path, ca_path, extra_flags) print("VPN: starting...") vpn_ok = vpn.start() if vpn_ok: print("VPN: started") else: print ("VPN: Error starting.") return return wait(1) print "VPN: is up? -> " + str(vpn.is_up()) wait(3) print("VPN: stopping...") vpn_ok = vpn.stop() print("VPN: stopped.") wait(1) print "VPN: is up? -> " + str(vpn.is_up())
def main(): # XXX HACK picked manually from eip-service.json remotes = ( ("198.252.153.84", "1194"), ("46.165.242.169", "1194"), ) prefix = os.path.join(get_path_prefix(), "leap/providers/demo.bitmask.net/keys") cert_path = key_path = prefix + "/client/openvpn.pem" ca_path = prefix + "/ca/cacert.pem" extra_flags = { "auth": "SHA1", "cipher": "AES-128-CBC", "keepalive": "10 30", "tls-cipher": "DHE-RSA-AES128-SHA", "tun-ipv6": "true", } eip = EIPManager(remotes, cert_path, key_path, ca_path, extra_flags) reactor.addSystemEventTrigger('before', 'shutdown', eip.stop) eip.start()
def get_logger(perform_rollover=False): """ Push to the app stack the needed handlers and return a Logger object. :rtype: logbook.Logger """ # NOTE: make sure that the folder exists, the logger is created before # saving settings on the first run. _base = os.path.join(get_path_prefix(), "leap") mkdir_p(_base) bitmask_log_file = os.path.join(_base, "bitmask.log") # level = logbook.WARNING # if flags.DEBUG: # level = logbook.NOTSET level = logbook.NOTSET # This handler consumes logs not handled by the others null_handler = logbook.NullHandler() null_handler.push_application() file_handler = logbook.RotatingFileHandler( bitmask_log_file, format_string=LOG_FORMAT, bubble=True, max_size=sys.maxint ) if perform_rollover: file_handler.perform_rollover() file_handler.push_application() stream_handler = ColorizedStderrHandler(level=level, format_string=LOG_FORMAT, bubble=True) stream_handler.push_application() logger = logbook.Logger("leap") return logger
def __init__(self): super(EIPService, self).__init__() # XXX picked manually from eip-service.json remotes = ( ("198.252.153.84", "1194"), ("46.165.242.169", "1194"), ) prefix = os.path.join(get_path_prefix(), "leap/providers/demo.bitmask.net/keys") cert_path = key_path = prefix + "/client/openvpn.pem" ca_path = prefix + "/ca/cacert.pem" extra_flags = { "auth": "SHA1", "cipher": "AES-128-CBC", "keepalive": "10 30", "tls-cipher": "DHE-RSA-AES128-SHA", "tun-ipv6": "true", } self._eip = EIPManager(remotes, cert_path, key_path, ca_path, extra_flags)