lliu01 commited on
Commit
e5de4d4
·
verified ·
1 Parent(s): ead1743

Fix error again

Browse files
Files changed (1) hide show
  1. app.py +33 -26
app.py CHANGED
@@ -73,11 +73,6 @@ def submit_correction(original_answer, corrected_answer):
73
  # No operation function for the submit button click event
74
  return "Correction submitted!"
75
 
76
- chatbot=gr.Chatbot(label="Chat History",)
77
- correct_answer = gr.Textbox(label="Correct Answer", placeholder="Enter the correct answer if the provided one is wrong")
78
- submit_btn = gr.Button("Submit Correction")
79
- submit_btn.click(fn=submit_correction, inputs=[chatbot, correct_answer], outputs="text")
80
-
81
  if __name__ == "__main__":
82
  args = parse_args()
83
  tokenizer = AutoTokenizer.from_pretrained("lliu01/fortios_one_config")
@@ -88,24 +83,33 @@ if __name__ == "__main__":
88
  )
89
  device = torch.device('cuda' if torch.cuda.is_available() else 'cpu')
90
  model = model.to(device)
91
- gr.ChatInterface(
92
- predict,
93
- title="FortiOS CLI Chat - Demo",
94
- description="FortiOS CLI Chat",
95
- theme="soft",
96
- chatbot=chatbot,
97
- textbox=gr.Textbox(placeholder="input", container=False, scale=7),
98
- retry_btn=None,
99
- undo_btn="Delete Previous",
100
- clear_btn="Clear",
101
- additional_inputs=[
102
- gr.Textbox(sys_prompt, label="System Prompt"),
103
- gr.Slider(0, 1, 0.5, label="Temperature"),
104
- gr.Slider(100, 2048, 1024, label="Max Tokens"),
105
- correct_answer,
106
- submit_btn,
107
- ],
108
- examples=[
 
 
 
 
 
 
 
 
 
109
  ["Allow all traffic from any source IP address and any source interface 'port10' to any destination IP address and any destination interface 'port9'. This policy will be applied at all times (always) and will allow all services. Additionally, this policy will enable UTM features, use proxy-based inspection mode, and use an SSL-SSH profile named 'deep-custom'. Finally, this policy will also enable source NAT."],
110
  ["Configure a firewall policy to allow users 'dina' and '15947' to access 'DR-Exchange-Servers' and 'HQ-Exchange-Servers' using RDP protocol from the 'SSL-VPN-IT-Pool' address range, incoming from the 'ssl.FG-Traffic' interface and outgoing to the 'FG-PA-Inside' interface. The policy should have Antivirus scanning enabled with profile 'ABE_AV' and log all traffic. The policy should be always active and currently disabled for testing or maintenance purposes."],
111
  ["Configure a firewall policy named 'ZoomAccess' that allows traffic from the 'IP_10.96.54.149' and 'HighCourt_Zoom' addresses coming in through the 'VLAN51' interface to access the 'Zoom_access' destination through the 'npu0_vlink1' interface, at any time, with all services allowed, using proxy-based inspection and SSL certificate inspection."],
@@ -114,6 +118,9 @@ if __name__ == "__main__":
114
  ["The user wants to create a traffic shaper named 'Videoconferencia' that limits the maximum bandwidth to 60 megabits per second, effectively enforcing an upper bandwidth limit for video conferencing traffic."],
115
  ["Configure an interface named 'Sec60' in the 'root' virtual domain with an IP address of 172.18.60.1/24. Allow management access to this interface for ping, fabric, and speed-test. Enable device identification and set the interface role to LAN. Set the SNMP index to 41 and enable auto-authentication for dedicated Fortinet extension devices. Additionally, enable switch controller features such as IGMP snooping, IGMP snooping proxy, and DHCP snooping. Set the color of the interface icon on the GUI to 7 and associate it with the 'FortiLink' interface and VLAN ID 60."],
116
  ],
117
- additional_inputs_accordion_name="Parameters",
118
- ).queue().launch()
119
- submit_btn.click(fn=submit_correction, inputs=[chatbot, correct_answer], outputs="text")
 
 
 
 
73
  # No operation function for the submit button click event
74
  return "Correction submitted!"
75
 
 
 
 
 
 
76
  if __name__ == "__main__":
77
  args = parse_args()
78
  tokenizer = AutoTokenizer.from_pretrained("lliu01/fortios_one_config")
 
83
  )
84
  device = torch.device('cuda' if torch.cuda.is_available() else 'cpu')
85
  model = model.to(device)
86
+ with gr.Blocks() as demo:
87
+ chatbot = gr.Chatbot(label="Chat History")
88
+ system_prompt = gr.Textbox(label="System Prompt")
89
+ temperature = gr.Slider(0, 1, 0.5, label="Temperature")
90
+ max_tokens = gr.Slider(100, 2048, 1024, label="Max Tokens")
91
+ user_input = gr.Textbox(placeholder="Input", container=False, scale=7)
92
+ correct_answer = gr.Textbox(label="Correct Answer", placeholder="Enter the correct answer if the provided one is wrong")
93
+ submit_btn = gr.Button("Submit Correction")
94
+
95
+ gr.Interface(
96
+ fn=predict,
97
+ inputs=[user_input, chatbot, system_prompt, temperature, max_tokens],
98
+ outputs=chatbot,
99
+ title="FortiOS CLI Chat - Demo",
100
+ description="FortiOS CLI Chat",
101
+ theme="soft",
102
+ chatbot=gr.Chatbot(label="Chat History"),
103
+ textbox=gr.Textbox(placeholder="Input", container=False, scale=7),
104
+ retry_btn=None,
105
+ undo_btn="Delete Previous",
106
+ clear_btn="Clear",
107
+ additional_inputs=[
108
+ gr.Textbox(sys_prompt, label="System Prompt"),
109
+ gr.Slider(0, 1, 0.5, label="Temperature"),
110
+ gr.Slider(100, 2048, 1024, label="Max Tokens"),
111
+ ],
112
+ examples=[
113
  ["Allow all traffic from any source IP address and any source interface 'port10' to any destination IP address and any destination interface 'port9'. This policy will be applied at all times (always) and will allow all services. Additionally, this policy will enable UTM features, use proxy-based inspection mode, and use an SSL-SSH profile named 'deep-custom'. Finally, this policy will also enable source NAT."],
114
  ["Configure a firewall policy to allow users 'dina' and '15947' to access 'DR-Exchange-Servers' and 'HQ-Exchange-Servers' using RDP protocol from the 'SSL-VPN-IT-Pool' address range, incoming from the 'ssl.FG-Traffic' interface and outgoing to the 'FG-PA-Inside' interface. The policy should have Antivirus scanning enabled with profile 'ABE_AV' and log all traffic. The policy should be always active and currently disabled for testing or maintenance purposes."],
115
  ["Configure a firewall policy named 'ZoomAccess' that allows traffic from the 'IP_10.96.54.149' and 'HighCourt_Zoom' addresses coming in through the 'VLAN51' interface to access the 'Zoom_access' destination through the 'npu0_vlink1' interface, at any time, with all services allowed, using proxy-based inspection and SSL certificate inspection."],
 
118
  ["The user wants to create a traffic shaper named 'Videoconferencia' that limits the maximum bandwidth to 60 megabits per second, effectively enforcing an upper bandwidth limit for video conferencing traffic."],
119
  ["Configure an interface named 'Sec60' in the 'root' virtual domain with an IP address of 172.18.60.1/24. Allow management access to this interface for ping, fabric, and speed-test. Enable device identification and set the interface role to LAN. Set the SNMP index to 41 and enable auto-authentication for dedicated Fortinet extension devices. Additionally, enable switch controller features such as IGMP snooping, IGMP snooping proxy, and DHCP snooping. Set the color of the interface icon on the GUI to 7 and associate it with the 'FortiLink' interface and VLAN ID 60."],
120
  ],
121
+ additional_inputs_accordion_name="Parameters",
122
+ ).launch()
123
+
124
+ submit_btn.click(fn=submit_correction, inputs=[chatbot, correct_answer], outputs="text")
125
+
126
+ demo.launch()