GitXplorerGitXplorer
s

git-secret

public
3779 stars
199 forks
93 issues

Commits

List of commits on branch master.
Verified
c84c4af5450d8ccc86e48ce510d46fe951a182c9

Bump debian from 12.7-slim to 12.8-slim in /.ci/release-ci/debian (#1108)

ddependabot[bot] committed 2 months ago
Verified
617497de73afc9709f1939674d8c222ae4180c6c

Bump debian from 12.7-slim to 12.8-slim in /.ci/docker-ci/debian-gnupg1 (#1106)

ddependabot[bot] committed 2 months ago
Verified
f208c64a91d9b10d0daeca503cce5da0d736e5ce

Bump JamesIves/github-pages-deploy-action from 4.6.8 to 4.6.9 (#1105)

ddependabot[bot] committed 2 months ago
Verified
4c19a3cdbf853a8b07b57652baee306b10f5f803

Bump fedora from 40 to 41 in /.ci/release-ci/fedora (#1104)

ddependabot[bot] committed 2 months ago
Verified
69f2576ccf1ac162d439253789c95b2b0815150d

Bump fedora from 40 to 41 in /.ci/docker-ci/fedora (#1103)

ddependabot[bot] committed 2 months ago
Verified
ca899f3b694187f9027161f537414422ee99c483

Bump JamesIves/github-pages-deploy-action from 4.6.4 to 4.6.8 (#1101)

ddependabot[bot] committed 4 months ago

README

The README file for this repository.

git-secret

test release-ci Homebrew Supporters

git-secret

What is git-secret?

git-secret is a bash tool which stores private data inside a git repo. git-secret encrypts files with permitted users' public keys, allowing users you trust to access encrypted data using pgp and their secret keys.

With git-secret, changes to access rights are simplified, and private-public key issues are handled for you.

When someone's permission is revoked, secrets do not need to be changed with git-secret - just remove their key from the repo's keyring using git secret removeperson their@email.com, re-encrypt the files, and they won't be able to decrypt secrets anymore. If you think the user might have copied the secrets or keys when they had access, then you should also change the secrets.

Preview

git-secret terminal preview

Installation

git-secret supports brew, just type: brew install git-secret

It also supports apt and yum. You can also use make if you want to. See the installation section for the details.

Requirements

git-secret relies on several external packages:

  • bash since 3.2.57 (it is hard to tell the correct patch release)
  • gawk since 4.0.2
  • git since 1.8.3.1
  • gpg since gnupg 1.4 to gnupg 2.X
  • sha256sum since 8.21 (on freebsd and MacOS shasum is used instead)

Contributing

Do you want to help the project? Find an issue and send a PR. It is more than welcomed! See CONTRIBUTING.md on how to do that.

Security

In order to encrypt (git-secret hide -m) files only when modified, the path mappings file tracks sha256sum checksums of the files added (git-secret add) to git-secret's path mappings filesystem database. Although, the chances of encountering a sha collision are low, it is recommend that you pad files with random data for greater security. Or avoid using the -m option altogether. If your secret file holds more data than just a single password these precautions should not be necessary, but could be followed for greater security.

If you found any security related issues, please do not disclose it in public. Send an email to mail@sobolevn.me

Changelog

git-secret uses semver. See CHANGELOG.md.

Packagers

Thanks to all the people and groups who package git-secret for easier install on particular OSes and distributions!

Packaging status

Here are some packagings of git-secret that we're aware of:

Such packages are considered 'downstream' because the git-secret code 'flows' from the git-secret repository to the various rpm/deb/dpkg/etc packages that are created for specific OSes and distributions.

We have also added notes specifically for packagers in CONTRIBUTING.md.

Sponsors

Support this project by becoming a sponsor. Your logo will show up here with a link to your website. [Become a sponsor]

Sponsors

Backers

Thanks to all our backers!

Backers

Contributors

This project exists thanks to all the people who contribute. [Contribute].

License

MIT. See LICENSE.md for details.

Thanks

Special thanks to Elio Qoshi from ura for the awesome logo.