contrib/pa-rekey
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
#!/bin/sh
#
# rotate keys and reencrypt passwords
#
# Reuse identities file: export PA_IDENTITIES=~/.local/share/pa/identities
# Reuse recipients file: export PA_RECIPIENTS=~/.local/share/pa/recipients
die() {
printf 'error: %s.\n' "$1" >&2
exit 1
}
age=$(command -v age || command -v rage) ||
die "age not found, install per https://age-encryption.org"
age_keygen=$(command -v age-keygen || command -v rage-keygen) ||
die "age-keygen not found, install per https://age-encryption.org"
# Restrict permissions of any new files to only the current user.
umask 077
basedir=${XDG_DATA_HOME:=$HOME/.local/share}/pa
: "${PA_DIR:=$basedir/passwords}"
mkdir "$basedir/tmp" ||
die "Couldn't create temporary directory"
trap 'rm -rf "$basedir/tmp"; exit' EXIT
trap 'rm -rf "$basedir/tmp"; trap - INT; kill -s INT 0' INT
cp -R "$PA_DIR" "$basedir/tmp/passwords" ||
die "Couldn't copy password directory"
# Remove git repository for forward secrecy.
rm -rf "$basedir/tmp/passwords/.git"
[ "$PA_IDENTITIES" ] && cp "$PA_IDENTITIES" "$basedir/tmp/identities"
[ "$PA_RECIPIENTS" ] && cp "$PA_RECIPIENTS" "$basedir/tmp/recipients"
$age_keygen >>"$basedir/tmp/identities" 2>/dev/null
$age_keygen -y "$basedir/tmp/identities" >>"$basedir/tmp/recipients" 2>/dev/null
pa list | while read -r name; do
pa show "$name" | $age -R "$basedir/tmp/recipients" -o "$basedir/tmp/passwords/$name.age" ||
die "Couldn't encrypt $name.age"
done
trap - INT EXIT
rm -rf "$PA_DIR"
mv "$basedir/tmp/passwords" "$PA_DIR"
mv "$basedir/tmp/identities" "$basedir/identities"
mv "$basedir/tmp/recipients" "$basedir/recipients"
rmdir "$basedir/tmp"
# Recreate git repository if needed.
pa list >/dev/null