2025-07-14 01:10:12 -07:00
|
|
|
#!/bin/bash
|
|
|
|
|
2025-07-15 02:34:18 -07:00
|
|
|
yay -S --noconfirm --needed libfido2 pam-u2f
|
|
|
|
|
2025-07-17 02:05:41 -07:00
|
|
|
# Check if the user doesn't want sudo
|
|
|
|
while [[ $# -gt 0 ]]; do
|
|
|
|
case $1 in
|
|
|
|
--no-sudo) exit 0 ;;
|
|
|
|
*)
|
|
|
|
echo "Unknown option: $1 \n --no-sudo is the only option"
|
|
|
|
exit 1
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
|
2025-07-15 02:34:18 -07:00
|
|
|
tokens=$(fido2-token -L)
|
|
|
|
if [ -z "$tokens" ]; then
|
2025-07-15 03:30:28 -07:00
|
|
|
echo -e "\e[31m\nNo fido2 device detected. Plug it in, you may have to unlock it as well\e[0m"
|
|
|
|
else
|
|
|
|
|
|
|
|
# Create the pamu2fcfg file
|
|
|
|
if [ ! -f /etc/fido2/fido2 ]; then
|
|
|
|
sudo mkdir -p /etc/fido2
|
|
|
|
echo -e "\e[32m\nLet's setup your device, confirm on the device now\n\e[0m"
|
|
|
|
pamu2fcfg >/tmp/fido2 # This needs to run as the user
|
|
|
|
sudo mv /tmp/fido2 /etc/fido2/fido2
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Add fido2 auth as an option for sudo
|
|
|
|
if ! grep -q pam_u2f.so /etc/pam.d/sudo; then
|
|
|
|
sudo sed -i '1i auth sufficient pam_u2f.so cue authfile=/etc/fido2/fido2' /etc/pam.d/sudo
|
|
|
|
fi
|
2025-07-15 02:34:18 -07:00
|
|
|
fi
|