Tarsnap is a secure online backup service for UNIX-like operating systems, including BSD, Linux and OS X. Created in 2008 by Colin Percival, Tarsnap encrypts and stores data in Amazon S3. The service is designed for efficiency, only uploading and storing data that has directly changed since the last backup.[2] Its security keys are known only to the user. It was developed and debugged, with input solicited from bug-bounty hunters, to try to find vulnerabilities. An inadvertent yet serious nonce-reuse vulnerability was found by this process and fixed in 2011.
Example of usage (all parameters are optional)
Simple
roles:
- {
role: "sa-tarsnap"
}
Advanced:
roles:
- {
role: "sa-tarsnap",
tarsnap_version: "1.0.37"
}
Generate key, if you don't have any
tarsnap-keygen --keyfile ~/tarsnap.key --user v@gmail.com --machine mypc
backup routine tarsnap_backup.sh
#!/bin/bash
/usr/local/bin/tarsnap -P -c --cachedir ~/cache/ --keyfile ~/tarsnap.key -f "$(uname -n)-$(date +%Y-%m-%d_%H-%M-%S)" data
restore routine tarsnap_restore.sh
#!/bin/bash
ARCHIEVE=${1}
TARGET_DIR=${2-.}
mkdir -p $TARGET_DIR
tarsnap --cachedir ~/cache/ --keyfile ~/tarsnap.key -p -x -f $ARCHIEVE -C $TARGET_DIR
List archieves tarsnap_list.sh
#!/bin/bash
/usr/local/bin/tarsnap --cachedir ~/cache/ --keyfile ~/tarsnap.key --list-archives | sort
Delete archieve by name tarsnap_delete.sh
#!/bin/bash
ARCHIEVE=${1-do-galaxy-2016-11-14_16-59-26}
tarsnap --cachedir ~/cache/ --keyfile ~/tarsnap.key -d -f $ARCHIEVE
Delete all archieves associated with key tarsnap_nuke.sh
#!/bin/bash
tarsnap --cachedir ~/cache/ --keyfile ~/tarsnap.key --nuke
Copyright 2016 - Vyacheslav Voronenko
Code licensed under the [BSD 3 clause] (https://opensource.org/licenses/BSD-3-Clause) or the [MIT License] (http://opensource.org/licenses/MIT).
Subscribe for roles updates at [FB] (https://www.facebook.com/SoftAsap/)