.\" -*- mode: troff; coding: utf-8 -*- .TH "nix3-env-shell" "1" "" .RS .PP \fBWarning\fR .br This program is \fB\fBexperimental\fR\fR and its interface is subject to change. .RE .SH Name .LP \f(CRnix env shell\fR - run a shell in which the specified packages are available .SH Synopsis .LP \f(CRnix env shell\fR [\fIoption\fR\[u2026]] \fIinstallables\fR\[u2026] .SH Examples .IP "\(bu" 3 Start a shell providing \f(CRyoutube-dl\fR from the \f(CRnixpkgs\fR flake: .LP .EX # nix shell nixpkgs#youtube-dl # youtube-dl --version 2020.11.01.1 .EE .IP "\(bu" 3 Start a shell providing GNU Hello from NixOS 20.03: .LP .EX # nix shell nixpkgs/nixos-20.03#hello .EE .IP "\(bu" 3 Run GNU Hello: .LP .EX # nix shell nixpkgs#hello --command hello --greeting 'Hi everybody!' Hi everybody! .EE .IP "\(bu" 3 Run multiple commands in a shell environment: .LP .EX # nix shell nixpkgs#gnumake --command sh -c \(dqcd src && make\(dq .EE .IP "\(bu" 3 Run GNU Hello in a chroot store: .LP .EX # nix shell --store \(ti/my-nix nixpkgs#hello --command hello .EE .IP "\(bu" 3 Start a shell providing GNU Hello in a chroot store: .LP .EX # nix shell --store \(ti/my-nix nixpkgs#hello nixpkgs#bashInteractive --command bash .EE .IP Note that it\(cqs necessary to specify \f(CRbash\fR explicitly because your default shell (e.g. \f(CR/bin/bash\fR) generally will not exist in the chroot. .SH Description .LP \f(CRnix shell\fR runs a command in an environment in which the \f(CR$PATH\fR variable provides the specified \fB\fIinstallables\fR\fR. If no command is specified, it starts the default shell of your user account specified by \f(CR$SHELL\fR. .SH Use as a \f(CR#!\fR-interpreter .LP You can use \f(CRnix\fR as a script interpreter to allow scripts written in arbitrary languages to obtain their own dependencies via Nix. This is done by starting the script with the following lines: .LP .EX #! /usr/bin/env nix #! nix shell installables --command real-interpreter .EE .PP where \fIreal-interpreter\fR is the “real” script interpreter that will be invoked by \f(CRnix shell\fR after it has obtained the dependencies and initialised the environment, and \fIinstallables\fR are the attribute names of the dependencies in Nixpkgs. .PP The lines starting with \f(CR#! nix\fR specify options (see above). Note that you cannot write \f(CR#! /usr/bin/env nix shell -i ...\fR because many operating systems only allow one argument in \f(CR#!\fR lines. .PP For example, here is a Python script that depends on Python and the \f(CRprettytable\fR package: .LP .EX #! /usr/bin/env nix #! nix shell github:tomberek/-#python3With.prettytable --command python import prettytable # Print a simple table. t = prettytable.PrettyTable([\(dqN\(dq, \(dqN\(ha2\(dq]) for n in range(1, 10): t.add_row([n, n * n]) print t .EE .PP Similarly, the following is a Perl script that specifies that it requires Perl and the \f(CRHTML::TokeParser::Simple\fR and \f(CRLWP\fR packages: .LP .EX #! /usr/bin/env nix #! nix shell github:tomberek/-#perlWith.HTMLTokeParserSimple.LWP --command perl -x use HTML::TokeParser::Simple; # Fetch nixos.org and print all hrefs. my $p = HTML::TokeParser::Simple->new(url => 'http://nixos.org/'); while (my $token = $p->get_tag(\(dqa\(dq)) { my $href = $token->get_attr(\(dqhref\(dq); print \(dq$href\en\(dq if $href; } .EE .PP Sometimes you need to pass a simple Nix expression to customize a package like Terraform: .LP .EX #! /usr/bin/env nix #! nix shell --impure --expr \(ga\(ga #! nix with (import (builtins.getFlake ''nixpkgs'') {}); #! nix terraform.withPlugins (plugins: [ plugins.openstack ]) #! nix \(ga\(ga #! nix --command bash terraform \(dq$@\(dq .EE .RS .PP \fBNote\fR .PP You must use double backticks (\f(CR\(ga\(ga\fR) when passing a simple Nix expression in a nix shell shebang. .RE .PP Finally, using the merging of multiple nix shell shebangs the following Haskell script uses a specific branch of Nixpkgs/NixOS (the 21.11 stable branch): .LP .EX #!/usr/bin/env nix #!nix shell --override-input nixpkgs github:NixOS/nixpkgs/nixos-21.11 #!nix github:tomberek/-#haskellWith.download-curl.tagsoup --command runghc import Network.Curl.Download import Text.HTML.TagSoup import Data.Either import Data.ByteString.Char8 (unpack) -- Fetch nixos.org and print all hrefs. main = do resp <- openURI \(dqhttps://nixos.org/\(dq let tags = filter (isTagOpenName \(dqa\(dq) $ parseTags $ unpack $ fromRight undefined resp let tags' = map (fromAttrib \(dqhref\(dq) tags mapM_ putStrLn $ filter (/= \(dq\(dq) tags' .EE .PP If you want to be even more precise, you can specify a specific revision of Nixpkgs: .LP .EX #!nix shell --override-input nixpkgs github:NixOS/nixpkgs/eabc38219184cc3e04a974fe31857d8e0eac098d .EE .PP You can also use a Nix expression to build your own dependencies. For example, the Python example could have been written as: .LP .EX #! /usr/bin/env nix #! nix shell --impure --file deps.nix -i python .EE .PP where the file \f(CRdeps.nix\fR in the same directory as the \f(CR#!\fR-script contains: .LP .EX with import {}; python3.withPackages (ps: with ps; [ prettytable ]) .EE .SH Options .IP "\(bu" 3 \fB\f(CR--command\fR\fR / \f(CR-c\fR \fIcommand\fR \fIargs\fR .IP Command and arguments to be executed, defaulting to \f(CR$SHELL\fR .IP "\(bu" 3 \fB\f(CR--ignore-environment\fR\fR / \f(CR-i\fR .IP Clear the entire environment (except those specified with \f(CR--keep\fR). .IP "\(bu" 3 \fB\f(CR--keep\fR\fR / \f(CR-k\fR \fIname\fR .IP Keep the environment variable \fIname\fR. .IP "\(bu" 3 \fB\f(CR--stdin\fR\fR .IP Read installables from the standard input. No default installable applied. .IP "\(bu" 3 \fB\f(CR--unset\fR\fR / \f(CR-u\fR \fIname\fR .IP Unset the environment variable \fIname\fR. .SS Common evaluation options .IP "\(bu" 3 \fB\f(CR--arg\fR\fR \fIname\fR \fIexpr\fR .IP Pass the value \fIexpr\fR as the argument \fIname\fR to Nix functions. .IP "\(bu" 3 \fB\f(CR--arg-from-file\fR\fR \fIname\fR \fIpath\fR .IP Pass the contents of file \fIpath\fR as the argument \fIname\fR to Nix functions. .IP "\(bu" 3 \fB\f(CR--arg-from-stdin\fR\fR \fIname\fR .IP Pass the contents of stdin as the argument \fIname\fR to Nix functions. .IP "\(bu" 3 \fB\f(CR--argstr\fR\fR \fIname\fR \fIstring\fR .IP Pass the string \fIstring\fR as the argument \fIname\fR to Nix functions. .IP "\(bu" 3 \fB\f(CR--debugger\fR\fR .IP Start an interactive environment if evaluation fails. .IP "\(bu" 3 \fB\f(CR--eval-store\fR\fR \fIstore-url\fR .IP The \fBURL of the Nix store\fR to use for evaluation, i.e. to store derivations (\f(CR.drv\fR files) and inputs referenced by them. .IP "\(bu" 3 \fB\f(CR--impure\fR\fR .IP Allow access to mutable paths and repositories. .IP "\(bu" 3 \fB\f(CR--include\fR\fR / \f(CR-I\fR \fIpath\fR .IP Add \fIpath\fR to search path entries used to resolve \fBlookup paths\fR .IP This option may be given multiple times. .IP Paths added through \f(CR-I\fR take precedence over the \fB\f(CRnix-path\fR configuration setting\fR and the \fB\f(CRNIX_PATH\fR environment variable\fR. .IP "\(bu" 3 \fB\f(CR--override-flake\fR\fR \fIoriginal-ref\fR \fIresolved-ref\fR .IP Override the flake registries, redirecting \fIoriginal-ref\fR to \fIresolved-ref\fR. .SS Common flake-related options .IP "\(bu" 3 \fB\f(CR--commit-lock-file\fR\fR .IP Commit changes to the flake\(cqs lock file. .IP "\(bu" 3 \fB\f(CR--inputs-from\fR\fR \fIflake-url\fR .IP Use the inputs of the specified flake as registry entries. .IP "\(bu" 3 \fB\f(CR--no-registries\fR\fR .IP Don\(cqt allow lookups in the flake registries. .RS .IP \fBDEPRECATED\fR .IP Use \fB\f(CR--no-use-registries\fR\fR instead. .RE .IP "\(bu" 3 \fB\f(CR--no-update-lock-file\fR\fR .IP Do not allow any updates to the flake\(cqs lock file. .IP "\(bu" 3 \fB\f(CR--no-write-lock-file\fR\fR .IP Do not write the flake\(cqs newly generated lock file. .IP "\(bu" 3 \fB\f(CR--output-lock-file\fR\fR \fIflake-lock-path\fR .IP Write the given lock file instead of \f(CRflake.lock\fR within the top-level flake. .IP "\(bu" 3 \fB\f(CR--override-input\fR\fR \fIinput-path\fR \fIflake-url\fR .IP Override a specific flake input (e.g. \f(CRdwarffs/nixpkgs\fR). This implies \f(CR--no-write-lock-file\fR. .IP "\(bu" 3 \fB\f(CR--recreate-lock-file\fR\fR .IP Recreate the flake\(cqs lock file from scratch. .RS .IP \fBDEPRECATED\fR .IP Use \fB\f(CRnix flake update\fR\fR instead. .RE .IP "\(bu" 3 \fB\f(CR--reference-lock-file\fR\fR \fIflake-lock-path\fR .IP Read the given lock file instead of \f(CRflake.lock\fR within the top-level flake. .IP "\(bu" 3 \fB\f(CR--update-input\fR\fR \fIinput-path\fR .IP Update a specific flake input (ignoring its previous entry in the lock file). .RS .IP \fBDEPRECATED\fR .IP Use \fB\f(CRnix flake update\fR\fR instead. .RE .SS Logging-related options .IP "\(bu" 3 \fB\f(CR--debug\fR\fR .IP Set the logging verbosity level to \(oqdebug\(cq. .IP "\(bu" 3 \fB\f(CR--log-format\fR\fR \fIformat\fR .IP Set the format of log output; one of \f(CRraw\fR, \f(CRinternal-json\fR, \f(CRbar\fR or \f(CRbar-with-logs\fR. .IP "\(bu" 3 \fB\f(CR--print-build-logs\fR\fR / \f(CR-L\fR .IP Print full build logs on standard error. .IP "\(bu" 3 \fB\f(CR--quiet\fR\fR .IP Decrease the logging verbosity level. .IP "\(bu" 3 \fB\f(CR--verbose\fR\fR / \f(CR-v\fR .IP Increase the logging verbosity level. .SS Miscellaneous global options .IP "\(bu" 3 \fB\f(CR--help\fR\fR .IP Show usage information. .IP "\(bu" 3 \fB\f(CR--offline\fR\fR .IP Disable substituters and consider all previously downloaded files up-to-date. .IP "\(bu" 3 \fB\f(CR--option\fR\fR \fIname\fR \fIvalue\fR .IP Set the Nix configuration setting \fIname\fR to \fIvalue\fR (overriding \f(CRnix.conf\fR). .IP "\(bu" 3 \fB\f(CR--refresh\fR\fR .IP Consider all previously downloaded files out-of-date. .IP "\(bu" 3 \fB\f(CR--repair\fR\fR .IP During evaluation, rewrite missing or corrupted files in the Nix store. During building, rebuild missing or corrupted store paths. .IP "\(bu" 3 \fB\f(CR--version\fR\fR .IP Show version information. .SS Options that change the interpretation of \fBinstallables\fR .IP "\(bu" 3 \fB\f(CR--expr\fR\fR \fIexpr\fR .IP Interpret \fB\fIinstallables\fR\fR as attribute paths relative to the Nix expression \fIexpr\fR. .IP "\(bu" 3 \fB\f(CR--file\fR\fR / \f(CR-f\fR \fIfile\fR .IP Interpret \fB\fIinstallables\fR\fR as attribute paths relative to the Nix expression stored in \fIfile\fR. If \fIfile\fR is the character -, then a Nix expression will be read from standard input. Implies \f(CR--impure\fR. .RS .LP \fBNote\fR .PP See \fB\f(CRman nix.conf\fR\fR for overriding configuration settings with command line flags. .RE