Spaces:
Paused
Paused
| services: | |
| # The postgres database. | |
| db: | |
| image: postgres:15-alpine | |
| restart: always | |
| env_file: | |
| - ./middleware.env | |
| environment: | |
| POSTGRES_PASSWORD: ${POSTGRES_PASSWORD:-difyai123456} | |
| POSTGRES_DB: ${POSTGRES_DB:-dify} | |
| PGDATA: ${PGDATA:-/var/lib/postgresql/data/pgdata} | |
| command: > | |
| postgres -c 'max_connections=${POSTGRES_MAX_CONNECTIONS:-100}' | |
| -c 'shared_buffers=${POSTGRES_SHARED_BUFFERS:-128MB}' | |
| -c 'work_mem=${POSTGRES_WORK_MEM:-4MB}' | |
| -c 'maintenance_work_mem=${POSTGRES_MAINTENANCE_WORK_MEM:-64MB}' | |
| -c 'effective_cache_size=${POSTGRES_EFFECTIVE_CACHE_SIZE:-4096MB}' | |
| volumes: | |
| - ${PGDATA_HOST_VOLUME:-./volumes/db/data}:/var/lib/postgresql/data | |
| ports: | |
| - "${EXPOSE_POSTGRES_PORT:-5432}:5432" | |
| healthcheck: | |
| test: [ "CMD", "pg_isready" ] | |
| interval: 1s | |
| timeout: 3s | |
| retries: 30 | |
| # The redis cache. | |
| redis: | |
| image: redis:6-alpine | |
| restart: always | |
| volumes: | |
| # Mount the redis data directory to the container. | |
| - ${REDIS_HOST_VOLUME:-./volumes/redis/data}:/data | |
| # Set the redis password when startup redis server. | |
| command: redis-server --requirepass difyai123456 | |
| ports: | |
| - "${EXPOSE_REDIS_PORT:-6379}:6379" | |
| healthcheck: | |
| test: [ "CMD", "redis-cli", "ping" ] | |
| # The DifySandbox | |
| sandbox: | |
| image: langgenius/dify-sandbox:0.2.10 | |
| restart: always | |
| environment: | |
| # The DifySandbox configurations | |
| # Make sure you are changing this key for your deployment with a strong key. | |
| # You can generate a strong key using `openssl rand -base64 42`. | |
| API_KEY: ${SANDBOX_API_KEY:-dify-sandbox} | |
| GIN_MODE: ${SANDBOX_GIN_MODE:-release} | |
| WORKER_TIMEOUT: ${SANDBOX_WORKER_TIMEOUT:-15} | |
| ENABLE_NETWORK: ${SANDBOX_ENABLE_NETWORK:-true} | |
| HTTP_PROXY: ${SANDBOX_HTTP_PROXY:-http://ssrf_proxy:3128} | |
| HTTPS_PROXY: ${SANDBOX_HTTPS_PROXY:-http://ssrf_proxy:3128} | |
| SANDBOX_PORT: ${SANDBOX_PORT:-8194} | |
| volumes: | |
| - ./volumes/sandbox/dependencies:/dependencies | |
| - ./volumes/sandbox/conf:/conf | |
| healthcheck: | |
| test: [ "CMD", "curl", "-f", "http://localhost:8194/health" ] | |
| networks: | |
| - ssrf_proxy_network | |
| # ssrf_proxy server | |
| # for more information, please refer to | |
| # https://docs.dify.ai/learn-more/faq/install-faq#id-18.-why-is-ssrf_proxy-needed | |
| ssrf_proxy: | |
| image: ubuntu/squid:latest | |
| restart: always | |
| volumes: | |
| - ./ssrf_proxy/squid.conf.template:/etc/squid/squid.conf.template | |
| - ./ssrf_proxy/docker-entrypoint.sh:/docker-entrypoint-mount.sh | |
| entrypoint: [ "sh", "-c", "cp /docker-entrypoint-mount.sh /docker-entrypoint.sh && sed -i 's/\r$$//' /docker-entrypoint.sh && chmod +x /docker-entrypoint.sh && /docker-entrypoint.sh" ] | |
| environment: | |
| # pls clearly modify the squid env vars to fit your network environment. | |
| HTTP_PORT: ${SSRF_HTTP_PORT:-3128} | |
| COREDUMP_DIR: ${SSRF_COREDUMP_DIR:-/var/spool/squid} | |
| REVERSE_PROXY_PORT: ${SSRF_REVERSE_PROXY_PORT:-8194} | |
| SANDBOX_HOST: ${SSRF_SANDBOX_HOST:-sandbox} | |
| SANDBOX_PORT: ${SANDBOX_PORT:-8194} | |
| ports: | |
| - "${EXPOSE_SSRF_PROXY_PORT:-3128}:${SSRF_HTTP_PORT:-3128}" | |
| - "${EXPOSE_SANDBOX_PORT:-8194}:${SANDBOX_PORT:-8194}" | |
| networks: | |
| - ssrf_proxy_network | |
| - default | |
| # The Weaviate vector store. | |
| weaviate: | |
| image: semitechnologies/weaviate:1.19.0 | |
| profiles: | |
| - "" | |
| - weaviate | |
| restart: always | |
| volumes: | |
| # Mount the Weaviate data directory to the container. | |
| - ${WEAVIATE_HOST_VOLUME:-./volumes/weaviate}:/var/lib/weaviate | |
| env_file: | |
| - ./middleware.env | |
| environment: | |
| # The Weaviate configurations | |
| # You can refer to the [Weaviate](https://weaviate.io/developers/weaviate/config-refs/env-vars) documentation for more information. | |
| PERSISTENCE_DATA_PATH: ${WEAVIATE_PERSISTENCE_DATA_PATH:-/var/lib/weaviate} | |
| QUERY_DEFAULTS_LIMIT: ${WEAVIATE_QUERY_DEFAULTS_LIMIT:-25} | |
| AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED: ${WEAVIATE_AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED:-false} | |
| DEFAULT_VECTORIZER_MODULE: ${WEAVIATE_DEFAULT_VECTORIZER_MODULE:-none} | |
| CLUSTER_HOSTNAME: ${WEAVIATE_CLUSTER_HOSTNAME:-node1} | |
| AUTHENTICATION_APIKEY_ENABLED: ${WEAVIATE_AUTHENTICATION_APIKEY_ENABLED:-true} | |
| AUTHENTICATION_APIKEY_ALLOWED_KEYS: ${WEAVIATE_AUTHENTICATION_APIKEY_ALLOWED_KEYS:-WVF5YThaHlkYwhGUSmCRgsX3tD5ngdN8pkih} | |
| AUTHENTICATION_APIKEY_USERS: ${WEAVIATE_AUTHENTICATION_APIKEY_USERS:-hello@dify.ai} | |
| AUTHORIZATION_ADMINLIST_ENABLED: ${WEAVIATE_AUTHORIZATION_ADMINLIST_ENABLED:-true} | |
| AUTHORIZATION_ADMINLIST_USERS: ${WEAVIATE_AUTHORIZATION_ADMINLIST_USERS:-hello@dify.ai} | |
| ports: | |
| - "${EXPOSE_WEAVIATE_PORT:-8080}:8080" | |
| networks: | |
| # create a network between sandbox, api and ssrf_proxy, and can not access outside. | |
| ssrf_proxy_network: | |
| driver: bridge | |
| internal: true | |