ansible-gpg-vault/vault.sh

36 lines
788 B
Bash
Executable File

#!/bin/bash
set -e -u
# Keyserver to use. You need to trust this keyserver that the uid is not spoofed when receiving keys
KEYSERVER=""
# File which contains a list of fingerprints to receive and encrypt the vault for
KEY_FILE=""
REPO_BASE_PATH="$(dirname $0)/.."
# File in which the passphrase for the gpg vault is encrypted
VAULT_PASS_FILE="$REPO_BASE_PATH/gpg/vault_passphrase.gpg"
ACTION="$1"
# default action is vault decrypt
if [[ -z "$ACTION" ]]; then
ACTION="decrypt"
fi
case "$ACTION" in
"decrypt")
gpg2 --batch --use-agent --decrypt $(dirname $0)/vault_passphrase.gpg 2>/dev/null
;;
"reencrypt")
;;
"init")
mkdir -p $REPO_BASE_PATH/gpg
touch $REPO_BASE_PATH/gpg/vault_passphrase
touch $REPO_BASE_PATH/gpg/$KEY_FILE
;;
esac