Alex
01d2af9961
Update favicon.ico
...
favicon new
2023-10-02 15:21:36 +01:00
Alex
05ec1216e0
Merge pull request #363 from hirenchauhan2/feat/ui/170
...
feat(ui): add scroll to bottom button
2023-10-01 21:59:22 +01:00
Alex
af0e6481f8
Update Conversation.tsx
2023-10-01 21:57:12 +01:00
Hiren Chauhan
153b5c028b
feat(ui): add scroll to bottom button
...
This will show the scroll to bottom button when user scrolls to top from the last message.
Closes #170
2023-10-02 00:15:31 +05:30
Alex
9a33bf2210
script + cpu optimisations
2023-10-01 19:16:13 +01:00
Alex
783e7f6939
working es
2023-09-29 00:32:19 +01:00
Alex
86be6be2d2
Update Dockerfile
2023-09-28 15:30:47 +01:00
Alex
35a63e867a
Merge pull request #345 from beardcodes/patch-1
...
Update Dockerfile
2023-09-28 15:30:19 +01:00
Pavel
b7e4a3c99e
Merge pull request #348 from arc53/feature/better-structure
...
Feature/better structure
2023-09-27 20:18:09 +03:00
Zakarya El Quaroui
04b038960b
Update Dockerfile
...
The current node version is vulnerable to buffer overflow.
CVE-2022-3602
PUBLISHED
View JSON
X.509 Email Address 4-byte Buffer Overflow
Important CVE JSON 5 Information
Assigner: Openssl
Published: 2022-11-01Updated: 2022-11-03
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
2023-09-27 17:08:44 +08:00
Alex
e85a583f0a
testings
2023-09-26 10:03:22 +01:00
DenyTwice
d983a519e3
Uncomments selectDocsModal, removes redundant styles
2023-09-23 21:43:16 +05:30
DenyTwice
ae01070b8f
Design consistency changes, fixes arrow icon positioning in source docs dropdown
2023-09-23 21:31:05 +05:30
Alex
e5c43cfc4b
Merge pull request #334 from arc53/support-for-docx
...
Include docx files in the frontend
2023-09-15 11:28:56 +01:00
Alex
45fc08e221
Update Upload.tsx
2023-09-15 11:28:23 +01:00
Alex
67e8511106
Update Upload.tsx
2023-09-15 11:27:08 +01:00
Alex
1b7dc8a509
Merge pull request #298 from arc53/feature/hisotry
...
fix the styling in a box
2023-08-05 22:02:42 +01:00
Alex
87cc3cf168
fix the styling in a box
2023-08-05 21:58:54 +01:00
Pavel
1687e6682a
Merge pull request #290 from arc53/feature/hisotry
...
history
2023-07-26 22:26:11 +01:00
Alex
8187a339f0
little bug fix
2023-07-26 22:17:18 +01:00
Alex
382c3930a2
history
2023-07-26 22:14:54 +01:00
dependabot[bot]
b8e57c9b6f
Bump word-wrap from 1.2.3 to 1.2.4 in /frontend
...
Bumps [word-wrap](https://github.com/jonschlinkert/word-wrap ) from 1.2.3 to 1.2.4.
- [Release notes](https://github.com/jonschlinkert/word-wrap/releases )
- [Commits](https://github.com/jonschlinkert/word-wrap/compare/1.2.3...1.2.4 )
---
updated-dependencies:
- dependency-name: word-wrap
dependency-type: indirect
...
Signed-off-by: dependabot[bot] <support@github.com>
2023-07-20 06:16:47 +00:00
Sukhman S
96eb68e042
feat: use generic Modal with render props
2023-07-02 10:35:03 +05:30
Sukhman S
bf78bdd6d4
feat: pass ErrorMessage as a prop to Modal
2023-07-02 10:34:43 +05:30
Sukhman S
d998815847
fix: fix styles for error message
2023-07-01 23:19:27 +05:30
Sukhman S
00ba7b78ca
feat: use generic Modal with render props
2023-07-01 23:04:45 +05:30
Sukhman S
0b735d94f1
feat: add generic Modal component
2023-07-01 23:03:29 +05:30
Alex
b8e28e0c12
Merge pull request #256 from arc53/dependabot/npm_and_yarn/frontend/vite-4.1.5
...
Bump vite from 4.1.4 to 4.1.5 in /frontend
2023-06-25 10:54:15 +07:00
Idan
2404899e28
Fixed request length bug, changed to as less used port
2023-06-23 14:56:14 +03:00
Alex
94cc18bd71
fix for sending sources + azure embeddings issue
2023-06-15 11:35:21 +01:00
Alex
bff200fede
Sources by filename if available
2023-06-12 14:56:42 +01:00
Alex
af6f783043
hotfix
2023-06-11 23:04:02 +01:00
Alex
610adcbefc
Sources in responses
2023-06-11 22:56:34 +01:00
dependabot[bot]
1d3631fa04
Bump vite from 4.1.4 to 4.1.5 in /frontend
...
Bumps [vite](https://github.com/vitejs/vite/tree/HEAD/packages/vite ) from 4.1.4 to 4.1.5.
- [Release notes](https://github.com/vitejs/vite/releases )
- [Changelog](https://github.com/vitejs/vite/blob/v4.1.5/packages/vite/CHANGELOG.md )
- [Commits](https://github.com/vitejs/vite/commits/v4.1.5/packages/vite )
---
updated-dependencies:
- dependency-name: vite
dependency-type: direct:development
...
Signed-off-by: dependabot[bot] <support@github.com>
2023-06-06 02:19:21 +00:00
Alex
f8910ba136
Added history in streaming convo + fixed little bug with message margins on loading state
2023-05-31 23:47:16 +01:00
Alex
fae3f55010
Working streaming
2023-05-31 17:44:20 +01:00
Alex
20c877f75b
working fe
2023-05-31 15:42:17 +01:00
Alex
8380858a82
some fixes
2023-05-30 20:00:41 +01:00
Alex
d2358c399d
working version
2023-05-30 19:43:06 +01:00
Alex
c3af8a77af
working streams
2023-05-29 17:55:43 +01:00
Alex
ff2e79fe7b
streaming experiments
2023-05-18 23:52:59 +01:00
Alex
7f56f57778
better markdown styling
2023-05-06 15:22:23 +01:00
Serge Kozloff
db4cdc901c
Merge pull request #1 from arc53/main
...
t
2023-04-26 18:55:39 +01:00
Alex
cb47bcdb0e
Update ConversationBubble.tsx
2023-04-26 13:35:05 +01:00
Alex
dbe9c4dc18
init
2023-04-25 17:01:44 +01:00
Serj
b6cadb1d65
Removed spaces
2023-04-24 18:46:05 +01:00
Chen
d3fab69155
feat: ui enhancement
2023-04-06 23:54:16 +08:00
Alex
9ba86bc174
Update preferenceSlice.ts
2023-03-28 10:19:42 +01:00
Alex
e6f1c7d0c3
mobile more space
2023-03-27 21:50:54 +01:00
Alex
87ad9a3190
Update Upload.tsx
2023-03-27 21:48:44 +01:00