Docker is a good platform for trying out docassemble for the first time. It is also ideal in a production environment. Amazon’s EC2 Container Service can be used to maintain a cluster of docassemble web server instances, created from Docker images, that communicate with a central server. For information about how to install docassemble in a multi-server arrangement on EC2 Container Service (“ECS”), see the scalability section.
First, make sure you are running Docker on a computer or virtual computer with at least 1GB of memory and 20GB of hard drive space.
If you have a Windows PC, follow the Docker installation instructions for Windows.
If you have a Mac, follow the Docker installation instructions for OS X.
On Ubuntu (assuming username
On Amazon Linux (assuming the username
usermod line allows the non-root user to run Docker. You may
need to log out and log back in again for this new user permission to
Docker will probably start automatically after it is installed. On
Linux, you many need to do
sudo /etc/init.d/docker start,
systemctl start docker, or
sudo service docker start.
Once Docker is installed, you can install and run docassemble from the command line.
To get a command line on Windows, run Windows PowerShell.
To get a command line on a Mac, launch the Terminal application.
From the command line, simply type in:
docker run command will download and run docassemble,
making the application available on the standard HTTP port (port 80)
of your machine.
It will take several minutes for docassemble to download, and once
docker run command finishes, docassemble will start to
run. After a few minutes, you can point your web browser to the
hostname of the machine that is running Docker. If you are running
Docker on your own computer, this address is probably
Using the web browser, you can log in using the default username ([email protected]) and password (“password”), and make changes to the configuration from the menu.
If you are already using port 80 on your machine, call
-p 8080:80 instead of
docker run command, the
-d flag means that the container
will run in the background.
-p flag maps a port on the host machine to a port on the
Docker container. In this example, port 80 on the host machine will
map to port 80 within the Docker container. If you are already
using port 80 on the host machine, you could use
-p 8080:80, and
then port 8080 on the host machine would be passed through to port 80
on the Docker container.
jhpyle/docassemble tag refers to a Docker image that is
hosted on Docker Hub. The image is about 4GB in size. It is an
automated build based on the “master” branch of the
docassemble repository on GitHub.
Shut down the container by running:
By default, Docker gives containers ten seconds to shut down before
forcibly shutting them down. Usually, ten seconds is plenty of time,
but if the server is slow, docassemble might take a little longer
than ten seconds to shut down. To be on the safe side, give the
container plenty of time to shut down gracefully. The
-t 60 means
that Docker will wait up to 60 seconds before forcibly shutting down
the container. It will probably take no more than 15 seconds for the
docker stop command to complete.
It is very important to avoid a forced shutdown of docassemble. The container runs a PostgreSQL server, and the data files of the server may become corrupted if PostgreSQL is not gracefully shut down. To facilitate data storage (more on this later), docassemble backs up your data during the shutdown process and restores from that backup during the initialization process. If the shutdown process is interrupted, your data may be left in an inconsistent state and there may be errors during later initialization.
To see a list of stopped containers, run
docker ps -a. To remove a
docker rm <containerid>.
You should not need to access the running container in order to get docassemble to work, and all the log files you need will hopefully be available from “Logs” in the web browser. However, you might want to gain access to the running container for some reason.
To do so, find out the ID of the running container by doing
docker ps. You will see output like the following:
The ID is in the first column. Then run:
using your own ID in place of
e4fa52ba540e. This will give you a
command prompt within the running container.
The first thing to check when you connect to a container is:
The output should be something like:
If you are running docassemble in a single-server arrangement, the processes that should be “RUNNING” include apache2, celery, initialize, postgres, rabbitmq, redis, watchdog, and websockets.
Log files on the container that you might wish to check include:
- Other files in
exit to leave the container and get back to your standard
In the example above, we started
docker run -d -p 80:80 jhpyle/docassemble.
This command will cause docassemble to use default values for all
configuration options. You can also communicate specific
configuration options to the container.
The recommended way to do this is to create a text file called
in the current working directory containing variable definitions in
standard shell script format. For example:
Then, you can pass these environment variables to the container using
docker run command:
These configuration options will cause the Apache configuration file
to use docassemble.example.com as the
ServerName and use HTTPS
with certificates hosted on Let’s Encrypt. (The directive
443:443 is included so that the HTTPS port is exposed.)
A template for the
env.list file is included in distribution.
When running docassemble in ECS, environment variables like these are specified in JSON text that is entered into the web interface. (See the scalability section for more information about using ECS.)
You can set the following configuration options:
allor a colon-separated list of services (e.g.
sql:log:redis, etc.). The options are:
all: the Docker container will run all of the services of docassemble on a single container.
web: The Docker container will serve as a web server.
celery: The Docker container will serve as a Celery node.
sql: The Docker container will run the central PostgreSQL service.
redis: The Docker container will run the central Redis service.
rabbitmq: The Docker container will run the central RabbitMQ service.
log: The Docker container will run the central log aggregation service.
SERVERHOSTNAME: In a multi-server arrangement, all docassemble application servers need to be able to communicate with each other using port 9001 (the supervisor port). All application servers “register” with the central SQL server. When they register, they each provide their hostname; that is, the hostname at which the specific individual application server can be found. Then, when an application server wants to send a message to the other application servers, the application server can query the central SQL server to get a list of hostnames of other application servers. This is necessary so that any one application server can send a signal to the other application servers to install a new package or new version of a package, so that all servers are running the same software. If you are running docassemble in a multi-server arrangement, and you are starting an application server, set
SERVERHOSTNAMEto the hostname with which other application servers can find that server. Note that you do not need to worry about setting
SERVERHOSTNAMEif you are using EC2.
DBHOST: The hostname of the PostgreSQL server. Keep undefined or set to
nullin order to use the PostgreSQL server on the same host. This environment variable, along with others that begin with
DB, populates values in
dbsection of the configuration file.
DBNAME: The name of the PostgreSQL database. The default is
DBUSER: The username for connecting to the PostgreSQL server. The default is
DBPASSWORD: The password for connecting to the SQL server. The default is
DBPREFIX: This sets the prefix for the database specifier. The default is
DBPORT: This sets the port that docassemble will use to access the SQL server.
DBTABLEPREFIX: This allows multiple separate docassemble implementations to share the same SQL database. The value is a prefix to be added to each table in the database.
EC2: Set this to
Trueif you are running Docker on EC2. This tells docassemble that it can use an EC2-specific method of determining the hostname of the server on which it is running. See the
USEHTTPS: Set this to
Trueif you would like docassemble to communicate with the browser using encryption. Read the HTTPS section for more information. Defaults to
False. See the
use httpsconfiguration directive.
DAHOSTNAME: Set this to the hostname by which web browsers can find docassemble. This is necessary for HTTPS to function. See the
external hostnameconfiguration directive.
USELETSENCRYPT: Set this to
Trueif you are using Let’s Encrypt. The default is
False. See the
use lets encryptconfiguration directive.
LETSENCRYPTEMAIL: Set this to the e-mail address you use with Let’s Encrypt. See the
lets encrypt emailconfiguration directive.
LOGSERVER: This is used in the multi-server arrangement where there is a separate server for collecting log messages. The default is
none, which causes the server to run Syslog-ng. See the
log serverconfiguration directive.
REDIS: If you are running docassemble in a multi-server arrangement, set this to the host name at which the Redis server can be accessed. See the
RABBITMQ: If you are running docassemble in a multi-server arrangement, set this to the host name at which the RabbitMQ server can be accessed. Note that RabbitMQ is very particular about hostnames. If the RabbitMQ server is running on a machine on which the
hostnamecommand evaluates to
abc, then your application servers will need to set
abcand nothing else. It is up to you to make sure that
abcresolves to an IP address. Note that if you run docassemble using the instructions in the scalability section, you do not need to worry about this. See the
URLROOT: If users access docassemble at https://docassemble.example.com, set
https://docassemble.example.com. See the
url rootconfiguration directive.
POSTURLROOT: If users access docassemble at https://docassemble.example.com/da, set
/da/. The trailing slash is important. If users access docassemble at https://docassemble.example.com, you can ignore this. The default value is
/. See the
BEHINDHTTPSLOADBALANCER: Set this to
Trueif a load balancer is in use and the load balancer accepts connections in HTTPS but forwards them to web servers as HTTP. This lets docassemble know that when it forms URLs, it should use the
httpsscheme even though requests appear to be coming in as HTTP requests. See the
behind https load balancerconfiguration directive.
S3ENABLE: Set this to
Trueif you are using S3 as a repository for uploaded files, Playground files, the configuration file, and other information. This environment variable, along with others that begin with
S3, populates values in
s3section of the configuration file. If this is unset, but
S3BUCKETis set, it will be assumed to be
S3BUCKET: If you are using S3, set this to the bucket name. Note that docassemble will not create the bucket for you. You will need to create it for yourself beforehand.
S3ACCESSKEY: If you are using S3, set this to the S3 access key. You can ignore this environment variable if you are using EC2 with an IAM role that allows access to your S3 bucket.
S3SECRETACCESSKEY: If you are using S3, set this to the S3 access secret. You can ignore this environment variable if you are using EC2 with an IAM role that allows access to your S3 bucket.
AZUREENABLE: Set this to
Trueif you are using Azure blob storage as a repository for uploaded files, Playground files, the configuration file, and other information. This environment variable, along with others that begin with
AZURE, populates values in
azuresection of the configuration file. If this is unset, but
AZURECONTAINERare set, it will be assumed to be
AZURECONTAINER: If you are using Azure blob storage, set this to the container name. Note that docassemble will not create the container for you. You will need to create it for yourself beforehand.
AZUREACCOUNTNAME: If you are using Azure blob storage, set this to the account name.
AZUREACCOUNTKEY: If you are using Azure blob storage, set this to the account key.
TIMEZONE: You can use this to set the time zone of the server. The value of the variable is stored in
dpkg-reconfigure -f noninteractive tzdatais run in order to set the system time zone. The default is
America/New_York. See the
LOCALE: You can use this to enable a locale on the server. When the server starts, the value of
LOCALEis appended to
update-localeare run. The default is
en_US.UTF-8 UTF-8. See the
os localeconfiguration directive.
OTHERLOCALES: You can use this to set up other locales on the system besides the default locale. Set this to a comma separated list of locales. The values need to match entries in Debian’s
/etc/locale.gen. See the
other os localesconfiguration directive.
PACKAGES: If your interviews use code that depends on certain Debian packages being installed, you can provide a comma-separated list of Debian packages in the
PACKAGESenvironment variable. The packages will be installed when the image is run. See the
debian packagesconfiguration directive.
For example, if
True, then the Apache configuration files, if stored on a
persistent volume, will not be overwritten if they already exist when
a new container starts up. So if you had been using Let’s Encrypt,
but then you decide to change the
DAHOSTNAME, you will need to
delete the saved configuration before running a new container. If you
are using S3, you can go to the S3 Console and
delete the “Apache” folder and the “letsencrypt.tar.gz” file. If you
are using Azure blob storage, you can go to the
Azure Portal and delete the “Apache” folder and the
Also, if a configuration file exists on S3/Azure blob storage (
config.yml) or in a
persistent volume (
the values in that configuration will take precedence over the
corresponding environment variables that are passed to Docker. Once
a configuration file exists, you should make changes to the
configuration file rather than passing environment variables to
Docker. However, if your configuration is on S3/Azure blob storage, you will at least need to
pass sufficient access keys (e.g.,
etc.) to access the storage; otherwise your container will not know
where to find the configuration. Also, there are some environment
variables that do not exist in the configuration file because they are
server-specific. These include
Docker containers are volatile. They are designed to be run, turned off, and destroyed. When using Docker, the best way to upgrade docassemble to a new version is to destroy and rebuild your containers.
But what about your data? If you run docassemble, you are
accumulating valuable data in SQL, in files, and in Redis. If your
data are stored on the Docker container, they will be destroyed by
There are two ways around this problem. The first, and most
preferable solution, is to get an account on Amazon Web Services
(AWS) or Microsoft Azure. If you use AWS, create an S3 bucket
for your data, and then when you launch your container, set the
S3BUCKET and associated environment variables. If you use
Microsoft Azure, create an Azure blob storage resource, and a
blob storage container within it, and then when you launch your
container, set the
AZURECONTAINER environment variables. When
docker stop is run, docassemble will backup the SQL database,
the Redis database, the configuration, and your uploaded files to
your S3 bucket or blob storage container. Then, when you issue a
docker run command with environment variables pointing
docassemble to your S3 bucket/Azure blob storage resource,
docassemble will make restore from the backup. You can
docker rm your container and your data will persist in the cloud.
The second way is to use persistent volumes, which is a feature of Docker. This will store the data in directories on the Docker host, so that when you destroy the container, these directories will be untouched, and when you start up a new container, it will use the saved directories.
These two options are explained in the following subsections.
To use S3 for persistent storage, sign up with
Amazon Web Services, go to the S3 Console, click “Create Bucket,”
and pick a name. If your site is at docassemble.example.com, a good
name for the bucket is
docassemble-example-com. (Client software
will have trouble accessing your bucket if it contains
characters.) Under “Region,” pick the region nearest you.
Then you need to obtain an access key and a secret access key for
S3. To obtain these credentials, go to IAM Console and create a
user with “programmatic access.” Under “Attach existing policies
directly,” find the policy called
AmazonS3FullAccess and attach it
to the user.
Note that if you run docassemble on EC2, you can launch your
EC2 instances with an IAM role that allows docassemble to
access to an S3 bucket without the necessity of setting
S3SECRETACCESSKEY. In this case, the only
environment variable you need to pass is
These secret access keys will become available to all developers who
use your docassemble server, since they are in the configuration
file. If you want to limit access to a particular bucket, you do not
have to use the
AmazonS3FullAccess policy when obtaining S3
credentials. Instead, you can create your own policy with the
docassemble-example-com in the above text with the name of
your S3 bucket.
Using Microsoft Azure is very similar to using S3. From the Azure Portal dashboard, search for “Storage accounts” in the “Resources.” Click “Add” to create a new storage account. Under “Deployment model,” choose “Resource manager.” Under “Account kind,” choose “Blob storage.” Under Performance, choose “Access tier,” you can choose either “Cool” or “Hot,” but you may have to pay more for “Hot.”
Once the storage account is created, go into it and click “+
Container” to add a new container. Set the “Access type” to
“Private.” The name of the container corresponds with the
AZURECONTAINER environment variable. Back at the storage account,
click “Access keys.” The “Storage account name” corresponds with the
AZUREACCOUNTNAME. The “key1” corresponds
AZUREACCOUNTKEY environment variable. (You can also use
To run docassemble in a single-server arrangement in such a way that the configuration, the Playground files, the uploaded files, and other data persist after the Docker container is removed or updated, run the image as follows:
--env-file=env.list is an optional parameter that refers to a
env.list containing environment variables for the
configuration. A template for the
env.list file is included in
An advantage of using persistent volumes is that you can completely
replace the docassemble container and rebuild it from scratch, and
jhpyle/docassemble image again, docassemble will
keep running where it left off.
If you are using HTTPS with your own certificates (as opposed to
using Let’s Encrypt), you can use a persistent volume to provide the
certificates to the Docker container. Just add
dacerts:/usr/share/docassemble/certs to your
docker run command.
To see what volumes exist on your Docker system, you can run:
For example, if you are using HTTPS with your own certificates, and
you need to update the certificates your server should use, you can
find the path where the
dacerts volume lives (
docker volume inspect
dacerts), copy your certificates to that path (
/var/lib/docker/volumes/dacerts/data/docassemble.key), and then stop
the container (
docker stop -t 60 <containerid>) and start it again
docker start <containerid>).
To delete all of the volumes, do:
- S3 and Azure blob storage make scaling easier. They are the “cloud” way of storing persistent data, at least until cloud-based network file systems become more robust.
- It is easier to upgrade your virtual machines to the latest software and operating system if you can just destroy them and recreate them, rather than running update scripts. If your persistent data is stored in the cloud, you can destroy and recreate virtual machines at will, without ever having to worry about copying your data on and off the machines.
Services on different machines
The docassemble application consists of several services, some of which are singular and some of which can be plural.
The singular services include:
- RabbitMQ for coordinating background processes
- The docassemble log message aggregator
- A cron service that runs scheduled tasks and housekeeping functions
The (potentially) plural services include:
- Web servers
- Celery nodes
The docassemble Docker container will run any subset of these
six services, depending on the value of the environment variable
CONTAINERROLE, which is passed to the container at startup. In a
single-server arrangement (
all, or left
undefined), the container runs all of the services (except the log
message aggregator, which is not necessary in the case of a
In a multi-server arrangement, you can have one machine run SQL, another machine run Redis and RabbitMQ, and any number of machines run web servers and Celery nodes. You can decide how to allocate services to different machines. For example, you might want to run central tasks on a powerful server, while running many web servers on less powerful machines.
Since the SQL, Redis, and RabbitMQ services are standard services, they do not have to be run from docassemble Docker containers. For example, if you are already running a SQL server, a Redis server, and a RabbitMQ server, you could just point docassemble to those resources.
- Regardless of the
CONTAINERROLE, port 9001 needs to be forwarded so that the container can be controlled via supervisor.
sql: forward port 5432 (Postgresql)
web: forward ports 80 (HTTP) and 443 (HTTPS)
log: forward ports 514 (Syslog-ng) and 8080 (custom web server)
redis: forward port 6379 (Redis)
rabbitmq: forward ports 4369, 5671, 5672, and 25672 (RabbitMQ).
Note that Docker will fail if any of these ports is already in use.
For example, many Linux distributions run a mail tranport agent on
port 25 by default; you will have to stop that service in order to
start Docker with
If you run multiple docassemble Docker containers on different machines, the containers will need to have a way to share files with one another.
One way to share files among containers is to make
/usr/share/docassemble/ a persistent volume on a network file
system. This directory contains the configuration, SSL certificates,
Python virtual environment, and uploaded files. However, network
file systems present problems.
Note that when you use the cloud (S3 or
Azure blob storage) for data storage,
docassemble will copy the
config.yml file out of the cloud on
startup, and save
config.yml to the cloud whenever the configuration
This means that as long as there is a
config.yml file in the cloud
with the configuration you want, you can start docassemble
containers without specifying a lot of configuration options; you
simply have to refer to your cloud storage bucket/container, and
docassemble will take it from there. For example, to run a
central server, you can do:
To run an application server, you can do:
If you are running docassemble on EC2, the easiest way to enable HTTPS support is to set up an Application Load Balancer that accepts connections in HTTPS format and forwards them to the web servers in HTTP format. In this configuration Amazon takes care of creating and hosting the necessary SSL certificates.
If you are running docassemble in a single-server arrangement, or in a multi-server arrangement with only one web server, you can use Let’s Encrypt to enable HTTPS. If you have more than one web server, you can enable encryption without Let’s Encrypt by installing your own certificates.
To use Let’s Encrypt, set the following environment variables in
your task definition or
USELETSENCRYPT: set this to
LETSENCRYPTEMAIL: Let’s Encrypt requires an e-mail address, which it will use to get in touch with you about renewing the SSL certificates.
DAHOSTNAME: set this to the hostname that users will use to get to the web application. Let’s Encrypt needs this in order to verify that you have access to the host.
USEHTTPS: set this to
For example, your
env.list may look like:
The first time the server is started, the
letsencrypt utility will
be run, which will change the Apache configuration in order to use the
appropriate SSL certificates. When the server is later restarted,
letsencrypt renew command will be run, which will refresh the
certificates if they are within 30 days of expiring.
In addition, a script will run on a weekly basis to attempt to renew the certificates.
If you are using a multi-server arrangement with a single web
server, you need to run the
cron role on the same server that runs
web role. If you use the e-mail receiving feature with
TLS encryption, the
Using your own SSL certificates with Docker requires that your SSL certificates reside within each container. There are several ways to accomplish this:
- Use S3 or Azure blob storage and upload the certificates to your bucket/container.
- Build your own private image in which your SSL certificates are
Docker/apache.ca.pem. During the build process, these files will be copied into
- Use persistent volumes and copy the SSL certificate files
apache.ca.pem) into the volume for
/usr/share/docassemble/certsbefore starting the container.
The default Apache configuration file expects SSL certificates to be located in the following files:
The meaning of these files is as follows:
apache.crt: this file is generated by your certificate authority when you submit a certificate signing request.
apache.key: this file is generated at the time you create your certificate signing request.
apache.ca.pem: this file is generated by your certificate authority. It is variously known as the “chain file” or the “root bundle.”
In order to make sure that these files are replicated on every web
server, the supervisor will run the
docassemble.webapp.install_certs module before starting the web
If you are using S3 or Azure blob storage, this module will copy
the files from the
certs/ prefix in your bucket/container to
/etc/ssl/docassemble. You can use the S3 Console or the
Azure Portal to create a folder called
certs and upload your
certificate files into that folder.
There are two ways that you can put your own certificate files into
/usr/share/docassemble/certs directory. The first way is to
create your own Docker image of docassemble and put your
certificates into the
Docker/ssl directory. The contents of this
directory are copied into
/usr/share/docassemble/certs during the
The second way is to use persistent volumes. If you have a
persistent volume called
certs for the directory
/usr/share/docassemble/certs, then you can run
inspect certs to get the directory on the Docker host corresponding
to this directory, and you can copy the SSL certificate files into
that directory before starting the container.
Note that the files need to be called
apache.ca.pem, because this is what the
standard web server configuration expects.
If you want to use different filesystem or cloud locations, the
docassemble.webapp.install_certs can be configured to use different
locations. See the configuration variables
cert install directory.
If you use the e-mail receiving feature, you can use TLS to
encrypt incoming e-mail communications. By default, docassemble
will install self-signed certificates into the Exim configuration,
but for best results you should use certificates that match your
incoming mail domain.
However, if you are running your
web, you will need to create
and install your own certificates. In addition, if your
incoming mail domain is different from your
DAHOSTNAME), then you will also need to install your own
If you are using S3 or
Azure blob storage, copy your certificate and
private key to the
certs folder of your S3 bucket or
Azure blob storage container, using the filenames
docassemble.webapp.install_certs will copy these files
into the appropriate location (
/etc/exim4) with the appropriate
ownership and permissions.
The simplest way to run docassemble is to give it a dedicated machine and run Docker on ports 80 and 443. However, if you have an existing machine that is already running a web server, it is possible to run docassemble on that machine using Docker. You can configure the web server on that machine to forward traffic to the Docker container.
The following example illustrates how to do this. Your situation will probably be different, but this example will still help you figure out how to configure your system.
In this example, we will show how to run docassemble using
Docker on an Ubuntu 16.04 server. The machine will run a web server
using encryption. The web server will be accessible at
https://justice.example.com and will serve resources other than
docassemble. The docassemble resources will be accessible at
https://justice.example.com/da. Docker will run on the machine
and will listen on port 8080. The web server will accept HTTPS
/da and forward them HTTP requests to port 8080. The
SSL certificate will be installed on the Ubuntu server, and the
Docker container will run an HTTP server. Docker will be
controlled by the user account
ubuntu, which is assumed to have
The last command changes the user privileges of the
For these changes to take effect, we need to log out and log in again.
(E.g., exit the ssh session and start a new one.)
and add the following lines, replacing any other lines that
We then do the same with the HTTPS configuration.
Now, let’s enable some necessary components of Apache:
We can test whether everything is working by going to
http://justice.example.com in a web browser. We should see the
default Apache page.
Once that is done, we are ready to run certbot.
When certbot asks “Please choose whether HTTPS access is required or optional,” we will select “Secure - Make all requests redirect to secure HTTPS access.” This will cause all HTTP traffic to be forwarded to HTTPS.
We can test whether the SSL certificates work by going to
https://justice.example.com. We should see the default Apache page
again, but with encryption this time.
Now we are ready to run docassemble. First we need to create a
short text file called
env.list that contains some configuration
options for docassemble.
Set the contents of
POSTURLROOT directive, which is set to
/da/, indicates the
path after the domain at which docassemble can be accessed. The
Apache web server will be able to provide other resources at other
/da/ will be reserved for the exclusive use of
docassemble. The beginning slash and the trailing slash are both
Now, let’s download, install, and run docassemble.
-p 8080:80 means that port 8080 on the Ubuntu
machine will be mapped to port 80 within the Docker container.
Now that docassemble is running, let’s configure Apache on the Ubuntu machine to forward requests to docassemble. Edit the HTTPS configuration file:
Add the following lines within the
Then restart the web server:
Now, when we go to
https://justice.example.com/da, we will see the
docassemble demo interview.
Then download docassemble:
To make changes to the configuration of the docassemble application that will be installed in the image, edit the following files:
docassemble/Dockerfile: you may want to change the locale and the Debian mirror; the standard “httpredir” mirror can lead to random packages not being downloaded, depending on which mirrors it chooses to use.
docassemble/Docker/config/config.yml.dist: you probably do not need to change this; it is a template that is updated based on the contents of the environment variables passed to
docker run. Once your server is up and running you can change the rest of the configuration in the web application.
docassemble/Docker/initialize.sh: this script updates
config.ymlbased on the environment variables; retrieves a new version of
config.ymlfrom S3/Azure blob storage, if available; if
CONTAINERROLEis not set to
web, starts the PostgreSQL server and initializes the database if it does not exist; creates the tables in the database if they do not already exist; copies SSL certificates from S3/Azure blob storage or
/usr/share/docassemble/certsif S3/Azure blob storage is not enabled; enables the Apache
Trueand otherwise disables it; runs the Let’s Encrypt utility if
Trueand the utility has not been run yet; and starts Apache and other background tasks.
docassemble/Docker/config/docassemble-http.conf.dist: Apache configuration file for handling HTTP requests. Note that if
mod_sslis enabled, HTTP will merely redirect to HTTPS.
docassemble/Docker/config/docassemble-ssl.conf.dist: Apache configuration file for handling HTTPS requests.
docassemble/Docker/config/docassemble-log.conf.dist: Apache configuration file for handling requests on port 8080. This is enabled if the
docassemble/Docker/ssl/apache.crt.orig: default SSL certificate for Apache.
docassemble/Docker/ssl/apache.key.orig: default SSL certificate for Apache.
docassemble/Docker/ssl/apache.ca.pem.orig: default SSL certificate for Apache.
docassemble/Docker/ssl/exim.crt.orig: default SSL certificate for Exim.
docassemble/Docker/ssl/exim.key.orig: default SSL certificate for Exim.
docassemble/Docker/docassemble.conf: Apache configuration file that causes Apache to use the Python virtualenv.
docassemble/Docker/docassemble-supervisor.conf: supervisor configuration file.
docassemble/Docker/docassemble-syslog-ng.conf: Syslog-ng configuration file used when
CONTAINERROLEdoes not include
docassemble/Docker/syslog-ng.conf: Syslog-ng configuration file used when
docassemble/Docker/rabbitmq.config: RabbitMQ configuration file.
docassemble/Docker/docassemble.logrotate: This file will be copied into
/etc/logrotate.dand will control the rotation of the docassemble log file in
docassemble/Docker/apache.logrotate: This replaces the standard apache logrotate configuration. It does not compress old log files, so that it is easier to view them in the web application.
docassemble/Docker/process-email.sh]: This is a script that is run when an e-mail is received, if the e-mail receiving feature is configured.
docassemble/Docker/run-apache.sh: This is a script that is run by supervisor to start the Apache server.
docassemble/Docker/run-celery.sh: This is a script that is run by supervisor to start the Celery server.
docassemble/Docker/run-cron.sh: This is a script that is run by supervisor to start the cron daemon.
docassemble/Docker/run-postgresql.sh: This is a script that is run by supervisor to start the PostgreSQL server.
docassemble/Docker/run-rabbitmq.sh: This is a script that is run by supervisor to start the RabbitMQ server.
docassemble/Docker/run-redis.sh: This is a script that is run by supervisor to start the Redis server.
docassemble/Docker/run-syslogng.sh: This is a script that is run by supervisor to start the Syslog-ng daemon.
docassemble/Docker/run-websockets.sh: This is a script that is run by supervisor to start the WebSocket server.
docassemble/Docker/reset.sh: This is a script that is run by supervisor to restart the web server, the Celery server, and the WebSocket server on a signal from a peer server.
docassemble/Docker/sync.sh: This is a script that is run by supervisor to synchronize log files.
docassemble/Docker/update.sh]: This is a script that is run by supervisor to update the software on the container.
To build the image, run:
You can then run your image:
Or push it to Docker Hub:
Upgrading docassemble when using Docker
As new versions of docassemble become available, you can obtain the latest version by running:
docker run commands will use the latest
When you are using Docker to run docassemble, you can upgrade
docassemble to the newest version simply by running
jhpyle/docassemble, then running
docker stop and
docker rm on
your docassemble container, followed by
docker run. Note,
docker rm will delete all of the data on the server
unless you are using a data storage system.
Cleaning up after Docker
If you run
docker pull to retrieve new versions of docassemble,
or you build your own docassemble images more than once, you may
find your disk space being used up. The full docassemble image is
about 4GB in size, and whenever you run
docker pull or build a new
image, a new image is created – the old image is not overwritten.
The following three lines will stop all containers, remove all containers, and then remove all of the images that Docker created during the build process.
The last line, which deletes images, frees up the most disk space. However, it may be necessary to remove the containers first, as the containers depend on the images.