#secret-key-files = /run/credentials/nix-daemon.service/secret-key-files.pem
'';
settings = {
- trusted-users = [ config.users.users."julm".name ];
substituters = [
#"http://nix-localcache.losurdo.wg"
#"ssh://nix-ssh@losurdo.wg?priority=30"
secret-key-files = /run/credentials/nix-daemon.service/${hostName}.key
'';
settings = {
- trusted-users = [ config.users.users."julm".name ];
substituters = [
#"http://nix-localcache.losurdo.wg"
"ssh://nix-ssh@losurdo.wg?priority=30"
nix = {
settings = {
- trusted-users = [ config.users.users."sevy".name ];
substituters = [
#"ssh://nix-ssh@losurdo.wg?priority=30"
#"ssh://nix-ssh@oignon.wg?priority=10"
nix.settings.trusted-public-keys = [
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
];
+ nix.settings.trusted-users = [
+ "root"
+ "@wheel"
+ ];
networking.firewall.pingLimit = "--limit 60/minute --limit-burst 5";
security.allowSimultaneousMultithreading = false;
security.apparmor.enable = mkDefault true;