dotfiles/systems/ceres/config/comfyui.nix

71 lines
1.3 KiB
Nix
Raw Normal View History

2025-07-19 19:06:11 -05:00
{
2025-07-19 19:11:24 -05:00
config,
pkgs,
flake,
...
}:
2025-07-27 17:52:29 -05:00
2025-07-19 19:11:24 -05:00
let
2025-07-27 17:52:29 -05:00
inherit (flake.config.services.instances) comfyui web;
2025-07-19 19:11:24 -05:00
service = comfyui;
localhost = web.localhost.address1;
2025-07-27 17:52:29 -05:00
host = service.domains.url0;
2025-07-19 19:11:24 -05:00
in
{
nixpkgs.overlays = [
flake.inputs.nix-comfyui.overlays.default
];
2025-07-27 17:52:29 -05:00
services = {
comfyui = {
enable = true;
openFirewall = true;
host = localhost;
package = pkgs.comfyuiPackages.comfyui.override {
extensions = with pkgs.comfyuiPackages.extensions; [
acly-inpaint
acly-tooling
cubiq-ipadapter-plus
fannovel16-controlnet-aux
];
commandLineArgs = [
"--preview-method"
"auto"
];
};
};
caddy = {
virtualHosts = {
"${host}" = {
extraConfig = ''
basicauth {
2025-07-27 18:22:08 -05:00
{$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH}
2025-07-27 17:52:29 -05:00
}
2025-07-27 18:07:10 -05:00
reverse_proxy ${localhost}:${toString service.ports.port0}
2025-07-27 17:52:29 -05:00
tls ${service.ssl.cert} ${service.ssl.key}
'';
};
};
2025-07-19 19:06:11 -05:00
};
};
2025-07-19 19:11:24 -05:00
2025-07-27 17:52:29 -05:00
systemd.tmpfiles.rules = [
"Z ${service.sops.path0} 755 caddy caddy -"
];
2025-07-19 19:11:24 -05:00
users.users.${service.name}.extraGroups = [
"users"
2025-07-27 18:22:08 -05:00
"caddy"
2025-07-19 19:11:24 -05:00
];
networking = {
firewall = {
allowedTCPPorts = [
service.ports.port0
];
};
};
2025-07-19 19:06:11 -05:00
}