Drop support for running nix-worker in "slave" mode
AFAIK nobody uses this, setuid binaries are evil, and there is no good reason why people can't just run the daemon.
This commit is contained in:
		
							parent
							
								
									7586095504
								
							
						
					
					
						commit
						522ecab9b8
					
				
					 6 changed files with 9 additions and 146 deletions
				
			
		|  | @ -201,10 +201,8 @@ flag, e.g. <literal>--option gc-keep-outputs false</literal>.</para> | |||
|     under the uid of the Nix process (that is, the uid of the caller | ||||
|     if <envar>NIX_REMOTE</envar> is empty, the uid under which the Nix | ||||
|     daemon runs if <envar>NIX_REMOTE</envar> is | ||||
|     <literal>daemon</literal>, or the uid that owns the setuid | ||||
|     <command>nix-worker</command> program if <envar>NIX_REMOTE</envar> | ||||
|     is <literal>slave</literal>).  Obviously, this should not be used | ||||
|     in multi-user settings with untrusted users.</para> | ||||
|     <literal>daemon</literal>).  Obviously, this should not be used in | ||||
|     multi-user settings with untrusted users.</para> | ||||
| 
 | ||||
|     </listitem> | ||||
| 
 | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue