Ansible vault 1.1 rust implementation, While not totally feature complete, ansivault allow to work with or without ansible headers.
Features: * encrypt a string or file (with or without ansible header) * decrypt a string or file (with or without ansible header) * rekey a string or file (plain encrypted, with or without ansible header) * view a file (same as decrypt it to stdout) Input and output can be from argument, file or stdin/stdout
When fiddling with vault file and key provided by arguments, be careful of the EOL problem…
Editors tends to add an EOL (end of line) character after the last char. Which will not be present if you provide the key with thek
option. In vim, you can avoid this behaviour with:set noendofline nofixendofline
```bash
ansivault -a -k toto encrypt -s lorem ipsum $ANSIBLE_VAULT;1.1;AES256 62393433633962666237643534326531633166353364646339623837363231343131656662323465 3731396538376632623432336166643835663538363234340a303735396438636266306538633637 32613133303933396563386439366464386133363666616262633331626165333164313566376561 3861353538663538610a393965653462383031303334623032636336333831663364613234316430 6266
ansivault -k toto encrypt -s lorem ipsum 636237313635343038393061303962363332616538343638623938643531653064643339353434326137383134613338336133626165656165316335343034610a616233626238316331613966613065363161646637393936613339656666633736643334396538616537653637616165343338613132663838303832653739610a3439643933653237346632646335323663353437623839353637393537383963%
echo "lorem ipsum" | ansivault -ak toto encrypt | ansivault -ak toto decrypt lorem ipsum
ansivault -ak toto -o myoutputfile input_file ```
In order to avoid giving the vault key as an argument, an environment variable ANSIVAULT_KEY_FILE
can be set to point to the file containing the vault key.
bash
ansivault [options] <command> [command options] [argument]
Use to decrypt a file or a given string. Input cannot contain mixed data (file with clear text
and encrypted values, for example). If ansible
flag is not provided, operation will fail if the input
has the ansible vault header.
Usage
bash
ansivault [common options] decrypt [hios] [INPUT_FILE]
* h, help: display help on decrypt command
* o, output OUTPUT_FILE: output file for decrypted data. Default to stdout if not provided
* s, input-string INPUT_STRING: a string to ben encoded. If provided, INPUTFILE will be ignored
* *INPUTFILE*: the path to the file to decrypt. If not provided, stdin is used
Use to encrypt a file or a given string. If the ansible
flag is provided, ansible vault header
will be present in the output.
Usage
bash
ansivault [common options] encrypt [hios] [INPUT_FILE]
* h, help: display help on encrypt command
* o, output OUTPUT_FILE: output file for encrypted data. Default to stdout if not provided
* s, input-string INPUT_STRING: a string to ben encoded. If provided, INPUTFILE will be ignored
* *INPUTFILE*: the path to the file to encrypt. If not provided, stdin is used
Rekey a file with the provide new key. The file will be rekeyed in-place.
Usage
bash
ansivault [common options] rekey [h]n INPUT_FILE
* h, help: display help on rekey command
* n, new-key NEW_KEY: the new key to rekey with
* INPUT_FILE: the path to the file to encrypt
Decrypt and print an encrypted file.
Same behaviour as ansible decrypt INPUT_FILE
Usage
bash
ansivault [common options] view [h] INPUT_FILE
* h, help: display help on view command
* INPUT_FILE: the path to the file to display
This project is licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in guidon by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.
Doc generated with cargo readme