Commit Graph

733 Commits

Author SHA1 Message Date
Pavel
b47ecab1a9 llama-cpp local 2023-09-30 23:38:48 +04:00
Pavel
833e1836e1 Merge pull request #352 from arc53/feature/aws-sagemaker-inference
sagemaker + llm creator class
2023-09-29 17:42:54 +03:00
Alex
e4be38b9f7 sagemaker + llm creator class 2023-09-29 01:09:01 +01:00
Alex
c1c54f4848 Update README.md 2023-09-28 16:07:50 +01:00
Alex
86be6be2d2 Update Dockerfile 2023-09-28 15:30:47 +01:00
Alex
35a63e867a Merge pull request #345 from beardcodes/patch-1
Update Dockerfile
2023-09-28 15:30:19 +01:00
Alex
9c12a417ee Update README.md 2023-09-28 15:22:56 +01:00
Pavel
b7e4a3c99e Merge pull request #348 from arc53/feature/better-structure
Feature/better structure
2023-09-27 20:18:09 +03:00
Alex
039062d071 ruff fix 2023-09-27 18:10:26 +01:00
Alex
83ae3e8371 more ruff fixes 2023-09-27 18:04:07 +01:00
Alex
852de8bdfc ruff linting 2023-09-27 18:01:40 +01:00
Alex
b8acb860aa some tests 2023-09-27 17:54:57 +01:00
Alex
e6849b85d1 Create huggingface.py 2023-09-27 17:02:47 +01:00
Alex
8fa9657ba6 working full 2023-09-27 16:25:57 +01:00
Zakarya El Quaroui
04b038960b Update Dockerfile
The current node version is vulnerable to buffer overflow. 

CVE-2022-3602
PUBLISHED
View JSON
X.509 Email Address 4-byte Buffer Overflow
Important CVE JSON 5 Information
Assigner: Openssl

Published: 2022-11-01Updated: 2022-11-03
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
2023-09-27 17:08:44 +08:00
Alex
52507a5a95 Merge pull request #342 from arc53/hacktoberfest 2023-09-26 18:36:14 +01:00
Alex
d8505ba2ab Update README.md 2023-09-26 15:14:26 +01:00
Alex
fa26c0997e Update index.mdx 2023-09-26 15:07:42 +01:00
Alex
5a0aadd2ae Hacktoberfest info 2023-09-26 13:48:57 +01:00
Alex
025549ebf8 fixes to make it work 2023-09-26 13:00:17 +01:00
Alex
e85a583f0a testings 2023-09-26 10:03:22 +01:00
Alex
f7244ddb7a Merge pull request #340 from DenyTwice/main
UI Improvements, implements task 3 in issue #279
2023-09-24 11:13:27 +01:00
DenyTwice
d983a519e3 Uncomments selectDocsModal, removes redundant styles 2023-09-23 21:43:16 +05:30
DenyTwice
ae01070b8f Design consistency changes, fixes arrow icon positioning in source docs dropdown 2023-09-23 21:31:05 +05:30
Alex
b2118602d9 Merge pull request #335 from B2o5T/patch-1
fix syntax highlightning
2023-09-16 09:49:03 +01:00
Dimitri POSTOLOV
9303f3b47b Update API-docs.md 2023-09-16 02:18:01 +02:00
Alex
e5c43cfc4b Merge pull request #334 from arc53/support-for-docx
Include docx files in the frontend
2023-09-15 11:28:56 +01:00
Alex
45fc08e221 Update Upload.tsx 2023-09-15 11:28:23 +01:00
Alex
67e8511106 Update Upload.tsx 2023-09-15 11:27:08 +01:00
Pavel
4f7fd0a62b Merge pull request #333 from arc53/feature/update-guides
updated deployment and created react widget guide
2023-09-15 13:11:30 +03:00
Alex
88fe454962 removed unecessary comma 2023-09-15 11:08:21 +01:00
Alex
26f7a9be0a updated deployment and create react widget guide 2023-09-15 11:00:59 +01:00
Alex
9256926bb7 Update README.md 2023-09-14 22:22:28 +01:00
Alex
2a83318739 updates modal 2023-09-13 14:11:32 +01:00
Pavel
d6e2535a5e Merge pull request #330 from arc53/feature/better-widget
Feature/better widget
2023-09-12 20:05:01 +03:00
Alex
2bffb7e22c update widgets 2023-09-12 17:44:40 +01:00
Alex
24a162cf86 use all states 2023-09-12 17:43:41 +01:00
Alex
f3104f3bc4 different source docs 2023-09-12 17:37:26 +01:00
Alex
45f1bf6709 widget final 2023-09-12 17:36:41 +01:00
Alex
40b2590815 different imports 2023-09-12 17:25:08 +01:00
Alex
dd9ab46b5c Update theme.config.jsx 2023-09-12 17:21:32 +01:00
Alex
c2aeadae33 Update theme.config.jsx 2023-09-12 17:19:18 +01:00
Alex
1bd9759ab7 update package 2023-09-12 17:13:34 +01:00
Alex
dcdbb05168 Update theme.config.jsx 2023-09-12 17:00:45 +01:00
Alex
ae117c47e9 widget everywhere 2023-09-12 16:43:47 +01:00
Alex
7f7856f0e4 Local storage sync 2023-09-12 16:39:09 +01:00
Alex
aa7b7c8619 Update docs 2023-09-12 15:48:52 +01:00
Alex
ee0cbff245 cleanup 2023-09-12 15:42:31 +01:00
Alex
c2c18b25d2 widget 0.2.0 2023-09-12 15:41:05 +01:00
Alex
816c7c95ed react-widget 2023-09-12 14:01:12 +01:00