File size: 11,043 Bytes
024277f
0ef482f
938f609
08216b8
938f609
9d41b1d
08216b8
024277f
 
 
48607b7
1f8048b
 
9c6065d
1f8048b
024277f
 
 
 
08216b8
024277f
08216b8
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
024277f
08216b8
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
024277f
08216b8
024277f
 
 
 
 
08216b8
024277f
08216b8
024277f
 
 
 
 
 
 
 
08216b8
 
024277f
08216b8
024277f
 
 
 
 
08216b8
 
 
 
 
 
 
 
 
024277f
 
 
08216b8
024277f
 
08216b8
 
 
024277f
08216b8
024277f
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
08216b8
938f609
024277f
 
 
 
 
 
 
08216b8
024277f
08216b8
 
0ef482f
024277f
dac9550
 
024277f
 
 
 
 
 
 
 
dac9550
48607b7
bbcef43
 
024277f
48607b7
024277f
406e27f
024277f
 
 
 
 
 
 
 
 
 
9c6065d
024277f
08216b8
 
 
 
 
 
 
 
024277f
 
 
 
 
 
 
 
a10dd0b
024277f
 
 
 
 
 
 
 
 
c5129eb
a10dd0b
bbcef43
08216b8
bbcef43
 
c5129eb
9d41b1d
024277f
 
 
 
c5129eb
9d41b1d
c5129eb
08216b8
024277f
48607b7
dac9550
d722b23
024277f
9c6065d
024277f
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
08216b8
48607b7
08216b8
024277f
08216b8
024277f
 
 
 
dd3451f
ec3d9e7
024277f
 
 
 
 
 
0ef482f
024277f
 
d081bf3
08216b8
024277f
9a56bc2
024277f
08216b8
024277f
 
 
9a56bc2
444e2a5
0ef482f
024277f
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
# app.py
import os
import base64
import json
import gradio as gr
from huggingface_hub import upload_file, InferenceClient
from datetime import datetime
import traceback
import threading
from typing import Tuple, Optional, Dict, Any

# --- Config ---
HF_DATASET_REPO = "OppaAI/Robot_MCP"
HF_VLM_MODEL = "Qwen/Qwen2.5-VL-7B-Instruct"

# In-memory processed requests cache to prevent duplicate execution for identical request_id
PROCESSED_REQUESTS: Dict[str, Dict[str, Any]] = {}
PROCESSED_LOCK = threading.Lock()

# ==========================================
# Robot Tools (unchanged semantics)
# ==========================================
def tool_speak(text: str, emotion: str = "neutral") -> dict:
    return {
        "status": "success",
        "action_executed": "speak",
        "payload": {"text": text, "emotion": emotion}
    }

def tool_navigate(direction: str, distance_meters: float) -> dict:
    if distance_meters > 5.0:
        return {"status": "error", "message": "Safety limit: Cannot move more than 5m at once."}
    return {
        "status": "success",
        "action_executed": "navigate",
        "payload": {"direction": direction, "distance": distance_meters}
    }

def tool_scan_hazard(hazard_type: str, severity: str) -> dict:
    timestamp = datetime.now().isoformat()
    log_entry = f"[{timestamp}] WARNING: {hazard_type} detected (Severity: {severity})"
    # (in real system: write to file/logging infra)
    return {
        "status": "warning_logged",
        "log": log_entry
    }

def tool_analyze_human(clothing_color: str, estimated_action: str) -> dict:
    return {
        "status": "human_tracked",
        "details": f"Human wearing {clothing_color} is likely {estimated_action}."
    }

TOOL_REGISTRY = {
    "speak": tool_speak,
    "navigate": tool_navigate,
    "scan_hazard": tool_scan_hazard,
    "analyze_human": tool_analyze_human
}

# ==========================================
# Helper: Save & Upload (robust)
# ==========================================
def save_and_upload_image(image_b64: str, hf_token: str) -> Tuple[Optional[str], Optional[str], Optional[str], int]:
    """
    Save a base64 image to a uniquely named /tmp file and upload to HF dataset repo.
    Returns: local_tmp_path, hf_url, path_in_repo, size_bytes
    """
    try:
        # decode
        image_bytes = base64.b64decode(image_b64)
        size_bytes = len(image_bytes)
        print("[debug] decoded image bytes:", size_bytes)
        if size_bytes < 10:
            raise ValueError("Decoded image is too small or invalid base64")

        # unique tmp filename (avoid collision across workers)
        timestamp = datetime.now().strftime("%Y%m%d_%H%M%S_%f")
        local_tmp_path = f"/tmp/robot_img_{timestamp}.jpg"
        with open(local_tmp_path, "wb") as f:
            f.write(image_bytes)
        print(f"[debug] wrote local tmp file: {local_tmp_path}")

        # Prepare filename in repo (put at repo root to avoid folder permission issues)
        filename = f"robot_{timestamp}.jpg"
        path_in_repo = filename

        # upload_file might raise. capture exception and show traceback
        upload_file(
            path_or_fileobj=local_tmp_path,
            path_in_repo=path_in_repo,
            repo_id=HF_DATASET_REPO,
            token=hf_token,
            repo_type="dataset"
        )

        hf_image_url = f"https://huggingface.co/datasets/{HF_DATASET_REPO}/resolve/main/{path_in_repo}"
        print("[debug] upload successful:", hf_image_url)
        return local_tmp_path, hf_image_url, path_in_repo, size_bytes

    except Exception as e:
        print("[error] save_and_upload_image failed:", e)
        traceback.print_exc()
        return None, None, None, 0

# ==========================================
# Main logic
# ==========================================
def safe_parse_json_from_text(text: str) -> Optional[dict]:
    """
    Try to extract JSON object from model output.
    Accepts raw JSON, or a ```json\n{...}``` block, or text with JSON substring.
    Returns dict or None.
    """
    if not text:
        return None
    # remove markdown fences
    t = text.strip()
    if t.startswith("```") and "```" in t[3:]:
        # remove outer fences
        t = t.strip("`")
    # find first '{' and last '}' to try to extract JSON substring
    start = t.find("{")
    end = t.rfind("}")
    if start >= 0 and end > start:
        candidate = t[start:end+1]
        try:
            return json.loads(candidate)
        except Exception:
            # fallback: try the whole text
            try:
                return json.loads(t)
            except Exception:
                return None
    else:
        try:
            return json.loads(t)
        except Exception:
            return None

def validate_and_call_tool(tool_name: str, tool_args: dict):
    if not tool_name:
        return {"error": "No tool_name provided by VLM."}
    if tool_name not in TOOL_REGISTRY:
        return {"error": f"Tool '{tool_name}' not found in registry."}
    # safe-call: ensure dict args only contain acceptable keys for that tool
    try:
        result = TOOL_REGISTRY[tool_name](**tool_args)
        return result
    except TypeError as e:
        return {"error": f"Tool call argument mismatch: {str(e)}"}
    except Exception as e:
        traceback.print_exc()
        return {"error": f"Tool execution failed: {str(e)}"}

def process_and_describe(payload: dict):
    """
    payload expects keys:
      - hf_token (string)
      - image_b64 (base64 str)
      - robot_id (optional)
      - request_id (optional)  # recommended to dedupe retries
    """
    vlm_text = ""
    tool_result = None
    action_data = {}

    try:
        # basic checks
        hf_token = payload.get("hf_token")
        if not hf_token:
            return {"error": "HF token not provided in payload. Token must have datasets write permission if uploading."}

        request_id = payload.get("request_id") or payload.get("robot_id") or None
        if request_id:
            with PROCESSED_LOCK:
                if request_id in PROCESSED_REQUESTS:
                    print("[info] duplicate request_id detected; returning cached result")
                    return PROCESSED_REQUESTS[request_id]

        robot_id = payload.get("robot_id", "unknown")
        image_b64 = payload.get("image_b64")
        if not image_b64:
            return {"error": "No image provided in payload."}

        # Save & upload (only once per invocation)
        local_tmp_path, hf_url, path_in_repo, size_bytes = save_and_upload_image(image_b64, hf_token)
        if not hf_url:
            # Upload failed: return error with helpful debug info
            return {
                "error": "Image upload failed on server.",
                "debug": {
                    "local_tmp_path": local_tmp_path,
                    "path_in_repo": path_in_repo,
                    "size_bytes": size_bytes
                }
            }

        # Build system prompt (kept compact)
        tools_desc = json.dumps({
            "speak": {"text": "string", "emotion": "string"},
            "navigate": {"direction": "forward/left/right", "distance_meters": "float"},
            "scan_hazard": {"hazard_type": "string", "severity": "low/medium/high"},
            "analyze_human": {"clothing_color": "string", "estimated_action": "string"}
        }, indent=2)

        system_prompt = f"""
You are a Robot Control AI. Analyze the image and choose ONE tool to execute.

AVAILABLE TOOLS (JSON Schema):
{tools_desc}

INSTRUCTIONS:
1. Describe what you see briefly.
2. Select the single most appropriate tool and provide arguments matching the schema.

RESPONSE FORMAT (Strict JSON):
{{
  "description": "Brief visual description",
  "tool_name": "name_of_tool",
  "arguments": {{ ...args matching schema... }}
}}
"""

        # Build messages payload for VLM - include the uploaded HF URL (some VLMs can fetch it)
        messages_payload = [
            {"role": "system", "content": system_prompt},
            {"role": "user", "content": [
                {"type": "text", "text": "Analyze this camera feed and decide on an action."},
                {"type": "image_url", "image_url": {"url": f"data:image/jpeg;base64,{image_b64}"}}
            ]}
        ]

        # Instantiate HF Inference client and call chat completion
        hf_client = InferenceClient(token=hf_token)

        # NOTE: huggingface InferenceClient usage may vary by version. We use the chat completions create call.
        chat_completion = hf_client.chat.completions.create(
            model=HF_VLM_MODEL,
            messages=messages_payload,
            max_tokens=300,
            temperature=0.1
        )

        vlm_text = chat_completion.choices[0].message.content.strip()
        print("[debug] VLM raw output:", vlm_text[:1000])

        # attempt to parse JSON
        parsed = safe_parse_json_from_text(vlm_text)
        if parsed is None:
            # If the model didn't return JSON, return descriptive fallback but do not execute tools
            result = {
                "status": "model_no_json",
                "robot_id": robot_id,
                "image_url": hf_url,
                "vlm_raw": vlm_text,
                "message": "VLM did not return valid JSON following the required schema."
            }
            if request_id:
                with PROCESSED_LOCK:
                    PROCESSED_REQUESTS[request_id] = result
            return result

        action_data = parsed
        tool_name = action_data.get("tool_name")
        tool_args = action_data.get("arguments", {}) or {}

        # Validate that arguments is a dict
        if not isinstance(tool_args, dict):
            tool_args = {}

        # Execute the tool once and capture result
        print(f"[info] Executing tool: {tool_name} with args {tool_args}")
        tool_result = validate_and_call_tool(tool_name, tool_args)

        result = {
            "status": "success",
            "robot_id": robot_id,
            "image_url": hf_url,
            "image_bytes": size_bytes,
            "analysis": action_data.get("description"),
            "chosen_tool": tool_name,
            "tool_arguments": tool_args,
            "tool_execution_result": tool_result,
            "vlm_raw": vlm_text
        }

        if request_id:
            with PROCESSED_LOCK:
                PROCESSED_REQUESTS[request_id] = result

        return result

    except Exception as e:
        traceback.print_exc()
        return {"error": f"Server error: {str(e)}", "vlm_raw": vlm_text}

# --- Gradio Interface ---
iface = gr.Interface(
    fn=process_and_describe,
    inputs=gr.JSON(label="Input (JSON with 'image_b64', 'hf_token', optional 'request_id')"),
    outputs=gr.JSON(label="Robot Command Output"),
    api_name="predict",
    allow_flagging="never",
    live=False
)

if __name__ == "__main__":
    # When deploying to HF Space: set server_name and server_port via env if you need
    iface.launch()