Werk #9537: mkbackup: New option to decrypt backup files
| Component | Firmware |
| Title | mkbackup: New option to decrypt backup files |
| Date | Jun 28, 2024 |
| Level | Prominent Change |
| Class | New Feature |
| Compatibility | Compatible - no manual interaction needed |
| Appliance Version | 1.7.3 |
We have added an new option which you can use to decrypt an encrypted backup without actually restoring the backup. This is handy in case you just want to extract some files or inspect a backup.
This action is present within the user interface on the "Device backup" - "Restore" page.
If you choose "Decrypt from this backup target" you will be redirected to the "Decrypt from target page" where all encrpyted backup IDs are listed. With "Start decryption of this backup" you will be asked to enter the passphrase of the encryption key.
The decryption will decrypt all files within the backup target that are encrypted and copy it to a new backup directory named like the old one but with the suffix "_decrypted".
After the job has finished, you can find the unencrypted backup e.g. on the "Restore" - "Restore from this backup" page.
This option is also available via command line:
root@cma:~# MKBACKUP_PASSPHRASE=PASSPHRASE mkbackup decrypt --no-verify Target-ID Backup-ID