| | |
| |
|
| | import os |
| | import re |
| | import time |
| | import json |
| | import requests |
| | import subprocess |
| | import cloudpickle as pickle |
| | from datetime import timedelta |
| | from IPython.display import clear_output |
| |
|
| |
|
| | |
| | env = os.getenv('ENV_NAME') |
| | root_path = os.getenv('ROOT_PATH') |
| | webui_path = os.getenv('WEBUI_PATH') |
| | free_plan = os.getenv('FREE_PLAN') |
| |
|
| |
|
| | def load_settings(): |
| | SETTINGS_FILE = f'{root_path}/settings.json' |
| | if os.path.exists(SETTINGS_FILE): |
| | with open(SETTINGS_FILE, 'r') as f: |
| | return json.load(f) |
| | return {} |
| |
|
| | settings = load_settings() |
| | ngrok_token = settings.get('ngrok_token', "") |
| | zrok_token = settings.get('zrok_token', "") |
| | commandline_arguments = settings.get('commandline_arguments', "") |
| | change_webui = settings.get('change_webui', "") |
| |
|
| |
|
| | |
| | def is_package_installed(package_name): |
| | try: |
| | subprocess.run(["npm", "ls", "-g", package_name], check=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) |
| | return True |
| | except subprocess.CalledProcessError: |
| | return False |
| |
|
| | lt_tunnel = is_package_installed('localtunnel') |
| |
|
| |
|
| | |
| | print('Please Wait...') |
| |
|
| | def get_public_ip(version='ipv4'): |
| | try: |
| | url = f'https://api64.ipify.org?format=json&{version}=true' |
| | response = requests.get(url) |
| | return response.json().get('ip', 'N/A') |
| | except Exception as e: |
| | print(f"Error getting public {version} address:", e) |
| |
|
| | |
| | public_ip_file = f"{root_path}/public_ip.txt" |
| | if os.path.exists(public_ip_file): |
| | with open(public_ip_file, 'r') as file: |
| | public_ipv4 = file.read().strip() |
| | else: |
| | public_ipv4 = get_public_ip(version='ipv4') |
| | with open(public_ip_file, 'w') as file: |
| | file.write(public_ipv4) |
| |
|
| | tunnel_class = pickle.load(open(f"{root_path}/new_tunnel", "rb"), encoding="utf-8") |
| | tunnel_port = 1834 |
| | tunnel = tunnel_class(tunnel_port) |
| | tunnel.add_tunnel(command="cl tunnel --url localhost:{port}", name="cl", pattern=re.compile(r"[\w-]+\.trycloudflare\.com")) |
| |
|
| | if lt_tunnel: |
| | tunnel.add_tunnel(command="lt --port {port}", name="lt", pattern=re.compile(r"[\w-]+\.loca\.lt"), note="Password : " + "\033[32m" + public_ipv4 + "\033[0m" + " rerun cell if 404 error.") |
| |
|
| | if zrok_token: |
| | get_ipython().system('zrok enable {zrok_token} &> /dev/null') |
| | tunnel.add_tunnel(command="zrok share public http://localhost:{port}/ --headless", name="zrok", pattern=re.compile(r"[\w-]+\.share\.zrok\.io")) |
| |
|
| | clear_output() |
| |
|
| |
|
| | |
| | paths_to_check = { |
| | "tagger_hf_cache_dir": f"{webui_path}/models/interrogators/", |
| | "ad_extra_models_dir": f"{webui_path}/models/adetailer/", |
| | "sd_checkpoint_hash": "", |
| | "sd_model_checkpoint": "", |
| | "sd_vae": "None" |
| | } |
| |
|
| | config_path = f'{webui_path}/config.json' |
| |
|
| | if os.path.exists(config_path): |
| | with open(config_path, 'r') as file: |
| | config_data = json.load(file) |
| |
|
| | for key, value in paths_to_check.items(): |
| | if key in config_data and config_data[key] != value: |
| | sed_command = f"sed -i 's|\"{key}\": \".*\"|\"{key}\": \"{value}\"|' {config_path}" |
| | os.system(sed_command) |
| |
|
| |
|
| | with tunnel: |
| | get_ipython().run_line_magic('cd', '{webui_path}') |
| |
|
| | commandline_arguments += f' --port={tunnel_port}' |
| | if ngrok_token: |
| | commandline_arguments += f' --ngrok {ngrok_token}' |
| | if env != "Google Colab": |
| | commandline_arguments += f' --encrypt-pass={tunnel_port} --api' |
| |
|
| | if change_webui == 'A1111': |
| | commandline_arguments += ' --xformers' |
| | else: |
| | commandline_arguments += ' --disable-xformers --opt-sdp-attention --cuda-stream --pin-shared-memory' |
| |
|
| | get_ipython().system('COMMANDLINE_ARGS="{commandline_arguments}" python launch.py') |
| |
|
| | start_colab = float(open(f'{webui_path}/static/colabTimer.txt', 'r').read()) |
| | time_since_start = str(timedelta(seconds=time.time()-start_colab)).split('.')[0] |
| | print(f"\n⌚️ \033[0mYou have been conducting this session for - \033[33m{time_since_start}\033[0m\n\n") |
| |
|
| | if zrok_token: |
| | get_ipython().system('zrok disable &> /dev/null') |
| |
|
| |
|