Update app.py
Browse files
app.py
CHANGED
@@ -13,10 +13,12 @@ from cryptography.hazmat.primitives.asymmetric import rsa, padding
|
|
13 |
from cryptography.hazmat.primitives.ciphers.aead import AESGCM
|
14 |
from cryptography.hazmat.primitives import hashes
|
15 |
|
|
|
16 |
logging.basicConfig(level=logging.INFO, format='%(asctime)s - %(name)s - %(levelname)s - %(message)s')
|
17 |
logger = logging.getLogger(__name__)
|
18 |
|
19 |
-
|
|
|
20 |
BASE_HF_URL = "https://huggingface.co/spaces/"
|
21 |
CREATOR_SPACE_ID = "broadfield-dev/KeyLock-Auth-Creator"
|
22 |
SERVER_SPACE_ID = "broadfield-dev/KeyLock-Auth-Server"
|
@@ -27,102 +29,180 @@ SERVER_APP_PY_URL = f"{SERVER_URL}/raw/main/app.py"
|
|
27 |
|
28 |
|
29 |
def generate_rsa_keys():
|
|
|
30 |
private_key = rsa.generate_private_key(public_exponent=65537, key_size=2048)
|
31 |
-
private_pem = private_key.private_bytes(
|
32 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
33 |
return private_pem, public_pem
|
34 |
|
35 |
def create_encrypted_image(secret_data_str: str, public_key_pem: str) -> Image.Image:
|
36 |
-
|
37 |
-
if not
|
|
|
|
|
|
|
|
|
38 |
data_dict = {}
|
39 |
for line in secret_data_str.splitlines():
|
40 |
line = line.strip()
|
41 |
-
if not line or line.startswith('#'):
|
|
|
42 |
parts = line.split(':', 1) if ':' in line else line.split('=', 1)
|
43 |
-
if len(parts) == 2:
|
44 |
-
|
|
|
|
|
|
|
|
|
45 |
json_bytes = json.dumps(data_dict).encode('utf-8')
|
46 |
public_key = serialization.load_pem_public_key(public_key_pem.encode('utf-8'))
|
|
|
|
|
47 |
aes_key, nonce = os.urandom(32), os.urandom(12)
|
48 |
ciphertext = AESGCM(aes_key).encrypt(nonce, json_bytes, None)
|
49 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50 |
encrypted_payload = struct.pack('>I', len(rsa_encrypted_key)) + rsa_encrypted_key + nonce + ciphertext
|
|
|
|
|
51 |
img = Image.new('RGB', (800, 600), color=(45, 52, 54))
|
52 |
draw = ImageDraw.Draw(img)
|
53 |
-
try:
|
54 |
-
|
|
|
|
|
55 |
draw.text((400, 300), "KeyLock Secure Data", fill=(223, 230, 233), font=font, anchor="ms")
|
|
|
|
|
56 |
pixel_data = np.array(img.convert("RGB")).ravel()
|
57 |
binary_payload = ''.join(format(b, '08b') for b in struct.pack('>I', len(encrypted_payload)) + encrypted_payload)
|
58 |
-
|
|
|
|
|
|
|
59 |
pixel_data[:len(binary_payload)] = (pixel_data[:len(binary_payload)] & 0xFE) | np.array(list(binary_payload), dtype=np.uint8)
|
60 |
stego_pixels = pixel_data.reshape((600, 800, 3))
|
|
|
61 |
return Image.fromarray(stego_pixels, 'RGB')
|
62 |
|
63 |
def get_server_list():
|
64 |
-
|
|
|
65 |
yield gr.Dropdown(choices=[], value=None, label="β³ Fetching..."), status, []
|
66 |
try:
|
67 |
response = requests.get(CREATOR_ENDPOINTS_JSON_URL, timeout=10)
|
68 |
response.raise_for_status()
|
69 |
all_entries = response.json()
|
70 |
valid_endpoints = []
|
71 |
-
|
72 |
for entry in all_entries:
|
73 |
-
if
|
74 |
-
|
75 |
-
|
76 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
77 |
if not valid_endpoints:
|
78 |
raise ValueError("No valid server configurations found in the remote file.")
|
|
|
79 |
endpoint_names = [e['name'] for e in valid_endpoints]
|
80 |
status = f"β
Success! Found {len(endpoint_names)} valid servers."
|
81 |
yield gr.Dropdown(choices=endpoint_names, value=endpoint_names[0] if endpoint_names else None, label="Target Server"), status, valid_endpoints
|
82 |
except Exception as e:
|
83 |
status = f"β Error fetching or parsing configuration: {e}"
|
|
|
84 |
yield gr.Dropdown(choices=[], value=None, label="Error fetching servers"), status, []
|
85 |
|
86 |
def create_keylock_wrapper(service_name: str, secret_data: str, available_endpoints: list):
|
87 |
-
|
|
|
|
|
88 |
public_key = next((e['public_key'] for e in available_endpoints if e['name'] == service_name), None)
|
89 |
-
if not public_key:
|
|
|
90 |
try:
|
91 |
created_image = create_encrypted_image(secret_data, public_key)
|
92 |
return created_image, f"β
Success! Image created for '{service_name}'."
|
93 |
except Exception as e:
|
|
|
94 |
return None, f"β Error: {e}"
|
95 |
|
96 |
def send_keylock_wrapper(service_name: str, image: Image.Image, available_endpoints: list):
|
97 |
-
|
98 |
-
if
|
|
|
|
|
|
|
|
|
99 |
api_endpoint = next((e.get('api_endpoint') for e in available_endpoints if e['name'] == service_name), None)
|
100 |
-
if not api_endpoint:
|
|
|
|
|
101 |
status = f"Connecting to endpoint: {api_endpoint}"
|
102 |
yield None, status
|
|
|
103 |
try:
|
104 |
with io.BytesIO() as buffer:
|
105 |
image.save(buffer, format="PNG")
|
106 |
b64_string = base64.b64encode(buffer.getvalue()).decode("utf-8")
|
|
|
|
|
107 |
payload = {"data": [b64_string]}
|
108 |
headers = {"Content-Type": "application/json"}
|
|
|
109 |
response = requests.post(api_endpoint, headers=headers, json=payload, timeout=45)
|
|
|
|
|
110 |
response_json = response.json()
|
111 |
-
if
|
112 |
-
|
113 |
-
|
114 |
-
|
115 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
116 |
else:
|
117 |
-
raise gr.Error(f"API
|
|
|
118 |
except Exception as e:
|
|
|
119 |
yield None, f"β Error calling server API: {e}"
|
120 |
|
121 |
def refresh_and_update_all():
|
|
|
|
|
122 |
for dropdown_update, status_update, state_update in get_server_list():
|
123 |
pass
|
124 |
return dropdown_update, dropdown_update, status_update, state_update
|
125 |
|
|
|
126 |
theme = gr.themes.Base(
|
127 |
primary_hue=gr.themes.colors.blue, secondary_hue=gr.themes.colors.sky, neutral_hue=gr.themes.colors.slate,
|
128 |
font=(gr.themes.GoogleFont("Inter"), "system-ui", "sans-serif"),
|
@@ -186,6 +266,7 @@ with gr.Blocks(theme=theme, title="KeyLock Operations Dashboard") as demo:
|
|
186 |
output_private_key = gr.Textbox(lines=10, label="Generated Private Key", interactive=False, show_copy_button=True)
|
187 |
gen_keys_button = gr.Button("βοΈ Generate New 2048-bit Key Pair", variant="secondary")
|
188 |
|
|
|
189 |
gen_keys_button.click(fn=generate_rsa_keys, inputs=None, outputs=[output_private_key, output_public_key])
|
190 |
refresh_button.click(fn=refresh_and_update_all, outputs=[creator_service_dropdown, send_service_dropdown, creator_status, endpoints_state])
|
191 |
demo.load(fn=refresh_and_update_all, outputs=[creator_service_dropdown, send_service_dropdown, creator_status, endpoints_state])
|
|
|
13 |
from cryptography.hazmat.primitives.ciphers.aead import AESGCM
|
14 |
from cryptography.hazmat.primitives import hashes
|
15 |
|
16 |
+
# --- Basic Configuration ---
|
17 |
logging.basicConfig(level=logging.INFO, format='%(asctime)s - %(name)s - %(levelname)s - %(message)s')
|
18 |
logger = logging.getLogger(__name__)
|
19 |
|
20 |
+
# --- Constants ---
|
21 |
+
CREATOR_ENDPOINTS_JSON_URL = "./endpoints.json"
|
22 |
BASE_HF_URL = "https://huggingface.co/spaces/"
|
23 |
CREATOR_SPACE_ID = "broadfield-dev/KeyLock-Auth-Creator"
|
24 |
SERVER_SPACE_ID = "broadfield-dev/KeyLock-Auth-Server"
|
|
|
29 |
|
30 |
|
31 |
def generate_rsa_keys():
|
32 |
+
"""Generates a new 2048-bit RSA private and public key pair."""
|
33 |
private_key = rsa.generate_private_key(public_exponent=65537, key_size=2048)
|
34 |
+
private_pem = private_key.private_bytes(
|
35 |
+
encoding=serialization.Encoding.PEM,
|
36 |
+
format=serialization.PrivateFormat.PKCS8,
|
37 |
+
encryption_algorithm=serialization.NoEncryption()
|
38 |
+
).decode('utf-8')
|
39 |
+
public_pem = private_key.public_key().public_bytes(
|
40 |
+
encoding=serialization.Encoding.PEM,
|
41 |
+
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
42 |
+
).decode('utf-8')
|
43 |
return private_pem, public_pem
|
44 |
|
45 |
def create_encrypted_image(secret_data_str: str, public_key_pem: str) -> Image.Image:
|
46 |
+
"""Encrypts data and embeds it into a new image using steganography."""
|
47 |
+
if not secret_data_str.strip():
|
48 |
+
raise ValueError("Secret data cannot be empty.")
|
49 |
+
if not public_key_pem.strip():
|
50 |
+
raise ValueError("Public Key cannot be empty.")
|
51 |
+
|
52 |
data_dict = {}
|
53 |
for line in secret_data_str.splitlines():
|
54 |
line = line.strip()
|
55 |
+
if not line or line.startswith('#'):
|
56 |
+
continue
|
57 |
parts = line.split(':', 1) if ':' in line else line.split('=', 1)
|
58 |
+
if len(parts) == 2:
|
59 |
+
data_dict[parts[0].strip()] = parts[1].strip().strip("'\"")
|
60 |
+
|
61 |
+
if not data_dict:
|
62 |
+
raise ValueError("No valid key-value pairs found in secret data.")
|
63 |
+
|
64 |
json_bytes = json.dumps(data_dict).encode('utf-8')
|
65 |
public_key = serialization.load_pem_public_key(public_key_pem.encode('utf-8'))
|
66 |
+
|
67 |
+
# AES-GCM encryption
|
68 |
aes_key, nonce = os.urandom(32), os.urandom(12)
|
69 |
ciphertext = AESGCM(aes_key).encrypt(nonce, json_bytes, None)
|
70 |
+
|
71 |
+
# RSA-OAEP encryption for the AES key
|
72 |
+
rsa_encrypted_key = public_key.encrypt(
|
73 |
+
aes_key,
|
74 |
+
padding.OAEP(mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None)
|
75 |
+
)
|
76 |
+
|
77 |
+
# Pack the payload: [len(rsa_key)][rsa_key][nonce][ciphertext]
|
78 |
encrypted_payload = struct.pack('>I', len(rsa_encrypted_key)) + rsa_encrypted_key + nonce + ciphertext
|
79 |
+
|
80 |
+
# Create a base image
|
81 |
img = Image.new('RGB', (800, 600), color=(45, 52, 54))
|
82 |
draw = ImageDraw.Draw(img)
|
83 |
+
try:
|
84 |
+
font = ImageFont.truetype("DejaVuSans.ttf", 40)
|
85 |
+
except IOError:
|
86 |
+
font = ImageFont.load_default(size=30)
|
87 |
draw.text((400, 300), "KeyLock Secure Data", fill=(223, 230, 233), font=font, anchor="ms")
|
88 |
+
|
89 |
+
# LSB Steganography
|
90 |
pixel_data = np.array(img.convert("RGB")).ravel()
|
91 |
binary_payload = ''.join(format(b, '08b') for b in struct.pack('>I', len(encrypted_payload)) + encrypted_payload)
|
92 |
+
|
93 |
+
if len(binary_payload) > pixel_data.size:
|
94 |
+
raise ValueError(f"Data is too large for the image. Max size: {pixel_data.size // 8} bytes.")
|
95 |
+
|
96 |
pixel_data[:len(binary_payload)] = (pixel_data[:len(binary_payload)] & 0xFE) | np.array(list(binary_payload), dtype=np.uint8)
|
97 |
stego_pixels = pixel_data.reshape((600, 800, 3))
|
98 |
+
|
99 |
return Image.fromarray(stego_pixels, 'RGB')
|
100 |
|
101 |
def get_server_list():
|
102 |
+
"""Fetches and validates the server list from the remote JSON configuration."""
|
103 |
+
status = "Fetching server list from remote config..."
|
104 |
yield gr.Dropdown(choices=[], value=None, label="β³ Fetching..."), status, []
|
105 |
try:
|
106 |
response = requests.get(CREATOR_ENDPOINTS_JSON_URL, timeout=10)
|
107 |
response.raise_for_status()
|
108 |
all_entries = response.json()
|
109 |
valid_endpoints = []
|
110 |
+
|
111 |
for entry in all_entries:
|
112 |
+
if not isinstance(entry, dict) or "name" not in entry or "public_key" not in entry:
|
113 |
+
logger.warning(f"Skipping invalid entry (missing name or public_key): {entry}")
|
114 |
+
continue
|
115 |
+
|
116 |
+
# **FIX: Auto-generate api_endpoint from link if it's missing**
|
117 |
+
if "api_endpoint" not in entry:
|
118 |
+
if "link" in entry:
|
119 |
+
base_url = entry["link"].strip("/")
|
120 |
+
entry["api_endpoint"] = f"{base_url}/api/predict/"
|
121 |
+
logger.info(f"Auto-generating API endpoint for '{entry['name']}': {entry['api_endpoint']}")
|
122 |
+
else:
|
123 |
+
logger.warning(f"Skipping invalid entry '{entry['name']}' (missing 'api_endpoint' and 'link'): {entry}")
|
124 |
+
continue
|
125 |
+
|
126 |
+
valid_endpoints.append(entry)
|
127 |
+
|
128 |
if not valid_endpoints:
|
129 |
raise ValueError("No valid server configurations found in the remote file.")
|
130 |
+
|
131 |
endpoint_names = [e['name'] for e in valid_endpoints]
|
132 |
status = f"β
Success! Found {len(endpoint_names)} valid servers."
|
133 |
yield gr.Dropdown(choices=endpoint_names, value=endpoint_names[0] if endpoint_names else None, label="Target Server"), status, valid_endpoints
|
134 |
except Exception as e:
|
135 |
status = f"β Error fetching or parsing configuration: {e}"
|
136 |
+
logger.error(status)
|
137 |
yield gr.Dropdown(choices=[], value=None, label="Error fetching servers"), status, []
|
138 |
|
139 |
def create_keylock_wrapper(service_name: str, secret_data: str, available_endpoints: list):
|
140 |
+
"""Wrapper function to handle UI for creating the encrypted image."""
|
141 |
+
if not service_name:
|
142 |
+
raise gr.Error("Please select a target server.")
|
143 |
public_key = next((e['public_key'] for e in available_endpoints if e['name'] == service_name), None)
|
144 |
+
if not public_key:
|
145 |
+
raise gr.Error(f"Could not find public key for '{service_name}'. Please refresh the server list.")
|
146 |
try:
|
147 |
created_image = create_encrypted_image(secret_data, public_key)
|
148 |
return created_image, f"β
Success! Image created for '{service_name}'."
|
149 |
except Exception as e:
|
150 |
+
logger.error(f"Error creating image: {e}")
|
151 |
return None, f"β Error: {e}"
|
152 |
|
153 |
def send_keylock_wrapper(service_name: str, image: Image.Image, available_endpoints: list):
|
154 |
+
"""Wrapper function to handle UI for sending the image to the remote server."""
|
155 |
+
if not service_name:
|
156 |
+
raise gr.Error("Please select a target server.")
|
157 |
+
if image is None:
|
158 |
+
raise gr.Error("Please create or upload an image to send.")
|
159 |
+
|
160 |
api_endpoint = next((e.get('api_endpoint') for e in available_endpoints if e['name'] == service_name), None)
|
161 |
+
if not api_endpoint:
|
162 |
+
raise gr.Error(f"Configuration Error: Could not find 'api_endpoint' for '{service_name}'.")
|
163 |
+
|
164 |
status = f"Connecting to endpoint: {api_endpoint}"
|
165 |
yield None, status
|
166 |
+
|
167 |
try:
|
168 |
with io.BytesIO() as buffer:
|
169 |
image.save(buffer, format="PNG")
|
170 |
b64_string = base64.b64encode(buffer.getvalue()).decode("utf-8")
|
171 |
+
|
172 |
+
# Gradio API expects data in this format
|
173 |
payload = {"data": [b64_string]}
|
174 |
headers = {"Content-Type": "application/json"}
|
175 |
+
|
176 |
response = requests.post(api_endpoint, headers=headers, json=payload, timeout=45)
|
177 |
+
response.raise_for_status() # **IMPROVEMENT: Raise exception for HTTP errors**
|
178 |
+
|
179 |
response_json = response.json()
|
180 |
+
if "data" in response_json:
|
181 |
+
decrypted_data = response_json["data"][0]
|
182 |
+
# If the server returns a stringified JSON, parse it again
|
183 |
+
if isinstance(decrypted_data, str):
|
184 |
+
try:
|
185 |
+
decrypted_data = json.loads(decrypted_data)
|
186 |
+
except json.JSONDecodeError:
|
187 |
+
pass # Keep as string if not valid JSON
|
188 |
+
yield decrypted_data, "β
Success! Data decrypted by remote server."
|
189 |
+
elif "error" in response_json:
|
190 |
+
raise gr.Error(f"API Error: {response_json['error']}")
|
191 |
else:
|
192 |
+
raise gr.Error(f"API returned an unexpected response format: {response_json}")
|
193 |
+
|
194 |
except Exception as e:
|
195 |
+
logger.error(f"Error calling server API: {e}")
|
196 |
yield None, f"β Error calling server API: {e}"
|
197 |
|
198 |
def refresh_and_update_all():
|
199 |
+
"""Calls get_server_list and updates all relevant UI components."""
|
200 |
+
# The generator yields updates, we need to iterate to get the final one
|
201 |
for dropdown_update, status_update, state_update in get_server_list():
|
202 |
pass
|
203 |
return dropdown_update, dropdown_update, status_update, state_update
|
204 |
|
205 |
+
# --- Gradio UI Definition ---
|
206 |
theme = gr.themes.Base(
|
207 |
primary_hue=gr.themes.colors.blue, secondary_hue=gr.themes.colors.sky, neutral_hue=gr.themes.colors.slate,
|
208 |
font=(gr.themes.GoogleFont("Inter"), "system-ui", "sans-serif"),
|
|
|
266 |
output_private_key = gr.Textbox(lines=10, label="Generated Private Key", interactive=False, show_copy_button=True)
|
267 |
gen_keys_button = gr.Button("βοΈ Generate New 2048-bit Key Pair", variant="secondary")
|
268 |
|
269 |
+
# --- Event Handlers ---
|
270 |
gen_keys_button.click(fn=generate_rsa_keys, inputs=None, outputs=[output_private_key, output_public_key])
|
271 |
refresh_button.click(fn=refresh_and_update_all, outputs=[creator_service_dropdown, send_service_dropdown, creator_status, endpoints_state])
|
272 |
demo.load(fn=refresh_and_update_all, outputs=[creator_service_dropdown, send_service_dropdown, creator_status, endpoints_state])
|