aboutsummaryrefslogtreecommitdiff
path: root/org/linux-room.org
diff options
context:
space:
mode:
Diffstat (limited to 'org/linux-room.org')
-rw-r--r--org/linux-room.org30
1 files changed, 17 insertions, 13 deletions
diff --git a/org/linux-room.org b/org/linux-room.org
index b9229c4..0ab4eaa 100644
--- a/org/linux-room.org
+++ b/org/linux-room.org
@@ -119,20 +119,24 @@ to go back.
:CUSTOM_ID: encrypted-partitions-in-spacefm
:END:
SpaceFM doesnt support encrypted partitions by default but lucky for us
-its very customizable. To get encrypted disks working I use udisks2 and
-udiskie.
-
-+ Install udisks2 and udiskie.
-+ Go to xfce session and startup than add the command =udiskie -s= as a
- autostarted app. The -s option makes udiskie show a tray icon and hide
- it when there arent any disks. -t will show the tray all the time and
- by default udiskie will not show a tray.
-+ In spaceFM go to Devices->Settings->Device Handlers and add a new
- handler:\\
- [[file:images/udiskie_in_spacefm.jpg]]\\
+its very customizable. I use to use [[https://igurublog.wordpress.com/2012/03/11/udisks2-another-loss-for-linux][udisks2/udiskie]] to get encrypted disk
+support though I found a less bloated way.
+
++ Install cryptsetup if not already on the system.
++ In spaceFM go to Devices->Settings->Device Handlers and add a new handler
+ with these settings.\\
Whitelist: =crypto_LUKS=\\
- Mount: =udiskie-mount %v=\\
- Unmount: =udiskie-umount $(lsblk -n -o MOUNTPOINT %v)=
+ \\
+ Mount:\\
+ (enable run in terminal)\\
+ =sudo cryptsetup luksOpen %v `basename %v`=\\
+ =sudo mount --mkdir /dev/mapper/`basename %v` /media/`basename %v`=\\
+ \\
+ Unmount:\\
+ =sudo umount /media/`basename %v`=\\
+ =sudo rmdir /media/`basename %v`=\\
+ =sudo cryptsetup luksClose `basename %v`=
+If you have issues un-mounting just close all tabs and give it a second.
*** sftp
:PROPERTIES: