Crates.io | file_endec |
lib.rs | file_endec |
version | 1.0.1 |
source | src |
created_at | 2020-04-19 21:07:15.361079 |
updated_at | 2020-11-22 21:41:43.908919 |
description | Secure file encryption and decryption from the command line. |
homepage | https://github.com/mverleg/file_endec |
repository | https://github.com/mverleg/file_endec |
max_upload_size | |
id | 232040 |
size | 203,485 |
Command line utility that encrypts and decrypts files.
Run the encryptor with Docker::
docker run --rm -it -v "$(pwd):/data" mverleg/file-endec /fileenc file.txt
You can mount any directory in which you want to encrypt files; the above example uses the current directory $(pwd)
. Use /filedec
instead of /fileenc
for decryption.
To build the image yourself (instead of downloading from Dockerhub), clone the Github project and run::
docker build -t mverleg/file-endec .
This will also run the tests and lints, to verify that your version is okay.
Use fileenc --help
and filedec --help
to see CLI arguments. For fileenc
:
USAGE:
fileenc [FLAGS] [OPTIONS] <FILES>...
FLAGS:
--accept-weak-key Suppress warning if the encryption key is not strong.
-v, --debug Show debug information, especially on errors.
-d, --delete-input Delete unencrypted input files after successful encryption (overwrites garbage before
delete).
--dry-run Test encryption, but do not save encrypted files (nor delete input, if --delete-input).
-h, --help Prints help information
-f, --overwrite Overwrite output files if they exist.
-q, --quiet Do not show progress or other non-critical output.
-V, --version Prints version information
OPTIONS:
-k, --key <key-source>
Where to get the key; one of 'pass:$password', 'env:$var_name', 'file:$path', 'ask', 'askonce', 'pipe'
[default: ask]
-o, --output-dir <output-dir>
Alternative output directory. If not given, output is saved alongside input.
--output-extension <output-extension> Extension added to encrypted files. [default: .enc]
ARGS:
<FILES>... One or more paths to input files (absolute or relative)
While this mostly relies on established hashing and encryption algorithms, there are no security guarantees, and the author is not a professional security expert. Use at your own risk.