feat: comfyui-test

This commit is contained in:
Nick 2025-07-27 21:53:20 -05:00
parent 3095a75c52
commit 47e9f98b3e
2 changed files with 62 additions and 62 deletions

View file

@ -64,7 +64,7 @@ in
searx searx
vaultwarden vaultwarden
website website
comfyui # comfyui
prompter prompter
; ;
}; };

View file

@ -1,70 +1,70 @@
{ {
config, # config,
pkgs, # pkgs,
flake, # flake,
... # ...
}: # }:
let # let
inherit (flake.config.services.instances) comfyui web; # inherit (flake.config.services.instances) comfyui web;
service = comfyui; # service = comfyui;
localhost = web.localhost.address1; # localhost = web.localhost.address1;
host = service.domains.url0; # host = service.domains.url0;
in # in
{ # {
nixpkgs.overlays = [ # nixpkgs.overlays = [
flake.inputs.nix-comfyui.overlays.default # flake.inputs.nix-comfyui.overlays.default
]; # ];
services = { # services = {
comfyui = { # comfyui = {
enable = true; # enable = true;
openFirewall = true; # openFirewall = true;
host = localhost; # host = localhost;
package = pkgs.comfyuiPackages.comfyui.override { # package = pkgs.comfyuiPackages.comfyui.override {
extensions = with pkgs.comfyuiPackages.extensions; [ # extensions = with pkgs.comfyuiPackages.extensions; [
# acly-inpaint # # acly-inpaint
# acly-tooling # # acly-tooling
# cubiq-ipadapter-plus # # cubiq-ipadapter-plus
# fannovel16-controlnet-aux # # fannovel16-controlnet-aux
]; # ];
commandLineArgs = [ # commandLineArgs = [
"--preview-method" # "--preview-method"
"auto" # "auto"
]; # ];
}; # };
}; # };
caddy = { # caddy = {
virtualHosts = { # virtualHosts = {
"${host}" = { # "${host}" = {
extraConfig = '' # extraConfig = ''
basicauth { # basicauth {
{$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH} # {$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH}
} # }
reverse_proxy ${localhost}:${toString service.ports.port0} # reverse_proxy ${localhost}:${toString service.ports.port0}
tls ${service.ssl.cert} ${service.ssl.key} # tls ${service.ssl.cert} ${service.ssl.key}
''; # '';
}; # };
}; # };
}; # };
}; # };
systemd.tmpfiles.rules = [ # systemd.tmpfiles.rules = [
"Z ${service.sops.path0} 755 caddy caddy -" # "Z ${service.sops.path0} 755 caddy caddy -"
]; # ];
users.users.${service.name}.extraGroups = [ # users.users.${service.name}.extraGroups = [
"users" # "users"
"caddy" # "caddy"
]; # ];
networking = { # networking = {
firewall = { # firewall = {
allowedTCPPorts = [ # allowedTCPPorts = [
service.ports.port0 # service.ports.port0
]; # ];
}; # };
}; # };
} }