install.fairie/home/.chezmoiscripts/universal/run_onchange_before_91-configure-gpg.sh.tmpl

57 lines
2.4 KiB
Cheetah
Raw Normal View History

#!/usr/bin/env bash
Update 21 files - /home/.chezmoiscripts/universal/run_onchange_after_85-remove-shortcuts.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_94-bash-it.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_95-bootstrap-zsh-plugins.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_98-cleanup.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_99-restart-gnome.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_08-install-zx.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_09-node-version.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_10-remove-bloatware.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_11-install-docker.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_91-configure-gpg.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_85-remove-shortcuts.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_94-bash-it.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_95-bootstrap-zsh-plugins.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_98-cleanup.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_after_99-restart-gnome.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_08-install-zx.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_09-install-go.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_09-node-version.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_10-remove-bloatware.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_11-install-docker.sh.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_91-configure-gpg.sh.tmpl
2023-04-11 20:57:02 -07:00
# @file GPG Configuration
# @brief Imports the public GPG key defined by the variable `KEYID` and then assigns it ultimate trust
# @description
# This script imports your publicly hosted GPG key using `pgp.mit.edu` as the key host. It then assigns it
# the ultimate trust level. It also downloads and configures GPG to use the configuration defined in `.config.gpg`
# in the `home/.chezmoidata.yaml` file.
2023-01-24 20:36:59 -08:00
{{ includeTemplate "universal/profile-before" }}
{{ includeTemplate "universal/logg-before" }}
KEYID="{{ .user.gpg.id }}"
if [ -n "$KEYID" ] && command -v gpg > /dev/null; then
if [ ! -d "$HOME/.gnupg" ]; then
mkdir "$HOME/.gnupg"
fi
chown "$(whoami)" "$HOME/.gnupg"
chmod 700 "$HOME/.gnupg"
chown -Rf "$(whoami)" "$HOME/.gnupg/"
find "$HOME/.gnupg" -type f -exec chmod 600 {} \;
find "$HOME/.gnupg" -type d -exec chmod 700 {} \;
if [ ! -f "$HOME/.gnupg/gpg.conf" ]; then
logg 'Downloading hardened gpg.conf file to ~/.gpnupg/gpg.conf'
curl -sSL "{{ .config.gpg }}" > "$HOME/.gnupg/gpg.conf"
chmod 600 "$HOME/.gnupg/gpg.conf"
fi
KEYID_TRIMMED="$(echo "$KEYID" | sed 's/^0x//')"
if ! gpg --list-secret-keys --keyid-format=long | grep "$KEYID_TRIMMED" > /dev/null; then
logg info 'Attempting to download the specified public GPG key (`{{ .user.gpg.id }}`) from public keyservers'
sudo pkill dirmngr
dirmngr --daemon --standard-resolver
Update 55 files - /home/dot_gnupg/public/0xF0A300E4199A1C33.sig - /home/dot_gnupg/public/apt.hashicorp.sig - /home/dot_gnupg/public/linux.wazuh.sig - /home/dot_gnupg/public/qubes.uman.sig - /home/dot_ssh/authorized_keys.github.tmpl - /home/dot_ssh/endlessh/config.tmpl - /home/dot_ssh/endlessh/run_onchange_after_endlessh.tmpl - /home/dot_ssh/fail2ban/jail.local.tmpl - /home/dot_ssh/fail2ban/run_onchange_after_fail2ban.tmpl - /home/dot_ssh/private_config.tmpl - /home/dot_ssh/private_id_rsa.tmpl - /home/dot_ssh/private_ssh-audi.tmpl - /home/dot_ssh/private_ssh-blue.tmpl - /home/dot_ssh/private_ssh-fiat.tmpl - /home/dot_ssh/private_ssh-honda.tmpl - /home/dot_ssh/private_ssh-lab.pub.tmpl - /home/dot_ssh/private_ssh-lab.tmpl - /home/dot_ssh/private_ssh-mini.tmpl - /home/dot_ssh/private_ssh-red.tmpl - /home/dot_ssh/private_ssh-yellow.tmpl - /home/dot_ssh/run_onchanges_after_ensure-private-key.tmpl - /home/dot_ssh/run_onchanges_after_generate-public-keys.tmpl - /home/dot_ssh/ssh-authorized_keys.yubikey.tmpl - /home/dot_ssh/symlink_authorized_keys.tmpl - /home/dot_ssh/system/banner - /home/dot_ssh/system/run_onchange_after_sshd.tmpl - /home/dot_ssh/system/sshd_config.tmpl - /home/private_dot_gnupg/public/linux.wazuh.sig - /home/private_dot_gnupg/public/0xF0A300E4199A1C33.sig - /home/private_dot_gnupg/public/qubes.uman.sig - /home/private_dot_gnupg/public/apt.hashicorp.sig - /home/private_dot_ssh/endlessh/config.tmpl - /home/private_dot_ssh/endlessh/run_onchange_after_endlessh.tmpl - /home/private_dot_ssh/fail2ban/jail.local.tmpl - /home/private_dot_ssh/fail2ban/run_onchange_after_fail2ban.tmpl - /home/private_dot_ssh/system/banner - /home/private_dot_ssh/system/run_onchange_after_sshd.tmpl - /home/private_dot_ssh/system/sshd_config.tmpl - /home/private_dot_ssh/private_ssh-mini.tmpl - /home/private_dot_ssh/symlink_authorized_keys.tmpl - /home/private_dot_ssh/private_ssh-audi.tmpl - /home/private_dot_ssh/private_ssh-lab.pub.tmpl - /home/private_dot_ssh/private_ssh-yellow.tmpl - /home/private_dot_ssh/private_config.tmpl - /home/private_dot_ssh/run_onchanges_after_generate-public-keys.tmpl - /home/private_dot_ssh/private_ssh-fiat.tmpl - /home/private_dot_ssh/private_ssh-blue.tmpl - /home/private_dot_ssh/private_ssh-red.tmpl - /home/private_dot_ssh/ssh-authorized_keys.yubikey.tmpl - /home/private_dot_ssh/private_ssh-honda.tmpl - /home/private_dot_ssh/authorized_keys.github.tmpl - /home/private_dot_ssh/private_id_rsa.tmpl - /home/private_dot_ssh/run_onchanges_after_ensure-private-key.tmpl - /home/private_dot_ssh/private_ssh-lab.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_91-configure-gpg.tmpl
2023-02-01 08:40:47 -08:00
gpg --keyserver https://pgp.mit.edu --recv "$KEYID" || EXIT_CODE=$?
if [ -n "$EXIT_CODE" ]; then
logg info 'Non-zero exit code received when downloading public GPG key'
gpg --keyserver hkps://pgp.mit.edu --recv "$KEYID" || EXIT_CODE=$?
if [ -n "$EXIT_CODE" ]; then
logg info 'Non-zero exit code received when trying to retrieve public user GPG key on hkps://pgp.mit.edu'
gpgconf --kill dirmngr
KEYID="${KEYID^^}"
KEYID="$(echo "$KEYID" | sed 's/^0X/0x/')"
if [ -f "$HOME/.gnupg/public/$KEYID.sig" ]; then
gpg --import "$HOME/.gnupg/public/$KEYID.sig"
fi
else
logg success 'Successfully imported configured public user GPG key'
fi
fi
else
logg info 'Key is already in keyring'
fi
logg 'Ensuring the trust of the provided public GPG key is set to maximum'
echo -e "trust\n5\ny" | gpg --command-fd 0 --edit-key "$KEYID"
else
logg warn '`gpg` appears to be unavailable. Is it installed and on the PATH?'
fi