From 04a6055d06768d23a708cc63f549629ec5a49f18 Mon Sep 17 00:00:00 2001 From: Colin Date: Sun, 25 Feb 2024 05:12:44 +0000 Subject: [PATCH] remove /libexec from environment.pathsToLink --- hosts/common/fs.nix | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/hosts/common/fs.nix b/hosts/common/fs.nix index 7520058d..159fa9d1 100644 --- a/hosts/common/fs.nix +++ b/hosts/common/fs.nix @@ -56,10 +56,10 @@ let "uid=1000" "gid=100" ]; - sshRoot = ssh ++ [ - # we don't transform_symlinks because that breaks the validity of remote /nix stores - "sftp_server=/run/wrappers/bin/sudo\\040/run/current-system/sw/libexec/sftp-server" - ]; + # sshRoot = ssh ++ [ + # # we don't transform_symlinks because that breaks the validity of remote /nix stores + # "sftp_server=/run/wrappers/bin/sudo\\040/run/current-system/sw/libexec/sftp-server" + # ]; # in the event of hunt NFS mounts, consider: # - @@ -157,11 +157,11 @@ lib.mkMerge [ dir.acl.mode = "0750"; }; - environment.pathsToLink = [ - # needed to achieve superuser access for user-mounted filesystems (see optionsRoot above) - # we can only link whole directories here, even though we're only interested in pkgs.openssh - "/libexec" - ]; + # environment.pathsToLink = [ + # # needed to achieve superuser access for user-mounted filesystems (see sshRoot above) + # # we can only link whole directories here, even though we're only interested in pkgs.openssh + # "/libexec" + # ]; programs.fuse.userAllowOther = true; #< necessary for `allow_other` or `allow_root` options. environment.systemPackages = [