summaryrefslogtreecommitdiff
path: root/bin/kj-sync-keys.sh
blob: b8be72d765b05c8d9a7985d4cb1b4012a16be1f1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
#!/bin/bash
#
# This script syncs authorized keys (found in the $authorized_keys_file below)
# to a list of remote hosts. It does not touch existing keys unless overwrite
# is set to true, but creates a special section containing the keys.

declare -r begin_marker="### BEGIN MANAGED_BY_KJ_SYNC_AUTHORIZED_KEYS.SH ###"
declare -r end_marker="### END MANAGED_BY_KJ_SYNC_AUTHORIZED_KEYS.SH ###"
# If overwrite=true, the entire authorized_keys file is overwritten.
declare -r overwrite=false
declare -r tmpdir=$(mktemp -d /tmp/kj_sync_authorized_keys.XXXXX)

targets=(
  root@orbekk.osl.trygveandre.net
  tesuji.6.orbekk.com
  login.6.orbekk.com
  minecraft.6.orbekk.com
  login.pvv.ntnu.no
  aji.orbekk.com
  moyo.orbekk.com
  pi@photobox.6.orbekk.com
)
authorized_keys_file=$HOME/dotfiles/authorized_keys
if [[ ! -f "${authorized_keys_file}" ]]; then
  echo "could not find authorized_keys_file: ${authorized_keys_file}"
  exit 1
fi

add_keys_to_file() {
  local filename="$1"
  awk \
    "/$begin_marker/"' { exit 0 } { print }' \
    ${filename} > ${filename}.header
  awk \
    "/$end_marker/"' { should_output=1 } should_output { print }' \
    ${filename} > ${filename}.footer

  cat "${filename}.header" > ${filename}
  echo "${begin_marker}" >> ${filename}
  echo "# WARNING: ANY CHANGES WILL BE OVERWRITTEN" >> ${filename}
  cat "$authorized_keys_file" >> ${filename}
  echo "${end_marker}" >> ${filename}
  cat "${filename}.footer" >> ${filename}
}

for target in ${targets[@]}; do
  echo "syncing $target"
  tmp="${tmpdir}/${target}"
  touch ${tmp}
  if [[ $overwrite != true ]]; then
    ssh ${target} 'cat .ssh/authorized_keys || echo -n' > ${tmp}
  fi
  add_keys_to_file "${tmp}"
  ssh ${target} 'mkdir -p .ssh'
  cat "${tmp}" | ssh ${target} 'cat > .ssh/authorized_keys.tmp && mv .ssh/authorized_keys{.tmp,}'
done