@jparadasb/charms
v1.3.4
Published
A Small set of scripts to make some repetitive tasks easier
Downloads
22
Maintainers
Readme
About The Project
This project contains two magical spells to encrypt and decrypt secret files in your repository, using Keybase to handle the private keys to sign and allow you to use the teams feature to distribute secrets in your work team.
Getting Started
Prerequisites
You will need to have setup your keybase account and the keybase CLI installed. Read more
Installation
npm install --location=global @jparadasb/charms
Usage
Fidelius Charm (encrypt)
Imagine you have all your secrets or env files ignored in your project
you should run
fidelius --user <keybase_username>
or
fidelius --team <keybase_teamname>
Now you will see the encrypted files which you are secure to commit.
Fidelio Charm flags
- --force [By default, the command will skip the generated encrypted files. To regenerate it use this flag]
- --user [If you are using your own user to encrypt]
- --team [If you are using the name of a team to encrypt]
- --paterm [the pattern of the secrets files to encrypt. default: *.env]
Revelio Charm (decrypt)
Assuming you are cloning a repository and that you are already a member in (keybase) of the team in charge of that repository and you want to decrypt the secrets file there, you have to run:
revelio
Now you have the secrets files decrypted and can run your project without hesitate
Revelio Charm flags
- --force [By default, the command will skip the generated decrypted files. To regenerate it use this flag]
- --paterm [the pattern of the secrets files to encrypt. default: *.env]
License
Distributed under the MIT License. See LICENSE
for more information.