stable-diffusion-webui/webui.py

267 lines
9.7 KiB
Python
Raw Permalink Normal View History

import os
import sys
2022-10-01 20:47:42 +00:00
import time
2022-10-01 21:50:03 +00:00
import importlib
import signal
import re
2022-10-18 06:51:53 +00:00
from fastapi import FastAPI
2022-11-04 18:36:47 +00:00
from fastapi.middleware.cors import CORSMiddleware
2022-10-07 21:56:00 +00:00
from fastapi.middleware.gzip import GZipMiddleware
from packaging import version
2022-10-07 21:56:00 +00:00
import logging
logging.getLogger("xformers").addFilter(lambda record: 'A matching Triton is not available' not in record.getMessage())
from modules import import_hook, errors, extra_networks
from modules import extra_networks_hypernet, ui_extra_networks_hypernets, ui_extra_networks_textual_inversion
from modules.call_queue import wrap_queued_call, queue_lock, wrap_gradio_gpu_call
import torch
# Truncate version number of nightly/local build of PyTorch to not cause exceptions with CodeFormer or Safetensors
if ".dev" in torch.__version__ or "+git" in torch.__version__:
2023-01-06 12:06:26 +00:00
torch.__version__ = re.search(r'[\d.]+[\d]', torch.__version__).group(0)
from modules import shared, devices, sd_samplers, upscaler, extensions, localization, ui_tempdir, ui_extra_networks
2022-09-26 14:29:50 +00:00
import modules.codeformer_model as codeformer
import modules.face_restoration
import modules.gfpgan_model as gfpgan
import modules.img2img
2022-10-02 12:56:22 +00:00
2022-09-26 14:29:50 +00:00
import modules.lowvram
import modules.paths
2022-09-26 14:29:50 +00:00
import modules.scripts
import modules.sd_hijack
import modules.sd_models
2022-10-30 14:54:31 +00:00
import modules.sd_vae
2022-09-26 14:29:50 +00:00
import modules.txt2img
2022-10-30 14:46:43 +00:00
import modules.script_callbacks
import modules.textual_inversion.textual_inversion
import modules.progress
2022-10-02 12:56:22 +00:00
2022-09-26 14:29:50 +00:00
import modules.ui
2022-09-26 15:27:18 +00:00
from modules import modelloader
2022-09-26 14:29:50 +00:00
from modules.shared import cmd_opts
import modules.hypernetworks.hypernetwork
if cmd_opts.server_name:
server_name = cmd_opts.server_name
else:
server_name = "0.0.0.0" if cmd_opts.listen else None
def check_versions():
expected_torch_version = "1.13.1"
if version.parse(torch.__version__) < version.parse(expected_torch_version):
errors.print_error_explanation(f"""
You are running torch {torch.__version__}.
The program is tested to work with torch {expected_torch_version}.
To reinstall the desired version, run with commandline flag --reinstall-torch.
Beware that this will cause a lot of large files to be downloaded.
""".strip())
expected_xformers_version = "0.0.16rc425"
if shared.xformers_available:
import xformers
if version.parse(xformers.__version__) < version.parse(expected_xformers_version):
errors.print_error_explanation(f"""
You are running xformers {xformers.__version__}.
The program is tested to work with xformers {expected_xformers_version}.
To reinstall the desired version, run with commandline flag --reinstall-xformers.
""".strip())
def initialize():
check_versions()
extensions.list_extensions()
localization.list_localizations(cmd_opts.localizations_dir)
2022-10-20 15:58:52 +00:00
if cmd_opts.ui_debug_mode:
shared.sd_upscalers = upscaler.UpscalerLanczos().scalers
modules.scripts.load_scripts()
2022-10-20 15:58:52 +00:00
return
modelloader.cleanup_models()
modules.sd_models.setup_model()
codeformer.setup_model(cmd_opts.codeformer_models_path)
gfpgan.setup_model(cmd_opts.gfpgan_models_path)
shared.face_restorers.append(modules.face_restoration.FaceRestoration())
modelloader.list_builtin_upscalers()
modules.scripts.load_scripts()
modelloader.load_upscalers()
2022-10-30 14:54:31 +00:00
modules.sd_vae.refresh_vae_list()
modules.textual_inversion.textual_inversion.list_textual_inversion_templates()
try:
modules.sd_models.load_model()
except Exception as e:
errors.display(e, "loading stable diffusion model")
print("", file=sys.stderr)
print("Stable diffusion model failed to load, exiting", file=sys.stderr)
exit(1)
2023-01-14 06:56:59 +00:00
shared.opts.data["sd_model_checkpoint"] = shared.sd_model.sd_checkpoint_info.title
shared.opts.onchange("sd_model_checkpoint", wrap_queued_call(lambda: modules.sd_models.reload_model_weights()))
shared.opts.onchange("sd_vae", wrap_queued_call(lambda: modules.sd_vae.reload_vae_weights()), call=False)
shared.opts.onchange("sd_vae_as_default", wrap_queued_call(lambda: modules.sd_vae.reload_vae_weights()), call=False)
shared.opts.onchange("temp_dir", ui_tempdir.on_tmpdir_changed)
shared.reload_hypernetworks()
ui_extra_networks.intialize()
ui_extra_networks.register_page(ui_extra_networks_textual_inversion.ExtraNetworksPageTextualInversion())
ui_extra_networks.register_page(ui_extra_networks_hypernets.ExtraNetworksPageHypernetworks())
extra_networks.initialize()
extra_networks.register_extra_network(extra_networks_hypernet.ExtraNetworkHypernet())
if cmd_opts.tls_keyfile is not None and cmd_opts.tls_keyfile is not None:
try:
if not os.path.exists(cmd_opts.tls_keyfile):
print("Invalid path to TLS keyfile given")
if not os.path.exists(cmd_opts.tls_certfile):
print(f"Invalid path to TLS certfile: '{cmd_opts.tls_certfile}'")
except TypeError:
cmd_opts.tls_keyfile = cmd_opts.tls_certfile = None
print("TLS setup invalid, running webui without TLS")
else:
print("Running with TLS")
2022-09-06 05:54:11 +00:00
# make the program just exit at ctrl+c without waiting for anything
def sigint_handler(sig, frame):
2022-09-06 16:33:51 +00:00
print(f'Interrupted with signal {sig} in {frame}')
2022-09-06 05:54:11 +00:00
os._exit(0)
2022-08-22 14:15:46 +00:00
2022-09-06 05:54:11 +00:00
signal.signal(signal.SIGINT, sigint_handler)
2022-10-02 18:26:38 +00:00
2022-11-04 18:36:47 +00:00
def setup_cors(app):
if cmd_opts.cors_allow_origins and cmd_opts.cors_allow_origins_regex:
app.add_middleware(CORSMiddleware, allow_origins=cmd_opts.cors_allow_origins.split(','), allow_origin_regex=cmd_opts.cors_allow_origins_regex, allow_methods=['*'], allow_credentials=True, allow_headers=['*'])
elif cmd_opts.cors_allow_origins:
app.add_middleware(CORSMiddleware, allow_origins=cmd_opts.cors_allow_origins.split(','), allow_methods=['*'], allow_credentials=True, allow_headers=['*'])
elif cmd_opts.cors_allow_origins_regex:
app.add_middleware(CORSMiddleware, allow_origin_regex=cmd_opts.cors_allow_origins_regex, allow_methods=['*'], allow_credentials=True, allow_headers=['*'])
2022-11-04 18:36:47 +00:00
def create_api(app):
from modules.api.api import Api
2022-10-18 06:51:53 +00:00
api = Api(app, queue_lock)
return api
def wait_on_server(demo=None):
2022-10-01 17:31:58 +00:00
while 1:
time.sleep(0.5)
if shared.state.need_restart:
shared.state.need_restart = False
time.sleep(0.5)
demo.close()
time.sleep(0.5)
break
def api_only():
initialize()
2022-10-01 17:31:58 +00:00
app = FastAPI()
2022-11-04 18:36:47 +00:00
setup_cors(app)
app.add_middleware(GZipMiddleware, minimum_size=1000)
api = create_api(app)
modules.script_callbacks.app_started_callback(None, app)
api.launch(server_name="0.0.0.0" if cmd_opts.listen else "127.0.0.1", port=cmd_opts.port if cmd_opts.port else 7861)
def webui():
launch_api = cmd_opts.api
initialize()
while 1:
if shared.opts.clean_temp_dir_at_start:
ui_tempdir.cleanup_tmpdr()
modules.script_callbacks.before_ui_callback()
shared.demo = modules.ui.create_ui()
if cmd_opts.gradio_queue:
shared.demo.queue(64)
2023-01-14 10:38:10 +00:00
app, local_url, share_url = shared.demo.launch(
2022-10-02 18:26:38 +00:00
share=cmd_opts.share,
server_name=server_name,
2022-10-02 18:26:38 +00:00
server_port=cmd_opts.port,
ssl_keyfile=cmd_opts.tls_keyfile,
ssl_certfile=cmd_opts.tls_certfile,
2022-10-02 18:26:38 +00:00
debug=cmd_opts.gradio_debug,
auth=[tuple(cred.split(':')) for cred in cmd_opts.gradio_auth.strip('"').split(',')] if cmd_opts.gradio_auth else None,
inbrowser=cmd_opts.autolaunch,
prevent_thread_lock=True
)
# after initial launch, disable --autolaunch for subsequent restarts
cmd_opts.autolaunch = False
# gradio uses a very open CORS policy via app.user_middleware, which makes it possible for
# an attacker to trick the user into opening a malicious HTML page, which makes a request to the
2022-12-15 02:01:32 +00:00
# running web ui and do whatever the attacker wants, including installing an extension and
# running its code. We disable this here. Suggested by RyotaK.
app.user_middleware = [x for x in app.user_middleware if x.cls.__name__ != 'CORSMiddleware']
2022-11-04 18:36:47 +00:00
setup_cors(app)
2022-10-11 11:53:02 +00:00
app.add_middleware(GZipMiddleware, minimum_size=1000)
2022-10-02 18:26:38 +00:00
modules.progress.setup_progress_api(app)
if launch_api:
create_api(app)
2022-10-02 18:26:38 +00:00
modules.script_callbacks.app_started_callback(shared.demo, app)
2022-10-30 14:46:43 +00:00
wait_on_server(shared.demo)
print('Restarting UI...')
sd_samplers.set_samplers()
modules.script_callbacks.script_unloaded_callback()
extensions.list_extensions()
localization.list_localizations(cmd_opts.localizations_dir)
modelloader.forbid_loaded_nonbuiltin_upscalers()
modules.scripts.reload_scripts()
modules.script_callbacks.model_loaded_callback(shared.sd_model)
modelloader.load_upscalers()
for module in [module for name, module in sys.modules.items() if name.startswith("modules.ui")]:
importlib.reload(module)
modules.sd_models.list_models()
shared.reload_hypernetworks()
ui_extra_networks.intialize()
ui_extra_networks.register_page(ui_extra_networks_textual_inversion.ExtraNetworksPageTextualInversion())
ui_extra_networks.register_page(ui_extra_networks_hypernets.ExtraNetworksPageHypernetworks())
extra_networks.initialize()
extra_networks.register_extra_network(extra_networks_hypernet.ExtraNetworkHypernet())
2022-09-11 15:48:36 +00:00
if __name__ == "__main__":
2022-10-18 06:51:53 +00:00
if cmd_opts.nowebui:
api_only()
else:
webui()