Skip to content

Fix/iframe window no open#2671

Open
hongzeMu wants to merge 27 commits intocoze-dev:mainfrom
verteklab:fix/iframe_window_noOpen
Open

Fix/iframe window no open#2671
hongzeMu wants to merge 27 commits intocoze-dev:mainfrom
verteklab:fix/iframe_window_noOpen

Conversation

@hongzeMu
Copy link
Copy Markdown

What type of PR is this?

Check the PR title.

  • This PR title match the format: <type>(optional scope): <description>
  • The description of this PR title is user-oriented and clear enough for others to understand.
  • Add documentation if the current PR requires user awareness at the usage level.

(Optional) Translate the PR title into Chinese.

(Optional) More detailed description for this PR(en: English/zh: Chinese).

en:
zh(optional):

(Optional) Which issue(s) this PR fixes:

hongzeMu and others added 27 commits April 10, 2026 11:07
Capture all current workspace modifications so the branch state is fully backed up on remote.

Made-with: Cursor
chore(docker): update Dockerfile and docker-compose for Go module proxy and port mappings
feat(i18n): set default locale to zh-CN and update user profile accor…
…ils, and implement corresponding middleware and tests
Builds on the existing knowledge OpenAPI endpoints (a1a3679) to make
admin-API-key access from the intelligent-system backend fully functional.

- nginx: proxy /open_api/* to coze-server (previously 405'd into static FS).
- workflow: add SignImageURLOpenAPI handler, /open_api/workflow/sign_image_url
  route, middleware stubs, and openapi_auth allowlist entry so template photo
  URIs can be re-signed with a Bearer token instead of a user session cookie.
- knowledge: skip checkPermission and SpaceID/AppID filtering when
  fromOpenAPI=true in datasetDetail / listSlice / listPhoto / photoDetail.
  The admin API key is the authorization; it isn't guaranteed to be a member
  of the dataset's space, and backend clients don't carry SpaceID/ProjectID
  into these calls.

Made-with: Cursor
…o PDF.js

- Add PreviewDocx component using mammoth + DOMPurify for in-browser docx
  rendering
- Split file-preview and segment-preview dispatchers: md/txt/pdf/docx each
  have their own branch, with a graceful unsupported fallback instead of
  silently handing non-PDF bytes to PDF.js
- Surface PDF load failures via onLoadError in usePreviewPdf
- Drop legacy .doc from accept lists (no client renderer; fileExtensionSet
  had no parser case either); keep .doc on the backend-converted
  preview_tos_url path in segment review for future server-side conversion
- Add doc-preview/README.md with the add-a-new-format checklist
- Parameterize node/nginx base images in frontend/Dockerfile via
  NODE_IMAGE and NGINX_IMAGE build args (defaults unchanged), and route
  them through docker.m.daocloud.io in docker-compose.override.yml so
  the build works from networks where registry-1.docker.io is
  unreachable.
- Strip the 16-line Apache-2.0 header that was prepended to
  common/scripts/install-run*.js inside the builder stage. Rush 5.147.1
  content-hashes those files and otherwise aborts with "The standard
  files in the 'common/scripts' folders need to be updated for this
  Rush version." The rewrite is guarded by a header check so it is
  idempotent and safe if the upstream scripts are ever restored.

Made-with: Cursor
- Introduced CustomHTTP model class with corresponding connection and validation structures.
- Updated model creation logic to handle Custom HTTP requests.
- Enhanced admin interface with new fields for Custom HTTP configuration.
- Updated model metadata to include Custom HTTP model details.
- Added necessary translations for new fields in the admin UI.
- Updated model class references from CustomHTTP to Other across various files.
- Adjusted related logic in model creation and metadata to reflect the new naming.
- Modified admin interface and translations to align with the updated model class designation.
- Changed TopP parameter checks to handle nil pointers and dereference correctly.
- Ensured consistent handling of TopP in both request body and template variable building.
- Improved robustness of the custom HTTP model's parameter management.
- Require key custom HTTP fields during model creation.
- Tighten validation for custom HTTP settings.
- Expose custom HTTP metadata to the frontend.
- Update admin UI for the new custom HTTP flow.
… from context

- Introduced IsAdminFromCtx function to determine if the current session belongs to an admin user based on a whitelist of admin emails.
- Integrated this function into the TestRun method to enforce admin checks before allowing user space access.
…kflow method

- Updated SaveWorkflow method to include admin status verification using IsAdminFromCtx.
- Restricted user space access checks to non-admin users, enhancing security and access control.
@CLAassistant
Copy link
Copy Markdown

CLAassistant commented Apr 23, 2026

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you all sign our Contributor License Agreement before we can accept your contribution.
0 out of 3 committers have signed the CLA.

❌ lotusknight
❌ XinyuLiu233
❌ hongzeMu
You have signed the CLA already but the status is still pending? Let us recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants