Vulnerability Summary: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specifie
--- | |
services: | |
webui: | |
image: ghcr.io/open-webui/open-webui:main | |
ports: | |
- 8080:8080/tcp | |
environment: | |
- OLLAMA_BASE_URL=http://ollama:11434 | |
volumes: | |
- /var/opt/data/ollama/webui:/app/backend/data |
{ | |
"name": "OpenChat 3.5", | |
"load_params": { | |
"n_ctx": 8192, | |
"n_batch": 512, | |
"rope_freq_base": 10000, | |
"rope_freq_scale": 1, | |
"n_gpu_layers": 80, | |
"use_mlock": true, | |
"main_gpu": 0, |
(cors) { | |
@cors_preflight method OPTIONS | |
header { | |
Access-Control-Allow-Origin "{header.origin}" | |
Vary Origin | |
Access-Control-Expose-Headers "Authorization" | |
Access-Control-Allow-Credentials "true" | |
} |
# spin up a runpod GPU with TextGen WebUI, no need to use openai flag | |
# you can also use TextGen WebUI on your local computer | |
git clone https://github.com/cpacker/MemGPT.git | |
cd MemGPT | |
export OPENAI_API_BASE=https://some-stuff-5000.proxy.runpod.net # using runpod | |
# export OPENAI_API_BASE=localhost:5000 # using local computer | |
BACKEND_TYPE=webui | |
python3 main.py --no_verify |
Note this should only be done once you are sure you have reliable TB mesh network.
this is because proxmox UI seems fragile wrt to changing underlying network after configuration of ceph.
All installation done via command line due to gui not understanding the mesh network
This setup doesn't attempt to seperate the ceph public network and ceph cluster network (not same as proxmox clutser network), The goal is to get an easy working setup.
**2025.04.24 NOTE: some folks had to switch to IPv6 for ceph due to IPv4 unreliability issues, we think as of pve 8.4.1 and all the input the community has give to update this set of gsists - that IPv4 is now reliable even on MS-01. As such i advising everyone to use IPv4 for ceph as if you have IPv6 you will have issues with SDN at this time (if you don't use SDN this is not an issue).
https://github.com/jondurbin/airoboros
pip install --upgrade airoboros==2.0.13
# Clone llama.cpp | |
git clone https://github.com/ggerganov/llama.cpp.git | |
cd llama.cpp | |
# Build it | |
make clean | |
LLAMA_METAL=1 make | |
# Download model | |
export MODEL=llama-2-13b-chat.ggmlv3.q4_0.bin |
-- View to easily query the leaked RARBG torrent DB. | |
CREATE VIEW magnet_links as | |
SELECT id, title, cat, size, 'magnet:?xt=urn:btih:' || hash as magnetLink, imdb, dt | |
FROM items | |
ORDER BY dt DESC; | |
-- Example query: | |
SELECT * FROM magnet_links | |
WHERE title LIKE '%Apocalypse.Now.1979.Theatrical%' | |
LIMIT 501 |
import torch | |
print(torch.version.cuda) | |
print(torch.cuda.is_available()) |