From 75137d5da8411c904db695453be85c437c7ea09d Mon Sep 17 00:00:00 2001 From: alterNERDtive Date: Sat, 23 Jul 2022 18:36:58 +0200 Subject: [PATCH] =?UTF-8?q?typos=20=E2=80=99n=E2=80=99=20shit?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 16 +++++++++++++++- gpgtool | 2 +- 2 files changed, 16 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index afaaad6..47c1d0e 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # GPGTool Zsh script to manage GPG keys without storing the master key in your main GnuPG -keyirng. +keyring. **This is currently in a *TESTING* state. Do not use for production unless you can manually verify each step doesn’t accidentally leak into your main GnuPG @@ -22,6 +22,10 @@ So in case of compromise of your GPG key(s) 3. make sure to propagate that e.g. via key server and 4. generate new sub keys. +## How It Works + +FIXXME + ## Installation Download / clone this repo and put it somewhere. Either run `gpgtools` from @@ -31,6 +35,16 @@ If you want to package this for your flavour for \*nix, go ahead. It’s GPL. ## Usage +### Open the Key Safe + +FIXXME + +### Work with Your Keys + +FIXXME + +### Close the Key Safe + FIXXME ## (Optional) Configuration File diff --git a/gpgtool b/gpgtool index 792a23c..f77df6f 100755 --- a/gpgtool +++ b/gpgtool @@ -45,7 +45,7 @@ init () { [[ -z "${keypath}" ]] && keypath=${GPGTOOLKEYPATH} # Unlock device: - if [[ ! -z "${dev}" ]] && udisksctl info -b ${dev} | grep -q org.freedesktop.UDisks2.Encrypted + if [[ ! -z "${dev}" ]] && udisksctl info -b ${dev} | grep -q "org.freedesktop.UDisks2.Encrypted" then echo "Unlocking device ${dev} …" local mountdev=$(udisksctl unlock -b "${dev}")