Manual Deletion of Specific Files in .stversions on Encrypted Devices

Hello,

I need to manually delete specific files from .stversions on untrusted devices, while keeping the others files. Since these files are encrypted, I cannot directly identify their original names. This situation arose because an ignore rule was incorrectly applied, causing very large db files to propagate into .stversions and fill up the drives, so I am doing the clean-ups afterwards. The other files must not be removed (ie I can’t just delete .stversions).

I found this post suggesting that decryption might help map encrypted filenames to their decrypted counterparts using the command syncthing decrypt --verify-only --password XXX --verbose $folderpath. Can this method be used to identify and therefore manually remove specific encrypted files? I’m able to script this using a prompt method for deletion, but want to ensure this approach is correct first.

Regarding folder deletions: The folder structure on the encrypted device does not directly mirror the original source structure but is organized based on the encryption process. I’m not sure if the original full path is represented in the encrypted filename or in the encrypted dir structure, or both. I wanted to look at a way to perhaps delete dirs if possible (otherwise file deletion is fine), on the encrypted structure side.

Any advice on this would be greatly appreciated.

Thanks!