Commit Graph

193 Commits

Author SHA1 Message Date
Alex
01d2af9961 Update favicon.ico
favicon new
2023-10-02 15:21:36 +01:00
Alex
05ec1216e0
Merge pull request #363 from hirenchauhan2/feat/ui/170
feat(ui): add scroll to bottom button
2023-10-01 21:59:22 +01:00
Alex
af0e6481f8 Update Conversation.tsx 2023-10-01 21:57:12 +01:00
Hiren Chauhan
153b5c028b
feat(ui): add scroll to bottom button
This will show the scroll to bottom button when user scrolls to top from the last message.

Closes #170
2023-10-02 00:15:31 +05:30
Alex
9a33bf2210 script + cpu optimisations 2023-10-01 19:16:13 +01:00
Alex
783e7f6939 working es 2023-09-29 00:32:19 +01:00
Alex
86be6be2d2
Update Dockerfile 2023-09-28 15:30:47 +01:00
Alex
35a63e867a
Merge pull request #345 from beardcodes/patch-1
Update Dockerfile
2023-09-28 15:30:19 +01:00
Pavel
b7e4a3c99e
Merge pull request #348 from arc53/feature/better-structure
Feature/better structure
2023-09-27 20:18:09 +03:00
Zakarya El Quaroui
04b038960b
Update Dockerfile
The current node version is vulnerable to buffer overflow. 

CVE-2022-3602
PUBLISHED
View JSON
X.509 Email Address 4-byte Buffer Overflow
Important CVE JSON 5 Information
Assigner: Openssl

Published: 2022-11-01Updated: 2022-11-03
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
2023-09-27 17:08:44 +08:00
Alex
e85a583f0a testings 2023-09-26 10:03:22 +01:00
DenyTwice
d983a519e3 Uncomments selectDocsModal, removes redundant styles 2023-09-23 21:43:16 +05:30
DenyTwice
ae01070b8f Design consistency changes, fixes arrow icon positioning in source docs dropdown 2023-09-23 21:31:05 +05:30
Alex
e5c43cfc4b
Merge pull request #334 from arc53/support-for-docx
Include docx files in the frontend
2023-09-15 11:28:56 +01:00
Alex
45fc08e221 Update Upload.tsx 2023-09-15 11:28:23 +01:00
Alex
67e8511106 Update Upload.tsx 2023-09-15 11:27:08 +01:00
Alex
1b7dc8a509
Merge pull request #298 from arc53/feature/hisotry
fix the styling in a box
2023-08-05 22:02:42 +01:00
Alex
87cc3cf168 fix the styling in a box 2023-08-05 21:58:54 +01:00
Pavel
1687e6682a
Merge pull request #290 from arc53/feature/hisotry
history
2023-07-26 22:26:11 +01:00
Alex
8187a339f0 little bug fix 2023-07-26 22:17:18 +01:00
Alex
382c3930a2 history 2023-07-26 22:14:54 +01:00
dependabot[bot]
b8e57c9b6f
Bump word-wrap from 1.2.3 to 1.2.4 in /frontend
Bumps [word-wrap](https://github.com/jonschlinkert/word-wrap) from 1.2.3 to 1.2.4.
- [Release notes](https://github.com/jonschlinkert/word-wrap/releases)
- [Commits](https://github.com/jonschlinkert/word-wrap/compare/1.2.3...1.2.4)

---
updated-dependencies:
- dependency-name: word-wrap
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-07-20 06:16:47 +00:00
Sukhman S
96eb68e042 feat: use generic Modal with render props 2023-07-02 10:35:03 +05:30
Sukhman S
bf78bdd6d4 feat: pass ErrorMessage as a prop to Modal 2023-07-02 10:34:43 +05:30
Sukhman S
d998815847 fix: fix styles for error message 2023-07-01 23:19:27 +05:30
Sukhman S
00ba7b78ca feat: use generic Modal with render props 2023-07-01 23:04:45 +05:30
Sukhman S
0b735d94f1 feat: add generic Modal component 2023-07-01 23:03:29 +05:30
Alex
b8e28e0c12
Merge pull request #256 from arc53/dependabot/npm_and_yarn/frontend/vite-4.1.5
Bump vite from 4.1.4 to 4.1.5 in /frontend
2023-06-25 10:54:15 +07:00
Idan
2404899e28 Fixed request length bug, changed to as less used port 2023-06-23 14:56:14 +03:00
Alex
94cc18bd71 fix for sending sources + azure embeddings issue 2023-06-15 11:35:21 +01:00
Alex
bff200fede Sources by filename if available 2023-06-12 14:56:42 +01:00
Alex
af6f783043 hotfix 2023-06-11 23:04:02 +01:00
Alex
610adcbefc Sources in responses 2023-06-11 22:56:34 +01:00
dependabot[bot]
1d3631fa04
Bump vite from 4.1.4 to 4.1.5 in /frontend
Bumps [vite](https://github.com/vitejs/vite/tree/HEAD/packages/vite) from 4.1.4 to 4.1.5.
- [Release notes](https://github.com/vitejs/vite/releases)
- [Changelog](https://github.com/vitejs/vite/blob/v4.1.5/packages/vite/CHANGELOG.md)
- [Commits](https://github.com/vitejs/vite/commits/v4.1.5/packages/vite)

---
updated-dependencies:
- dependency-name: vite
  dependency-type: direct:development
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-06-06 02:19:21 +00:00
Alex
f8910ba136 Added history in streaming convo + fixed little bug with message margins on loading state 2023-05-31 23:47:16 +01:00
Alex
fae3f55010 Working streaming 2023-05-31 17:44:20 +01:00
Alex
20c877f75b working fe 2023-05-31 15:42:17 +01:00
Alex
8380858a82 some fixes 2023-05-30 20:00:41 +01:00
Alex
d2358c399d working version 2023-05-30 19:43:06 +01:00
Alex
c3af8a77af working streams 2023-05-29 17:55:43 +01:00
Alex
ff2e79fe7b streaming experiments 2023-05-18 23:52:59 +01:00
Alex
7f56f57778 better markdown styling 2023-05-06 15:22:23 +01:00
Serge Kozloff
db4cdc901c
Merge pull request #1 from arc53/main
t
2023-04-26 18:55:39 +01:00
Alex
cb47bcdb0e Update ConversationBubble.tsx 2023-04-26 13:35:05 +01:00
Alex
dbe9c4dc18 init 2023-04-25 17:01:44 +01:00
Serj
b6cadb1d65 Removed spaces 2023-04-24 18:46:05 +01:00
Chen
d3fab69155 feat: ui enhancement 2023-04-06 23:54:16 +08:00
Alex
9ba86bc174 Update preferenceSlice.ts 2023-03-28 10:19:42 +01:00
Alex
e6f1c7d0c3 mobile more space 2023-03-27 21:50:54 +01:00
Alex
87ad9a3190 Update Upload.tsx 2023-03-27 21:48:44 +01:00