Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Age based repository file encryption gitops tool

License

NotificationsYou must be signed in to change notification settings

slok/agebox

Repository files navigation

agebox

agebox

CIGo Report CardApache 2 licensedGitHub release (latest SemVer)

Easy and simple file repository encryption tool based onAge.

Have you ever thought"this should be simple" while you were using tools likeBlackbox ,Git-crypt orSops? This is what agebox is. A tool on top ofAge's security system that encrypts/decrypts your repository files, focused on simplicity and gitops.

Features

  • Secure (Agebox delegates security toAge).
  • Tracks encrypted files in repository.
  • No PGP and no agents, just simple SSH andAge key files.
  • File flexibility (encrypts/decrypts recursive paths, multiple/single files, all tracked files...).
  • Reencrypts all tracked files with a single command.
  • Focused on Gitops, CI flows and simplicity.
  • Works with any file (doesn't understand formats like JSON, YAML...).
  • Single binary/executable.
  • No side effects like VCS commands (e.g: doesn't execute Git commands for you).

Get agebox

  • Releases
  • Docker images
  • git clone git@github.com:slok/agebox.git && cd ./agebox && make build && ls -la ./bin

Getting started

Initialize agebox tracking file.

agebox init

Encrypt (and track) multiple files.

agebox encrypt ./app1/secret1.yaml ./app2/secret1.yaml

Encrypt (and track) a directory in dry-run to see what would be encrypted before doing it.

agebox encrypt ./secrets --dry-run

Encrypt (and track) a directory and only (filter regex used) thesecret named yaml files.

agebox encrypt ./manifests --filter".*secret(\.yaml|\.yml)$"

Decrypt a subset of tracked secrets and a file.

agebox decrypt ./secrets/team-1 ./secrets/secret1.yaml

Decrypt only (filter regex used)team-a tracked files.

agebox decrypt ./secrets --filter".*team-a.*"

Force decryption of all tracked files.

agebox decrypt --all --force

Validate tracked secrets are encrypted and not decrypted (without decrypt validation).

agebox validate --no-decrypt

Cat multiple encrypted files and print them to stdout.

agebox cat ./secrets/secret1.yaml.agebox ./secrets/secret2.json.agebox --no-log

Reencrypt all files.

agebox reencrypt

Untrack multiple files.

agebox untrack ./secrets/secret1.yaml ./secrets/secret2.yaml

Untrack and delete file.

agebox untrack ./secrets/secret1.yaml --delete

How does it work

When you initialize agebox on a repository it will create a file (.ageboxreg.yml) that will track all the encryptedfiles in the repository.

From now on if you encrypt files with agebox from the root of the repository it will:

  • Track the files if not already tracked.
  • Encrypt the files with the public keys in./keys or--public-keys as recipients.
  • If is a directory it will expand to all the files in the directory and subdirectories.

As a regular flow of agebox usage examples, you can:

  • Decrypt tracked files as a single file, multiple files, a directory and its subdirectories...
  • Decrypt all tracked files (--all).
  • Reencrypt all tracked files with the public key recipients.
  • Encrypt all tracked files (--all) that are decrypted in the repository.
  • Untrack a file (and optionally delete from the file system).
  • Encrypt/decrypt in dry-run to validate (handy en CI for checking).
  • Cat encrypted files to stdout.
  • Validate tracked files are encrypted and not decrypted (useful on CI, git hooks...).

Check theGetting started section for specific commands.

Keys

Agebox supports the same asymmetric keysAge does:

  • X25519 (Age).
  • RSA SSH.
  • Ed25519 SSH.

Agebox knows how to discover keys in directories (recursively).

Public keys

The public keys are the recipients of the encrypted files. With their respective private keys, users will be able to decrypt the files.

Public keys should be on a directory relative to the root of the repository (by default./keys) at the moment of invoking encryption commands, this simplifies the usage of keys by not requiring pgp keys or agents.

Agebox will encrypt with the loaded public keys, this means that when we add or remove any public key we shouldreencrypt the tracked files.

In case you don't want to have all the public keys in all the repositories that are managed by agebox, you could centralize these keys in another repository andgetting them before invoking agebox. Some usage examples:

  • Git submodulegit pull --recurse-submodules.
  • Git repo and previous agebox command invokegit clone/pull.
  • Download public keys from S3.

You can configure this with--public-keys flag orAGEBOX_PUBLIC_KEYS env var.

You can have multiple public keys in a file (one per line), likeAge recipients file.

Private keys

By default Agebox will try loading all the valid private keys fromHOME/.ssh, however you can configure this with--private-keys flag orAGEBOX_PRIVATE_KEYS env var to point to specific directory with the keys (or a path to a single key).

Alternatives

  • Blackbox: Uses PGP (requires an agent), complex and sometimes has undesired side effects (e.g git commands execution).
  • Sops: Lots of features and very complex for simple use cases.
  • Git-crypt: Uses PGP (requires an agent), complex, 100% tied to Git.

Kudos

Thanks to@FiloSottile,@Benjojo12 and all the othercontributors ofAge.

WithoutAge,Agebox would not exist.


[8]ページ先頭

©2009-2025 Movatter.jp