1
0
Fork 0
mirror of synced 2024-11-05 09:18:59 -05:00
yadm/_docs/080_encryption.md
2019-11-04 18:09:51 -06:00

1.6 KiB

title permalink
Encryption /docs/encryption

It can be useful to manage confidential files, like SSH keys, across multiple systems. However, doing so would put plain text data into a Git repository, which often resides on a public system. yadm implements a feature which can make it easy to encrypt and decrypt a set of files so the encrypted version can be maintained in the Git repository. This feature will only work if the gpg command is available. It is recommended that you use a private repository when keeping confidential files, even though they are encrypted.

To use this feature, a list of patterns must be created and saved as $HOME/.config/yadm/encrypt. For example:

.ssh/*.key

The yadm encrypt command will find all files matching the patterns, and prompt for a password. Once a password has confirmed, the matching files will be encrypted and saved as $HOME/.config/yadm/files.gpg. The patterns and files.gpg should be added to the yadm repository so they are available across multiple systems.

yadm add .config/yadm/encrypt
yadm add .config/yadm/files.gpg

To decrypt these files later, or on another system run yadm decrypt and provide the correct password. By default, any decrypted files will have their "group" and "others" permissions removed.

Asymmetric Encryption

Symmetric encryption is used by default, but asymmetric encryption may be enabled using the yadm.gpg-recipient configuration. To do so, run:

yadm config yadm.gpg-recipient <recipient-address>

For this to work, <recipient-address> must exist in your gpg keyrings.