Module to access a backup system.


By default, the Bareos Director (>= 18.2.4) uses TLS-PSK when communicating through the network.

The Python ( core module ssl does support TLS-PSK only since Python >= 3.13. The section Transport Encryption (TLS-PSK) describes how to use TLS-PSK and about the limitations. For testing this module can also be used without TLS.


Create some named consoles for testing:

root@host:~# bconsole
*configure add console name=user1 password=secret profile=operator TlsEnable=no
*configure add console name=user-tls password=secret profile=operator

This creates a console user with name user1 and the profile operator. The operator profile is a default profile that comes with the Bareos Director. It does allow most commands, but deny some dangerous commands (see show profile=operator), so it is well suited for this purpose. Futhermore, TLS enforcement is disabled for this console user.

For testing with TLS-PSK, we also create the user user-tls.


Calling bareos-director console commands

>>> import bareos.bsock
>>> directorconsole=bareos.bsock.DirectorConsole(address='localhost', port=9101, name='user1', password='secret')
>>> print('help').decode("utf-8"))

This creates a console connection to a Bareos Director. This connection can be used to call commands. These are the same commands as available via bconsole.

To connect to the default console instead, omit the name parameter:

>>> directorconsole = bareos.bsock.DirectorConsole(address='localhost', port=9101, password='defaultconsolepassword')

The result of the call method is a bytes object. In most cases, it has to be decoded to UTF-8.

Simple version of the bconsole in Python

>>> import bareos.bsock
>>> directorconsole = bareos.bsock.DirectorConsole(address='localhost', port=9101, password='secret')
>>> directorconsole.interactive()

Or use the script: --debug --name=user1 --password=secret localhost

Use JSON objects of the API mode 2

Requires: Bareos >= 15.2

The class DirectorConsoleJson is inherited from DirectorConsole and uses the Director Console API mode 2 (JSON).

For general information about API mode 2 and what data structures to expect, see


>>> import bareos.bsock
>>> directorconsole = bareos.bsock.DirectorConsoleJson(address='localhost', port=9101, password='secret')
>>> pools ='list pools')
>>> for pool in pools["pools"]:
...   print(pool["name"])

The results the the call method is a dict object.

In case of an error, an exception, derived from bareos.exceptions.Error is raised.


>>>"test it")
Traceback (most recent call last):
bareos.exceptions.JsonRpcErrorReceivedException: failed: test it: is an invalid command.

Transport Encryption (TLS-PSK)

Since Bareos >= 18.2.4, Bareos supports TLS-PSK (Transport-Layer-Security Pre-Shared-Key) to secure its network connections and uses this by default.

Unfortunately the Python core module ssl does support TLS-PSK only with Python >= 3.13. For some older versions of Python, the extra module sslpsk (see offers limited support.

Fallback To Unencrypted Connections

Normally DirectorConsole tries to connect using the latest known protocol version. In order to allow connections in more environments, the DirectorConsole can fall back to older protocol versions. Specify protocolversion = None (or 0 as command line argument) to enable automatic fall back. If connecting via TLS-PSK fails, it falls back to the old, unencrypted protocol version. Depending on your bareos-director configuration, unencrypted connections will be accepted:

>>> import bareos.bsock
/.../bareos/bsock/ UserWarning: Connection encryption via TLS-PSK is not available (TLS-PSK is not available in the ssl module and the extra module sslpsk is not installed).
>>> directorconsole=bareos.bsock.DirectorConsole(address='localhost', port=9101, name='user-tls', password='secret', protocolversion=None)
socket error: Conversation terminated (-4)
Failed to connect using protocol version 2. Trying protocol version 1.
>>> print('help').decode("utf-8"))

To enforce a encrypted connection, use the tls_psk_require=True parameter:

>>> import bareos.bsock
/.../bareos/bsock/ UserWarning: Connection encryption via TLS-PSK is not available, as the module sslpsk is not installed.
>>> directorconsole=bareos.bsock.DirectorConsole(address='localhost', port=9101, name='user-tls', password='secret', tls_psk_require=True)
Traceback (most recent call last):
bareos.exceptions.ConnectionError: TLS-PSK is required, but not available.

In this case, an exception is raised, if the connection can not be established via TLS-PSK.


The extra module sslpsk (see extends the core module ssl by TLS-PSK.

At the time of writing, the lasted version installable via pip is 1.0.0 (, which is not working with Python >= 3.

For using python-bareos with TLS-PSK with Python >= 3 and Python <= 3.9 the latest version must by installed manually. At the time of writing, even the latest version ( does not support Python >= 3.10. However, Python >= 3.13 has direct support for TLS-PSK in the core ssl module.

Installing the sslpsk module manually:

git clone
cd sslpsk
python build
python install

python-bareos will detect, that sslpsk is available and will use it automatically. This can be verified by following command:

>>> import bareos.bsock
>>> bareos.bsock.DirectorConsole.is_tls_psk_available()

Another limitation of the current sslpsk version is, that it is not able to autodetect the TLS protocol version to use.

In order to use it, specify tls_version with an appropriate protocol version. In most cases this should be tls_version=ssl.PROTOCOL_TLSv1_2, like in the following example:

>>> import ssl
>>> import bareos.bsock
>>> directorconsole = bareos.bsock.DirectorConsoleJson(address='localhost', user='user-tls', password='secret', tls_version=ssl.PROTOCOL_TLSv1_2)
>>> print('help').decode("utf-8"))