- Clone down the repo
- run
./install
- follow prompts
- done
To remove work-profile
and aws-credentials
from being tracked on git. run the following:
git update-index --assume-unchanged ./files/work-profile ./files/aws-credentials
TODO: https://www.engineerbetter.com/blog/yubikey-all-the-things/
Requirements:
- GPG (
brew install gpg
) - Git >= v2.0 (
brew install git && brew link git
) - Keybase.app (
brew cask install keybase
)
$ keybase pgp gen --multi
# Enter your real name, which will be publicly visible in your new key: Example Exampleton
# Enter a public email address for your key: [email protected]
# Enter another email address (or <enter> when done):
# Push an encrypted copy of your new secret key to the Keybase.io server? [Y/n] Y
# ▶ INFO PGP User ID: Example Exampleton <[email protected]> [primary]
# ▶ INFO Generating primary key (4096 bits)
# ▶ INFO Generating encryption subkey (4096 bits)
# ▶ INFO Generated new PGP key:
# ▶ INFO user: Example Exampleton <[email protected]>
# ▶ INFO 4096-bit RSA key, ID CC66B456E865BBEE, created 2016-04-06
# ▶ INFO Exported new key to the local GPG keychain
$ gpg --list-secret-keys --keyid-format LONG
# /Users/$USERNAME/.gnupg/secring.gpg
# ----------------------------------
# sec 4096R/865BBEE 2018-06-05 [expires: 2032-06-05]
# uid Example Exampleton <[email protected]>
$ git config --global user.signingkey 865BBEE
$ git config --global commit.gpgsign true
$ keybase pgp export -q CB86A866E870EE00 | pbcopy && open https://github.com/settings/keys
$ keybase pgp export
# ▶ WARNING Found several matches:
# user: Example Exampleton <[email protected]>
# 4096-bit RSA key, ID 865BBEE, created 2018-06-05
# user: Other Key <[email protected]>
# 4096-bit RSA key, ID 3F4GD5, created 2018-04-23
$ keybase pgp export -q 865BBEE | gpg --import
$ keybase pgp export -q 865BBEE --secret | gpg --allow-secret-key-import --import
https://josnun.com/posts/managing-dotfiles-and-zsh-with-dotbot-and-antigen/