provide 'cce/yubikey-otp) (
Yubikeys can also store time-based one-time passwords. It drifts in and out of the Fedora packaging standards, and so I chose to install it from PIP. I use this as a backup in case my Pass configuration is broken or degraded.
setq ykman-path "/usr/bin/ykman")
(
"y" #'yubikey-get-oath)
(evil-leader/set-key defun yubikey-get-oath ()
("Copy a OATH token to yourkill-ring"
(interactive)let ((ivy-hash (make-hash-table :test 'equal))
(lambda (choice)
(cb (
(with-temp-buffert t nil "oath" "code" (gethash choice ivy-hash))
(call-process-region (point-min) (point-max) ykman-path let* ((output (buffer-string))
(
(cells (split-string output))last cells))
(code (
)car code)))))))
(kill-new (
(with-temp-buffert t nil "oath" "list")
(call-process-region (point-min) (point-max) ykman-path let ((output (buffer-string)))
(dolist (line (split-string output "\n"))
(
(puthash line line ivy-hash)
)))"Copy token:" ivy-hash :action cb))) (ivy-read
- name: python-devel installed
dnf:
name:
- python-devel
- pcsc-lite-devel
- swig
state: present
when: ansible_pkg_mgr=="dnf"
tags:
- yubikey-otp
- fail: msg=dnf
when: ansible_pkg_mgr!="dnf"
- name: ykman is installed
pip:
name: yubikey-manager
state: present
tags:
- yubikey-otp