diff --git a/modules/persist/stores/crypt.nix b/modules/persist/stores/crypt.nix index 85f137ef..b8670db1 100644 --- a/modules/persist/stores/crypt.nix +++ b/modules/persist/stores/crypt.nix @@ -21,7 +21,7 @@ lib.mkIf config.sane.persist.enable device = underlying; fsType = "fuse.gocryptfs"; options = [ - "nodev" + # "nodev" # "Unknown parameter 'nodev'". gocryptfs requires this be passed as `-ko nodev` # "nosuid" # "Unknown parameter 'nosuid'". gocryptfs requires this be passed as `-ko nosuid` (also, nosuid is default) "allow_other" # root ends up being the user that mounts this, so need to make it visible to other users. "passfile=${key}" diff --git a/modules/persist/stores/private.nix b/modules/persist/stores/private.nix index c71dc1d0..640fb7ac 100644 --- a/modules/persist/stores/private.nix +++ b/modules/persist/stores/private.nix @@ -31,7 +31,7 @@ lib.mkIf config.sane.persist.enable options = [ "noauto" # don't try to mount, until the user logs in! "nofail" - "nodev" + # "nodev" # "Unknown parameter 'nodev'". gocryptfs requires this be passed as `-ko nodev` # "noexec" # handful of scripts in ~/private/knowledge that are executable # "nosuid" # "Unknown parameter 'nosuid'". gocryptfs requires this be passed as `-ko nosuid` (also nosuid is default) "allow_other" # root ends up being the user that mounts this, so need to make it visible to other users.