Compare commits

..

1 Commits

Author SHA1 Message Date
Christer Warén
85ec9b80d8 Update SSH Keys Sign feature 2026-01-18 18:55:03 +02:00
6 changed files with 30 additions and 70 deletions

View File

@@ -12,7 +12,7 @@ wx-login(){
elif [[ ! -z ${args['token']} ]]
then
AUTH_METHOD=token
elif [[ $(wxi-config login read) ]]
elif [[ -f "$HOME/.warengroup/config.json" && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != 'null' && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != '' ]]
then
AUTH_METHOD=token
elif [[ ! -z ${args['username']} ]]
@@ -66,7 +66,7 @@ wx-login(){
fi
TOKEN=$VAULT_LOGIN
wxi-config login write
wxi-config login
;;
token)
echo -n "Token: "
@@ -76,9 +76,9 @@ wx-login(){
then
TOKEN=${args['token']}
fi
elif [[ $(wxi-config login read) ]]
elif [[ -f "$HOME/.warengroup/config.json" && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != 'null' && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != '' ]]
then
TOKEN=$(wxi-config login read)
TOKEN=$(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token)
else
read -s TOKEN
fi
@@ -107,18 +107,13 @@ wx-login(){
then
wxi-content status "Login" "Failed"
wxi-footer
if [[ $(wxi-config login read) ]]
then
wx-logout &> /dev/null
wx-login
else
wxi-stop
fi
wx-logout &> /dev/null
wx-login
#wxi-stop
fi
TOKEN=$VAULT_LOGIN
wxi-config login write
wxi-config login
;;
*)
wxi-content status "Login Type" "Unsupported"

View File

@@ -14,7 +14,8 @@ wx-logout(){
then
wxi-header "$ORG_HEADER" h3
echo "Logging Out..."
wxi-config login erase
TOKEN=""
wxi-config login
wxi-footer
fi

View File

@@ -72,12 +72,10 @@ wx-infra(){
else
host=${args['host']}
fi
operation=${args['operation']}
extra_vars=${args['extra-vars']}
wxi-header "Manager" h3
ansible-playbook $INFRA_VAULT manager.yml --tags $operation --extra-vars "host=$host" --extra-vars="$extra_vars"
ansible-playbook $INFRA_VAULT manager.yml --tags $operation --extra-vars "host=$host"
else
wxi-header "Infra" h3
host=${args['host']}

View File

@@ -2,6 +2,8 @@ wxi-ssh-keys-sign(){
wxi-header "SSH / Keys / Sign"
wxi-restricted
wxi-ssh-keys-sign-create $ORG sysadmin 3600
if [[ $USERNAME == "cwchristerw" ]]
then
wxi-ssh-keys-sign-create cwchristerw sysadmin 3600

View File

@@ -1,24 +1,8 @@
wxi-config(){
case $1 in
login)
case $2 in
write)
jq '.login.'$ORG'.token = "'$TOKEN'"' $HOME/.warengroup/config.json &> $HOME/.warengroup/config.json.tmp
;;
read)
if [[ -f "$HOME/.warengroup/config.json" && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != 'null' && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != '' ]]
then
cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token
else
return 1
fi
;;
erase)
TOKEN=""
wxi-config login write
;;
esac
;;
jq '.login.'$ORG'.token = "'$TOKEN'"' $HOME/.warengroup/config.json &> $HOME/.warengroup/config.json.tmp
;;
*)
echo -n ""
;;

50
wx
View File

@@ -12,24 +12,8 @@ declare -Ax messages
wxi-config(){
case $1 in
login)
case $2 in
write)
jq '.login.'$ORG'.token = "'$TOKEN'"' $HOME/.warengroup/config.json &> $HOME/.warengroup/config.json.tmp
;;
read)
if [[ -f "$HOME/.warengroup/config.json" && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != 'null' && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != '' ]]
then
cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token
else
return 1
fi
;;
erase)
TOKEN=""
wxi-config login write
;;
esac
;;
jq '.login.'$ORG'.token = "'$TOKEN'"' $HOME/.warengroup/config.json &> $HOME/.warengroup/config.json.tmp
;;
*)
echo -n ""
;;
@@ -360,12 +344,10 @@ wx-infra(){
else
host=${args['host']}
fi
operation=${args['operation']}
extra_vars=${args['extra-vars']}
wxi-header "Manager" h3
ansible-playbook $INFRA_VAULT manager.yml --tags $operation --extra-vars "host=$host" --extra-vars="$extra_vars"
ansible-playbook $INFRA_VAULT manager.yml --tags $operation --extra-vars "host=$host"
else
wxi-header "Infra" h3
host=${args['host']}
@@ -424,7 +406,7 @@ wx-login(){
elif [[ ! -z ${args['token']} ]]
then
AUTH_METHOD=token
elif [[ $(wxi-config login read) ]]
elif [[ -f "$HOME/.warengroup/config.json" && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != 'null' && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != '' ]]
then
AUTH_METHOD=token
elif [[ ! -z ${args['username']} ]]
@@ -478,7 +460,7 @@ wx-login(){
fi
TOKEN=$VAULT_LOGIN
wxi-config login write
wxi-config login
;;
token)
echo -n "Token: "
@@ -488,9 +470,9 @@ wx-login(){
then
TOKEN=${args['token']}
fi
elif [[ $(wxi-config login read) ]]
elif [[ -f "$HOME/.warengroup/config.json" && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != 'null' && $(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token) != '' ]]
then
TOKEN=$(wxi-config login read)
TOKEN=$(cat $HOME/.warengroup/config.json | jq -r .login.$ORG.token)
else
read -s TOKEN
fi
@@ -519,18 +501,13 @@ wx-login(){
then
wxi-content status "Login" "Failed"
wxi-footer
if [[ $(wxi-config login read) ]]
then
wx-logout &> /dev/null
wx-login
else
wxi-stop
fi
wx-logout &> /dev/null
wx-login
#wxi-stop
fi
TOKEN=$VAULT_LOGIN
wxi-config login write
wxi-config login
;;
*)
wxi-content status "Login Type" "Unsupported"
@@ -576,7 +553,8 @@ wx-logout(){
then
wxi-header "$ORG_HEADER" h3
echo "Logging Out..."
wxi-config login erase
TOKEN=""
wxi-config login
wxi-footer
fi
@@ -860,6 +838,8 @@ wxi-ssh-keys-sign(){
wxi-header "SSH / Keys / Sign"
wxi-restricted
wxi-ssh-keys-sign-create $ORG sysadmin 3600
if [[ $USERNAME == "cwchristerw" ]]
then
wxi-ssh-keys-sign-create cwchristerw sysadmin 3600