Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Nix
  3. Self Host Blocks

Self Host Blocks

AGPL-3.0Nixv0.8.0Self-Hosted

An opinionated NixOS distribution providing modular building blocks and unified configuration for self-hosting services with best practices.

Visit WebsiteGitHubGitHub
459 stars16 forks0 contributors

What is Self Host Blocks?

SelfHostBlocks is an opinionated NixOS distribution and collection of modules that standardizes self-hosting server management. It provides pre-configured services (like Nextcloud, Jellyfin, Vaultwarden) and reusable building blocks (backup, monitoring, SSO) with a unified configuration interface. It solves the complexity and maintenance burden of self-hosting by embedding best practices and ensuring robustness through automated testing.

Target Audience

Privacy and data sovereignty enthusiasts, homelab administrators, and developers who want to self-host services with a declarative, maintainable infrastructure. It suits those familiar with NixOS or willing to adopt its ecosystem for server management.

Value Proposition

Developers choose SelfHostBlocks for its focus on long-term maintainability, modular design via contracts, and comprehensive integration of best practices. Unlike other server management tools, it provides a tested, distribution-like guarantee that services work together correctly and offers a consistent configuration experience.

Overview

Modular server management based on NixOS modules and focused on best practices.

Use Cases

Best For

  • Setting up a private groupware server with services like Nextcloud, calendars, and contacts
  • Managing a media server stack (Jellyfin, Audiobookshelf, *arr suite) with automated backups
  • Deploying a secure, monitored homelab with Grafana/Prometheus and SSO integration
  • Building a declarative NixOS-based infrastructure with reusable, modular components
  • Escaping cloud dependencies for privacy-focused, self-hosted alternatives
  • Experimenting with or adopting the NixOS contracts system for modular service composition

Not Ideal For

  • Teams needing quick, graphical server setup without NixOS or CLI expertise
  • Projects requiring frequent, ad-hoc service changes without full system reconfiguration
  • Enterprises that depend on commercial support and extensive documentation for all components
  • Users who prefer container-based solutions like Docker over system-level NixOS management

Pros & Cons

Pros

Unified Configuration Interface

Services like Nextcloud and Forgejo share consistent configuration patterns, as shown in README snippets, making setup intuitive and reducing complexity.

Modular Building Blocks

Reusable components such as LDAP, backups, and monitoring integrate seamlessly, providing a solid foundation and enabling easy customization with other services.

Automated Testing & Updates

Comprehensive NixOS VM tests ensure all services evaluate, build, and work correctly together, with automated updates following nixpkgs unstable for reliability.

Contracts System for Modularity

Pioneers a contracts mechanism to increase modularity, allowing interchangeable components like databases or reverse proxies, as detailed in the linked RFC.

Best Practices Integration

Out-of-the-box features include ZFS datasets per service, automatic HTTPS, Grafana/Prometheus monitoring, and LDAP/SSO integration for a robust setup.

Cons

Single Maintainer Risk

The README cautions that this is a one-person effort with potential undiscovered bugs, which could lead to slower issue resolution and limited support.

Patched Nixpkgs Dependency

SelfHostBlocks requires its own patched version of nixpkgs, limiting flexibility and potentially causing conflicts with custom NixOS configurations or updates.

Incomplete Documentation

Some services lack entries in the manual, forcing users to refer to the 'All Options' section, which can be cumbersome and less user-friendly.

Steep Initial Setup

Focus on long-term maintenance over ease of installation means a higher barrier to entry, especially for those new to NixOS or declarative infrastructure.

Frequently Asked Questions

Quick Stats

Stars459
Forks16
Contributors0
Open Issues99
Last commit2 days ago
CreatedSince 2022

Tags

#modular-architecture#privacy#infrastructure-as-code#data-sovereignty#nixos#nix-modules#self-hosting#nix#automated-deployment#self-hosted#server-management#declarative-configuration

Built With

F
Flakes
N
Nix
N
NixOS
L
Loki
P
PostgreSQL
G
Grafana
P
Prometheus
Z
ZFS

Links & Resources

Website

Included in

Self Hosted284.1kNix5.0k
Auto-fetched 1 day ago

Related Projects

Home ManagerHome Manager

Manage a user environment using Nix [maintainer=@khaneliman, @rycee]

Stars9,785
Forks2,381
Last commit2 days ago
nix-darwinnix-darwin

Manage your macOS using Nix

Stars5,439
Forks618
Last commit1 day ago
Ansible-NASAnsible-NAS

Build a full-featured home server or NAS replacement with an Ubuntu box and this playbook.

Stars3,732
Forks522
Last commit3 months ago
NixOS hardwareNixOS hardware

A collection of NixOS modules covering hardware quirks.

Stars3,104
Forks927
Last commit2 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub