The difficulty of writing a plugin depends on how easy it is to interface with TrueCrypt using commands.
A simpler option than writing a whole plugin would be to create aliases for TrueCrypt's CLI: Usage: truecrypt [--auto-mount <str>] [--backup-headers] [--background-task] [-C] [-c] [--create-keyfile] [--delete-token-keyfiles] [-d] [--encryption <str>] [--explore] [--filesystem <str>] [-f] [--fs-options <str>] [--hash <str>] [-h] [--import-token-keyfiles] [-k <str>] [-l] [--list-token-keyfiles] [--load-preferences] [--mount] [-m <str>] [--new-keyfiles <str>] [--new-password <str>] [--non-interactive] [-p <str>] [--protect-hidden <str>] [--protection-keyfiles <str>] [--protection-password <str>] [--random-source <str>] [--restore-headers] [--quick] [--size <str>] [--slot <str>] [--test] [-t] [--token-lib <str>] [-v] [--version] [--volume-properties] [--volume-type <str>] [Volume path] [Mount point] --auto-mount=<str> Auto mount device-hosted/favorite volumes --backup-headers Backup volume headers --background-task Start Background Task -C, --change Change password or keyfiles -c, --create Create new volume --create-keyfile Create new keyfile --delete-token-keyfiles Delete security token keyfiles -d, --dismount Dismount volume --encryption=<str> Encryption algorithm --explore Open explorer window for mounted volume --filesystem=<str> Filesystem type -f, --force Force mount/dismount/overwrite --fs-options=<str> Filesystem mount options --hash=<str> Hash algorithm -h, --help Display detailed command line help --import-token-keyfiles Import keyfiles to security token -k, --keyfiles=<str> Keyfiles -l, --list List mounted volumes --list-token-keyfiles List security token keyfiles --load-preferences Load user preferences --mount Mount volume interactively -m, --mount-options=<str> TrueCrypt volume mount options --new-keyfiles=<str> New keyfiles --new-password=<str> New password --non-interactive Do not interact with user -p, --password=<str> Password --protect-hidden=<str> Protect hidden volume --protection-keyfiles=<str> Keyfiles for protected hidden volume --protection-password=<str> Password for protected hidden volume --random-source=<str> Use file as source of random data --restore-headers Restore volume headers --quick Enable quick format --size=<str> Size in bytes --slot=<str> Volume slot number --test Test internal algorithms -t, --text Use text user interface --token-lib=<str> Security token library -v, --verbose Enable verbose output --version Display version information --volume-properties Display volume properties --volume-type=<str> Volume type On Wed, Nov 25, 2009 at 4:28 PM, baldurpet <[email protected]> wrote: > > Like what? > > Off the top of my head probably a plug-in that deals with mounting and > dismounting hidden volumes and files? Allowing users to select a > specific file/device to mount/dismount or choosing to dismount all > mounted volumes. > > I thought about something which would allow users to create a > TrueCrypt partition or file using nothing except Gnome Do- it would be > much trickier than simply allowing users to mount so it would probably > be too much of a hassle. > > Please let me know if this idea is viable or not- if it is I would > probably try working on the plug-in myself since it would come in > handy for me personally. > > -- > > You received this message because you are subscribed to the Google Groups > "GNOME Do" group. > To post to this group, send email to [email protected]. > To unsubscribe from this group, send email to > [email protected]<gnome-do%[email protected]> > . > For more options, visit this group at > http://groups.google.com/group/gnome-do?hl=en. > > > -- You received this message because you are subscribed to the Google Groups "GNOME Do" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/gnome-do?hl=en.
