Commit graph

29 commits

Author SHA1 Message Date
Self Denial
144c9059a3 Improve logging. Move print() statements to appropiate log().
Add COMFYUI and WEBHOOK logging and associated environment variable
control. Add WEBHOOK payload & request debug logs.
2024-03-31 13:17:29 -06:00
Timothy J. Baek
5af8d0612a chore: py formatting 2024-03-31 01:13:39 -07:00
changchiyou
d69dfb7c8b
feat: support google chat webhook
https://github.com/open-webui/open-webui/pull/1305/\#issuecomment-2021151237
2024-03-27 10:25:57 +08:00
changchiyou
427ca4e3f5
refactor: dynamically swap activitySubtitle and activityImage if CUSTOM_NAME has been set 2024-03-26 15:45:36 +08:00
changchiyou
5eac5c54f8
feat: Teams MessageCard
refer to https://learn.microsoft.com/en-us/microsoftteams/platform/webhooks-and-connectors/how-to/connectors-using\?tabs\=cURL\#example-of-connector-message
2024-03-26 15:04:17 +08:00
Timothy J. Baek
fa65be2ad2 refac: post webhook 2024-03-20 18:47:13 -07:00
Timothy J. Baek
2c6e2d5e8a feat: webhook backend 2024-03-20 18:35:02 -07:00
Timothy J. Baek
366679ff7c fix: 'dict' object issue 2024-02-24 22:10:43 -08:00
Timothy J. Baek
b5bd07a06a feat: secure litellm api 2024-02-23 22:44:56 -08:00
Timothy J. Baek
275523e32e feat: jwt utils 2024-02-19 20:44:00 -08:00
Timothy J. Baek
e07001e5f6 feat: rag folder scan support 2024-02-17 21:06:08 -08:00
Timothy J. Baek
3af8d16e6a fix: admin issue 2024-02-10 17:54:33 -08:00
Tim Farrell
08e8e922fd Endpoint role-checking was redundantly applied but FastAPI provides a nice abstraction mechanic...so I applied it. There should be no logical changes in this code; only simpler, cleaner ways for doing the same thing. 2024-02-08 18:05:01 -06:00
Tim Farrell
4fceb404bd Call jwt.decode with the expected algorithms 2024-02-02 09:01:57 -06:00
Tim Farrell
e15dbdc46a Pass the instance we're using. 2024-02-02 09:01:34 -06:00
Tim Farrell
8c37edd027 Even though "User.email" is enforced as unique at signup, it is not a unique field in the database. Let's use "User.id" instead. This also makes it more difficult to do a session stealing attack. 2024-02-02 09:01:06 -06:00
Tim Farrell
2c1dacb9b6 We should verify signatures to make the whole session secret meaningful. 2024-02-02 09:00:31 -06:00
Tim Farrell
d67f3d982b Start by renaming variables to something more generic. This will give us a bit more flexibility as we look to other session management mechanisms. 2024-02-02 08:58:13 -06:00
Timothy J. Baek
28226a6f97 feat: web rag support 2024-01-26 22:17:28 -08:00
Timothy J. Baek
5e6d946f83 chore: disable passlib log 2024-01-05 12:22:27 -08:00
ThatOneCalculator
07cc7f15d5
chore: 🚨 lint and format 2024-01-03 14:33:57 -08:00
Timothy J. Baek
d8754b4486 feat/fix: email format validation 2024-01-02 16:22:48 -08:00
Anuraag Jain
77323d9b25 refac: remove the verify_token and use get-current user for auth+user 2024-01-01 10:55:50 +02:00
Anuraag Jain
bdd153d8f5 refac: use dependencies to verify token
- feat: added new util to get the current user when needed. Middleware was adding authentication logic to all the routes. let's revisit if we can move the non-auth endpoints to a separate route.
- refac: update the routes to use new helpers for verification and retrieving user
- chore: added black for local formatting of py code
2023-12-30 12:53:33 +02:00
Anuraag Jain
a01b112f7f feat(auth): add auth middleware
- refactored chat routes to use request.user instead of doing authentication in every route
2023-12-28 22:15:54 +02:00
Timothy J. Baek
e539cf5c28 feat: gguf upload 2023-12-23 15:38:52 -08:00
Timothy J. Baek
dedb42582b feat: gravatar default image updated 2023-11-19 00:46:27 -08:00
Timothy J. Baek
83ff1d77ea feat: set first user to admin by default 2023-11-19 00:41:29 -08:00
Timothy J. Baek
8547b7807d feat: basic RBAC support 2023-11-18 21:41:43 -08:00