stable-diffusion-webui/webui.py

196 lines
6.8 KiB
Python
Raw Normal View History

import os
import threading
2022-10-01 14:47:42 -06:00
import time
2022-10-01 15:50:03 -06:00
import importlib
import signal
2022-09-26 08:29:50 -06:00
import threading
2022-10-18 00:51:53 -06:00
from fastapi import FastAPI
2022-11-04 12:36:47 -06:00
from fastapi.middleware.cors import CORSMiddleware
2022-10-07 15:56:00 -06:00
from fastapi.middleware.gzip import GZipMiddleware
2022-12-16 05:43:09 -07:00
from modules import import_hook
from modules.call_queue import wrap_queued_call, queue_lock, wrap_gradio_gpu_call
from modules.paths import script_path
from modules import shared, devices, sd_samplers, upscaler, extensions, localization, ui_tempdir
2022-09-26 08:29:50 -06:00
import modules.codeformer_model as codeformer
2022-09-11 09:48:36 -06:00
import modules.extras
2022-09-26 08:29:50 -06:00
import modules.face_restoration
import modules.gfpgan_model as gfpgan
import modules.img2img
2022-10-02 06:56:22 -06:00
2022-09-26 08:29:50 -06:00
import modules.lowvram
import modules.paths
2022-09-26 08:29:50 -06:00
import modules.scripts
import modules.sd_hijack
import modules.sd_models
2022-10-30 08:54:31 -06:00
import modules.sd_vae
2022-09-26 08:29:50 -06:00
import modules.txt2img
2022-10-30 08:46:43 -06:00
import modules.script_callbacks
2022-10-02 06:56:22 -06:00
2022-09-26 08:29:50 -06:00
import modules.ui
2022-09-26 09:27:18 -06:00
from modules import modelloader
2022-09-26 08:29:50 -06:00
from modules.shared import cmd_opts
import modules.hypernetworks.hypernetwork
if cmd_opts.server_name:
server_name = cmd_opts.server_name
else:
server_name = "0.0.0.0" if cmd_opts.listen else None
def initialize():
extensions.list_extensions()
localization.list_localizations(cmd_opts.localizations_dir)
2022-10-20 09:58:52 -06:00
if cmd_opts.ui_debug_mode:
shared.sd_upscalers = upscaler.UpscalerLanczos().scalers
modules.scripts.load_scripts()
2022-10-20 09:58:52 -06:00
return
modelloader.cleanup_models()
modules.sd_models.setup_model()
codeformer.setup_model(cmd_opts.codeformer_models_path)
gfpgan.setup_model(cmd_opts.gfpgan_models_path)
shared.face_restorers.append(modules.face_restoration.FaceRestoration())
modules.scripts.load_scripts()
modelloader.load_upscalers()
2022-10-30 08:54:31 -06:00
modules.sd_vae.refresh_vae_list()
modules.sd_models.load_model()
shared.opts.onchange("sd_model_checkpoint", wrap_queued_call(lambda: modules.sd_models.reload_model_weights()))
shared.opts.onchange("sd_vae", wrap_queued_call(lambda: modules.sd_vae.reload_vae_weights()), call=False)
shared.opts.onchange("sd_vae_as_default", wrap_queued_call(lambda: modules.sd_vae.reload_vae_weights()), call=False)
2022-11-26 06:10:46 -07:00
shared.opts.onchange("sd_hypernetwork", wrap_queued_call(lambda: shared.reload_hypernetworks()))
2022-10-13 11:12:37 -06:00
shared.opts.onchange("sd_hypernetwork_strength", modules.hypernetworks.hypernetwork.apply_strength)
shared.opts.onchange("temp_dir", ui_tempdir.on_tmpdir_changed)
if cmd_opts.tls_keyfile is not None and cmd_opts.tls_keyfile is not None:
try:
if not os.path.exists(cmd_opts.tls_keyfile):
print("Invalid path to TLS keyfile given")
if not os.path.exists(cmd_opts.tls_certfile):
print(f"Invalid path to TLS certfile: '{cmd_opts.tls_certfile}'")
except TypeError:
cmd_opts.tls_keyfile = cmd_opts.tls_certfile = None
print("TLS setup invalid, running webui without TLS")
else:
print("Running with TLS")
2022-09-05 23:54:11 -06:00
# make the program just exit at ctrl+c without waiting for anything
def sigint_handler(sig, frame):
2022-09-06 10:33:51 -06:00
print(f'Interrupted with signal {sig} in {frame}')
2022-09-05 23:54:11 -06:00
os._exit(0)
2022-08-22 08:15:46 -06:00
2022-09-05 23:54:11 -06:00
signal.signal(signal.SIGINT, sigint_handler)
2022-10-02 12:26:38 -06:00
2022-11-04 12:36:47 -06:00
def setup_cors(app):
if cmd_opts.cors_allow_origins and cmd_opts.cors_allow_origins_regex:
app.add_middleware(CORSMiddleware, allow_origins=cmd_opts.cors_allow_origins.split(','), allow_origin_regex=cmd_opts.cors_allow_origins_regex, allow_methods=['*'])
elif cmd_opts.cors_allow_origins:
2022-11-04 12:36:47 -06:00
app.add_middleware(CORSMiddleware, allow_origins=cmd_opts.cors_allow_origins.split(','), allow_methods=['*'])
elif cmd_opts.cors_allow_origins_regex:
app.add_middleware(CORSMiddleware, allow_origin_regex=cmd_opts.cors_allow_origins_regex, allow_methods=['*'])
2022-11-04 12:36:47 -06:00
def create_api(app):
from modules.api.api import Api
2022-10-18 00:51:53 -06:00
api = Api(app, queue_lock)
return api
def wait_on_server(demo=None):
2022-10-01 11:31:58 -06:00
while 1:
time.sleep(0.5)
if shared.state.need_restart:
shared.state.need_restart = False
time.sleep(0.5)
demo.close()
time.sleep(0.5)
break
def api_only():
initialize()
2022-10-01 11:31:58 -06:00
app = FastAPI()
2022-11-04 12:36:47 -06:00
setup_cors(app)
app.add_middleware(GZipMiddleware, minimum_size=1000)
api = create_api(app)
modules.script_callbacks.app_started_callback(None, app)
api.launch(server_name="0.0.0.0" if cmd_opts.listen else "127.0.0.1", port=cmd_opts.port if cmd_opts.port else 7861)
def webui():
launch_api = cmd_opts.api
initialize()
while 1:
if shared.opts.clean_temp_dir_at_start:
ui_tempdir.cleanup_tmpdr()
shared.demo = modules.ui.create_ui()
2022-12-04 10:13:31 -07:00
app, local_url, share_url = shared.demo.queue(default_enabled=False).launch(
2022-10-02 12:26:38 -06:00
share=cmd_opts.share,
server_name=server_name,
2022-10-02 12:26:38 -06:00
server_port=cmd_opts.port,
ssl_keyfile=cmd_opts.tls_keyfile,
ssl_certfile=cmd_opts.tls_certfile,
2022-10-02 12:26:38 -06:00
debug=cmd_opts.gradio_debug,
auth=[tuple(cred.split(':')) for cred in cmd_opts.gradio_auth.strip('"').split(',')] if cmd_opts.gradio_auth else None,
inbrowser=cmd_opts.autolaunch,
prevent_thread_lock=True
)
# after initial launch, disable --autolaunch for subsequent restarts
cmd_opts.autolaunch = False
# gradio uses a very open CORS policy via app.user_middleware, which makes it possible for
# an attacker to trick the user into opening a malicious HTML page, which makes a request to the
2022-12-14 19:01:32 -07:00
# running web ui and do whatever the attacker wants, including installing an extension and
# running its code. We disable this here. Suggested by RyotaK.
app.user_middleware = [x for x in app.user_middleware if x.cls.__name__ != 'CORSMiddleware']
2022-11-04 12:36:47 -06:00
setup_cors(app)
2022-10-11 05:53:02 -06:00
app.add_middleware(GZipMiddleware, minimum_size=1000)
2022-10-02 12:26:38 -06:00
if launch_api:
create_api(app)
2022-10-02 12:26:38 -06:00
modules.script_callbacks.app_started_callback(shared.demo, app)
modules.script_callbacks.app_started_callback(shared.demo, app)
2022-10-30 08:46:43 -06:00
wait_on_server(shared.demo)
sd_samplers.set_samplers()
print('Reloading extensions')
extensions.list_extensions()
localization.list_localizations(cmd_opts.localizations_dir)
print('Reloading custom scripts')
modules.scripts.reload_scripts()
modelloader.load_upscalers()
2022-10-02 12:26:38 -06:00
print('Reloading modules: modules.ui')
importlib.reload(modules.ui)
print('Refreshing Model List')
modules.sd_models.list_models()
2022-10-02 12:26:38 -06:00
print('Restarting Gradio')
2022-09-11 09:48:36 -06:00
if __name__ == "__main__":
2022-10-18 00:51:53 -06:00
if cmd_opts.nowebui:
api_only()
else:
webui()