Spaces:
Runtime error
Runtime error
Fix error again
Browse files
app.py
CHANGED
@@ -73,11 +73,6 @@ def submit_correction(original_answer, corrected_answer):
|
|
73 |
# No operation function for the submit button click event
|
74 |
return "Correction submitted!"
|
75 |
|
76 |
-
chatbot=gr.Chatbot(label="Chat History",)
|
77 |
-
correct_answer = gr.Textbox(label="Correct Answer", placeholder="Enter the correct answer if the provided one is wrong")
|
78 |
-
submit_btn = gr.Button("Submit Correction")
|
79 |
-
submit_btn.click(fn=submit_correction, inputs=[chatbot, correct_answer], outputs="text")
|
80 |
-
|
81 |
if __name__ == "__main__":
|
82 |
args = parse_args()
|
83 |
tokenizer = AutoTokenizer.from_pretrained("lliu01/fortios_one_config")
|
@@ -88,24 +83,33 @@ if __name__ == "__main__":
|
|
88 |
)
|
89 |
device = torch.device('cuda' if torch.cuda.is_available() else 'cpu')
|
90 |
model = model.to(device)
|
91 |
-
gr.
|
92 |
-
|
93 |
-
|
94 |
-
|
95 |
-
|
96 |
-
|
97 |
-
|
98 |
-
|
99 |
-
|
100 |
-
|
101 |
-
|
102 |
-
|
103 |
-
|
104 |
-
|
105 |
-
|
106 |
-
|
107 |
-
|
108 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
109 |
["Allow all traffic from any source IP address and any source interface 'port10' to any destination IP address and any destination interface 'port9'. This policy will be applied at all times (always) and will allow all services. Additionally, this policy will enable UTM features, use proxy-based inspection mode, and use an SSL-SSH profile named 'deep-custom'. Finally, this policy will also enable source NAT."],
|
110 |
["Configure a firewall policy to allow users 'dina' and '15947' to access 'DR-Exchange-Servers' and 'HQ-Exchange-Servers' using RDP protocol from the 'SSL-VPN-IT-Pool' address range, incoming from the 'ssl.FG-Traffic' interface and outgoing to the 'FG-PA-Inside' interface. The policy should have Antivirus scanning enabled with profile 'ABE_AV' and log all traffic. The policy should be always active and currently disabled for testing or maintenance purposes."],
|
111 |
["Configure a firewall policy named 'ZoomAccess' that allows traffic from the 'IP_10.96.54.149' and 'HighCourt_Zoom' addresses coming in through the 'VLAN51' interface to access the 'Zoom_access' destination through the 'npu0_vlink1' interface, at any time, with all services allowed, using proxy-based inspection and SSL certificate inspection."],
|
@@ -114,6 +118,9 @@ if __name__ == "__main__":
|
|
114 |
["The user wants to create a traffic shaper named 'Videoconferencia' that limits the maximum bandwidth to 60 megabits per second, effectively enforcing an upper bandwidth limit for video conferencing traffic."],
|
115 |
["Configure an interface named 'Sec60' in the 'root' virtual domain with an IP address of 172.18.60.1/24. Allow management access to this interface for ping, fabric, and speed-test. Enable device identification and set the interface role to LAN. Set the SNMP index to 41 and enable auto-authentication for dedicated Fortinet extension devices. Additionally, enable switch controller features such as IGMP snooping, IGMP snooping proxy, and DHCP snooping. Set the color of the interface icon on the GUI to 7 and associate it with the 'FortiLink' interface and VLAN ID 60."],
|
116 |
],
|
117 |
-
|
118 |
-
|
119 |
-
|
|
|
|
|
|
|
|
73 |
# No operation function for the submit button click event
|
74 |
return "Correction submitted!"
|
75 |
|
|
|
|
|
|
|
|
|
|
|
76 |
if __name__ == "__main__":
|
77 |
args = parse_args()
|
78 |
tokenizer = AutoTokenizer.from_pretrained("lliu01/fortios_one_config")
|
|
|
83 |
)
|
84 |
device = torch.device('cuda' if torch.cuda.is_available() else 'cpu')
|
85 |
model = model.to(device)
|
86 |
+
with gr.Blocks() as demo:
|
87 |
+
chatbot = gr.Chatbot(label="Chat History")
|
88 |
+
system_prompt = gr.Textbox(label="System Prompt")
|
89 |
+
temperature = gr.Slider(0, 1, 0.5, label="Temperature")
|
90 |
+
max_tokens = gr.Slider(100, 2048, 1024, label="Max Tokens")
|
91 |
+
user_input = gr.Textbox(placeholder="Input", container=False, scale=7)
|
92 |
+
correct_answer = gr.Textbox(label="Correct Answer", placeholder="Enter the correct answer if the provided one is wrong")
|
93 |
+
submit_btn = gr.Button("Submit Correction")
|
94 |
+
|
95 |
+
gr.Interface(
|
96 |
+
fn=predict,
|
97 |
+
inputs=[user_input, chatbot, system_prompt, temperature, max_tokens],
|
98 |
+
outputs=chatbot,
|
99 |
+
title="FortiOS CLI Chat - Demo",
|
100 |
+
description="FortiOS CLI Chat",
|
101 |
+
theme="soft",
|
102 |
+
chatbot=gr.Chatbot(label="Chat History"),
|
103 |
+
textbox=gr.Textbox(placeholder="Input", container=False, scale=7),
|
104 |
+
retry_btn=None,
|
105 |
+
undo_btn="Delete Previous",
|
106 |
+
clear_btn="Clear",
|
107 |
+
additional_inputs=[
|
108 |
+
gr.Textbox(sys_prompt, label="System Prompt"),
|
109 |
+
gr.Slider(0, 1, 0.5, label="Temperature"),
|
110 |
+
gr.Slider(100, 2048, 1024, label="Max Tokens"),
|
111 |
+
],
|
112 |
+
examples=[
|
113 |
["Allow all traffic from any source IP address and any source interface 'port10' to any destination IP address and any destination interface 'port9'. This policy will be applied at all times (always) and will allow all services. Additionally, this policy will enable UTM features, use proxy-based inspection mode, and use an SSL-SSH profile named 'deep-custom'. Finally, this policy will also enable source NAT."],
|
114 |
["Configure a firewall policy to allow users 'dina' and '15947' to access 'DR-Exchange-Servers' and 'HQ-Exchange-Servers' using RDP protocol from the 'SSL-VPN-IT-Pool' address range, incoming from the 'ssl.FG-Traffic' interface and outgoing to the 'FG-PA-Inside' interface. The policy should have Antivirus scanning enabled with profile 'ABE_AV' and log all traffic. The policy should be always active and currently disabled for testing or maintenance purposes."],
|
115 |
["Configure a firewall policy named 'ZoomAccess' that allows traffic from the 'IP_10.96.54.149' and 'HighCourt_Zoom' addresses coming in through the 'VLAN51' interface to access the 'Zoom_access' destination through the 'npu0_vlink1' interface, at any time, with all services allowed, using proxy-based inspection and SSL certificate inspection."],
|
|
|
118 |
["The user wants to create a traffic shaper named 'Videoconferencia' that limits the maximum bandwidth to 60 megabits per second, effectively enforcing an upper bandwidth limit for video conferencing traffic."],
|
119 |
["Configure an interface named 'Sec60' in the 'root' virtual domain with an IP address of 172.18.60.1/24. Allow management access to this interface for ping, fabric, and speed-test. Enable device identification and set the interface role to LAN. Set the SNMP index to 41 and enable auto-authentication for dedicated Fortinet extension devices. Additionally, enable switch controller features such as IGMP snooping, IGMP snooping proxy, and DHCP snooping. Set the color of the interface icon on the GUI to 7 and associate it with the 'FortiLink' interface and VLAN ID 60."],
|
120 |
],
|
121 |
+
additional_inputs_accordion_name="Parameters",
|
122 |
+
).launch()
|
123 |
+
|
124 |
+
submit_btn.click(fn=submit_correction, inputs=[chatbot, correct_answer], outputs="text")
|
125 |
+
|
126 |
+
demo.launch()
|