summaryrefslogtreecommitdiff
path: root/src/commands/cmd_mount.rs
diff options
context:
space:
mode:
authorRoland Vet <RlndVt@protonmail.com>2024-02-20 20:46:42 +0100
committerRoland Vet <RlndVt@protonmail.com>2024-02-22 21:12:49 +0100
commit37c0ae2e79580adfbd5b60b3349e351fadbef9e8 (patch)
tree665c54bf726a94419ece6968f24a9aa452403fdb /src/commands/cmd_mount.rs
parentceb259b2a331baf3e5dd45847eec85c3f0ddd520 (diff)
Rename KeyLocation to more appropriate KeyPolicy
Also key_location to key_policy Improve help description key policy Signed-off-by: Roland Vet <RlndVt@protonmail.com>
Diffstat (limited to 'src/commands/cmd_mount.rs')
-rw-r--r--src/commands/cmd_mount.rs10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/commands/cmd_mount.rs b/src/commands/cmd_mount.rs
index 0a68909b..041e16d6 100644
--- a/src/commands/cmd_mount.rs
+++ b/src/commands/cmd_mount.rs
@@ -5,7 +5,7 @@ use uuid::Uuid;
use std::io::{stdout, IsTerminal};
use std::path::PathBuf;
use crate::key;
-use crate::key::KeyLocation;
+use crate::key::KeyPolicy;
use std::ffi::{CString, c_char, c_void};
use std::os::unix::ffi::OsStrExt;
@@ -136,14 +136,14 @@ pub struct Cli {
#[arg(short = 'f', long)]
key_file: Option<PathBuf>,
- /// Where the password would be loaded from.
+ /// Password policy to use in case of encrypted filesystem.
///
/// Possible values are:
/// "fail" - don't ask for password, fail if filesystem is encrypted;
/// "wait" - wait for password to become available before mounting;
/// "ask" - prompt the user for password;
- #[arg(short, long, default_value = "ask", verbatim_doc_comment)]
- key_location: KeyLocation,
+ #[arg(short = 'k', long = "key_location", default_value = "ask", verbatim_doc_comment)]
+ key_policy: KeyPolicy,
/// Device, or UUID=\<UUID\>
dev: String,
@@ -227,7 +227,7 @@ fn cmd_mount_inner(opt: Cli) -> anyhow::Result<()> {
};
// If decryption by key_file was unsuccesful, prompt for password (or follow key_policy)
if fallback_to_prepare_key {
- key::prepare_key(&block_devices_to_mount[0], opt.key_location)?;
+ key::prepare_key(&block_devices_to_mount[0], opt.key_policy)?;
};
}