Key Provisioning Service
Provision authorized_keys from HTTPS/GitHub/GitLab and automatically keep them up to date.
Provisioning the authorized_keys for a user is usually either a cumbersome process, requiring a human to manually update a list of keys and redeploy every time a key changes or a person joins/leaves the team, or it involves setting up secret management providers that can be overkill in many situations. The needs of many sysadmins lie between these two extremes.
keyps aims to fill part of that gap by simplifying and automating the provisioning of authorized_keys by (re-)using infrastructure/services that are already ubiquitous. This allows individual team members to manage their keys and have those changes reflected on the machines they've been permitted access to without redeploying or deploying complicated additional infrastructure.
- Nix:
nix run github:srounce/keyps
TODO: Improve this section
$ keyps -s github:srounce-
-v...Verbosity level, the more
vs the more verbose program output will be.Example:
-vvv -
-f,--file <FILE>Path to authorized_keys file (eg. ./authorized_keys). This file must exist and be writable.
If not specified, an upward search for the closest available
.ssh/authorized_keysfile will be performed from the current working directory. -
-s,--source <SOURCES>One or more sources with one of the following formats:
github:<username>gitlab:<username>https://example.com/my.keys
-
-i,--interval <INTERVAL>Time in seconds to wait between polling sources
Default: 10
-
-h,--helpPrint help (see a summary with '-h')
-
-V,--versionPrint version