Yubikeys can also store time-based one-time passwords. It drifts in and out of the Fedora packaging standards, and so I chose to install it from PIP. I use this as a backup in case my Pass configuration is broken or degraded.
setq ykman-path "/usr/bin/ykman") ( "y" #'yubikey-get-oath) (evil-leader/set-key defun yubikey-get-oath () ("Copy a OATH token to yourkill-ring" (interactive)let ((ivy-hash (make-hash-table :test 'equal)) (lambda (choice) (cb ( (with-temp-buffert t nil "oath" "code" (gethash choice ivy-hash)) (call-process-region (point-min) (point-max) ykman-path let* ((output (buffer-string)) ( (cells (split-string output))last cells)) (code ( )car code))))))) (kill-new ( (with-temp-buffert t nil "oath" "list") (call-process-region (point-min) (point-max) ykman-path let ((output (buffer-string))) (dolist (line (split-string output "\n")) ( (puthash line line ivy-hash) )))"Copy token:" ivy-hash :action cb))) (ivy-read
- name: python-devel installed dnf: name: - python-devel - pcsc-lite-devel - swig state: present when: ansible_pkg_mgr=="dnf" tags: - yubikey-otp - fail: msg=dnf when: ansible_pkg_mgr!="dnf" - name: ykman is installed pip: name: yubikey-manager state: present tags: - yubikey-otp