feat: comfyui-test

This commit is contained in:
Nick 2025-07-27 21:47:58 -05:00
parent a659aa1704
commit 25d1a2304f
2 changed files with 62 additions and 62 deletions

View file

@ -64,7 +64,7 @@ in
searx searx
vaultwarden vaultwarden
website website
# comfyui comfyui
prompter prompter
; ;
}; };

View file

@ -1,70 +1,70 @@
{ {
# config, config,
# pkgs, pkgs,
# flake, flake,
# ... ...
# }: }:
# let let
# inherit (flake.config.services.instances) comfyui web; inherit (flake.config.services.instances) comfyui web;
# service = comfyui; service = comfyui;
# localhost = web.localhost.address1; localhost = web.localhost.address1;
# host = service.domains.url0; host = service.domains.url0;
# in in
# { {
# nixpkgs.overlays = [ nixpkgs.overlays = [
# flake.inputs.nix-comfyui.overlays.default flake.inputs.nix-comfyui.overlays.default
];
services = {
comfyui = {
enable = true;
openFirewall = true;
host = localhost;
package = pkgs.comfyuiPackages.comfyui.override {
# extensions = with pkgs.comfyuiPackages.extensions; [
# # acly-inpaint
# # acly-tooling
# # cubiq-ipadapter-plus
# # fannovel16-controlnet-aux
# ]; # ];
commandLineArgs = [
# services = { "--preview-method"
# comfyui = { "auto"
# enable = true; ];
# openFirewall = true; };
# host = localhost; };
# package = pkgs.comfyuiPackages.comfyui.override { caddy = {
# # extensions = with pkgs.comfyuiPackages.extensions; [ virtualHosts = {
# # # acly-inpaint "${host}" = {
# # # acly-tooling extraConfig = ''
# # # cubiq-ipadapter-plus basicauth {
# # # fannovel16-controlnet-aux {$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH}
# # ]; }
# commandLineArgs = [
# "--preview-method" reverse_proxy ${localhost}:${toString service.ports.port0}
# "auto"
# ]; tls ${service.ssl.cert} ${service.ssl.key}
# }; '';
# }; };
# caddy = { };
# virtualHosts = { };
# "${host}" = { };
# extraConfig = ''
# basicauth { systemd.tmpfiles.rules = [
# {$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH} "Z ${service.sops.path0} 755 caddy caddy -"
# } ];
# reverse_proxy ${localhost}:${toString service.ports.port0} users.users.${service.name}.extraGroups = [
"users"
# tls ${service.ssl.cert} ${service.ssl.key} "caddy"
# ''; ];
# };
# }; networking = {
# }; firewall = {
# }; allowedTCPPorts = [
service.ports.port0
# systemd.tmpfiles.rules = [ ];
# "Z ${service.sops.path0} 755 caddy caddy -" };
# ]; };
# users.users.${service.name}.extraGroups = [
# "users"
# "caddy"
# ];
# networking = {
# firewall = {
# allowedTCPPorts = [
# service.ports.port0
# ];
# };
# };
} }