lauro1 commited on
Commit
c5c5f4d
Β·
1 Parent(s): b18146e

gradio- simplify

Browse files
Files changed (1) hide show
  1. app.py +8 -19
app.py CHANGED
@@ -5,17 +5,12 @@ DEMO_SERVER = "4.208.9.167:80"
5
 
6
  def run_query( server, policy, prompt):
7
  if prompt == None or server == None or policy == None:
8
- return("β›” Error: please select an option for stages 1-3")
9
  if len(prompt) == 0 or len(policy) == 0 or len(server) == 0:
10
  return("β›” Error: please select an option for stages 1-3")
11
- if server != "Authentic confidential VM server":
12
  return ("β›” Error: you can only connect to an application running on a Confidential VM")
13
- if policy == "Expected Santacoder app policy file":
14
- POLICY = "./cce_policy.txt"
15
- elif policy == "Unexpected Hello World app policy file":
16
- POLICY = "./hello_world.txt"
17
- else:
18
- POLICY = "fake.txt"
19
  try:
20
  with SecureSession(f"http://{DEMO_SERVER}", POLICY) as secure_session:
21
  res = secure_session.post(endpoint="/generate", json={"input_text": prompt})
@@ -30,25 +25,19 @@ with gr.Blocks(theme=gr.themes.Soft()) as demo:
30
  gr.Markdown("<p>You can use this demo to send a function definition to BigCode's open-source Santacoder model and get back an auto-completed function.</p>")
31
  gr.Markdown("<p>The model is deployed within a highly-isolated Trusted Execution Environment, meaning that we, as the service provider, have no access to the data sent to this model!</p>")
32
  gr.Markdown("<p>You can see how we deployed the model by checking out the integration section of our <a href='https://blindbox.mithrilsecurity.io/en/latest/docs/how-to-guides/santacoder/'>documentation!</p>")
33
- gr.Markdown("><h3>Step 1: Check we are connecting to an authentic confidential VM")
34
- gr.Markdown("<p>This first option allows you to choose whether to connect to the Whisper application deployed with BlindBox on a confidential VM or the same application deployed on a dummy server which is not within a confidential VM!<br>This demonstrates how BlindBox blocks requests to non-authentic confidential VMs!</p>")
35
  with gr.Column():
36
  server = gr.Radio(
37
- ["Authentic confidential VM server", "Unauthentic dummy server"], label="Select the server you want to connect to"
38
- )
39
- gr.Markdown("><h3>Step 2: Check we are connecting to the latest official SaaS application image</h3>")
40
- gr.Markdown("<p>You can think of this second verification a bit like a checksum. Here, you can see what happens if the end user queries the application whilst providing the latest policy file for our Santacoder application, the latest policy file for a different Hello World application or sends no policy file at all.<br></p>")
41
- with gr.Column():
42
- policy = gr.Radio(
43
- ["Expected Santacoder app policy file", "Unexpected Hello World app policy file", "No policy file"], label="Select your CCE policy file"
44
  )
45
- gr.Markdown("><h3>Step 3: Select your prompt</h3>")
46
  gr.Markdown("<p>Select between the following prompt examples we provide.</p>")
47
  with gr.Column():
48
  prompt = gr.Radio(
49
  ["def sum(x, y):", "def print_name(name):", "def hello_world():", "def square_root(nbr):"], label="Select your user prompt"
50
  )
51
- gr.Markdown("><h3>Query the Santacoder model</h3>")
52
  with gr.Column():
53
  trigger = gr.Button("Test query")
54
  with gr.Column():
 
5
 
6
  def run_query( server, policy, prompt):
7
  if prompt == None or server == None or policy == None:
8
+ return("β›” Error: please select an option for stages 1 and 2")
9
  if len(prompt) == 0 or len(policy) == 0 or len(server) == 0:
10
  return("β›” Error: please select an option for stages 1-3")
11
+ if server != "Authentic and verified confidential VM server":
12
  return ("β›” Error: you can only connect to an application running on a Confidential VM")
13
+ POLICY = "./cce_policy.txt"
 
 
 
 
 
14
  try:
15
  with SecureSession(f"http://{DEMO_SERVER}", POLICY) as secure_session:
16
  res = secure_session.post(endpoint="/generate", json={"input_text": prompt})
 
25
  gr.Markdown("<p>You can use this demo to send a function definition to BigCode's open-source Santacoder model and get back an auto-completed function.</p>")
26
  gr.Markdown("<p>The model is deployed within a highly-isolated Trusted Execution Environment, meaning that we, as the service provider, have no access to the data sent to this model!</p>")
27
  gr.Markdown("<p>You can see how we deployed the model by checking out the integration section of our <a href='https://blindbox.mithrilsecurity.io/en/latest/docs/how-to-guides/santacoder/'>documentation!</p>")
28
+ gr.Markdown("><h3>Step 1: Check that we are connecting to an authentic confidential VM")
29
+ gr.Markdown("<p>This first option allows you to choose whether to connect to the Santacoder application deployed with BlindBox on a verified confidential VM or the same application deployed on a dummy server which is not within a confidential VM!<br>This demonstrates how BlindBox blocks requests to non-authentic confidential VMs!</p>")
30
  with gr.Column():
31
  server = gr.Radio(
32
+ ["Authentic and verified confidential VM server", "Unauthentic dummy server"], label="Select the server you want to connect to"
 
 
 
 
 
 
33
  )
34
+ gr.Markdown("><h3>Step 2: Select your prompt</h3>")
35
  gr.Markdown("<p>Select between the following prompt examples we provide.</p>")
36
  with gr.Column():
37
  prompt = gr.Radio(
38
  ["def sum(x, y):", "def print_name(name):", "def hello_world():", "def square_root(nbr):"], label="Select your user prompt"
39
  )
40
+ gr.Markdown("><h3>Step 3: Query the Santacoder model</h3>")
41
  with gr.Column():
42
  trigger = gr.Button("Test query")
43
  with gr.Column():