You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It seems like when I attach some filesystems, they are being accessed (via afp:// as well as smb://) as "linsk" regular user, which means e.g. /root and lots of other stuff in /etc are marked ⛔️ unaccessible in Finder. Is this a known limitation, and is there anyway around it? I would expect this to be a common issue, and for data rescue purposes, I'd be glad if something like a --root-euid option could be turned on to configure the effective Linux user as uid=0.
The text was updated successfully, but these errors were encountered:
As of now, the only option to achieve what you are asking for is to do chown 1000:1000 on all files that you need to access. Alternatively, if your use is limited to things that can be achieved with CLI, you can use linsk run --debug-shell. You can also combine both by browsing the directories with the CLI and changing file permissions on demand.
It seems like when I attach some filesystems, they are being accessed (via afp:// as well as smb://) as "linsk" regular user, which means e.g.
/root
and lots of other stuff in/etc
are marked ⛔️ unaccessible in Finder. Is this a known limitation, and is there anyway around it? I would expect this to be a common issue, and for data rescue purposes, I'd be glad if something like a--root-euid
option could be turned on to configure the effective Linux user as uid=0.The text was updated successfully, but these errors were encountered: