We store some secrets in git repositories. They are encrypted using git-crypt. While setting it up, we had to refer to multiple tutorials and writeups, which are consolidated in this post. We wrote this post for our own reference and hope it is helpful for the wider world as well.

Installation

First, install git-crypt (on Ubuntu: sudo apt install git-crypt). You can also refer to its manpage.

Symmetric vs Asymmetric

There are two modes. Symmetric and asymmetric.

This article sets up up a symmetric key, which would be a secret all users would need to share.

Instead, GPG can be used on a user-by-user basis. It requires setting up a GPG key. This is useful for GitHub and other tools as well. Suggestion: use your work email when setting this up.

How To

Make sure gpg is installed

See also: How To Use GPG to Encrypt and Sign Messages by Digital Ocean

Generate a Key

Follow these steps (original source).

Accept defaults when prompted

gpg --full-generate-key

Then export the key:

gpg --list-secret-keys --keyid-format=long # Note the KEY_ID, e.g. ABCD1234EFGH5678
gpg --armor --export {KEY_ID}

Upload the Key

Copy the whole block (including the “BEGIN” and the “END” lines) and add to your GitHub GPG Keys (docs).

Add the New User

Now, we’re adding a new user.

A little-known fact about GitHub is that they make the public parts of SSH and GPG keys publicly available via their API. Go ahead, try it with your username!

From a device that already has the repository unlocked (NOT the one you’re adding):

curl https://github.com/{username}.gpg | gpg --import

Example output:

gpg: directory '/home/username/.gnupg' created
gpg: keybox '/home/username/.gnupg/pubring.kbx' created
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100   651  100   651    0     0   6281      0 --:--:-- --:--:-- --:--:--  6259
gpg: /root/.gnupg/trustdb.gpg: trustdb created
gpg: key ABCD1234EFGH5678: public key "Other User <email@example.com>" imported
gpg: Total number processed: 1
gpg:               imported: 1

You may run into this error:

There is no assurance this key belongs to the named user
[stdin]: encryption failed: Unusable public key

This SuperUser post addresses that scenario and suggests:

gpg --edit-key {KEY_ID}

Then at the sub-prompt:

gpg> trust

If you’re sure about the authenticity of the key, select trust level 5.

Add the key to git-crypt:

$ git-crypt add-gpg-user KEY_ID

(See the GitHub article or notes above for instructions on how to identify the KEY_ID, e.g ABCD1234EFGH5678.)

The add-gpg-user command creates a commit on the repository. (If it didn’t commit, something went wrong.) Remember to git push it.

Unlock the Repository on the New Device

Simply git pull and then git-crypt unlock