2023-05-15 08:51:32 +08:00
|
|
|
services:
|
|
|
|
# The postgres database.
|
|
|
|
db:
|
|
|
|
image: postgres:15-alpine
|
|
|
|
restart: always
|
2024-06-28 17:37:52 +08:00
|
|
|
env_file:
|
|
|
|
- ./middleware.env
|
2023-05-15 08:51:32 +08:00
|
|
|
environment:
|
2024-06-28 17:37:52 +08:00
|
|
|
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD:-difyai123456}
|
|
|
|
POSTGRES_DB: ${POSTGRES_DB:-dify}
|
|
|
|
PGDATA: ${PGDATA:-/var/lib/postgresql/data/pgdata}
|
2023-05-15 08:51:32 +08:00
|
|
|
volumes:
|
|
|
|
- ./volumes/db/data:/var/lib/postgresql/data
|
|
|
|
ports:
|
|
|
|
- "5432:5432"
|
|
|
|
|
|
|
|
# The redis cache.
|
|
|
|
redis:
|
|
|
|
image: redis:6-alpine
|
|
|
|
restart: always
|
|
|
|
volumes:
|
|
|
|
# Mount the redis data directory to the container.
|
|
|
|
- ./volumes/redis/data:/data
|
|
|
|
# Set the redis password when startup redis server.
|
|
|
|
command: redis-server --requirepass difyai123456
|
|
|
|
ports:
|
|
|
|
- "6379:6379"
|
|
|
|
|
|
|
|
# The Weaviate vector store.
|
|
|
|
weaviate:
|
2023-11-22 16:41:20 +08:00
|
|
|
image: semitechnologies/weaviate:1.19.0
|
2023-05-15 08:51:32 +08:00
|
|
|
restart: always
|
|
|
|
volumes:
|
|
|
|
# Mount the Weaviate data directory to the container.
|
|
|
|
- ./volumes/weaviate:/var/lib/weaviate
|
2024-06-28 17:37:52 +08:00
|
|
|
env_file:
|
|
|
|
- ./middleware.env
|
2023-05-15 08:51:32 +08:00
|
|
|
environment:
|
|
|
|
# The Weaviate configurations
|
|
|
|
# You can refer to the [Weaviate](https://weaviate.io/developers/weaviate/config-refs/env-vars) documentation for more information.
|
2024-06-28 17:37:52 +08:00
|
|
|
PERSISTENCE_DATA_PATH: ${PERSISTENCE_DATA_PATH:-'/var/lib/weaviate'}
|
|
|
|
QUERY_DEFAULTS_LIMIT: ${QUERY_DEFAULTS_LIMIT:-25}
|
|
|
|
AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED: ${AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED:-false}
|
|
|
|
DEFAULT_VECTORIZER_MODULE: ${DEFAULT_VECTORIZER_MODULE:-none}
|
|
|
|
CLUSTER_HOSTNAME: ${CLUSTER_HOSTNAME:-node1}
|
|
|
|
AUTHENTICATION_APIKEY_ENABLED: ${AUTHENTICATION_APIKEY_ENABLED:-true}
|
|
|
|
AUTHENTICATION_APIKEY_ALLOWED_KEYS: ${AUTHENTICATION_APIKEY_ALLOWED_KEYS:-WVF5YThaHlkYwhGUSmCRgsX3tD5ngdN8pkih}
|
|
|
|
AUTHENTICATION_APIKEY_USERS: ${AUTHENTICATION_APIKEY_USERS:-hello@dify.ai}
|
|
|
|
AUTHORIZATION_ADMINLIST_ENABLED: ${AUTHORIZATION_ADMINLIST_ENABLED:-true}
|
|
|
|
AUTHORIZATION_ADMINLIST_USERS: ${AUTHORIZATION_ADMINLIST_USERS:-hello@dify.ai}
|
2023-05-15 08:51:32 +08:00
|
|
|
ports:
|
2023-10-09 01:04:04 +08:00
|
|
|
- "8080:8080"
|
|
|
|
|
2024-04-08 18:51:46 +08:00
|
|
|
# The DifySandbox
|
|
|
|
sandbox:
|
2024-06-02 11:30:14 +08:00
|
|
|
image: langgenius/dify-sandbox:0.2.1
|
2024-04-08 18:51:46 +08:00
|
|
|
restart: always
|
|
|
|
environment:
|
|
|
|
# The DifySandbox configurations
|
2024-05-13 14:39:14 +08:00
|
|
|
# Make sure you are changing this key for your deployment with a strong key.
|
|
|
|
# You can generate a strong key using `openssl rand -base64 42`.
|
2024-06-28 17:37:52 +08:00
|
|
|
API_KEY: ${API_KEY:-dify-sandbox}
|
|
|
|
GIN_MODE: ${GIN_MODE:-release}
|
|
|
|
WORKER_TIMEOUT: ${WORKER_TIMEOUT:-15}
|
|
|
|
ENABLE_NETWORK: ${ENABLE_NETWORK:-true}
|
|
|
|
HTTP_PROXY: ${HTTP_PROXY:-http://ssrf_proxy:3128}
|
|
|
|
HTTPS_PROXY: ${HTTPS_PROXY:-http://ssrf_proxy:3128}
|
|
|
|
SANDBOX_PORT: ${SANDBOX_PORT:-8194}
|
2024-05-13 14:39:14 +08:00
|
|
|
volumes:
|
|
|
|
- ./volumes/sandbox/dependencies:/dependencies
|
|
|
|
networks:
|
|
|
|
- ssrf_proxy_network
|
|
|
|
|
|
|
|
# ssrf_proxy server
|
|
|
|
# for more information, please refer to
|
|
|
|
# https://docs.dify.ai/getting-started/install-self-hosted/install-faq#id-16.-why-is-ssrf_proxy-needed
|
|
|
|
ssrf_proxy:
|
|
|
|
image: ubuntu/squid:latest
|
|
|
|
restart: always
|
2024-06-28 17:37:52 +08:00
|
|
|
volumes:
|
|
|
|
- ./ssrf_proxy/squid.conf.template:/etc/squid/squid.conf.template
|
|
|
|
- ./ssrf_proxy/docker-entrypoint.sh:/docker-entrypoint.sh
|
|
|
|
entrypoint: /docker-entrypoint.sh
|
2024-04-08 18:51:46 +08:00
|
|
|
ports:
|
2024-05-13 14:39:14 +08:00
|
|
|
- "3128:3128"
|
2024-04-08 18:51:46 +08:00
|
|
|
- "8194:8194"
|
2024-06-28 17:37:52 +08:00
|
|
|
environment:
|
|
|
|
# pls clearly modify the squid env vars to fit your network environment.
|
|
|
|
HTTP_PORT: ${HTTP_PORT:-3128}
|
|
|
|
COREDUMP_DIR: ${COREDUMP_DIR:-/var/spool/squid}
|
|
|
|
REVERSE_PROXY_PORT: ${REVERSE_PROXY_PORT:-8194}
|
|
|
|
SANDBOX_HOST: ${SANDBOX_HOST:-sandbox}
|
|
|
|
SANDBOX_PORT: ${SANDBOX_PORT:-8194}
|
2024-05-13 14:39:14 +08:00
|
|
|
networks:
|
|
|
|
- ssrf_proxy_network
|
|
|
|
- default
|
|
|
|
|
|
|
|
networks:
|
|
|
|
# create a network between sandbox, api and ssrf_proxy, and can not access outside.
|
|
|
|
ssrf_proxy_network:
|
|
|
|
driver: bridge
|
|
|
|
internal: true
|