Use a hack to allow gpg-agent forwarding to root.

This commit is contained in:
Darren 'Tadgy' Austin 2022-09-20 00:58:20 +01:00
commit 5faab722e9
2 changed files with 4 additions and 1 deletions

View file

@ -15,6 +15,9 @@ hash lesspipe >/dev/null 2>&1 && eval "$(SHELL=/bin/sh lesspipe)"
# Platform specific set up.
PLATFORM="$(uname -s)"
if [[ "$PLATFORM" = "Linux" ]]; then
# This is a hack to work around a problem with elogind/pam not creating
# a gnupg directory under /run/user/0 for the gpg-agent socket.
[[ -e "$HOME/.gnupg/S.gpg-agent" ]] && mkdir -m 700 /run/user/0/gnupg && ln -sf "$HOME/.gnupg/S.gpg-agent" /run/user/0/gnupg
export GPG_TTY="$(tty)" && gpg-connect-agent updatestartuptty /bye >/dev/null 2>&1
export I_WANT_A_BROKEN_PS=1
export LYNX_CFG="$HOME/.lynx.cfg"

View file

@ -45,7 +45,7 @@ Host phil lil tommy-wifi
Host full-* build-* clone-*
ForwardAgent yes
RemoteForward /run/user/0/gnupg/S.gpg-agent ${HOME}/.gnupg/S.gpg-agent
RemoteForward /root/.gnupg/S.gpg-agent ${HOME}/.gnupg/S.gpg-agent
User root
# GitHub.