typos ’n’ shit

This commit is contained in:
alterNERDtive 2022-07-23 18:36:58 +02:00
parent 6b2bdaec20
commit 75137d5da8
Signed by: alterNERDtive
GPG key ID: 547787A4FE6533F1
2 changed files with 16 additions and 2 deletions

View file

@ -1,7 +1,7 @@
# GPGTool # GPGTool
Zsh script to manage GPG keys without storing the master key in your main GnuPG Zsh script to manage GPG keys without storing the master key in your main GnuPG
keyirng. keyring.
**This is currently in a *TESTING* state. Do not use for production unless you **This is currently in a *TESTING* state. Do not use for production unless you
can manually verify each step doesnt accidentally leak into your main GnuPG can manually verify each step doesnt accidentally leak into your main GnuPG
@ -22,6 +22,10 @@ So in case of compromise of your GPG key(s)
3. make sure to propagate that e.g. via key server and 3. make sure to propagate that e.g. via key server and
4. generate new sub keys. 4. generate new sub keys.
## How It Works
FIXXME
## Installation ## Installation
Download / clone this repo and put it somewhere. Either run `gpgtools` from Download / clone this repo and put it somewhere. Either run `gpgtools` from
@ -31,6 +35,16 @@ If you want to package this for your flavour for \*nix, go ahead. Its GPL.
## Usage ## Usage
### Open the Key Safe
FIXXME
### Work with Your Keys
FIXXME
### Close the Key Safe
FIXXME FIXXME
## (Optional) Configuration File ## (Optional) Configuration File

View file

@ -45,7 +45,7 @@ init () {
[[ -z "${keypath}" ]] && keypath=${GPGTOOLKEYPATH} [[ -z "${keypath}" ]] && keypath=${GPGTOOLKEYPATH}
# Unlock device: # Unlock device:
if [[ ! -z "${dev}" ]] && udisksctl info -b ${dev} | grep -q org.freedesktop.UDisks2.Encrypted if [[ ! -z "${dev}" ]] && udisksctl info -b ${dev} | grep -q "org.freedesktop.UDisks2.Encrypted"
then then
echo "Unlocking device ${dev} …" echo "Unlocking device ${dev} …"
local mountdev=$(udisksctl unlock -b "${dev}") local mountdev=$(udisksctl unlock -b "${dev}")