typos ’n’ shit

This commit is contained in:
alterNERDtive 2022-07-23 18:36:58 +02:00
parent 6b2bdaec20
commit 75137d5da8
Signed by: alterNERDtive
GPG key ID: 547787A4FE6533F1
2 changed files with 16 additions and 2 deletions

View file

@ -1,7 +1,7 @@
# GPGTool
Zsh script to manage GPG keys without storing the master key in your main GnuPG
keyirng.
keyring.
**This is currently in a *TESTING* state. Do not use for production unless you
can manually verify each step doesnt accidentally leak into your main GnuPG
@ -22,6 +22,10 @@ So in case of compromise of your GPG key(s)
3. make sure to propagate that e.g. via key server and
4. generate new sub keys.
## How It Works
FIXXME
## Installation
Download / clone this repo and put it somewhere. Either run `gpgtools` from
@ -31,6 +35,16 @@ If you want to package this for your flavour for \*nix, go ahead. Its GPL.
## Usage
### Open the Key Safe
FIXXME
### Work with Your Keys
FIXXME
### Close the Key Safe
FIXXME
## (Optional) Configuration File

View file

@ -45,7 +45,7 @@ init () {
[[ -z "${keypath}" ]] && keypath=${GPGTOOLKEYPATH}
# Unlock device:
if [[ ! -z "${dev}" ]] && udisksctl info -b ${dev} | grep -q org.freedesktop.UDisks2.Encrypted
if [[ ! -z "${dev}" ]] && udisksctl info -b ${dev} | grep -q "org.freedesktop.UDisks2.Encrypted"
then
echo "Unlocking device ${dev} …"
local mountdev=$(udisksctl unlock -b "${dev}")