-
-
Notifications
You must be signed in to change notification settings - Fork 1.9k
Generate and use signing keys automatically #3023
Copy link
Copy link
Open
Labels
UXThe way in which users interact with Nix. Higher level than UI.The way in which users interact with Nix. Higher level than UI.featureFeature request or proposalFeature request or proposalremote buildThe SSH store, ssh:, ssh-ng:, ... (split from protocol label 2024-07)The SSH store, ssh:, ssh-ng:, ... (split from protocol label 2024-07)
Metadata
Metadata
Assignees
Labels
UXThe way in which users interact with Nix. Higher level than UI.The way in which users interact with Nix. Higher level than UI.featureFeature request or proposalFeature request or proposalremote buildThe SSH store, ssh:, ssh-ng:, ... (split from protocol label 2024-07)The SSH store, ssh:, ssh-ng:, ... (split from protocol label 2024-07)
Fields
Give feedbackNo fields configured for issues without a type.
Background
For the sake of building stuff faster, I often use remote builds in a bit of a nonstandard way, e.g.:
This allows building remotely without copying the whole dependency graph to my laptop. However:
⇒ my laptop will start building everything itself. I'd also prefer not to use the blanket
--no-require-sigsoption.Suggestion
If no
secret-key-filesare specified in the nix config, the option should default to/etc/nix/secret-key, and this file should be generated automatically along with/etc/nix/public-keyif it doesn't exist, using the machine's hostname as a key name. This makes it easier to track where builds come from when usingnix copyor remote builds, and allows usingnix copywithout--no-require-sigs.This allows me:
--no-require-sigs