v1.7.2 #364
Reference in New Issue
Block a user
Delete Branch "dev-1.7.2"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Fixed issues with OIDC users and credentials, with some small QOL fixes
Update Log:
Summary of Changes
Hello @LukeGus, I'm Gemini Code Assist1 ! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!
This pull request delivers a maintenance update, version
1.7.2, focusing on critical bug fixes and quality-of-life improvements. Key issues addressed include preventing OIDC user credential resets upon logout and ensuring NGINX accurately forwards client IP addresses. Additionally, user experience is enhanced through the persistence of sidebar states and more robust file deletion confirmations.Highlights
keyPassword,privateKey,publicKeyto snake_case (key_password,private_key,public_key) for consistency.Using Gemini Code Assist
The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.
Invoking Gemini
You can request assistance from Gemini at any point by creating a comment using either
/gemini <command>or@gemini-code-assist <command>. Below is a summary of the supported commands on the current page./gemini review/gemini summary/gemini helpCustomization
To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a
.gemini/folder in the base of the repository. Detailed instructions can be found here.Limitations & Feedback
Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.
You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.
Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution. ↩︎
Code Review
This pull request introduces several fixes and quality-of-life improvements. The fix for OIDC user data persistence is well-implemented and addresses a critical issue. The addition of sidebar state persistence and improved delete confirmations are great usability enhancements. The database schema changes improve consistency, but this could be taken further. I've identified a few areas for improvement, including a potentially overly restrictive NGINX configuration, some inconsistencies in the database schema naming, a minor redundancy in the code, and a potential bug in the UI's change detection logic for SSH hosts. Overall, this is a solid update.
@@ -11,2 +11,4 @@client_header_timeout 300s;set_real_ip_from 127.0.0.1;real_ip_header X-Forwarded-For;The
set_real_ip_from 127.0.0.1;directive is quite restrictive. If this NGINX instance is running inside a Docker container and is fronted by another proxy (e.g., another container in the same Docker network), the request will likely come from an internal Docker IP, not127.0.0.1. This would result in the real client IP not being correctly identified.To make this more robust, consider trusting the common Docker network ranges. This will cover most containerized and local proxy setups. You might want to adjust the CIDR blocks based on your specific Docker network configuration.
@@ -49,3 +49,3 @@keyPassword: text("key_password"),key_password: text("key_password"),keyType: text("key_type"),I see you're changing some field names from camelCase to snake_case (e.g.,
keyPasswordtokey_password), which is great for consistency with typical SQL naming conventions. However, this change isn't applied consistently across the schema. For example, in thesshDatatable, fields likeuserId,authType,credentialId,autostartPassword, andkeyTyperemain in camelCase. ThesshCredentialstable also has a mix of conventions (keyType,detectedKeyType,usageCount).This mix of naming conventions can be confusing and lead to bugs. It would be best to choose one convention (preferably snake_case for database schemas) and apply it to all fields for better maintainability.
This expression
credential.key_password || credential.key_passwordis redundant. It seems to be a leftover from a refactoring. You can simplify it to justcredential.key_password.