You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current experimental implementation works well. Below is a short shell script to perform a backup and persist it as an Azure KeyVault secret if any of the secrets have been modified in the past day.
#!/bin/bashif(( $(date -d "yesterday" +%s) < $(date -d $( passbolt list resource -c ModifiedTimestamp | sort | tail -2| head -1) +%s ) ))thenecho"The last modified date is within the past day, running backup"
az login --service-principal -u $APP_ID \
-p ~/.azure/auth-cert.pem --tenant $TENANT --allow-no-subscriptions \
-o none --only-show-errors
rm ~/.passbolt/keepass-backup.kdbx 2&> /dev/null
passbolt export keepass --file ~/.passbolt/keepass-backup.kdbx --password $PASS
az keyvault secret set --vault $VAULT \
--name $SECRET_NAME --encoding base64 \
--file ~/.passbolt/keepass-backup.kdbx \
-o none --only-show-errors
rm ~/.passbolt/keepass-backup.kdbx 2&> /dev/null
fi
Add a sub-command to export Passwords to a Keepass file.
This is useful for automatic Passbolt backups of a selfhosted instance which might go offline but may contain passwords needed to fix the instance.
Potential Library: https://github.com/tobischo/gokeepasslib
The text was updated successfully, but these errors were encountered: