Hello J.D.
thanks for your input.
For us, the main task is to differentiate between Espionage problems and external utility problems, hdiutil in this case.
Espionage problems we can fix, external utility problems we cannot, just report.
When you unlock a folder, we call hdiutil with path to the disk image, moutpoint folder and password, the rest is done by hdiutil.
Once the folder is unlocked, it is all operating system which handles the communication between disk image content (native Apple data format) and application which is reading the data (quicktime in this case - again Apple's app)
The unlock-mount part, you can do without Espionage if you have all the info needed, here is how to get it:
- Apple's Terminal application has a nice feature of filling out file paths if you drag the folder or file over Terminal's window
- so first we will find the files in Finder and then we drag to have the paths filled in
- unlock espionage
- make sure the folder you will be testing with is locked
- click onto small anchor icon in the lower left corner of the Espionage window to keep the window open
- click onto small "i" near the folder name, this will take you to the folder options window
- here you will see two drop down menus, one for disk image another for mountpoint folder you will also see a copy password button
- click onto disk image drop down menu and just select the disk image with the mouse in the menu and let the mouse button go, this will open a finder window with the disk image selected
- do the same for the mountpoint folder
- now paste this into terminal:
/usr/bin/hdiutil attach
press space once to add a space char after attach word
drag the disk image over terminal window
hit space again, the write
-mountpoint
another space
drag the moutpoint folder over terminal window
hit space and write
-noverify -noautofsck -stdinpass -nobrowse
The complete command whould look like this:
/usr/bin/hdiutil attach /Volumes/PEROosxj/esptst.sparsebundle -mountpoint /Volumes/PEROosxj/mountpt -noverify -noautofsck -stdinpass -nobrowse
hit enter
you will be asked for a password, click onto copy password button in Espionage window, paste it into terminal, hit enter
if all good you will get a short report on mounted volume.
What is interesting to see is how quickly will this happen, will there be a delay or not?
note that espionage will not be aware that the image is mounted, i.e. it will not show the folder to be unlocked, this is normal as we did the things "behind" espionage.
To unmount the volume, you write in the terminal
hdiutil unmount volumepath
the volumepath you will get in the aforementioned report
####
To the slow reading, see if you get this slow reading effect also when you mount it by hand, but I'm positive you will....
Let me know how it went,
Cheers
Zsolt
P.S. we got one report with similar behaviour, and the culprit was in a virus scanner, if you have one, make sure you disable it while testing. Thanks!