This page covers the public Community (Homelab) self-hosted path.
It is not the Enterprise Self-Hosted runtime hosting and lifecycle contract. Customer-owned enterprise runtime ownership remains a planning/contact posture today, so Community runbooks must not be taught as the deploy, upgrade, or support contract for Enterprise Self-Hosted.
The current supported public starter topology is the Community single-host helper path. That topology is a release-supported starting point, not the full conceptual boundary of the Community edition.
The supported install contract is a source checkout or equivalent release bundle that builds the required runtime images locally by default. It must not depend on private internal GHCR packages.
The anonymous public Community distribution channel is not open yet, so external users should not expect public GitHub clone or anonymous GHCR pulls to work today. Until that channel is opened, this path requires an authorized checkout or a published release bundle from the Nanami team.
Supported path
The supported public path today is the Community reference single-host helper:
- Obtain the current Community checkout or release bundle you want to run.
- Copy
deploy/community-single-host.env.exampletodeploy/community-single-host.env. - Replace placeholder secrets, public hosts, and gateway endpoint/domain values.
- Keep
COMMUNITY_IMAGE_SOURCE=buildunless you intentionally supply your own public registry images. - Run
scripts/community_single_host.sh validate-env. - Run
scripts/community_single_host.sh preflight. - Run
scripts/community_single_host.sh up. - Complete the first admin bootstrap in the product UI.
- Run
scripts/community_single_host_smoke.shbefore broader rollout.
This path is intentionally safer than manually starting each internal service one by one.
What you prepare
- Public app URL and API URL for users.
- A gateway domain or explicit gateway endpoint for WireGuard traffic.
- Real secrets instead of example placeholders.
- TLS and reverse proxying for public browser/API surfaces.
Hardening checklist
Use the dedicated Community security checklist as the supported operator reference. The short version is:
- use real secrets and rotate enrollment credentials,
- terminate TLS in front of public endpoints,
- restrict management API ingress by network controls,
- back up Postgres regularly,
- monitor gateway heartbeat and observed-state freshness,
- keep internal runtime ports off the public internet.
Known limitations
- Cross-platform managed client coverage is still expanding.
- Some advanced policy UX remains roadmap work.