Timothy J. Baek
da8646cae9
refac
2024-04-02 09:27:35 -07:00
Timothy J. Baek
38c34b4444
fix: import
2024-04-02 09:18:36 -07:00
Timothy Jaeryang Baek
56369fea3a
Merge branch 'dev' into feature/support_auth_by_api_key
2024-04-02 09:12:19 -07:00
Jun Siang Cheah
150152ddbd
fix: accidental indent during format changed logic
2024-03-29 21:04:30 +00:00
Timothy J. Baek
12287f8680
chore: code formatting
2024-03-29 13:06:18 -07:00
Jun Siang Cheah
50f6addd6f
feat: auto signup/login with WEBUI_AUTH_TRUSTED_EMAIL_HEADER
2024-03-28 10:34:57 +00:00
Jun Siang Cheah
29f13f34d3
feat: add WEBUI_AUTH_TRUSTED_EMAIL_HEADER for authenticating users by a trusted header
...
This is very yolo code, use at your own risk
2024-03-27 09:28:03 +00:00
liu.vaayne
81e928030f
backend support api key
2024-03-26 18:22:17 +08:00
Timothy J. Baek
fa65be2ad2
refac: post webhook
2024-03-20 18:47:13 -07:00
Timothy J. Baek
2c6e2d5e8a
feat: webhook backend
2024-03-20 18:35:02 -07:00
Timothy J. Baek
275523e32e
feat: jwt utils
2024-02-19 20:44:00 -08:00
Timothy J. Baek
511e939b5d
feat: admin settings
2024-02-14 01:17:43 -08:00
Tim Farrell
08e8e922fd
Endpoint role-checking was redundantly applied but FastAPI provides a nice abstraction mechanic...so I applied it. There should be no logical changes in this code; only simpler, cleaner ways for doing the same thing.
2024-02-08 18:05:01 -06:00
Tim Farrell
8c37edd027
Even though "User.email" is enforced as unique at signup, it is not a unique field in the database. Let's use "User.id" instead. This also makes it more difficult to do a session stealing attack.
2024-02-02 09:01:06 -06:00
Timothy J. Baek
3ce8f3e8fb
feat: profile update frontend integration
2024-01-26 21:22:25 -08:00
Timothy J. Baek
418da74756
feat: profile image update backend
2024-01-26 20:27:45 -08:00
Shiyinq
6a63c94153
feat: add guard clause to improve signup process
2024-01-20 21:54:53 +07:00
ThatOneCalculator
07cc7f15d5
chore: 🚨 lint and format
2024-01-03 14:33:57 -08:00
Timothy J. Baek
d8754b4486
feat/fix: email format validation
2024-01-02 16:22:48 -08:00
Timothy J. Baek
bb5bf3964e
feat: toggle signup enable from admin panel
2024-01-01 12:32:28 -08:00
Anuraag Jain
77323d9b25
refac: remove the verify_token and use get-current user for auth+user
2024-01-01 10:55:50 +02:00
Anuraag Jain
08c0d7a9ec
fix: merge conflicts
2023-12-30 13:00:21 +02:00
Anuraag Jain
613053e46c
Merge branch 'refac/auth-middleware' of https://github.com/anuraagdjain/ollama-webui into refac/auth-middleware
2023-12-30 12:53:35 +02:00
Anuraag Jain
bdd153d8f5
refac: use dependencies to verify token
...
- feat: added new util to get the current user when needed. Middleware was adding authentication logic to all the routes. let's revisit if we can move the non-auth endpoints to a separate route.
- refac: update the routes to use new helpers for verification and retrieving user
- chore: added black for local formatting of py code
2023-12-30 12:53:33 +02:00
Timothy J. Baek
500f61b7ee
chore: update password refac
2023-12-29 00:29:18 -08:00
Timothy J. Baek
d8bb19fd8a
feat: change password frontend added
2023-12-29 00:26:47 -08:00
Timothy J. Baek
9bd48ffd93
feat: change password support
2023-12-29 00:12:30 -08:00
Timothy J. Baek
c31ff1f679
fix: save email as lowercase
2023-12-27 19:10:56 -08:00
Timothy J. Baek
7c553f1287
feat: improved error message for signup
2023-12-27 12:06:22 -08:00
Timothy J. Baek
9174331025
feat: db migration to sqlite
2023-12-25 21:44:28 -08:00
Timothy J. Baek
83ff1d77ea
feat: set first user to admin by default
2023-11-19 00:41:29 -08:00
Timothy J. Baek
07d2c9871f
feat: admin panel added
2023-11-19 00:13:59 -08:00
Timothy J. Baek
8547b7807d
feat: basic RBAC support
2023-11-18 21:41:43 -08:00
Timothy J. Baek
921eef03b3
feat: multi-user support w/ RBAC
2023-11-18 16:47:12 -08:00