feat: comfyui-test

This commit is contained in:
Nick 2025-07-27 21:45:30 -05:00
parent 6d27fabd0e
commit a659aa1704

View file

@ -1,70 +1,70 @@
{ {
config, # config,
pkgs, # pkgs,
flake, # flake,
... # ...
}: # }:
let # let
inherit (flake.config.services.instances) comfyui web; # inherit (flake.config.services.instances) comfyui web;
service = comfyui; # service = comfyui;
localhost = web.localhost.address1; # localhost = web.localhost.address1;
host = service.domains.url0; # host = service.domains.url0;
in # in
{ # {
nixpkgs.overlays = [ # nixpkgs.overlays = [
flake.inputs.nix-comfyui.overlays.default # flake.inputs.nix-comfyui.overlays.default
];
services = {
comfyui = {
enable = true;
openFirewall = true;
host = localhost;
package = pkgs.comfyuiPackages.comfyui.override {
# extensions = with pkgs.comfyuiPackages.extensions; [
# # acly-inpaint
# # acly-tooling
# # cubiq-ipadapter-plus
# # fannovel16-controlnet-aux
# ]; # ];
commandLineArgs = [
"--preview-method"
"auto"
];
};
};
caddy = {
virtualHosts = {
"${host}" = {
extraConfig = ''
basicauth {
{$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH}
}
reverse_proxy ${localhost}:${toString service.ports.port0} # services = {
# comfyui = {
# enable = true;
# openFirewall = true;
# host = localhost;
# package = pkgs.comfyuiPackages.comfyui.override {
# # extensions = with pkgs.comfyuiPackages.extensions; [
# # # acly-inpaint
# # # acly-tooling
# # # cubiq-ipadapter-plus
# # # fannovel16-controlnet-aux
# # ];
# commandLineArgs = [
# "--preview-method"
# "auto"
# ];
# };
# };
# caddy = {
# virtualHosts = {
# "${host}" = {
# extraConfig = ''
# basicauth {
# {$CADDY_AUTH_USER} {$CADDY_AUTH_PASSWORD_HASH}
# }
tls ${service.ssl.cert} ${service.ssl.key} # reverse_proxy ${localhost}:${toString service.ports.port0}
'';
};
};
};
};
systemd.tmpfiles.rules = [ # tls ${service.ssl.cert} ${service.ssl.key}
"Z ${service.sops.path0} 755 caddy caddy -" # '';
]; # };
# };
# };
# };
users.users.${service.name}.extraGroups = [ # systemd.tmpfiles.rules = [
"users" # "Z ${service.sops.path0} 755 caddy caddy -"
"caddy" # ];
];
networking = { # users.users.${service.name}.extraGroups = [
firewall = { # "users"
allowedTCPPorts = [ # "caddy"
service.ports.port0 # ];
];
}; # networking = {
}; # firewall = {
# allowedTCPPorts = [
# service.ports.port0
# ];
# };
# };
} }