feat: comfyui-test

This commit is contained in:
Nick 2025-07-27 21:45:30 -05:00
parent 6d27fabd0e
commit a659aa1704

View file

@ -1,70 +1,70 @@
{ {
config, # config,
pkgs, # pkgs,
flake, # flake,
... # ...
}: # }:
let # let
inherit (flake.config.services.instances) comfyui web; # inherit (flake.config.services.instances) comfyui web;
service = comfyui; # service = comfyui;
localhost = web.localhost.address1; # localhost = web.localhost.address1;
host = service.domains.url0; # host = service.domains.url0;
in # in
{ # {
nixpkgs.overlays = [ # nixpkgs.overlays = [
flake.inputs.nix-comfyui.overlays.default # flake.inputs.nix-comfyui.overlays.default
];
services = {
comfyui = {
enable = true;
openFirewall = true;
host = localhost;
package = pkgs.comfyuiPackages.comfyui.override {
# extensions = with pkgs.comfyuiPackages.extensions; [
# # acly-inpaint
# # acly-tooling
# # cubiq-ipadapter-plus
# # fannovel16-controlnet-aux
# ]; # ];
commandLineArgs = [
"--preview-method" # services = {
"auto" # comfyui = {
]; # enable = true;
}; # openFirewall = true;
}; # host = localhost;
caddy = { # package = pkgs.comfyuiPackages.comfyui.override {
virtualHosts = { # # extensions = with pkgs.comfyuiPackages.extensions; [
"${host}" = { # # # acly-inpaint
extraConfig = '' # # # acly-tooling
basicauth { # # # cubiq-ipadapter-plus
{$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH} # # # fannovel16-controlnet-aux
} # # ];
# commandLineArgs = [
reverse_proxy ${localhost}:${toString service.ports.port0} # "--preview-method"
# "auto"
tls ${service.ssl.cert} ${service.ssl.key} # ];
''; # };
}; # };
}; # caddy = {
}; # virtualHosts = {
}; # "${host}" = {
# extraConfig = ''
systemd.tmpfiles.rules = [ # basicauth {
"Z ${service.sops.path0} 755 caddy caddy -" # {$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH}
]; # }
users.users.${service.name}.extraGroups = [ # reverse_proxy ${localhost}:${toString service.ports.port0}
"users"
"caddy" # tls ${service.ssl.cert} ${service.ssl.key}
]; # '';
# };
networking = { # };
firewall = { # };
allowedTCPPorts = [ # };
service.ports.port0
]; # systemd.tmpfiles.rules = [
}; # "Z ${service.sops.path0} 755 caddy caddy -"
}; # ];
# users.users.${service.name}.extraGroups = [
# "users"
# "caddy"
# ];
# networking = {
# firewall = {
# allowedTCPPorts = [
# service.ports.port0
# ];
# };
# };
} }