1
0
Fork 0
mirror of https://github.com/Luzifer/duplicity-backup.git synced 2024-11-09 15:40:06 +00:00

Documented env-template function

This commit is contained in:
Knut Ahlers 2016-06-25 15:18:08 +02:00
parent fdf8bb5aec
commit 8f9cfaa326
Signed by: luzifer
GPG key ID: DC2729FDD34BE99E

View file

@ -6,3 +6,23 @@
# Luzifer / duplicity-backup # Luzifer / duplicity-backup
`duplicity-backup` is a wrapper to execute a duplicity backup using a configuration file. It is designed to simplify handling backups on and restores from remote targets. All information required for the backup is set using the configuration file. Also the wrapper notifies targets (slack / [mondash](https://mondash.org/)) about successful and failed backups. `duplicity-backup` is a wrapper to execute a duplicity backup using a configuration file. It is designed to simplify handling backups on and restores from remote targets. All information required for the backup is set using the configuration file. Also the wrapper notifies targets (slack / [mondash](https://mondash.org/)) about successful and failed backups.
## Using without writing passwords to disk
Starting with version `v0.7.0` the `duplicity-backup` wrapper supports reading variables from the environment instead of writing the secrets to your disk. In every section of the file you can use the function `{{env "encrypt-password"}}` to read configuration options from the environment. As an example you could utilize [`vault2env`](https://gobuilder.me/github.com/Luzifer/vault2env) to set those variables from a Vault instance:
```bash
# vault write /secret/backups/mybackup encrypt-password=bVFq5jdyvkHD6VCvSQUY
Success! Data written to: secret/backups/mybackup
# cat ~/.duplicity.yaml
[...]
encryption:
enable: true
passphrase: {{env `encrypt-password`}}
[...]
# vault2env /secret/backups/mybackup -- duplicity-backup -f ~/.duplicity.yaml backup
(2016-06-25 15:07:06) ++++ duplicity-backup v0.7.0 started with command 'backup'
[...]
```