Introduction
Introduction Statistics Contact Development Disclaimer Help
cleaning up files. - dotfiles - These are my dotfiles. There are many like it, …
Log
Files
Refs
README
---
commit 478fb89ec67381228ee8743006dc296cc29925ab
parent 880487b157c393dbb7466104155f7ddea969c195
Author: Jay Scott <[email protected]>
Date: Tue, 13 Sep 2022 20:34:55 +0100
cleaning up files.
Diffstat:
A mutt/gpg.rc | 114 +++++++++++++++++++++++++++++…
A senpai/hightlight | 6 ++++++
A senpai/senpai.scfg | 4 ++++
3 files changed, 124 insertions(+), 0 deletions(-)
---
diff --git a/mutt/gpg.rc b/mutt/gpg.rc
@@ -0,0 +1,114 @@
+# -*-muttrc-*-
+#
+# Command formats for gpg.
+#
+# Some of the older commented-out versions of the commands use gpg-2comp from:
+# http://70t.de/download/gpg-2comp.tar.gz
+#
+# %p The empty string when no passphrase is needed,
+# the string "PGPPASSFD=0" if one is needed.
+#
+# This is mostly used in conditional % sequences.
+#
+# %f Most PGP commands operate on a single file or a file
+# containing a message. %f expands to this file's name.
+#
+# %s When verifying signatures, there is another temporary file
+# containing the detached signature. %s expands to this
+# file's name.
+#
+# %a In "signing" contexts, this expands to the value of the
+# configuration variable $pgp_sign_as, if set, otherwise
+# $pgp_default_key. You probably need to
+# use this within a conditional % sequence.
+#
+# %r In many contexts, mutt passes key IDs to pgp. %r expands to
+# a list of key IDs.
+
+
+# Section A: Key Management
+
+# The default key for encryption (used by $pgp_self_encrypt and
+# $postpone_encrypt).
+#
+# It will also be used for signing unless $pgp_sign_as is set to a
+# key.
+#
+# Unless your key does not have encryption capability, uncomment this
+# line and replace the keyid with your own.
+#
+# set pgp_default_key="0x12345678"
+
+# If you have a separate signing key, or your key _only_ has signing
+# capability, uncomment this line and replace the keyid with your
+# signing keyid.
+#
+# set pgp_sign_as="0x87654321"
+
+
+# Section B: Commands
+
+# Note that we explicitly set the comment armor header since GnuPG, when used
+# in some localiaztion environments, generates 8bit data in that header, there…
+# breaking PGP/MIME.
+
+# decode application/pgp
+set pgp_decode_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-verbose …
+
+# verify a pgp/mime signature
+set pgp_verify_command="gpg --status-fd=2 --no-verbose --quiet --batch --outpu…
+
+# decrypt a pgp/mime attachment
+set pgp_decrypt_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-verbose…
+
+# create a pgp/mime signed attachment
+# set pgp_sign_command="gpg-2comp --comment '' --no-verbose --batch --output -…
+set pgp_sign_command="gpg --no-verbose --batch --quiet --output - %?p?--passph…
+
+# create a application/pgp signed (old-style) message
+# set pgp_clearsign_command="gpg-2comp --comment '' --no-verbose --batch --out…
+set pgp_clearsign_command="gpg --no-verbose --batch --quiet --output - %?p?--p…
+
+# create a pgp/mime encrypted attachment
+# set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output - --enc…
+set pgp_encrypt_only_command="pgpewrap gpg --batch --quiet --no-verbose --outp…
+
+# create a pgp/mime encrypted and signed attachment
+# set pgp_encrypt_sign_command="pgpewrap gpg-2comp %?p?--passphrase-fd 0? -v -…
+set pgp_encrypt_sign_command="pgpewrap gpg %?p?--passphrase-fd 0? --batch --qu…
+
+# import a key into the public key ring
+set pgp_import_command="gpg --no-verbose --import %f"
+
+# export a key from the public key ring
+set pgp_export_command="gpg --no-verbose --export --armor %r"
+
+# verify a key
+set pgp_verify_key_command="gpg --verbose --batch --fingerprint --check-sigs %…
+
+# read in the public key ring
+# note: the second --with-fingerprint adds fingerprints to subkeys
+set pgp_list_pubring_command="gpg --no-verbose --batch --quiet --with-colons -…
+
+# read in the secret key ring
+# note: the second --with-fingerprint adds fingerprints to subkeys
+set pgp_list_secring_command="gpg --no-verbose --batch --quiet --with-colons -…
+
+# fetch keys
+# set pgp_getkeys_command="pkspxycwrap %r"
+
+# pattern for good signature - may need to be adapted to locale!
+
+# set pgp_good_sign="^gpgv?: Good signature from "
+
+# OK, here's a version which uses gnupg's message catalog:
+# set pgp_good_sign="`gettext -d gnupg -s 'Good signature from "' | tr -d '"'`"
+
+# This version uses --status-fd messages
+set pgp_good_sign="^\\[GNUPG:\\] GOODSIG"
+
+# pattern to verify a decryption occurred
+# This is now deprecated by pgp_check_gpg_decrypt_status_fd:
+# set pgp_decryption_okay="^\\[GNUPG:\\] DECRYPTION_OKAY"
+set pgp_check_gpg_decrypt_status_fd
+
diff --git a/senpai/hightlight b/senpai/hightlight
@@ -0,0 +1,6 @@
+#!/bin/sh
+escape() {
+ printf "%s" "$1" | sed 's#\\#\\\\#g'
+}
+
+notify-send "[$BUFFER] $SENDER" "$(escape "$MESSAGE")"
diff --git a/senpai/senpai.scfg b/senpai/senpai.scfg
@@ -0,0 +1,4 @@
+address chat.sr.ht
+nickname jayscott
+password-cmd pass tech/chat.sr.ht
+typings false
You are viewing proxied material from jay.scot. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.