diff --git a/backend/open_webui/internal/db.py b/backend/open_webui/internal/db.py index e3fbffcf23..a5eecd6605 100644 --- a/backend/open_webui/internal/db.py +++ b/backend/open_webui/internal/db.py @@ -91,7 +91,6 @@ if SQLALCHEMY_DATABASE_URL.startswith("sqlite+sqlcipher://"): # Extract database path from SQLCipher URL db_path = SQLALCHEMY_DATABASE_URL.replace("sqlite+sqlcipher://", "") - # Create a custom creator function that uses sqlcipher3 def create_sqlcipher_connection(): import sqlcipher3 diff --git a/backend/open_webui/internal/wrappers.py b/backend/open_webui/internal/wrappers.py index e33bb3d3a4..80b1aab8ff 100644 --- a/backend/open_webui/internal/wrappers.py +++ b/backend/open_webui/internal/wrappers.py @@ -55,7 +55,6 @@ def register_connection(db_url): # Convert sqlite+sqlcipher:///path/to/db.sqlite to /path/to/db.sqlite db_path = db_url.replace("sqlite+sqlcipher://", "") - # Use Peewee's native SqlCipherDatabase with encryption db = SqlCipherDatabase(db_path, passphrase=database_password) db.autoconnect = True diff --git a/backend/open_webui/socket/main.py b/backend/open_webui/socket/main.py index 5bfa5b4df8..72b2761c64 100644 --- a/backend/open_webui/socket/main.py +++ b/backend/open_webui/socket/main.py @@ -47,7 +47,7 @@ from open_webui.utils.access_control import has_access, get_users_with_access from open_webui.env import ( GLOBAL_LOG_LEVEL, - ) +) logging.basicConfig(stream=sys.stdout, level=GLOBAL_LOG_LEVEL) diff --git a/backend/open_webui/utils/oauth.py b/backend/open_webui/utils/oauth.py index 113db5b478..13108f78e5 100644 --- a/backend/open_webui/utils/oauth.py +++ b/backend/open_webui/utils/oauth.py @@ -795,15 +795,17 @@ class OAuthClientManager: # Passing them again causes Authlib to concatenate them (e.g., "ID1,ID1"), # which results in 401 errors from the token endpoint. (Fix for #19823) token = await client.authorize_access_token(request) - + # Validate that we received a proper token response # If token exchange failed (e.g., 401), we may get an error response instead if token and not token.get("access_token"): - error_desc = token.get("error_description", token.get("error", "Unknown error")) + error_desc = token.get( + "error_description", token.get("error", "Unknown error") + ) error_message = f"Token exchange failed: {error_desc}" log.error(f"Invalid token response for client_id {client_id}: {token}") token = None - + if token: try: # Add timestamp for tracking diff --git a/package-lock.json b/package-lock.json index 333d9c2fa1..0c7c0f8bea 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,12 +1,12 @@ { "name": "open-webui", - "version": "0.6.41", + "version": "0.6.42", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "open-webui", - "version": "0.6.41", + "version": "0.6.42", "dependencies": { "@azure/msal-browser": "^4.5.0", "@codemirror/lang-javascript": "^6.2.2", diff --git a/package.json b/package.json index 1381638435..411c83d985 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "open-webui", - "version": "0.6.41", + "version": "0.6.42", "private": true, "scripts": { "dev": "npm run pyodide:fetch && vite dev --host", diff --git a/src/lib/components/admin/Settings/WebSearch.svelte b/src/lib/components/admin/Settings/WebSearch.svelte index b2956fc729..6c9035f3c9 100644 --- a/src/lib/components/admin/Settings/WebSearch.svelte +++ b/src/lib/components/admin/Settings/WebSearch.svelte @@ -205,9 +205,8 @@ /> - -