mirror of
https://github.com/NixOS/nix
synced 2025-07-06 21:41:48 +02:00
<simplesect> -> <section>
Pandoc silently ignores <simplesect>...
This commit is contained in:
parent
136fd55bb2
commit
ee05108472
7 changed files with 82 additions and 54 deletions
|
@ -20,6 +20,8 @@ Nix store/database that performs the operation.
|
|||
> caches. So while unprivileged users may install packages from
|
||||
> arbitrary Nix expressions, they may not get pre-built binaries.
|
||||
|
||||
## Setting up the build users
|
||||
|
||||
The *build users* are the special UIDs under which builds are performed.
|
||||
They should all be members of the *build users group* `nixbld`. This
|
||||
group should have no other members. The build users should not be
|
||||
|
@ -35,6 +37,8 @@ This creates 10 build users. There can never be more concurrent builds
|
|||
than the number of build users, so you may want to increase this if you
|
||||
expect to do many builds at the same time.
|
||||
|
||||
## Running the daemon
|
||||
|
||||
The [Nix daemon](#sec-nix-daemon) should be started as follows (as
|
||||
`root`):
|
||||
|
||||
|
@ -50,6 +54,8 @@ should put a line like
|
|||
|
||||
into the users’ login scripts.
|
||||
|
||||
## Restricting access
|
||||
|
||||
To limit which users can perform Nix operations, you can use the
|
||||
permissions on the directory `/nix/var/nix/daemon-socket`. For instance,
|
||||
if you want to restrict the use of Nix to the members of a group called
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue