Tips&Tricks for NixOS Desktop

It’s often said that git is a poor VCS, but a good VCS Construction Kit. NixOS can feel similar at
times — nix is very powerful, and there are amazing things you can do if you know nuts&bolts of
it. However, for a casual user, the sheer amount of possibilities can feel overwhelming, and it
might be hard to see what’s most useful in the space of possible.

Over the years, I’ve accumulated a bunch of tricks I wish I knew earlier. I want to share them here,
and learn some knew ones, please feel free to add yours!

21 Likes

Use NixOS-unstable

When starting with NixOS, I picked the stable channel, but soon realized that, for the applications I use daily, I’d rather have more up-to-date versions. So I created a complex setup where most things are from stable, and select apps are from unstable.

Some years later, I realized that a better approach for me is to just use NixOS-unstable. Unstable is a misnomer – it’s just a rolling, continuous release, which is gated by a test suite and is pretty stable in practice. What’s more, even if something break’s, its trivial to boot the previous generation. NixOS mitigates major drawbacks of a rolling release model, making it a reasonable
boring default to use on a desktop.

Don’t rollback; switch to a working config instead

Speaking of rollbacks, nixos-rebuild --rollback switch is not the best way to do that. It rolls you back from a currently broken configuration, which requires you to boot the broken config and do some mental gimnastics to calculate how far to rollback.

Instead, boot into the configuration you want to rollback to, and issue

console /run/current-system/bin/switch-to-configuration boot

to make it default.

Use https://search.nixos.org/packages to look for packages

I’ve spent a lot of time looking for a good way to search for nix packages on the command line (eg, using nox utility). But it looks like using NixOS Search is a better default (would love a cli frontend for that though).

Look for options before packages

Many larger things, like docker or emacs, have both a package and an option.

Most of the time, you want the option, as it enables additional integration with the system (eg, starts systemd daemon or what not).

More generally, whatever you want to do with NixOS, start with looking for an option, chances are the thing has first-class support in NixOS.

Don’t use nix-env / nix profile install on NixOS

NixOS has two ways to install the packages. Declaring a package in configuration.nix installs is “globally”, such that it is available to all users. Using nix-env / nix profile install installs the package for the current user.

Originally, I used nix-env to install most packages, and only gradually moved “important” ones to configuration.nix. This seemed “reasonable”, but just made the state of the system less reproducible.

These days, I don’t use nix-env at all. If I need a one-off utility, I use nix shell nixpkgs#ffmpeg to temporary get it. For anything which I need more than a couple of times, I add it
to my system-wide configuration.

As an aside, this reasoning makes me hesitant to try home manager. HM manages user-specific packages, but for my single-user install I don’t want to have user-specific packages in the first
place.

Use buildFHSUserEnv to run unmodified binaries on NixOS

NixOS has a problem with running random binaries from the internet, because it doesn’t have expected things like dynamic linker in a usual place. One way to solve this is to use patchelf to modify the binaries. A different approach is to create a lightweight container around the binary, which sets up a “usual” environment. NixOS has a tool for that, buildFHSUserEnv, but it might get tricky to use. Here’s how I set it up:

environment.systemPackages = [
  (let base = pkgs.appimageTools.defaultFhsEnvArgs; in 
   pkgs.buildFHSUserEnv (base // {
     name = "fhs";
     targetPkgs = pkgs: (base.targetPkgs pkgs) ++ [pkgs.pkg-config]; 
     profile = "export FHS=1"; 
     runScript = "fish"; 
     extraOutputsToInstall = ["dev"];
   }))
   …
]

And here’s how I use it

# Get random binary from the Internet 
$ wget 'https://code.visualstudio.com/sha/download?build=stable&os=linux-x64' -O code.tar.gz 
$ aunpack code.tar.gz && cd VSCode-linux-x64

# Running stuff directly fails 
$ ./bin/code 
./bin/code: line 62: ./bin/../code: cannot execute:
required file not found

# Activating FHS drops me in a shell which looks like a "normal" Linux 
$ fhs 
(fhs) $ ls /usr/bin
(fhs) $ ./bin/code

Some details on the buildFHSUserEnv invocation.

  1. By default, it doesn’t include any packages.
    Building your own env with X and whatnot would be chore. So, I base my FHS on appimage one, using
    pkgs.appimageTools.defaultFhsEnvArgs as a base
  2. name would end up being the name of the binary I use to drop into env
  3. In targetPkgs, I add my own packages.
  4. profile is just for me to be able to add (fhs) to the shell prompt.
  5. runScript to run my shell, rather than bash.
  6. extraOutputsToInstall, like pkg-config, I
    need to be able to compile stuff (dont’ remeber details at this point).
45 Likes

How do you manage your dotfiles instead?

Using git as an example:

3 Likes

Are you sure it works? Because this issue is still open: NixOS: switch-to-configuration script does not correctly add a boot entry when executed standalone · Issue #82851 · NixOS/nixpkgs · GitHub

Just checked, and, yes, it seems to work for me. That is

  • I rebooted into one of the older configurations by selecting it in the boot manager (systemd-boot)
  • After boot, I run doas /run/current-system/bin/switch-to-configuration boot in the terminal
  • After reboot, that configuration was selected as the default one by the boot loader (I get the same list of entries, but now not the topmost one is focused).

hi all. newbie here. have an unusual issue with generations not visible in the Grub menu? I posted the full issue here: NO generations in grub?
I’m at a loss and perplexed by the issue.
I’ve installed afew flatpaks, printer, scanner and nvidia services in nixos 23.05. Im yet to install bluetooth, mount points and samba.
so far, i like the feel of the system. Was a die hard fedora kde (37) fanboy but their quality control by late has disappointed me, especially f38.

Require help and I guess ive posted into the wrong topic ? but any help be appreciated :flushed:

352698888_10162106737022985_7970500757639719670_n

1 Like

Seriously these advice should be documented somewhere for newcomers :smiley:

9 Likes

If it’s a single user system you don’t really care either way, the packages just need to be present for your user in some way.
On multi-user system this would make more sense because with home-manager you would then have to apply the config to multiple users on the system.
However an additional bonus to home-manager is a lot of options which aren’t part of nixpgks.
In addition if you use home-manager it’s easier to share your configuration with a non-NixOS system.
E.g. if your company uses another distro, etc.

With this I don’t agree at all, especially for new users. If someone is comfortable with NixOS sure then go ahead but at that point they should know how to fix problems.
The nice thing about NixOS is that you easily can install packages from unstable if you need them.
Once you setup the unstable-overlay it’s not really that complicated to install a package with unstable.something.

An important thing to keep in mind here is that switching back to an earlier generation doesn’t rollback the state. So if you have an application that uses a database to store its data and the schema changes between updates your data might be unusable in the previous generation.
Happened to me with Telegram and Signal for example.
Therefore it’s still very important to have backups of your data matching to your generations.

Good advice, as a quick and dirty solution for people with plenty of disk space stream-run might still be the easier option.

3 Likes

As for searching, I also find nix search nixpkgs very usefull. especially for other flakes than nixpkgs.
Another good way is to nix repl and :load-flake

For this I use mainly 2 options: nix-ld and similar tools like nix-alien and steam-run for quick and easy.
As a reminder, nixos recently switched for default chroot method to bwrap, which is almost better in every way except it changes some paths and all other “non user files” get nobody permissions.

Also for an awesome and full info about this, this is a great resourse:

Now for my tips:

11 Likes

Hi everyone, great topic and thanks to all for sharing

I recently switched my whole working environment from Ubuntu to NixOS (desktop).

Prolly not re-inventing the wheel here:
I’m currently running multiple NixOS desktop containers (not VM’s) in LXD which are accessed via xrdp (e.g with Remmina) for remote desktop, all within a NixOS desktop instance (Nixos in Nixos).
Main reasons is to avoid having to do clean install whenever I need to up or down an environment. As working remotely, this comes in handy and avoid mixing up work, personal and different projects, packages, etc.

Assuming one’s device has enough resources, it is runs quite smooth, though they are few drawbacks.
Also good alternative to nixos-rebuild build-vm (NixOS:nixos-rebuild build-vm - NixOS Wiki), containers also being “lighter” than VM’s.

Some example here:

2 Likes

Instead of using channels, fully flake your NixOS and ditch the channel idea.

2 Likes

It looks like nix-ld is the canonical solution, nowadays.

1 Like

A new tip!

In your NixOS configuration, it is possible to apply an unmerged pull request.

The way this works is that in nixpkgs there’s a function to apply a .diff to its own source code and return a fresh copy of nixpkgs.

So, if you run an upgrade, and then see that something’s broken, in addition to reverting to an earlier version what you can do is to check if there’s a pull request already fixing the issue, and then “cherry-pick” it.

This is how I do it in my flake-based config:

# My flake.nix
{
  inputs = {
    nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
  };

  # Use `inputs@` to be able to "shadow" nixpkgs input.
  outputs = inputs@{ self }:
    # The list of patches. I don't know the proper way to know the hash for the diff, so,
    # when adding a new patch I add a dummy value and read the error message.
    let patches = [
      {
        url = "https://patch-diff.githubusercontent.com/raw/NixOS/nixpkgs/pull/292148.diff";
        sha256 = "sha256-gaH4UxKi2s7auoaTmbBwo0t4HuT7MwBuNvC/z2vvugE=";
      }
    ];

    # First we get the pristine nixpkgs, to get at its `applyPatches` nix function from `pkgs`.
    originPkgs = inputs.nixpkgs.legacyPackages."x86_64-linux";
    # Then, we get our patched nixpkgs by calling that function with the list of our patches.
    nixpkgs = originPkgs.applyPatches {
      name = "nixpkgs-patched";
      src = inputs.nixpkgs;
      patches = map originPkgs.fetchpatch patches;
    };

    # Finally we get patched `nixosSystem`
    nixosSystem = import (nixpkgs + "/nixos/lib/eval-config.nix");

    # If you want to quick disable patches, uncomment:
    # nixosSystem = inputs.nixpkgs.lib.nixosSystem;
  in
  {
    nixosConfigurations = {
      Ishmael = nixosSystem {
         system = "x86_64-linux";
         modules =[ ./hosts/Ishmael.nix ];
      };
    };
  };
}

As a bonus, when the PR is merged and gets to nixos-unstable, the patch will fail to apply, so you’ll notice when it you can remove it!

16 Likes

LXD has moved from LinuxContainers.org to Ubuntu and some of the top tier devs weren’t too happy about it so they forked LXD and the new one is called Incus.

The goal of Incus is to provide a fully community led alternative to Canonical’s LXD as well as providing an opportunity to correct some mistakes that were made during LXD’s development which couldn’t be corrected without breaking backward compatibility.

In addition to Aleksa, the initial set of maintainers for Incus will include Christian Brauner, Serge Hallyn, Stéphane Graber and Tycho Andersen, effectively including the entire team that once created LXD.

See the announcement:

Yes, NixOS has Incus packages!