commit fdeae4bb94516253498e3153ed36ce45a21614d0 Author: jreichmann Date: Fri Aug 2 19:32:07 2019 +0200 add simple draft script for future use diff --git a/vault.sh b/vault.sh new file mode 100755 index 0000000..d9aa994 --- /dev/null +++ b/vault.sh @@ -0,0 +1,26 @@ +#!/bin/bash + +set -e -u + +# Keyserver to use. You need to trust this keyserver that the uid is not spoofed when receiving keys +KEYSERVER="" +# File which contains a list of uid's to receive and encrypt the vault for +KEY_FILE="" + +ACTION="$1" +# default action is vault decrypt +if [[ -z "$ACTION" ]]; then + ACTION="decrypt" +fi + + +case "$ACTION" in + "decrypt") + gpg2 --batch --use-agent --decrypt $(dirname $0)/vault_passphrase.gpg 2>/dev/null + ;; + + "reencrypt") + + ;; +esac +