Sandbox quickstart
RAGFlow's CodeExec agent component needs a sandbox provider to run Python and JavaScript code.
The simplest setup flow is:
- Start the required sandbox services.
- Open the RAGFlow admin page.
- Go to Admin > Sandbox Settings.
- Choose a provider and save the configuration.
- Test the connection in the same page.
Admin page
Configure sandbox providers from the admin page:
self_managed: Uses the executor manager service.local: Runs code on the current machine.ssh: Runs code on a remote machine over SSH.aliyun_codeinterpreterande2b: Cloud providers.
Provider options
RAGFlow supports multiple sandbox providers. Configure the active provider in Admin > Sandbox Settings after the services are up.
self_managed: Runs code inside Docker-managed sandbox containers. This is the default provider.local: Runs code as local Python or Node.js subprocesses. Use this only in trusted development environments.ssh: Runs code on a remote machine over SSH.aliyun_codeinterpreterande2b: Cloud-hosted providers that remain available in the admin provider list.
Prerequisites
- Linux distribution compatible with gVisor.
- gVisor installed and configured.
- Docker version 25.0 or higher (API 1.44+). Ensure your executor manager image ships with Docker CLI
29.1.0or higher to stay compatible with the latest Docker daemons. - Docker Compose version 2.26.1 or higher (similar to RAGFlow requirements).
- uv package and project manager installed.
- (Optional) GNU Make for simplified command-line management.
The error message client version 1.43 is too old. Minimum supported API version is 1.44 indicates that your executor manager image's built-in Docker CLI version is lower than 29.1.0 required by the Docker daemon in use.
Build Docker base images
The sandbox uses isolated base images for secure containerized execution environments.
Option 1: Build from source
Build the runtime base images:
docker build -t sandbox-base-python:latest ./sandbox_base_image/python
docker build -t sandbox-base-nodejs:latest ./sandbox_base_image/nodejs
Alternatively, build all base images at once using the Makefile:
make build
Build the executor manager image:
docker build -t sandbox-executor-manager:latest ./executor_manager
Option 2: Pull base images from Docker Hub
If you do not need to customize runtime dependencies, pull the published base images and tag them with the names used by standalone Docker Compose:
docker pull infiniflow/sandbox-base-python:latest
docker pull infiniflow/sandbox-base-nodejs:latest
docker tag infiniflow/sandbox-base-python:latest sandbox-base-python:latest
docker tag infiniflow/sandbox-base-nodejs:latest sandbox-base-nodejs:latest
Then restart the standalone sandbox services:
docker compose -f docker-compose.yml down
docker compose -f docker-compose.yml up -d
Running with RAGFlow
-
Verify that gVisor is properly installed and operational.
-
Configure the .env file located at docker/.env:
- Set
SANDBOX_ENABLED=1. - Include
sandboxinCOMPOSE_PROFILESif you want the defaultself_managedexecutor-manager service. - Keep the self-managed deployment defaults in
.envif you need to change the sandbox-executor-manager image, pool size, base images, seccomp, memory, or timeout.
-
Add the following entry to your /etc/hosts file to resolve the executor manager service:
127.0.0.1 es01 infinity mysql minio redis sandbox-executor-manager -
Start the RAGFlow service as usual.
-
Open Admin > Sandbox Settings.
-
Select a provider.
-
Fill in the required fields.
-
Click Save.
-
Click Test Connection if needed.
Environment variables
The variables in docker/.env are grouped by scope.
System-level variables
These variables apply to sandbox support in general:
SANDBOX_ENABLED: Enables sandbox support in RAGFlow.COMPOSE_PROFILES: Includesandboxto start the default self-managed executor-manager service.SANDBOX_ARTIFACT_BUCKET: MinIO bucket used for files generated by sandbox code.SANDBOX_ARTIFACT_EXPIRE_DAYS: Number of days before sandbox artifacts expire.
Self-managed deployment defaults
These variables are shown in Admin as deployment defaults for self_managed.
Changing them requires restarting sandbox-executor-manager.
SANDBOX_EXECUTOR_MANAGER_IMAGE: Docker image for the executor manager service.SANDBOX_EXECUTOR_MANAGER_POOL_SIZE: Number of Python and Node.js sandbox containers kept in the pool.SANDBOX_BASE_PYTHON_IMAGE: Python runtime image used by executor-managed containers.SANDBOX_BASE_NODEJS_IMAGE: Node.js runtime image used by executor-managed containers.SANDBOX_EXECUTOR_MANAGER_PORT: Host port exposed by the executor manager.SANDBOX_ENABLE_SECCOMP: Enables the optional seccomp profile for sandbox containers.SANDBOX_MAX_MEMORY: Memory limit for each sandbox runtime container.SANDBOX_TIMEOUT: Default execution timeout.
Admin-managed runtime settings
Provider selection and runtime settings are configured in Admin > Sandbox Settings.
Examples:
- Choose the active provider
- Configure
self_managedruntime settings - Configure all
localsettings - Configure all
sshsettings
For self_managed:
- Runtime settings are editable in Admin
- Deployment defaults come from
.envand are shown as read-only values
Running standalone
Manual setup
-
Initialize the environment variables:
cp .env.example .env -
Launch the sandbox services with Docker Compose:
docker compose -f docker-compose.yml up -
Test the sandbox setup:
source .venv/bin/activate
export PYTHONPATH=$(pwd)
uv pip install -r executor_manager/requirements.txt
uv run tests/sandbox_security_tests_full.py
Using Makefile
Run all setup, build, launch, and tests with a single command:
make
Monitoring
To follow logs of the executor manager container:
docker logs -f sandbox-executor-manager
Or use the Makefile shortcut:
make logs