New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auto-mount widget for Dom0 WM #363

Closed
marmarek opened this Issue Mar 8, 2015 · 1 comment

Comments

Projects
None yet
2 participants
@marmarek
Member

marmarek commented Mar 8, 2015

Reported by joanna on 25 Sep 2011 11:03 UTC
When the user connects a device to Dom0 (to make a backup) this widget should automatically ask for LUKS passwed and then mount the device.

Such applet already exists in standard KDE, it's just I cut it off some time ago when preparing the kde dom0 packages. So, we just need to locate it and bring it back to our kde dom0.

Migrated-From: https://wiki.qubes-os.org/ticket/363

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 8, 2015

Member

Comment by joanna on 2 Nov 2011 18:51 UTC
Ok, so we don't actually want an auto-mount widget in Dom0, because it might be confusing the user in case the user 1) uses Dom0 as a Usb VM (which is currently default setup) and 2) wishes to connect the USB disk to some VM (instead of using it for a system backup).

So, a better solution would be to read the list of available storage device in Qubes manager as part of the backup procedure. We might find some python package that already knows how to treat a device that is a LUKS device and that automatically asks for a passphrase etc.

In other words this is now becoming parts of the Qubes Manager improvements/backup ticket (#364).

Member

marmarek commented Mar 8, 2015

Comment by joanna on 2 Nov 2011 18:51 UTC
Ok, so we don't actually want an auto-mount widget in Dom0, because it might be confusing the user in case the user 1) uses Dom0 as a Usb VM (which is currently default setup) and 2) wishes to connect the USB disk to some VM (instead of using it for a system backup).

So, a better solution would be to read the list of available storage device in Qubes manager as part of the backup procedure. We might find some python package that already knows how to treat a device that is a LUKS device and that automatically asks for a passphrase etc.

In other words this is now becoming parts of the Qubes Manager improvements/backup ticket (#364).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment