Spaces:
Running
Running
Update app.py
Browse files
app.py
CHANGED
@@ -12,6 +12,7 @@ import huggingface_hub
|
|
12 |
import torch
|
13 |
import base64
|
14 |
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
|
|
|
15 |
from cryptography.hazmat.backends import default_backend
|
16 |
import yaml
|
17 |
from gradio_logsview.logsview import Log, LogsView, LogsViewRunner
|
@@ -32,7 +33,7 @@ MARKDOWN_DESCRIPTION = """
|
|
32 |
|
33 |
The fastest way to perform a model merge 🔥
|
34 |
|
35 |
-
Specify a YAML configuration file (see examples below) and a HF token and this app will perform the merge and upload the merged model to your user profile.
|
36 |
"""
|
37 |
|
38 |
MARKDOWN_ARTICLE = """
|
@@ -73,52 +74,119 @@ This Space is heavily inspired by LazyMergeKit by Maxime Labonne (see [Colab](ht
|
|
73 |
|
74 |
examples = [[str(f)] for f in pathlib.Path("examples").glob("*.yaml")]
|
75 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
76 |
|
77 |
-
def encrypt_file(file_path, key):
|
78 |
"""
|
79 |
-
Encrypt the contents of a file using AES encryption with the provided key.
|
80 |
-
|
|
|
81 |
Args:
|
82 |
file_path: Path to the file to encrypt (pathlib.Path or string)
|
83 |
-
key: Encryption key
|
84 |
-
|
85 |
Returns:
|
86 |
bool: True if encryption was successful, False otherwise
|
87 |
"""
|
88 |
try:
|
89 |
file_path = pathlib.Path(file_path)
|
90 |
if not file_path.exists():
|
|
|
91 |
return False
|
92 |
-
|
93 |
-
|
94 |
-
|
95 |
-
|
96 |
-
|
97 |
-
# Generate a random IV
|
98 |
iv = os.urandom(16)
|
99 |
-
|
100 |
-
# Create an
|
101 |
cipher = Cipher(algorithms.AES(key_bytes), modes.CBC(iv), backend=default_backend())
|
102 |
encryptor = cipher.encryptor()
|
103 |
-
|
104 |
-
#
|
|
|
|
|
105 |
with open(file_path, 'rb') as f:
|
106 |
-
|
107 |
-
|
108 |
-
# Pad the
|
109 |
-
|
110 |
-
|
111 |
-
|
112 |
-
|
113 |
-
|
|
|
|
|
|
|
|
|
114 |
with open(file_path, 'wb') as f:
|
115 |
-
f.write(
|
116 |
-
|
117 |
return True
|
118 |
except Exception as e:
|
119 |
print(f"Encryption error: {e}")
|
120 |
return False
|
121 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
122 |
|
123 |
def merge(yaml_config: str, hf_token: str, repo_name: str, cipher_key: str) -> Iterable[List[Log]]:
|
124 |
runner = LogsViewRunner()
|
@@ -136,7 +204,7 @@ def merge(yaml_config: str, hf_token: str, repo_name: str, cipher_key: str) -> I
|
|
136 |
if not hf_token:
|
137 |
yield runner.log("No HF token provided. A valid token is required for uploading.", level="ERROR")
|
138 |
return
|
139 |
-
|
140 |
# Validate that the token works by trying to get user info
|
141 |
try:
|
142 |
api = huggingface_hub.HfApi(token=hf_token)
|
@@ -146,10 +214,14 @@ def merge(yaml_config: str, hf_token: str, repo_name: str, cipher_key: str) -> I
|
|
146 |
yield runner.log(f"Invalid HF token: {e}", level="ERROR")
|
147 |
return
|
148 |
|
149 |
-
#
|
150 |
if not cipher_key:
|
151 |
-
cipher_key = "
|
152 |
-
yield runner.log("No cipher key provided. Using default key
|
|
|
|
|
|
|
|
|
153 |
|
154 |
with tempfile.TemporaryDirectory(ignore_cleanup_errors=True) as tmpdirname:
|
155 |
tmpdir = pathlib.Path(tmpdirname)
|
@@ -182,37 +254,49 @@ def merge(yaml_config: str, hf_token: str, repo_name: str, cipher_key: str) -> I
|
|
182 |
|
183 |
if runner.exit_code != 0:
|
184 |
yield runner.log("Merge failed. Deleting repo as no model is uploaded.", level="ERROR")
|
185 |
-
|
|
|
|
|
|
|
|
|
186 |
return
|
187 |
|
188 |
-
yield runner.log("Model merged successfully.
|
189 |
-
|
190 |
-
#
|
191 |
merge_dir = merged_path / "merge"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
192 |
readme_deleted = False
|
193 |
-
|
194 |
-
|
195 |
-
|
196 |
file.unlink()
|
197 |
readme_deleted = True
|
198 |
yield runner.log(f"Deleted {file.name} file before upload")
|
199 |
-
|
200 |
-
|
201 |
-
|
|
|
202 |
if not readme_deleted:
|
203 |
-
yield runner.log("No Readme.md file found to delete", level="INFO")
|
204 |
-
|
205 |
-
|
206 |
-
config_yml_path = merged_path / "merge" / "mergekit_config.yml"
|
207 |
-
if not config_yml_path.exists():
|
208 |
-
yield runner.log("mergekit_config.yml not found, nothing to encrypt", level="INFO")
|
209 |
-
elif encrypt_file(config_yml_path, cipher_key):
|
210 |
-
yield runner.log("Encrypted mergekit_config.yml with provided key")
|
211 |
-
|
212 |
yield from runner.run_python(
|
213 |
api.upload_folder,
|
214 |
repo_id=repo_url.repo_id,
|
215 |
-
folder_path=
|
216 |
)
|
217 |
yield runner.log(f"Model successfully uploaded to HF: {repo_url.repo_id}")
|
218 |
|
@@ -234,43 +318,65 @@ NEXT_RESTART = f"Next Restart: {next_run_time_utc.strftime('%Y-%m-%d %H:%M:%S')}
|
|
234 |
with gr.Blocks() as demo:
|
235 |
gr.Markdown(MARKDOWN_DESCRIPTION)
|
236 |
gr.Markdown(NEXT_RESTART)
|
237 |
-
|
238 |
-
with gr.
|
239 |
-
|
240 |
-
|
241 |
-
|
242 |
-
|
243 |
-
|
244 |
-
|
245 |
-
|
246 |
-
|
247 |
-
|
248 |
-
|
249 |
-
|
250 |
-
|
251 |
-
|
252 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
253 |
)
|
254 |
-
|
255 |
-
|
256 |
-
|
257 |
-
|
258 |
-
|
259 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
260 |
)
|
261 |
-
|
262 |
-
|
263 |
-
|
264 |
-
examples,
|
265 |
-
fn=lambda s: (s,),
|
266 |
-
run_on_click=True,
|
267 |
-
label="Examples",
|
268 |
-
inputs=[filename],
|
269 |
-
outputs=[config],
|
270 |
-
)
|
271 |
-
gr.Markdown(MARKDOWN_ARTICLE)
|
272 |
-
|
273 |
-
button.click(fn=merge, inputs=[config, token, repo_name, cipher_key], outputs=[logs])
|
274 |
-
|
275 |
-
|
276 |
-
demo.queue(default_concurrency_limit=1).launch()
|
|
|
12 |
import torch
|
13 |
import base64
|
14 |
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
|
15 |
+
from cryptography.hazmat.primitives import padding as sym_padding # Use symmetric padding
|
16 |
from cryptography.hazmat.backends import default_backend
|
17 |
import yaml
|
18 |
from gradio_logsview.logsview import Log, LogsView, LogsViewRunner
|
|
|
33 |
|
34 |
The fastest way to perform a model merge 🔥
|
35 |
|
36 |
+
Specify a YAML configuration file (see examples below) and a HF token and this app will perform the merge and upload the merged model to your user profile. Includes encryption for the `mergekit_config.yml` and a tool to decrypt it.
|
37 |
"""
|
38 |
|
39 |
MARKDOWN_ARTICLE = """
|
|
|
74 |
|
75 |
examples = [[str(f)] for f in pathlib.Path("examples").glob("*.yaml")]
|
76 |
|
77 |
+
def _prepare_key(key: str) -> bytes:
|
78 |
+
"""Pads or truncates the key to 32 bytes (256 bits) for AES."""
|
79 |
+
key_bytes = key.encode('utf-8')
|
80 |
+
if len(key_bytes) < 32:
|
81 |
+
return key_bytes + b'\0' * (32 - len(key_bytes))
|
82 |
+
else:
|
83 |
+
return key_bytes[:32]
|
84 |
|
85 |
+
def encrypt_file(file_path, key: str) -> bool:
|
86 |
"""
|
87 |
+
Encrypt the contents of a file using AES-256-CBC encryption with the provided key.
|
88 |
+
The output is Base64 encoded.
|
89 |
+
|
90 |
Args:
|
91 |
file_path: Path to the file to encrypt (pathlib.Path or string)
|
92 |
+
key: Encryption key string.
|
93 |
+
|
94 |
Returns:
|
95 |
bool: True if encryption was successful, False otherwise
|
96 |
"""
|
97 |
try:
|
98 |
file_path = pathlib.Path(file_path)
|
99 |
if not file_path.exists():
|
100 |
+
print(f"Encryption error: File not found at {file_path}")
|
101 |
return False
|
102 |
+
|
103 |
+
key_bytes = _prepare_key(key)
|
104 |
+
|
105 |
+
# Generate a random IV (Initialization Vector) - 16 bytes for AES
|
|
|
|
|
106 |
iv = os.urandom(16)
|
107 |
+
|
108 |
+
# Create an AES cipher instance with CBC mode
|
109 |
cipher = Cipher(algorithms.AES(key_bytes), modes.CBC(iv), backend=default_backend())
|
110 |
encryptor = cipher.encryptor()
|
111 |
+
|
112 |
+
# Use PKCS7 padding
|
113 |
+
padder = sym_padding.PKCS7(algorithms.AES.block_size).padder()
|
114 |
+
|
115 |
with open(file_path, 'rb') as f:
|
116 |
+
plaintext = f.read()
|
117 |
+
|
118 |
+
# Pad the data
|
119 |
+
padded_data = padder.update(plaintext) + padder.finalize()
|
120 |
+
|
121 |
+
# Encrypt the padded data
|
122 |
+
ciphertext = encryptor.update(padded_data) + encryptor.finalize()
|
123 |
+
|
124 |
+
# Prepend the IV to the ciphertext and base64 encode the result
|
125 |
+
encrypted_data_with_iv = base64.b64encode(iv + ciphertext)
|
126 |
+
|
127 |
+
# Write the base64 encoded encrypted data back to the file
|
128 |
with open(file_path, 'wb') as f:
|
129 |
+
f.write(encrypted_data_with_iv)
|
130 |
+
|
131 |
return True
|
132 |
except Exception as e:
|
133 |
print(f"Encryption error: {e}")
|
134 |
return False
|
135 |
|
136 |
+
def decrypt_file_content(file_input, key: str) -> str:
|
137 |
+
"""
|
138 |
+
Decrypts the content of an uploaded file using AES-256-CBC and returns the result.
|
139 |
+
Assumes the file content is Base64 encoded IV + ciphertext.
|
140 |
+
|
141 |
+
Args:
|
142 |
+
file_input: Gradio File component output (temporary file object).
|
143 |
+
key: Decryption key string.
|
144 |
+
|
145 |
+
Returns:
|
146 |
+
str: Decrypted content as a UTF-8 string, or an error message.
|
147 |
+
"""
|
148 |
+
if file_input is None:
|
149 |
+
return "Error: No file provided for decryption."
|
150 |
+
if not key:
|
151 |
+
return "Error: Decryption key cannot be empty."
|
152 |
+
|
153 |
+
try:
|
154 |
+
file_path = file_input.name # Get the temporary file path from Gradio
|
155 |
+
key_bytes = _prepare_key(key)
|
156 |
+
|
157 |
+
with open(file_path, 'rb') as f:
|
158 |
+
base64_encoded_data = f.read()
|
159 |
+
|
160 |
+
# Decode from Base64
|
161 |
+
encrypted_data_with_iv = base64.b64decode(base64_encoded_data)
|
162 |
+
|
163 |
+
# Extract the IV (first 16 bytes)
|
164 |
+
iv = encrypted_data_with_iv[:16]
|
165 |
+
# Extract the ciphertext (the rest)
|
166 |
+
ciphertext = encrypted_data_with_iv[16:]
|
167 |
+
|
168 |
+
# Create an AES cipher instance with CBC mode for decryption
|
169 |
+
cipher = Cipher(algorithms.AES(key_bytes), modes.CBC(iv), backend=default_backend())
|
170 |
+
decryptor = cipher.decryptor()
|
171 |
+
|
172 |
+
# Decrypt the data
|
173 |
+
padded_plaintext = decryptor.update(ciphertext) + decryptor.finalize()
|
174 |
+
|
175 |
+
# Unpad the data using PKCS7
|
176 |
+
unpadder = sym_padding.PKCS7(algorithms.AES.block_size).unpadder()
|
177 |
+
plaintext = unpadder.update(padded_plaintext) + unpadder.finalize()
|
178 |
+
|
179 |
+
# Decode the plaintext from bytes to string (assuming UTF-8)
|
180 |
+
return plaintext.decode('utf-8')
|
181 |
+
|
182 |
+
except (ValueError, TypeError) as e:
|
183 |
+
# Catches Base64 decoding errors, incorrect key type errors
|
184 |
+
return f"Decryption Error: Invalid input data or key format. ({e})"
|
185 |
+
except Exception as e:
|
186 |
+
# Catches padding errors (often due to wrong key), or other crypto issues
|
187 |
+
print(f"Decryption error details: {e}")
|
188 |
+
return f"Decryption Failed: Likely incorrect key or corrupted file. Error: {type(e).__name__}"
|
189 |
+
|
190 |
|
191 |
def merge(yaml_config: str, hf_token: str, repo_name: str, cipher_key: str) -> Iterable[List[Log]]:
|
192 |
runner = LogsViewRunner()
|
|
|
204 |
if not hf_token:
|
205 |
yield runner.log("No HF token provided. A valid token is required for uploading.", level="ERROR")
|
206 |
return
|
207 |
+
|
208 |
# Validate that the token works by trying to get user info
|
209 |
try:
|
210 |
api = huggingface_hub.HfApi(token=hf_token)
|
|
|
214 |
yield runner.log(f"Invalid HF token: {e}", level="ERROR")
|
215 |
return
|
216 |
|
217 |
+
# Use default key if none provided, but log a warning
|
218 |
if not cipher_key:
|
219 |
+
cipher_key = "default_insecure_key" # Make default explicitely insecure sounding
|
220 |
+
yield runner.log("No cipher key provided. Using a default, insecure key. Please provide your own key for security.", level="WARNING")
|
221 |
+
elif cipher_key == "Default": # Check against the placeholder value
|
222 |
+
cipher_key = "default_insecure_key" # Treat placeholder as no key provided
|
223 |
+
yield runner.log("Default placeholder key detected. Using an insecure key. Please provide your own key.", level="WARNING")
|
224 |
+
|
225 |
|
226 |
with tempfile.TemporaryDirectory(ignore_cleanup_errors=True) as tmpdirname:
|
227 |
tmpdir = pathlib.Path(tmpdirname)
|
|
|
254 |
|
255 |
if runner.exit_code != 0:
|
256 |
yield runner.log("Merge failed. Deleting repo as no model is uploaded.", level="ERROR")
|
257 |
+
try:
|
258 |
+
api.delete_repo(repo_url.repo_id)
|
259 |
+
yield runner.log(f"Repo {repo_url.repo_id} deleted.")
|
260 |
+
except Exception as delete_e:
|
261 |
+
yield runner.log(f"Failed to delete repo {repo_url.repo_id}: {delete_e}", level="WARNING")
|
262 |
return
|
263 |
|
264 |
+
yield runner.log("Model merged successfully. Preparing for upload.")
|
265 |
+
|
266 |
+
# ---- Encryption Step ----
|
267 |
merge_dir = merged_path / "merge"
|
268 |
+
config_yml_path = merge_dir / "mergekit_config.yml"
|
269 |
+
|
270 |
+
if config_yml_path.exists():
|
271 |
+
yield runner.log(f"Found {config_yml_path.name}. Encrypting...")
|
272 |
+
if encrypt_file(config_yml_path, cipher_key):
|
273 |
+
yield runner.log(f"Successfully encrypted {config_yml_path.name} with provided key.")
|
274 |
+
else:
|
275 |
+
yield runner.log(f"Failed to encrypt {config_yml_path.name}. Uploading unencrypted.", level="ERROR")
|
276 |
+
else:
|
277 |
+
yield runner.log(f"{config_yml_path.name} not found in merge output, nothing to encrypt.", level="INFO")
|
278 |
+
# ---- End Encryption Step ----
|
279 |
+
|
280 |
+
# Delete Readme.md if it exists (case-insensitive check) before upload
|
281 |
readme_deleted = False
|
282 |
+
try:
|
283 |
+
for file in merge_dir.glob("*"):
|
284 |
+
if file.name.lower() == "readme.md":
|
285 |
file.unlink()
|
286 |
readme_deleted = True
|
287 |
yield runner.log(f"Deleted {file.name} file before upload")
|
288 |
+
break # Assume only one readme
|
289 |
+
except Exception as e:
|
290 |
+
yield runner.log(f"Error deleting Readme.md: {e}", level="WARNING")
|
291 |
+
|
292 |
if not readme_deleted:
|
293 |
+
yield runner.log("No Readme.md file found to delete.", level="INFO")
|
294 |
+
|
295 |
+
yield runner.log("Uploading merged model files to HF.")
|
|
|
|
|
|
|
|
|
|
|
|
|
296 |
yield from runner.run_python(
|
297 |
api.upload_folder,
|
298 |
repo_id=repo_url.repo_id,
|
299 |
+
folder_path=merge_dir, # Upload from the 'merge' subdirectory
|
300 |
)
|
301 |
yield runner.log(f"Model successfully uploaded to HF: {repo_url.repo_id}")
|
302 |
|
|
|
318 |
with gr.Blocks() as demo:
|
319 |
gr.Markdown(MARKDOWN_DESCRIPTION)
|
320 |
gr.Markdown(NEXT_RESTART)
|
321 |
+
|
322 |
+
with gr.Tabs():
|
323 |
+
with gr.TabItem("Merge Model"):
|
324 |
+
with gr.Row():
|
325 |
+
filename = gr.Textbox(visible=False, label="filename")
|
326 |
+
config = gr.Code(language="yaml", lines=10, label="config.yaml")
|
327 |
+
with gr.Column():
|
328 |
+
token = gr.Textbox(
|
329 |
+
lines=1,
|
330 |
+
label="HF Write Token",
|
331 |
+
info="https://hf.co/settings/token",
|
332 |
+
type="password",
|
333 |
+
placeholder="Required for model upload.",
|
334 |
+
)
|
335 |
+
repo_name = gr.Textbox(
|
336 |
+
lines=1,
|
337 |
+
label="Repo name",
|
338 |
+
placeholder="Optional. Will create a random name if empty.",
|
339 |
+
)
|
340 |
+
cipher_key = gr.Textbox(
|
341 |
+
lines=1,
|
342 |
+
label="Encryption Key",
|
343 |
+
type="password",
|
344 |
+
info="Key used to encrypt the generated mergekit_config.yml file before upload. Leave blank or 'Default' for no encryption (or insecure default).",
|
345 |
+
placeholder="Enter your secret key here",
|
346 |
+
value="Default" # Set a default placeholder
|
347 |
+
)
|
348 |
+
button = gr.Button("Merge and Upload", variant="primary")
|
349 |
+
logs = LogsView(label="Merge Progress / Terminal output")
|
350 |
+
gr.Examples(
|
351 |
+
examples,
|
352 |
+
fn=lambda s: (s,),
|
353 |
+
run_on_click=True,
|
354 |
+
label="Merge Examples",
|
355 |
+
inputs=[filename],
|
356 |
+
outputs=[config],
|
357 |
)
|
358 |
+
gr.Markdown(MARKDOWN_ARTICLE)
|
359 |
+
|
360 |
+
button.click(fn=merge, inputs=[config, token, repo_name, cipher_key], outputs=[logs])
|
361 |
+
|
362 |
+
with gr.TabItem("Decrypt Configuration"):
|
363 |
+
gr.Markdown("Upload an encrypted `mergekit_config.yml` file and provide the key to decrypt it.")
|
364 |
+
with gr.Row():
|
365 |
+
decrypt_file_input = gr.File(label="Upload Encrypted mergekit_config.yml")
|
366 |
+
decrypt_key_input = gr.Textbox(
|
367 |
+
lines=1,
|
368 |
+
label="Decryption Key",
|
369 |
+
type="password",
|
370 |
+
placeholder="Enter the key used for encryption",
|
371 |
+
)
|
372 |
+
decrypt_button = gr.Button("Decrypt File", variant="secondary")
|
373 |
+
decrypted_output = gr.Code(language="yaml", label="Decrypted Configuration", lines=15, interactive=False)
|
374 |
+
|
375 |
+
decrypt_button.click(
|
376 |
+
fn=decrypt_file_content,
|
377 |
+
inputs=[decrypt_file_input, decrypt_key_input],
|
378 |
+
outputs=[decrypted_output]
|
379 |
)
|
380 |
+
|
381 |
+
|
382 |
+
demo.queue(default_concurrency_limit=1).launch()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|