You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It is possible to decrypt them by visually selecting the block, removing the indentation and then running :!gpg --decrypt 2>/dev/null, but that could be simplified by providing a wrapper command for this.
What do you think?
In the same vain, gpg --encrypt --armor might be provided as a command, although that usually requires you to specify a recipient key, but which will be asked for interactively.
The text was updated successfully, but these errors were encountered:
When editing pillar files for Salt, these might contain encrypted information, e.g.
It is possible to decrypt them by visually selecting the block, removing the indentation and then running
:!gpg --decrypt 2>/dev/null
, but that could be simplified by providing a wrapper command for this.What do you think?
In the same vain,
gpg --encrypt --armor
might be provided as a command, although that usually requires you to specify a recipient key, but which will be asked for interactively.The text was updated successfully, but these errors were encountered: