ward is a bunch of bash scripts that will keep your secret files safe but also as accessible as you'd like. i designed it to use it dangerously within git. consider it digital safe for your sensitive files. it encrypts your stuff, keeps it integrity-checked, it is written in bash and it's pretty straightforward:
- encrypts your files using gpg
- lets you check if someone's messed with your encrypted stuff
- generates totp codes if you're storing those sorts of secrets and need to recover accounts
make sure you've got these installed:
- gpg
- oath-toolkit (for totp)
- bc (basic math and comes with most systems)
- install the essentials:
# ubuntu/debian
sudo apt-get install gnupg oath-toolkit bc
# osx/homebrew
brew install gnupg oath-toolkit
- clone the repository
git clone https://github.com/oeo/ward.git
cd ward
- decrypt the example vault.tar.gz.gpg
yarn decrypt # or ./bin/decrypt.sh
the default vault decryption password is letmein
.
mkdir vault
echo 123 > vault/123.txt
yarn encrypt # or ./bin/encrypt.sh
here are the yarn commands you'll be using:
yarn encrypt
: encrypt your vault directoryyarn decrypt
: decrypt your encrypted vault fileyarn verify
: verify the checksum of your vaultyarn totp <totp_secret>
: generate a totp code using a secretyarn test
: run unit tests
- throw whatever you want to encrypt into a folder called
vault
- run
yarn encrypt
- type in a passphrase
- boom, you've got yourself an encrypted
vault.tar.gz.gpg
- make sure
vault.tar.gz.gpg
is where it should be - run
yarn decrypt
- enter your passphrase
- your files will pop back into the
vault
folder
run yarn verify
to ensure the archive hasn't been tampered with
yarn totp <totp_secret>
yarn test
- the
vault
folder doesn't self-destruct after encryption, clean up if you're paranoid- although it is included in the .gitignore, of course
if you're feeling lazy and a bit risky you can set WARD_PASSPHRASE
in your environment.
mit