udisksctl unlock parameter for keyfiles
Sebastian Fischmeister
sfischme at uwaterloo.ca
Tue Sep 11 12:17:47 PDT 2012
Cryptsetup requires root access and I don't want that for my backup
mechanism. Also I don't want to call sudo in a cron job. The encrypted
drive should be mountable by a regular user (e.g., automounting an
encrypted usb stick every 10 min and copy something onto it; I don't
want to keep the stick mounted).
I would be happy to hack it together with dbus-send, however, when I
was monitoring my dbus as nautilus was mounting the encrypted drive, I
couldn't collect a lot of useful information.
Sebastian
On 09/11/12 02:54pm, David Zeuthen wrote:
> Hi,
>
> On Tue, Sep 11, 2012 at 12:05 PM, Sebastian Fischmeister
> <sfischme at uwaterloo.ca> wrote:
> > This means one cannot script mounting an encrypted drive with
> > udiskctl. Is there a way around it?
>
> Is there any reason you're not just using cryptsetup(8) for this?
>
> With the way it's supposed to work, udisksctl isn't really meant to be
> used by scripts - see the API STABILITY and AUDIENCE sections in
> udisks(8) man page for why. Here's a link to the latest version
>
> http://udisks.freedesktop.org/docs/latest/udisks.8.html
>
> David
More information about the devkit-devel
mailing list