Timothy J. Baek
591cd993c2
refac: search query task
2024-06-09 14:53:10 -07:00
Timothy J. Baek
5e7237b9cb
refac: title generation
2024-06-09 14:25:31 -07:00
Timothy J. Baek
f2b9a5f5bf
refac: rag
2024-06-09 03:01:25 -07:00
Timothy J. Baek
d1da3dde65
refac: migration
2024-06-08 13:45:33 -07:00
Timothy J. Baek
82f7b6c315
refac: modelfiles migration
2024-06-03 12:48:17 -07:00
Timothy J. Baek
1fce466253
refac: folder rename web -> webui
2024-05-26 01:15:48 -07:00
Timothy J. Baek
dac9634242
feat: create model
2024-05-24 22:21:57 -07:00
Timothy J. Baek
e316abcfc8
refac: better migration script
2024-05-24 19:26:27 -07:00
Timothy J. Baek
01472c071b
feat: support webui_auth false
...
#929
2024-05-08 08:40:18 -07:00
Timothy J. Baek
96d9d3447b
fix: pwa icon
...
#1886
2024-05-01 19:32:36 -07:00
Timothy J. Baek
9094536d37
feat: user last active
2024-04-27 19:38:51 -04:00
Timothy J. Baek
0aa4d305c7
chore: print statement removed
2024-04-02 10:07:44 -07:00
Timothy J. Baek
1066096b33
fix
2024-04-02 10:06:58 -07:00
Timothy J. Baek
398b2076cd
refac
2024-04-02 10:05:53 -07:00
Timothy J. Baek
b35cc36e19
chore: formatting
2024-04-02 09:42:45 -07:00
Timothy Jaeryang Baek
a0935dec60
Merge branch 'dev' into feature/support_auth_by_api_key
2024-03-31 13:48:36 -07:00
Self Denial
144c9059a3
Improve logging. Move print()
statements to appropiate log()
.
...
Add COMFYUI and WEBHOOK logging and associated environment variable
control. Add WEBHOOK payload & request debug logs.
2024-03-31 13:17:29 -06:00
Timothy J. Baek
5af8d0612a
chore: py formatting
2024-03-31 01:13:39 -07:00
changchiyou
d69dfb7c8b
feat: support google chat webhook
...
https://github.com/open-webui/open-webui/pull/1305/\#issuecomment-2021151237
2024-03-27 10:25:57 +08:00
liu.vaayne
81e928030f
backend support api key
2024-03-26 18:22:17 +08:00
changchiyou
427ca4e3f5
refactor: dynamically swap activitySubtitle
and activityImage
if CUSTOM_NAME
has been set
2024-03-26 15:45:36 +08:00
changchiyou
5eac5c54f8
feat: Teams MessageCard
...
refer to https://learn.microsoft.com/en-us/microsoftteams/platform/webhooks-and-connectors/how-to/connectors-using\?tabs\=cURL\#example-of-connector-message
2024-03-26 15:04:17 +08:00
Timothy J. Baek
fa65be2ad2
refac: post webhook
2024-03-20 18:47:13 -07:00
Timothy J. Baek
2c6e2d5e8a
feat: webhook backend
2024-03-20 18:35:02 -07:00
Timothy J. Baek
366679ff7c
fix: 'dict' object issue
2024-02-24 22:10:43 -08:00
Timothy J. Baek
b5bd07a06a
feat: secure litellm api
2024-02-23 22:44:56 -08:00
Timothy J. Baek
275523e32e
feat: jwt utils
2024-02-19 20:44:00 -08:00
Timothy J. Baek
e07001e5f6
feat: rag folder scan support
2024-02-17 21:06:08 -08:00
Timothy J. Baek
3af8d16e6a
fix: admin issue
2024-02-10 17:54:33 -08:00
Tim Farrell
08e8e922fd
Endpoint role-checking was redundantly applied but FastAPI provides a nice abstraction mechanic...so I applied it. There should be no logical changes in this code; only simpler, cleaner ways for doing the same thing.
2024-02-08 18:05:01 -06:00
Tim Farrell
4fceb404bd
Call jwt.decode
with the expected algorithms
2024-02-02 09:01:57 -06:00
Tim Farrell
e15dbdc46a
Pass the instance we're using.
2024-02-02 09:01:34 -06:00
Tim Farrell
8c37edd027
Even though "User.email" is enforced as unique at signup, it is not a unique field in the database. Let's use "User.id" instead. This also makes it more difficult to do a session stealing attack.
2024-02-02 09:01:06 -06:00
Tim Farrell
2c1dacb9b6
We should verify signatures to make the whole session secret meaningful.
2024-02-02 09:00:31 -06:00
Tim Farrell
d67f3d982b
Start by renaming variables to something more generic. This will give us a bit more flexibility as we look to other session management mechanisms.
2024-02-02 08:58:13 -06:00
Timothy J. Baek
28226a6f97
feat: web rag support
2024-01-26 22:17:28 -08:00
Timothy J. Baek
5e6d946f83
chore: disable passlib log
2024-01-05 12:22:27 -08:00
ThatOneCalculator
07cc7f15d5
chore: 🚨 lint and format
2024-01-03 14:33:57 -08:00
Timothy J. Baek
d8754b4486
feat/fix: email format validation
2024-01-02 16:22:48 -08:00
Anuraag Jain
77323d9b25
refac: remove the verify_token and use get-current user for auth+user
2024-01-01 10:55:50 +02:00
Anuraag Jain
bdd153d8f5
refac: use dependencies to verify token
...
- feat: added new util to get the current user when needed. Middleware was adding authentication logic to all the routes. let's revisit if we can move the non-auth endpoints to a separate route.
- refac: update the routes to use new helpers for verification and retrieving user
- chore: added black for local formatting of py code
2023-12-30 12:53:33 +02:00
Anuraag Jain
a01b112f7f
feat(auth): add auth middleware
...
- refactored chat routes to use request.user instead of doing authentication in every route
2023-12-28 22:15:54 +02:00
Timothy J. Baek
e539cf5c28
feat: gguf upload
2023-12-23 15:38:52 -08:00
Timothy J. Baek
dedb42582b
feat: gravatar default image updated
2023-11-19 00:46:27 -08:00
Timothy J. Baek
83ff1d77ea
feat: set first user to admin by default
2023-11-19 00:41:29 -08:00
Timothy J. Baek
8547b7807d
feat: basic RBAC support
2023-11-18 21:41:43 -08:00