.\" -*- mode: troff; coding: utf-8 -*- .TH "nix3-daemon" "1" "" .RS .PP \fBWarning\fR .br This program is \fB\fBexperimental\fR\fR and its interface is subject to change. .RE .SH Name .LP \f(CRnix daemon\fR - daemon to perform store operations on behalf of non-root clients .SH Synopsis .LP \f(CRnix daemon\fR [\fIoption\fR\[u2026]] .SH Examples .IP "\(bu" 3 Run the daemon: .LP .EX # nix daemon .EE .IP "\(bu" 3 Run the daemon and listen on standard I/O instead of binding to a UNIX socket: .LP .EX # nix daemon --stdio .EE .IP "\(bu" 3 Run the daemon and force all connections to be trusted: .LP .EX # nix daemon --force-trusted .EE .IP "\(bu" 3 Run the daemon and force all connections to be untrusted: .LP .EX # nix daemon --force-untrusted .EE .IP "\(bu" 3 Run the daemon, listen on standard I/O, and force all connections to use Nix\(cqs default trust: .LP .EX # nix daemon --stdio --default-trust .EE .SH Description .LP This command runs the Nix daemon, which is a required component in multi-user Nix installations. It runs build tasks and other operations on the Nix store on behalf of non-root users. Usually you don\(cqt run the daemon directly; instead it\(cqs managed by a service management framework such as \f(CRsystemd\fR on Linux, or \f(CRlaunchctl\fR on Darwin. .PP Note that this daemon does not fork into the background. .SH Options .IP "\(bu" 3 \fB\f(CR--default-trust\fR\fR .IP Use Nix\(cqs default trust. .IP "\(bu" 3 \fB\f(CR--force-trusted\fR\fR .IP Force the daemon to trust connecting clients. .IP "\(bu" 3 \fB\f(CR--force-untrusted\fR\fR .IP Force the daemon to not trust connecting clients. The connection will be processed by the receiving daemon before forwarding commands. .IP "\(bu" 3 \fB\f(CR--process-ops\fR\fR .IP Forces the daemon to process received commands itself rather than forwarding the commands straight to the remote store. .LP .EX This is useful for the \(gamounted-ssh://\(ga store where some actions need to be performed on the remote end but as connected user, and not as the user of the underlying daemon on the remote end. .EE .IP "\(bu" 3 \fB\f(CR--stdio\fR\fR .IP Attach to standard I/O, instead of trying to bind to a UNIX socket. .SS Logging-related options .IP "\(bu" 3 \fB\f(CR--debug\fR\fR .IP Set the logging verbosity level to \(oqdebug\(cq. .IP "\(bu" 3 \fB\f(CR--log-format\fR\fR \fIformat\fR .IP Set the format of log output; one of \f(CRraw\fR, \f(CRinternal-json\fR, \f(CRbar\fR or \f(CRbar-with-logs\fR. .IP "\(bu" 3 \fB\f(CR--print-build-logs\fR\fR / \f(CR-L\fR .IP Print full build logs on standard error. .IP "\(bu" 3 \fB\f(CR--quiet\fR\fR .IP Decrease the logging verbosity level. .IP "\(bu" 3 \fB\f(CR--verbose\fR\fR / \f(CR-v\fR .IP Increase the logging verbosity level. .SS Miscellaneous global options .IP "\(bu" 3 \fB\f(CR--help\fR\fR .IP Show usage information. .IP "\(bu" 3 \fB\f(CR--offline\fR\fR .IP Disable substituters and consider all previously downloaded files up-to-date. .IP "\(bu" 3 \fB\f(CR--option\fR\fR \fIname\fR \fIvalue\fR .IP Set the Nix configuration setting \fIname\fR to \fIvalue\fR (overriding \f(CRnix.conf\fR). .IP "\(bu" 3 \fB\f(CR--refresh\fR\fR .IP Consider all previously downloaded files out-of-date. .IP "\(bu" 3 \fB\f(CR--version\fR\fR .IP Show version information. .RS .LP \fBNote\fR .PP See \fB\f(CRman nix.conf\fR\fR for overriding configuration settings with command line flags. .RE