Commit Graph

862 Commits

Author SHA1 Message Date
Alex
05ec1216e0
Merge pull request #363 from hirenchauhan2/feat/ui/170
feat(ui): add scroll to bottom button
2023-10-01 21:59:22 +01:00
Alex
af0e6481f8 Update Conversation.tsx 2023-10-01 21:57:12 +01:00
Alex
11a745c4d9
Merge pull request #364 from arc53/bug/fix-test
Fix broken test
2023-10-01 21:45:31 +01:00
Alex
2393da4425
Update README.md 2023-10-01 21:44:54 +01:00
Alex
95ab08e02d Update test_celery.py 2023-10-01 21:34:57 +01:00
Alex
95fdedf12e
Merge pull request #361 from Ayush-Prabhu/patch-1
Grammatical corrections
2023-10-01 20:58:09 +01:00
Alex
c73dd776db
Merge pull request #362 from arc53/feature/startup-script-cpu-inference
script + cpu optimisations
2023-10-01 20:11:42 +01:00
Alex
891e5fea3f
Update README.md 2023-10-01 20:10:41 +01:00
Alex
bb2f6f23b5
Update README.md 2023-10-01 20:09:15 +01:00
Alex
cd9b03bdb9 celery syncs 2023-10-01 20:05:13 +01:00
Alex
a619269502 celery bugs 2023-10-01 19:55:11 +01:00
Hiren Chauhan
153b5c028b
feat(ui): add scroll to bottom button
This will show the scroll to bottom button when user scrolls to top from the last message.

Closes #170
2023-10-02 00:15:31 +05:30
Alex
9a33bf2210 script + cpu optimisations 2023-10-01 19:16:13 +01:00
Ayush-Prabhu
34b4cd2231
Grammatical corrections
Corrected grammatical errors and spelling errors in : docs/pages/Guides/My-AI-answers-questions-using-external-knowledge.md
2023-10-01 23:36:50 +05:30
Alex
6045cbbc62
Merge pull request #355 from arc53/feature/cpu-llm
llama-cpp local
2023-10-01 17:55:26 +01:00
Alex
9bbf4044e0 script 2023-10-01 17:20:47 +01:00
Alex
fcf8a64d91
Merge pull request #360 from jbampton/fix-spelling
Fix spelling
2023-10-01 17:09:53 +01:00
John Bampton
2c6ab18e41 Fix spelling 2023-10-02 01:25:23 +10:00
Alex
2fea294b13 Update settings.py 2023-10-01 11:28:06 +01:00
Pavel
b47ecab1a9 llama-cpp local 2023-09-30 23:38:48 +04:00
Pavel
b86c294250
Merge pull request #354 from arc53/featue/elasticsearch
working es
2023-09-30 17:37:37 +03:00
Alex
3eacfb91aa fix314 2023-09-30 15:32:37 +01:00
Alex
94164c2a71
Merge branch 'main' into featue/elasticsearch 2023-09-30 15:30:23 +01:00
Alex
d85eb83ea2 elastic search fixes 2023-09-30 15:25:31 +01:00
Alex
b2002639db
Merge pull request #353 from arc53/bug/fix-aes-pdf
Update requirements.txt
2023-09-29 17:34:17 +01:00
Alex
347cfe253f elastic2 2023-09-29 17:17:48 +01:00
Pavel
833e1836e1
Merge pull request #352 from arc53/feature/aws-sagemaker-inference
sagemaker + llm creator class
2023-09-29 17:42:54 +03:00
Alex
e4be38b9f7 sagemaker + llm creator class 2023-09-29 01:09:01 +01:00
Alex
783e7f6939 working es 2023-09-29 00:32:19 +01:00
Alex
c1c54f4848
Update README.md 2023-09-28 16:07:50 +01:00
Alex
86be6be2d2
Update Dockerfile 2023-09-28 15:30:47 +01:00
Alex
35a63e867a
Merge pull request #345 from beardcodes/patch-1
Update Dockerfile
2023-09-28 15:30:19 +01:00
Alex
9c12a417ee
Update README.md 2023-09-28 15:22:56 +01:00
Alex
32a019c0d6 Update requirements.txt 2023-09-27 22:39:48 +01:00
Pavel
b7e4a3c99e
Merge pull request #348 from arc53/feature/better-structure
Feature/better structure
2023-09-27 20:18:09 +03:00
Alex
039062d071 ruff fix 2023-09-27 18:10:26 +01:00
Alex
83ae3e8371 more ruff fixes 2023-09-27 18:04:07 +01:00
Alex
852de8bdfc ruff linting 2023-09-27 18:01:40 +01:00
Alex
b8acb860aa some tests 2023-09-27 17:54:57 +01:00
Alex
e6849b85d1 Create huggingface.py 2023-09-27 17:02:47 +01:00
Alex
8fa9657ba6 working full 2023-09-27 16:25:57 +01:00
Zakarya El Quaroui
04b038960b
Update Dockerfile
The current node version is vulnerable to buffer overflow. 

CVE-2022-3602
PUBLISHED
View JSON
X.509 Email Address 4-byte Buffer Overflow
Important CVE JSON 5 Information
Assigner: Openssl

Published: 2022-11-01Updated: 2022-11-03
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
2023-09-27 17:08:44 +08:00
Alex
52507a5a95
Merge pull request #342 from arc53/hacktoberfest 2023-09-26 18:36:14 +01:00
Alex
d8505ba2ab
Update README.md 2023-09-26 15:14:26 +01:00
Alex
fa26c0997e
Update index.mdx 2023-09-26 15:07:42 +01:00
Alex
5a0aadd2ae Hacktoberfest info 2023-09-26 13:48:57 +01:00
Alex
025549ebf8 fixes to make it work 2023-09-26 13:00:17 +01:00
Alex
e85a583f0a testings 2023-09-26 10:03:22 +01:00
Alex
f7244ddb7a
Merge pull request #340 from DenyTwice/main
UI Improvements, implements task 3 in issue #279
2023-09-24 11:13:27 +01:00
DenyTwice
d983a519e3 Uncomments selectDocsModal, removes redundant styles 2023-09-23 21:43:16 +05:30