dotfiles/systems/ceres/config/comfyui.nix

85 lines
1.6 KiB
Nix
Raw Normal View History

2025-07-19 19:06:11 -05:00
{
2025-07-19 19:11:24 -05:00
config,
pkgs,
flake,
...
}:
2025-07-27 17:52:29 -05:00
2025-07-19 19:11:24 -05:00
let
2025-07-27 17:52:29 -05:00
inherit (flake.config.services.instances) comfyui web;
2025-07-19 19:11:24 -05:00
service = comfyui;
localhost = web.localhost.address1;
2025-07-27 17:52:29 -05:00
host = service.domains.url0;
2025-07-19 19:11:24 -05:00
in
{
nixpkgs.overlays = [
flake.inputs.nix-comfyui.overlays.default
];
2025-07-27 17:52:29 -05:00
services = {
comfyui = {
enable = true;
openFirewall = true;
host = localhost;
package = pkgs.comfyuiPackages.comfyui.override {
extensions = with pkgs.comfyuiPackages.extensions; [
acly-inpaint
acly-tooling
cubiq-ipadapter-plus
fannovel16-controlnet-aux
];
commandLineArgs = [
"--preview-method"
"auto"
];
};
};
caddy = {
virtualHosts = {
"${host}" = {
extraConfig = ''
basicauth {
2025-07-27 18:10:48 -05:00
import ${config.sops.secrets."caddy/${service.name}-auth".path}
2025-07-27 17:52:29 -05:00
}
2025-07-27 18:07:10 -05:00
reverse_proxy ${localhost}:${toString service.ports.port0}
2025-07-27 17:52:29 -05:00
tls ${service.ssl.cert} ${service.ssl.key}
'';
};
};
2025-07-19 19:06:11 -05:00
};
};
2025-07-19 19:11:24 -05:00
2025-07-27 17:53:36 -05:00
sops =
let
sopsPath = secret: {
path = "${service.sops.path0}/${service.name}-${secret}.env";
owner = "caddy";
mode = "0400";
};
in
{
secrets = {
"caddy/${service.name}-auth" = sopsPath "auth";
};
};
2025-07-27 17:52:29 -05:00
systemd.tmpfiles.rules = [
"Z ${service.sops.path0} 755 caddy caddy -"
];
2025-07-19 19:11:24 -05:00
users.users.${service.name}.extraGroups = [
"users"
];
networking = {
firewall = {
allowedTCPPorts = [
service.ports.port0
];
};
};
2025-07-19 19:06:11 -05:00
}