Server IP : 3.128.248.115 / Your IP : 18.217.132.107 Web Server : Apache/2.4.41 (Ubuntu) System : Linux ip-172-31-33-233 5.15.0-1037-aws #41~20.04.1-Ubuntu SMP Mon May 22 18:18:00 UTC 2023 x86_64 User : www-data ( 33) PHP Version : 7.4.28 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /bin/ |
Upload File : |
#!/bin/sh # # vigpg - edit an encrypted file # Copyright (C) 2010-2015 Dustin Kirkland # # Authors: Dustin Kirkland <kirkland@ubuntu.com> # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, version 3 of the License. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. set -e # Create a temporary workspace, in memory # Note that this unfortunately is not mlock(2)-able cleartext_file=$(mktemp /dev/shm/.vigpg-XXXXXXXXXXXX) # Ensure that we always remove the cleartext_file on any exit trap "shred -f ${cleartext_file} ${cleartext_file}.gpg 2>/dev/null || true" EXIT HUP INT QUIT TERM # Encrypted file from argv encrypted_file="$1" # Define our bail out function error() { # Log to stderr echo "ERROR: $1" 1>&2 # Remove our cleartext files, just in case the trap misses them somehow rm -f "$cleartext_file" "$cleartext_file".gpg # Exit non-zero to note the error condition exit 1 } if ! which gpg >/dev/null 2>&1; then echo "ERROR: gpg not found, hint..." 1>&2 echo " sudo apt-get install gnupg" 2>&1 exit 1 fi # Try to decrypt the target file if [ -e "$encrypted_file" ]; then rm -f "$cleartext_file" gpg -o "$cleartext_file" -d "$encrypted_file" || error "Unable to decrypt target" fi # Grab a checksum of the cleartext data before modification before=$(sha512sum "$cleartext_file") # Open the target cleartext file in your editor of choice # It's up to this editor to save the file, if edited sensible-editor "$cleartext_file" || error "Unable to edit target" # Calculate a checksum afterward, to dectect modification after=$(sha512sum "$cleartext_file") if [ "$before" != "$after" ]; then # File was modified, so we need to re-encrypt and overwrite our previous file run-one-until-success gpg --default-recipient-self -s -e "$cleartext_file" || error "Unable to re-encrypt target" cat "$cleartext_file".gpg > "$1" || error "Unable to write new encrypted file" echo echo "Successfully encrypted update file [$encrypted_file]" else # File was not modified, so do not re-encrypt/overwrite echo echo "The encrypted file was not modified [$encrypted_file]" fi rm -f "$cleartext_file" "$cleartext_file".gpg