guix-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 1/4] gnu: Separate util-linux into three packages.


From: John Darrington
Subject: Re: [PATCH 1/4] gnu: Separate util-linux into three packages.
Date: Sun, 13 Nov 2016 09:21:10 +0100
User-agent: Mutt/1.5.23 (2014-03-12)

On Sat, Nov 12, 2016 at 11:55:13PM +0100, Ludovic Court??s wrote:
     John Darrington <address@hidden> skribis:
     
     > On Sat, Nov 12, 2016 at 04:28:08PM +0100, John Darrington wrote:
     >           
     >           If so, would it work to just do:
     >           
     >             "--enable-fs-paths-default=/run/current-system/profile/sbin"
     >           
     >           ?
     >           
     >           That would only work on GuixSD, but Guix???s ???mount??? is 
certainly not very
     >           useful on foreign distros.
     >      
     >      That would certainly be a solution easier to do.   
     >      But doesn't it mean that we have a "functionally impure" system?
     >      
     >
     > Also, it would only work if nfs-utils was installed in the current 
system profile,
     > which need not be the case.  It might be installed only in root's 
profile or I might 
     > want to see what happens if I use an alternative version of nfs-utils.
     
     That ???mount??? can invoke ???mount.nfs??? looks like a convenience to 
me, not
     something highly critical.

Well it's critical if "mount -a" is going to work, and thus if NFS filesystems 
(such as /home in
many networks) can be automatically mounted at boot time.
     
     I would say that dynamic composition (???mount??? looking up 
???mount.nfs??? &
     co. in $PATH) is OK in this case.  The NFS service in GuixSD could
     extend ???profile-service-type??? such that ???nfs-utils??? is indeed in 
the
     system profile.
     
Ok If you think it's acceptable I'll push a change with just the
"--enable-fs-paths-default=/run/current-system/profile/sbin" option for now.  
If it
turns out not to be good enough then we can rethink it later.

J'

-- 
Avoid eavesdropping.  Send strong encrypted email.
PGP Public key ID: 1024D/2DE827B3 
fingerprint = 8797 A26D 0854 2EAB 0285  A290 8A67 719C 2DE8 27B3
See http://sks-keyservers.net or any PGP keyserver for public key.

Attachment: signature.asc
Description: Digital signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]