One-Time-Secret sharing platform with a symmetric 256bit AES encryption in the browser
Go to file
Knut Ahlers 4815405091
Fix: Update assets to include FR translation
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-07-20 14:31:08 +02:00
frontend Fix: Update assets to include FR translation 2019-07-20 14:31:08 +02:00
src Add french language translation (#10) 2019-07-20 14:21:43 +02:00
vendor Replace uuid library, update vendors 2018-10-06 20:08:21 +02:00
.gitignore Auto-resize textareas, use babel to transpile JS 2018-08-22 21:08:48 +02:00
.repo-runner.yaml CI: Update build image 2019-05-13 00:15:45 +02:00
api.go Handle json requests to create API 2019-05-10 23:00:08 +02:00
assets.go Fix: Update assets to include FR translation 2019-07-20 14:31:08 +02:00
CONTRIBUTING.md Initial API 2017-08-03 14:13:53 +02:00
Dockerfile Update Dockerfile to multi-stage build 2018-05-05 18:15:43 +02:00
Gopkg.lock Replace uuid library, update vendors 2018-10-06 20:08:21 +02:00
Gopkg.toml Replace uuid library, update vendors 2018-10-06 20:08:21 +02:00
History.md prepare release v0.16.0 2019-07-20 14:23:03 +02:00
LICENSE Fix LICENSE file 2018-05-05 18:10:10 +02:00
main.go Move frontend to Vue 2019-05-10 23:12:00 +02:00
Makefile UX: Auto-select secret URL after creation 2019-07-14 18:20:16 +02:00
README.md Update translation hint in README 2019-07-14 17:53:09 +02:00
storage_mem.go Replace uuid library, update vendors 2018-10-06 20:08:21 +02:00
storage_redis.go Replace uuid library, update vendors 2018-10-06 20:08:21 +02:00
storage.go Initial API 2017-08-03 14:13:53 +02:00
tplFuncs.go Generate SRI integrity hashes into html 2018-05-05 19:08:02 +02:00

Go Report Card

Luzifer / OTS

ots is a one-time-secret sharing platform. The secret is encrypted with a symmetric 256bit AES encryption in the browser before being sent to the server. Afterwards an URL containing the ID of the secret and the password is generated. The password is never sent to the server so the server will never be able to decrypt the secrets it delivers with a reasonable effort. Also the secret is immediately deleted on the first read.

Features

  • AES 256bit encryption
  • Server does never get the password
  • Secret is deleted on first read

Setup

For a better setup you can choose the backend which is used to store the secrets:

  • mem - In memory storage (wiped on restart of the daemon)
  • redis - Storing the secrets in a hash under one key
    • REDIS_URL - Redis connection string tcp://auth:PWD@HOST:PORT/DB
    • REDIS_EXPIRY - Expiry of the keys in seconds (Default 0 = no expiry)
    • REDIS_KEY - Key prefix to store the keys under (Default io.luzifer.ots)

Hint: Starting in v0.7.0 the secrets in Redis are no longer stored in a hash but in own keys. This allows for individual expiry. At the first start of v0.7.0 the old data will be migrated automatically and afterwards be subject of expiry if you set REDIS_EXPIRY. My hosted instance uses an expiry of 90d (= 7776000s).

Localize to your own language

If you want to help translating the application to your own language please download the en.json file from this repository and translate the strings inside. Afterwards please open an issue and attach your translation including the information which language you translated the strings into.

Of course you also could open a pull-request to add the new file to the src/langs folder. In this case please also edit the langs.js file and add your translation.

Same goes with when you're finding translation errors: Just open an issue and let me know!