In the meantime the following workaround may be used : creating a .fdi
file corresponding to the encrypted volume's UUID and specifying a
mountpoint (/etc/hal/fdi/policy/30user.fdi) copied from :
http://webcvs.freedesktop.org/hal/hal/doc/conf/storage-policy-examples.fdi?revision=1.1
 ).

Here my encrypted volume (replace "_WHATEVER_YOUR_VOLUME_UUID_IS_" by
your volume's UUID) will be mounted as /media/my_crypted


<?xml version="1.0" encoding="ISO-8859-1"?> <!-- -*- SGML -*- -->

<deviceinfo version="0.2">


  <device>
    <match key="block.is_volume" bool="true">
      <match key="volume.fsusage" string="crypto">
        <match key="volume.uuid"
string="_WHATEVER_YOUR_VOLUME_UUID_IS_">
          <merge key="volume.policy.desired_mount_point"
type="string">my_crypted</merge>
        </match>
      </match>
    </match>
  </device>

</deviceinfo>


Hope this helps.

Best regards,
-- 
Olivier BERGER <[EMAIL PROTECTED]>
Ingénieur Recherche - Dept INF
INT Evry (http://www.int-evry.fr)
OpenPGP-Id: 1024D/6B829EEC



Reply via email to