diff options
-rw-r--r-- | org/images/udiskie_in_spacefm.jpg | bin | 54340 -> 0 bytes | |||
-rw-r--r-- | org/linux-room.org | 30 |
2 files changed, 17 insertions, 13 deletions
diff --git a/org/images/udiskie_in_spacefm.jpg b/org/images/udiskie_in_spacefm.jpg Binary files differdeleted file mode 100644 index 7d0990d..0000000 --- a/org/images/udiskie_in_spacefm.jpg +++ /dev/null diff --git a/org/linux-room.org b/org/linux-room.org index b9229c4..0ab4eaa 100644 --- a/org/linux-room.org +++ b/org/linux-room.org @@ -119,20 +119,24 @@ to go back. :CUSTOM_ID: encrypted-partitions-in-spacefm :END: SpaceFM doesnt support encrypted partitions by default but lucky for us -its very customizable. To get encrypted disks working I use udisks2 and -udiskie. - -+ Install udisks2 and udiskie. -+ Go to xfce session and startup than add the command =udiskie -s= as a - autostarted app. The -s option makes udiskie show a tray icon and hide - it when there arent any disks. -t will show the tray all the time and - by default udiskie will not show a tray. -+ In spaceFM go to Devices->Settings->Device Handlers and add a new - handler:\\ - [[file:images/udiskie_in_spacefm.jpg]]\\ +its very customizable. I use to use [[https://igurublog.wordpress.com/2012/03/11/udisks2-another-loss-for-linux][udisks2/udiskie]] to get encrypted disk +support though I found a less bloated way. + ++ Install cryptsetup if not already on the system. ++ In spaceFM go to Devices->Settings->Device Handlers and add a new handler + with these settings.\\ Whitelist: =crypto_LUKS=\\ - Mount: =udiskie-mount %v=\\ - Unmount: =udiskie-umount $(lsblk -n -o MOUNTPOINT %v)= + \\ + Mount:\\ + (enable run in terminal)\\ + =sudo cryptsetup luksOpen %v `basename %v`=\\ + =sudo mount --mkdir /dev/mapper/`basename %v` /media/`basename %v`=\\ + \\ + Unmount:\\ + =sudo umount /media/`basename %v`=\\ + =sudo rmdir /media/`basename %v`=\\ + =sudo cryptsetup luksClose `basename %v`= +If you have issues un-mounting just close all tabs and give it a second. *** sftp :PROPERTIES: |