#!/bin/bash ~/.local/share/omarchy/bin/omarchy-show-logo if [[ "--remove" == "$1" ]]; then echo -e "\e[32mLet's remove your Fido2 device from sudo authentication.\n\e[0m" yay -Rns --noconfirm libfido2 pam-u2f sudo rm -rf /etc/fido2 sudo sed -i '\|^auth[[:space:]]\+sufficient[[:space:]]\+pam_u2f\.so[[:space:]]\+cue[[:space:]]\+authfile=/etc/fido2/fido2$|d' /etc/pam.d/sudo echo -e "\e[32m\nYou've successfully removed the fido2 device setup.\e[0m" else echo -e "\e[32mLet's setup your Fido2 device for sudo authentication.\n\e[0m" yay -S --noconfirm --needed libfido2 pam-u2f tokens=$(fido2-token -L) if [ -z "$tokens" ]; then echo -e "\e[31m\nNo fido2 device detected. Plug it in, you may have to unlock it as well\e[0m" else # Create the pamu2fcfg file if [ ! -f /etc/fido2/fido2 ]; then sudo mkdir -p /etc/fido2 echo -e "\e[32m\nLet's setup your device by confirming on the device now.\e[0m" pamu2fcfg >/tmp/fido2 # This needs to run as the user if [ $? -ne 0 ]; then echo -e "\e[31m\nSomething went wrong. Maybe try again?\e[0m" exit 1 fi sudo mv /tmp/fido2 /etc/fido2/fido2 fi # Add fido2 auth as an option for sudo if ! grep -q pam_u2f.so /etc/pam.d/sudo; then sudo sed -i '1i auth sufficient pam_u2f.so cue authfile=/etc/fido2/fido2' /etc/pam.d/sudo fi if ! sudo echo -e "\e[32m\nPerfect! Now you can use your fido2 device for sudo.\e[0m"; then echo -e "\e[31m\nSomething went wrong. Maybe try again?\e[0m" fi fi fi ~/.local/share/omarchy/bin/omarchy-show-done