Skip to content

Latest commit

 

History

History
53 lines (39 loc) · 1.4 KB

README.md

File metadata and controls

53 lines (39 loc) · 1.4 KB

Cold Vault

An encryption tool that use Google Tink to perform envelop encryption

The encrypted file then pushed into a vault storage of either:

  • Local dir: local://{dir_name}
  • S3: s3://{bucket_name}

Supported KMS:

  • AWS KMS: aws-kms://
  • GCP KMS: gcp-kms://
  • Hashicorp vault: hcvault://
  • Passphrase AES: aesgcm:// (not recommended)

Encryption is performed in memory so original file is expected to not be very large

Usage

Usage:
  cvault [flags]
  cvault [command]

Available Commands:
  completion  Generate the autocompletion script for the specified shell
  decrypt     Decrypt a file from storage
  encrypt     Encrypt a file and push it into storage
  help        Help about any command
  list        List encrypted file in store
  peek        Peek an encrypted file to stdout
  remove      Remove encrypted file from store

Flags:
  -h, --help                 help for cvault
  -k, --key-id string        KMS key id
      --pass-prompt string   Prompt for AES passphrase. Only when use key aesgcm://
  -s, --store string         Location of storage (default "local://.")
      --vault-token string   HC vault token

Use "cvault [command] --help" for more information about a command.

FAQ

- Q: Why cold vault
  A: I want to have an infrequently-access vault to store my recovery code, TOTP seed, etc...

- Q: Why not GPG
  A: I dont have a secure way to sync GPG private across machines