- Added n8n service description to the list of available tools, highlighting its low-code capabilities and integrations.
- Removed duplicate n8n entry from the access URLs section for clarity and consistency.
- Reorganized and clarified the list of included services, ensuring consistent formatting and improved readability.
- Added new services such as ComfyUI, Crawl4ai, Grafana, and others while removing outdated entries.
- Updated access URLs for various services to reflect recent changes in the installation process.
- Changed POSTGRES_HOST value in .env.example from 'db' to 'postgres' for clarity.
- Enhanced the final report script to display detailed PostgreSQL backup target information, including version, host, port, username, password, and database name.
- Introduced Postgresus service in docker-compose.yml with necessary environment variables and volume configuration.
- Updated .env.example to include Postgresus credentials (username, password, password hash).
- Modified Caddyfile to implement basic authentication for Postgresus.
- Enhanced scripts for secret generation to include Postgresus credentials.
- Updated README.md to add a description for Postgresus and its functionalities.
- Enhanced final report script to display Postgresus connection details if the service is active.
- Added OLLAMA_BASE_URL environment variable to the open-webui service in docker-compose.yml.
- Updated the service descriptions in 04_wizard.sh to include new services and reorganize existing ones for clarity.
- Introduced a comprehensive guide in ADDING_NEW_SERVICE.md detailing the steps to add a new optional service, including modifications to docker-compose.yml, Caddyfile, .env.example, and relevant scripts.
- Included instructions for handling Basic Auth, secret generation, and service selection during installation.
- Updated README.md to include a description for the new service.
- Updated .env.example to include PaddleOCR credentials (username, password, password hash).
- Modified Caddyfile to implement basic authentication for PaddleOCR using the new credentials.
- Enhanced docker-compose.yml to pass PaddleOCR environment variables to the service.
- Updated scripts to generate and manage PaddleOCR password securely.
- Added PaddleOCR documentation link in README.md for user reference.
- Updated installation commands to use pip for better package management.
- Changed the command to serve PaddleOCR, ensuring compatibility with the latest paddlex package.
- Changed PaddleOCR image to a specific version (3.1.1) for stability.
- Removed unnecessary installation of git and wget, streamlining the setup process.
- Replaced Miniconda installation with direct installation of python3 and python3-pip for simplicity.
- Updated pip commands to use pip3 for consistency and compatibility.
- Removed unnecessary installation of bzip2 and ca-certificates.
- Replaced installation of python3 and python3-pip with Miniconda for better package management.
- Added bzip2 and ca-certificates to the installation commands.
- Updated pip commands to use the conda environment for installing paddlex and serving setup.
- Added python3 and python3-pip to the installation commands.
- Updated pip commands to use python3 and pip3 for compatibility.
- Ensured pip installs paddlex without cache to optimize image size.
- Adjusted the service selection wizard to dynamically set the height of the checklist based on the number of services.
- Updated final report script to provide clearer API access information for PaddleOCR, distinguishing between external and internal access.
- Added PaddleOCR hostname to .env.example for environment variable setup.
- Updated Caddyfile to include reverse proxy configuration for PaddleOCR.
- Modified docker-compose.yml to define PaddleOCR service with necessary commands and health checks.
- Enhanced service selection wizard to include PaddleOCR in the options.
- Updated final report script to display PaddleOCR service details if active.
- Removed Cloudflare Tunnel Token prompts from the secrets generation script.
- Added logic to handle Cloudflare Tunnel Token input in the service selection wizard.
- Updated final report script to simplify security notice related to Cloudflare Tunnel.
- Changed installation command to use 'sudo bash' for better permissions handling.
- Clarified that the Cloudflare Tunnel service must be enabled in the Service Selection Wizard.
- Updated README to provide a direct link to the Cloudflare instructions.
- Removed the dependency on the Caddy service in docker-compose.yml for the Cloudflare Tunnel.
- Updated prompts in the secret generation script to clarify that leaving the Cloudflare Tunnel Token empty will skip the input.
- Deleted POSTIZ_USERNAME, POSTIZ_PASSWORD, and POSTIZ_PASSWORD_HASH from .env.example and docker-compose.yml to streamline configuration.
- Removed basic authentication setup from Caddyfile for the Postiz service.
- Updated scripts to eliminate generation of Postiz-related secrets, enhancing security and simplifying setup.
- Renamed service dependencies for PostgreSQL and Redis to align with updated naming conventions.
- Ensured that service health checks are maintained for proper startup order and reliability.
- Changed restart policy to 'always' for improved service reliability.
- Updated environment variable syntax for consistency and added new variables for self-hosting and upload directory.
- Ensured proper volume configuration for Postiz service.
- Adjusted service dependencies to reflect new naming conventions for PostgreSQL and Redis services.
- Added POSTIZ_DISABLE_REGISTRATION variable to .env.example to manage user registration settings.
- Updated docker-compose.yml to utilize the new environment variable for controlling registration behavior in the Postiz service, enhancing configuration flexibility.
- Introduced FRONTEND_URL, NEXT_PUBLIC_BACKEND_URL, BACKEND_INTERNAL_URL, MAIN_URL, and STORAGE_PROVIDER variables to enhance service configuration.
- These additions improve the flexibility and connectivity of the Postiz service within the Docker environment.
- Updated .env.example to include new environment variables for Postiz, including authentication and social media integration settings.
- Modified Caddyfile to implement basic authentication for the Postiz service.
- Enhanced docker-compose.yml to incorporate Postiz environment variables and ensure proper service configuration.
- Updated scripts to generate Postiz-related secrets and included them in the final report for user reference.
- Introduced DATABASE_URL, REDIS_URL, and JWT_SECRET environment variables to the Postiz service configuration.
- This enhancement improves the service's connectivity and security by ensuring necessary configurations are set for database and Redis access.
- Updated the Postiz service configuration to include health check dependencies for PostgreSQL and Redis, ensuring that these services are healthy before Postiz starts.
- This enhancement improves service reliability and startup order in the Docker environment.
- Introduced Postiz as a new service in docker-compose.yml, including necessary environment variables and volume configurations.
- Updated Caddyfile to set up reverse proxy for Postiz.
- Enhanced README.md to document Postiz and its hostname for user reference.
- Modified scripts to include Postiz in the service selection wizard and final report for improved user guidance.
- Introduced a new section addressing common issues related to sites not loading after installation.
- Provided potential causes and solutions, including resource checks and minimal configuration testing to enhance user support and guidance.
- Introduced N8N_PAYLOAD_SIZE_MAX variable to configure the maximum payload size for the n8n service, enhancing data handling capabilities.
- This addition supports improved performance and stability in processing larger payloads.
- Refactored environment variables for the n8n service, including the addition of EXECUTIONS_MODE, LANGCHAIN_API_KEY, and other settings for improved functionality.
- Ensured consistency in database configuration and enabled binary data mode with a TTL setting.
- Updated webhook URL and trust proxy settings for enhanced security and performance.