nixos-config/hosts/lithium
2025-10-28 16:10:19 -05:00
..
secrets backing up the working dir 2025-10-28 16:10:19 -05:00
services backing up the working dir 2025-10-28 16:10:19 -05:00
configuration.nix backing up the working dir 2025-10-28 16:10:19 -05:00
default.nix backing up the working dir 2025-10-28 16:10:19 -05:00
hardware.nix feat: split flake into multiple hosts and add homelab config 2025-06-06 22:28:42 -05:00
README.md feat: add new host and start modularizing system configuration 2025-06-16 13:54:38 -05:00
semi-secret-vars.nix feat: split flake into multiple hosts and add homelab config 2025-06-06 22:28:42 -05:00
sops.nix backing up the working dir 2025-10-28 16:10:19 -05:00

lithium

This is my primary homelab host/NAS, previously powered by TrueNAS Scale/k3s.

Manual Actions

Even with fully declarative Nix/Nixpkgs/NixOS at the end of the day there are still some actions that need to be taken manually.

  • secrets configuration (both for SOPS and git-agecrypt semi-secrets)
  • kanidm user management
  • tailscale auth key
  • jellyfin configuration via web-ui

Semi-Secrets

semi-secret-vars.nix is using git-agecrypt and following a pattern I discovered here:

Essentially there are some details I won't want exposed in the repository, but I do want them available to all my nix modules. The main one being the domain.

While it's not really a secret in the way a password is, consider this effort a mitigation against ddos attacks and automated requests and login attempts.