|
| 1 | +#!/usr/bin/env bash |
| 2 | +set -euo pipefail |
| 3 | + |
| 4 | +ROOT="$(cd "$(dirname "${BASH_SOURCE[0]}")/.." && pwd)" |
| 5 | +OUTPUT_ENCRYPTED="$ROOT/secrets/zapstore-signing.env.age" |
| 6 | +OUTPUT_ENCRYPTED_NEXT="$ROOT/secrets/zapstore-signing.env.age.next" |
| 7 | +CI_KEY_TMP="$ROOT/secrets/.age-key.ci.tmp" |
| 8 | + |
| 9 | +# Defaults from ~/configs/secrets/secrets.nix; can be overridden via env. |
| 10 | +YUBIKEY_PRIMARY="${PIKA_YUBIKEY_PRIMARY_RECIPIENT:-age1yubikey1q0zhu9e7zrj48zmnpx4fg07c0drt9f57e26uymgxa4h3fczwutzjjp5a6y5}" |
| 11 | +YUBIKEY_BACKUP="${PIKA_YUBIKEY_BACKUP_RECIPIENT:-age1yubikey1qtdv7spad78v4yhrtrts6tvv5wc80vw6mah6g64m9cr9l3ryxsf2jdx8gs9}" |
| 12 | +CI_RECIPIENT="${PIKA_CI_AGE_RECIPIENT:-}" |
| 13 | + |
| 14 | +usage() { |
| 15 | + cat <<'USAGE' |
| 16 | +usage: ./scripts/encrypt-zapstore-signing |
| 17 | +
|
| 18 | +Encrypts `secrets/zapstore-signing.env.age` with: |
| 19 | + - YubiKey primary recipient |
| 20 | + - YubiKey backup recipient |
| 21 | + - CI recipient (from PIKA_CI_AGE_RECIPIENT, AGE_SECRET_KEY, `server` in configs, or prompt) |
| 22 | +
|
| 23 | +Input: |
| 24 | + - `PIKA_ZAPSTORE_SIGN_WITH` (recommended) |
| 25 | + - or interactive prompt |
| 26 | +
|
| 27 | +Environment overrides: |
| 28 | + PIKA_ZAPSTORE_SIGN_WITH |
| 29 | + PIKA_CI_AGE_RECIPIENT |
| 30 | + PIKA_YUBIKEY_PRIMARY_RECIPIENT |
| 31 | + PIKA_YUBIKEY_BACKUP_RECIPIENT |
| 32 | +USAGE |
| 33 | +} |
| 34 | + |
| 35 | +need_cmd() { |
| 36 | + if ! command -v "$1" >/dev/null 2>&1; then |
| 37 | + echo "error: missing command: $1" >&2 |
| 38 | + exit 1 |
| 39 | + fi |
| 40 | +} |
| 41 | + |
| 42 | +load_recipients_from_configs() { |
| 43 | + local cfg="$HOME/configs/secrets/secrets.nix" |
| 44 | + local candidate="" |
| 45 | + if [ ! -f "$cfg" ]; then |
| 46 | + return 0 |
| 47 | + fi |
| 48 | + |
| 49 | + candidate="$(grep -E 'yubikey_primary = "age1' "$cfg" | head -n 1 | sed -E 's/.*"(age1[^"]+)".*/\1/')" |
| 50 | + if [ -z "${PIKA_YUBIKEY_PRIMARY_RECIPIENT:-}" ] && [ -n "$candidate" ]; then |
| 51 | + YUBIKEY_PRIMARY="$candidate" |
| 52 | + fi |
| 53 | + |
| 54 | + candidate="$(grep -E 'yubikey_backup = "age1' "$cfg" | head -n 1 | sed -E 's/.*"(age1[^"]+)".*/\1/')" |
| 55 | + if [ -z "${PIKA_YUBIKEY_BACKUP_RECIPIENT:-}" ] && [ -n "$candidate" ]; then |
| 56 | + YUBIKEY_BACKUP="$candidate" |
| 57 | + fi |
| 58 | + |
| 59 | + if [ -z "${PIKA_CI_AGE_RECIPIENT:-}" ] && [ -z "$CI_RECIPIENT" ]; then |
| 60 | + candidate="$(grep -E 'server = "age1' "$cfg" | head -n 1 | sed -E 's/.*"(age1[^"]+)".*/\1/')" |
| 61 | + if [ -n "$candidate" ]; then |
| 62 | + CI_RECIPIENT="$candidate" |
| 63 | + fi |
| 64 | + fi |
| 65 | +} |
| 66 | + |
| 67 | +cleanup() { |
| 68 | + rm -f "$CI_KEY_TMP" "$OUTPUT_ENCRYPTED_NEXT" |
| 69 | +} |
| 70 | +trap cleanup EXIT INT TERM |
| 71 | + |
| 72 | +if [ "${1:-}" = "-h" ] || [ "${1:-}" = "--help" ]; then |
| 73 | + usage |
| 74 | + exit 0 |
| 75 | +fi |
| 76 | +if [ "$#" -ne 0 ]; then |
| 77 | + usage >&2 |
| 78 | + exit 2 |
| 79 | +fi |
| 80 | + |
| 81 | +need_cmd age |
| 82 | +need_cmd age-keygen |
| 83 | +need_cmd grep |
| 84 | +need_cmd sed |
| 85 | + |
| 86 | +load_recipients_from_configs |
| 87 | + |
| 88 | +if [ -z "$CI_RECIPIENT" ] && [ -n "${AGE_SECRET_KEY:-}" ]; then |
| 89 | + umask 077 |
| 90 | + printf '%s\n' "$AGE_SECRET_KEY" >"$CI_KEY_TMP" |
| 91 | + CI_RECIPIENT="$(age-keygen -y "$CI_KEY_TMP")" |
| 92 | +fi |
| 93 | + |
| 94 | +if [ -z "$CI_RECIPIENT" ]; then |
| 95 | + if [ -t 0 ]; then |
| 96 | + read -r -p "Enter CI age recipient (age1...): " CI_RECIPIENT |
| 97 | + else |
| 98 | + echo "error: set PIKA_CI_AGE_RECIPIENT, AGE_SECRET_KEY, or configure server recipient in ~/configs/secrets/secrets.nix" >&2 |
| 99 | + exit 1 |
| 100 | + fi |
| 101 | +fi |
| 102 | + |
| 103 | +if ! printf '%s\n' "$CI_RECIPIENT" | grep -Eq '^age1[023456789acdefghjklmnpqrstuvwxyz]+$'; then |
| 104 | + echo "error: invalid CI recipient format (expected age1...)" >&2 |
| 105 | + exit 1 |
| 106 | +fi |
| 107 | + |
| 108 | +sign_with="${PIKA_ZAPSTORE_SIGN_WITH:-}" |
| 109 | +if [ -z "$sign_with" ]; then |
| 110 | + if [ ! -t 0 ]; then |
| 111 | + echo "error: set PIKA_ZAPSTORE_SIGN_WITH when running non-interactively" >&2 |
| 112 | + exit 1 |
| 113 | + fi |
| 114 | + read -r -s -p "Enter Zapstore SIGN_WITH (nsec or bunker URL): " sign_with |
| 115 | + printf '\n' |
| 116 | +fi |
| 117 | + |
| 118 | +if [ -z "$sign_with" ]; then |
| 119 | + echo "error: missing Zapstore SIGN_WITH value" >&2 |
| 120 | + exit 1 |
| 121 | +fi |
| 122 | + |
| 123 | +mkdir -p "$ROOT/secrets" |
| 124 | +umask 077 |
| 125 | + |
| 126 | +{ |
| 127 | + printf 'ZAPSTORE_SIGN_WITH=%s\n' "$sign_with" |
| 128 | +} | age -e \ |
| 129 | + -r "$YUBIKEY_PRIMARY" \ |
| 130 | + -r "$YUBIKEY_BACKUP" \ |
| 131 | + -r "$CI_RECIPIENT" \ |
| 132 | + -o "$OUTPUT_ENCRYPTED_NEXT" |
| 133 | + |
| 134 | +chmod 600 "$OUTPUT_ENCRYPTED_NEXT" |
| 135 | +mv "$OUTPUT_ENCRYPTED_NEXT" "$OUTPUT_ENCRYPTED" |
| 136 | + |
| 137 | +unset sign_with |
| 138 | + |
| 139 | +echo "ok: wrote $OUTPUT_ENCRYPTED" |
| 140 | +echo "ok: recipients:" |
| 141 | +echo " - $YUBIKEY_PRIMARY" |
| 142 | +echo " - $YUBIKEY_BACKUP" |
| 143 | +echo " - $CI_RECIPIENT (CI)" |
0 commit comments