Skip to content

Dev#217

Merged
OrenZhang merged 230 commits intomainfrom
dev
Nov 7, 2025
Merged

Dev#217
OrenZhang merged 230 commits intomainfrom
dev

Conversation

@OrenZhang
Copy link
Copy Markdown
Collaborator

No description provided.

Aslan Vatsaev and others added 30 commits October 10, 2025 13:26
translations of the new items added in the last version have been carried out.
Update translation.json (pt-BR)
Emphasize the importance of standalone PRs for translation updates.
… the cleanup can remove stale access tokens across every user when a connection is updated
… OAuth clients when the stored client ID no longer exists on the server, so the browser flow never hits the stale-ID failure
Upgraded `python-jose` from **1.4.0** to **1.5.0** to ensure compatibility with newer Python versions and apply security improvements.
- Adds explicit support for Python 3.12 and 3.13.
- Improves cryptographic backend handling.
- Includes bug fixes and security enhancements (e.g., removes sensitive data from exceptions).

- [python-jose 1.5.0 Release Notes](https://github.com/mpdavis/python-jose/releases)
This PR updates the unstructured package from version 0.16.17 to 0.18.15 to enable installation and compatibility with Python 3.13.

More info #18349
build(deps): bump unstructured from 0.16.17 to 0.18.15
build(deps): bump python-jose from 1.4.0 to 1.5.0
The textVariableHandler was using URL.createObjectURL() for clipboard images, which created a blob URL instead of the required base64-encoded data URL. This caused an "illegal base64 data" error when sending messages with images pasted via a {{CLIPBOARD}} prompt.

This commit updates the handler to use FileReader.readAsDataURL() to properly encode the image, aligning it with the existing on:paste logic. Additionally, it adds error handling for navigator.clipboard.read() to address potential permission issues in Firefox.
Classic298 and others added 27 commits November 6, 2025 03:49
* chore: Update CHANGELOG for version 0.6.35

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG with recent feature additions

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md
* fix(chats): handle null bytes in PostgreSQL search

Removes null bytes from message content before performing
case-insensitive search in PostgreSQL, preventing conversion
errors and ensuring reliable query results.

* fix(chats): prevent null byte errors in PostgreSQL queries

Ensures chat content and titles containing null bytes are excluded from PostgreSQL text queries to avoid conversion errors.

Improves reliability of search and filtering by handling problematic characters in JSON fields.
Co-Authored-By: Gero Doll <6284675+limbicnation@users.noreply.github.com>
feat: add OAUTH_GROUPS_SEPARATOR for configurable group parsing
@github-advanced-security
Copy link
Copy Markdown
Contributor

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

Comment on lines +530 to +531
"api.openai.com"
in request.app.state.config.OPENAI_API_BASE_URLS[idx]

Check failure

Code scanning / CodeQL

Incomplete URL substring sanitization High

The string
api.openai.com
may be at an arbitrary position in the sanitized URL.
"OAuth callback error for user_id=%s client_id=%s: %s",
user_id,
client_id,
error_message,

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.
Comment thread backend/open_webui/utils/oauth.py Outdated

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
@OrenZhang OrenZhang merged commit f0c282f into main Nov 7, 2025
27 of 28 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.