9de3b66c56
- /home/dot_gnupg/public/0xF0A300E4199A1C33.sig - /home/dot_gnupg/public/apt.hashicorp.sig - /home/dot_gnupg/public/linux.wazuh.sig - /home/dot_gnupg/public/qubes.uman.sig - /home/dot_ssh/authorized_keys.github.tmpl - /home/dot_ssh/endlessh/config.tmpl - /home/dot_ssh/endlessh/run_onchange_after_endlessh.tmpl - /home/dot_ssh/fail2ban/jail.local.tmpl - /home/dot_ssh/fail2ban/run_onchange_after_fail2ban.tmpl - /home/dot_ssh/private_config.tmpl - /home/dot_ssh/private_id_rsa.tmpl - /home/dot_ssh/private_ssh-audi.tmpl - /home/dot_ssh/private_ssh-blue.tmpl - /home/dot_ssh/private_ssh-fiat.tmpl - /home/dot_ssh/private_ssh-honda.tmpl - /home/dot_ssh/private_ssh-lab.pub.tmpl - /home/dot_ssh/private_ssh-lab.tmpl - /home/dot_ssh/private_ssh-mini.tmpl - /home/dot_ssh/private_ssh-red.tmpl - /home/dot_ssh/private_ssh-yellow.tmpl - /home/dot_ssh/run_onchanges_after_ensure-private-key.tmpl - /home/dot_ssh/run_onchanges_after_generate-public-keys.tmpl - /home/dot_ssh/ssh-authorized_keys.yubikey.tmpl - /home/dot_ssh/symlink_authorized_keys.tmpl - /home/dot_ssh/system/banner - /home/dot_ssh/system/run_onchange_after_sshd.tmpl - /home/dot_ssh/system/sshd_config.tmpl - /home/private_dot_gnupg/public/linux.wazuh.sig - /home/private_dot_gnupg/public/0xF0A300E4199A1C33.sig - /home/private_dot_gnupg/public/qubes.uman.sig - /home/private_dot_gnupg/public/apt.hashicorp.sig - /home/private_dot_ssh/endlessh/config.tmpl - /home/private_dot_ssh/endlessh/run_onchange_after_endlessh.tmpl - /home/private_dot_ssh/fail2ban/jail.local.tmpl - /home/private_dot_ssh/fail2ban/run_onchange_after_fail2ban.tmpl - /home/private_dot_ssh/system/banner - /home/private_dot_ssh/system/run_onchange_after_sshd.tmpl - /home/private_dot_ssh/system/sshd_config.tmpl - /home/private_dot_ssh/private_ssh-mini.tmpl - /home/private_dot_ssh/symlink_authorized_keys.tmpl - /home/private_dot_ssh/private_ssh-audi.tmpl - /home/private_dot_ssh/private_ssh-lab.pub.tmpl - /home/private_dot_ssh/private_ssh-yellow.tmpl - /home/private_dot_ssh/private_config.tmpl - /home/private_dot_ssh/run_onchanges_after_generate-public-keys.tmpl - /home/private_dot_ssh/private_ssh-fiat.tmpl - /home/private_dot_ssh/private_ssh-blue.tmpl - /home/private_dot_ssh/private_ssh-red.tmpl - /home/private_dot_ssh/ssh-authorized_keys.yubikey.tmpl - /home/private_dot_ssh/private_ssh-honda.tmpl - /home/private_dot_ssh/authorized_keys.github.tmpl - /home/private_dot_ssh/private_id_rsa.tmpl - /home/private_dot_ssh/run_onchanges_after_ensure-private-key.tmpl - /home/private_dot_ssh/private_ssh-lab.tmpl - /home/.chezmoiscripts/universal/run_onchange_before_91-configure-gpg.tmpl
20 lines
627 B
Bash
20 lines
627 B
Bash
#!/usr/bin/env bash
|
|
|
|
{{ $sshFiles := (output "find" (joinPath .chezmoi.homeDir ".ssh") "-type" "f") -}}
|
|
{{- range $sshFile := splitList "\n" $sshFiles -}}
|
|
{{- if ne $sshFile "" -}}
|
|
# {{ $sshFile }} hash: {{ $sshFile | sha256sum }}
|
|
{{ end -}}
|
|
{{- end }}
|
|
|
|
{{ includeTemplate "universal/profile" }}
|
|
{{ includeTemplate "universal/logg" }}
|
|
|
|
logg info 'Ensuring RSA public keys are present'
|
|
|
|
find "$HOME/.ssh" -type f | while read FILE; do
|
|
if [ ! -f "${FILE}" ] && cat "$FILE" | grep 'BEGIN RSA PRIVATE KEY'; then
|
|
logg info 'Generating missing public key for `'"$FILE"'`'
|
|
ssh-keygen -f "$FILE" -y > "${FILE}.pub"
|
|
fi
|
|
done
|