From: Ruben Beltran del Rio Date: Sun, 24 Sep 2023 20:32:28 +0000 (+0200) Subject: Add sensitive files X-Git-Url: https://git.r.bdr.sh/rbdr/dotfiles/commitdiff_plain/c9776425eb2bfe3fc09ccf2709d87ca3f405b25e?ds=inline;hp=-c Add sensitive files --- c9776425eb2bfe3fc09ccf2709d87ca3f405b25e diff --git a/.gitignore b/.gitignore index c0dfd83..6268864 100644 --- a/.gitignore +++ b/.gitignore @@ -8,3 +8,4 @@ tmuxp/* !tmuxp/main.yml config/nvim/lua/init_local.lua config/karabiner/automatic_backups/* +config/aerc/accounts.conf diff --git a/README.md b/README.md index e6f0796..3735424 100644 --- a/README.md +++ b/README.md @@ -52,9 +52,19 @@ In order to specify the environment in the prompt, create a function called `env_info_provider` and echo your environment details (eg. `dev`, `staging`, `production`) -## CoC & Neovim +## LSP & Neovim -Additional scripts are providing for updating extensions in neovim. +For the LSP to work, some external dependencies might be needed. As some of +these depend on what version asdf has loaded, or specific projects, they're +not included by default. -After setting up nvim and installing plugins, you can run -`./add-coc-vim-extensions` to automatically add the extensions. +See [the nvim-lspconfig docs][lsp] for more info. +[lsp]: https://github.com/neovim/nvim-lspconfig/blob/master/doc/server_configurations.md + +## Private Files + +There are some potentially sensitive files included. They're PGP encrypted. If +you need them you can run `./sensitive`. To update them if they change, +run `./sensitive update` instead. + +For passwords, make sure you have setup the `pass` store. diff --git a/sensitive b/sensitive new file mode 100755 index 0000000..2c5c660 --- /dev/null +++ b/sensitive @@ -0,0 +1,15 @@ +#!/usr/bin/env bash + +sensitive_files=("config/aerc/accounts.conf") + +if [[ "$1" == "update" ]]; then + echo "Updating" + for sensitive_file in $sensitive_files; do + gpg --output $sensitive_file.gpg --encrypt --recipient ruben@unlimited.pizza $sensitive_file + done +else + echo "Decrypting" + for sensitive_file in $sensitive_files; do + gpg --output $sensitive_file --decrypt $sensitive_file.gpg + done +fi