decrypt-if-have-key 722 B

123456789101112131415161718192021222324252627282930313233
  1. #!/bin/bash
  2. set -e
  3. # Decrypt our private files; changes to this file should be inspected
  4. # closely to ensure they do not create information leaks
  5. eval key="\${encrypted_${1}_key}"
  6. eval iv="\${encrypted_${1}_iv}"
  7. if [ ! "$key" ]
  8. then
  9. echo "No aes key present - skipping decryption"
  10. exit 0
  11. fi
  12. for i in .travis/*.enc
  13. do
  14. u=$(echo $i | sed -e 's/.enc$//')
  15. openssl aes-256-cbc -K "$key" -iv "$iv" -in $i -out $u -d
  16. done
  17. if [ -f .travis/travis_rsa ]
  18. then
  19. echo "ssh key present - loading to agent"
  20. # add key, then remove to prevent leaks
  21. chmod 600 .travis/travis_rsa
  22. ssh-add .travis/travis_rsa
  23. rm -f .travis/travis_rsa
  24. touch /tmp/ssh-key-loaded
  25. else
  26. echo "No ssh key present - skipping agent start"
  27. fi