export PIN=111111
export SIGN_KEY=11
export ENC_KEY=55
-
Create a data to sign
echo "data to sign (max 100 bytes)" > data
#!/usr/bin/env bash | |
## Loopback Filesystem | |
# This script will create and mount a loopback filesystem | |
# Useful if you need to limit director(ies) by size | |
# but only have one volume | |
# This script needs to be run with sudo | |
LO_FILESYSTEM_NAME=my_loopback | |
LO_FILESYSTEM_MB_SIZE=5 |
#!/bin/bash | |
# | |
# Initial script to create users when launching an Ubuntu server EC2 instance | |
# | |
declare -A USERKEY | |
# | |
# Create one entry for every user who needs access. Be sure to change the key to their |
Last updated March 13, 2024
This Gist explains how to sign commits using gpg in a step-by-step fashion. Previously, krypt.co was heavily mentioned, but I've only recently learned they were acquired by Akamai and no longer update their previous free products. Those mentions have been removed.
Additionally, 1Password now supports signing Git commits with SSH keys and makes it pretty easy-plus you can easily configure Git Tower to use it for both signing and ssh.
For using a GUI-based GIT tool such as Tower or Github Desktop, follow the steps here for signing your commits with GPG.
Here we create the master key. We want only Certify
capability: we use the master key only to create the subkeys, Sign - Encrypt - Authenticate
capabilities will be assigned to the subkeys.
Run the following command to start the master key generation process. Select the set your own capabilities
creation process (type 8
)
▶ gpg --full-generate-key --expert
gpg (GnuPG) 2.2.9; Copyright (C) 2018 Free Software Foundation, Inc.
103.120.66.35 | |
103.120.66.51 | |
103.227.255.101 | |
103.60.9.27 | |
103.60.9.75 | |
103.62.49.193 | |
103.62.49.195 | |
103.62.49.198 | |
103.62.49.203 | |
103.62.49.205 |
#!/bin/bash | |
## DESCRIPTION: | |
## AUTHOR: $USER_FULLNAME | |
declare -r SCRIPT_NAME=$(basename "$BASH_SOURCE" .sh) | |
## exit the shell(default status code: 1) after printing the message to stderr | |
bail() { |
$ openssl s_client -servername token.actions.githubusercontent.com -showcerts -connect token.actions.githubusercontent.com:443 < /dev/null 2>/dev/null | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' | sed "0,/-END CERTIFICATE-/d" > certificate.crt | |
$ openssl x509 -in certificate.crt -fingerprint -noout | cut -f2 -d'=' | tr -d ':' | tr '[:upper:]' '[:lower:]' | |
6938fd4d98bab03faadb97b34396831e3780aea1 |