It is possible to decrypt them by visually selecting the block, removing the indentation and then running :!gpg --decrypt 2>/dev/null, but that could be simplified by providing a wrapper command for this.
What do you think?
In the same vain, gpg --encrypt --armor might be provided as a command, although that usually requires you to specify a recipient key, but which will be asked for interactively.
When editing pillar files for Salt, these might contain encrypted information, e.g.
It is possible to decrypt them by visually selecting the block, removing the indentation and then running
:!gpg --decrypt 2>/dev/null
, but that could be simplified by providing a wrapper command for this.What do you think?
In the same vain,
gpg --encrypt --armor
might be provided as a command, although that usually requires you to specify a recipient key, but which will be asked for interactively.