Handling secrets in a secure yet shared mechanism #1
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I don't have much experience with this so I need to do some research first. On top of my head I can think of the following solutions.
Securing secret data
SQLite with AES-256 encryption
name
,type
(text, blob, file),type_dependent_info
.. etc. Which is much more hassle compared to having just using a file system.KeepassXC
keepassxc-cli
isn't made for this kind of use case I think.Encrypted directory
See https://wiki.archlinux.org/title/ECryptfs.
secrets
directory.I think I'm leaning towards this one so far.
Sharing secret data
Private repository on Forgejo
Actually, would it make sense to have two source packages.
/usr/share/shione/secrets/files
and includes all the necessary secrets.This would also make it easier for other people to use this project without having to re-build it themselves. They simply need to build their own secrets Debian package and install it beforehand.
Example:
This also means that all files can be generic and not shione-specific except for
/usr/share/shione
I suppose...The downside to this is that the secrets package has to manage file permissions accordingly which is annoying and requires duplicating work.