fix
This commit is contained in:
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.alephzero-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.alephzero-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/alephzero-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=PathRegexp(`^/alephzero-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=PathRegex(`^/alephzero-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.alephzero-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.alephzero-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/alephzero-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=PathRegexp(`^/alephzero-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/alephzero-mainnet/?$`)}
|
||||||
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.alephzero-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.alephzero-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/alephzero-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=PathRegexp(`^/alephzero-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=PathRegex(`^/alephzero-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.alephzero-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.alephzero-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/alephzero-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-sepolia/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=PathRegexp(`^/alephzero-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/alephzero-sepolia/?$`)}
|
||||||
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-nova-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-nova-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/arbitrum-nova-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-nova-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=PathRegexp(`^/arbitrum-nova-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=PathRegex(`^/arbitrum-nova-archive/?$`)}
|
||||||
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-nova-nitro-pruned-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-nova-nitro-pruned-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/arbitrum-nova/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-nova/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=PathRegexp(`^/arbitrum-nova/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=PathRegex(`^/arbitrum-nova/?$`)}
|
||||||
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-one-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-one-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/arbitrum-one-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-one-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=PathRegexp(`^/arbitrum-one-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=PathRegex(`^/arbitrum-one-archive/?$`)}
|
||||||
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-one-nitro-pruned-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-one-nitro-pruned-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/arbitrum-one/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-one/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=PathRegexp(`^/arbitrum-one/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=PathRegex(`^/arbitrum-one/?$`)}
|
||||||
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/arbitrum-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=PathRegexp(`^/arbitrum-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=PathRegex(`^/arbitrum-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.connext-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.connext-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/connext-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/connext-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=PathRegexp(`^/connext-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=PathRegex(`^/connext-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.connext-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.connext-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/connext-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/connext-sepolia/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=PathRegexp(`^/connext-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/connext-sepolia/?$`)}
|
||||||
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.everclear-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.everclear-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/everclear-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/everclear-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=PathRegexp(`^/everclear-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/everclear-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.everclear-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.everclear-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/everclear-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/everclear-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=PathRegexp(`^/everclear-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/everclear-mainnet/?$`)}
|
||||||
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.opencampuscodex-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.opencampuscodex-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/opencampuscodex-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/opencampuscodex-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=PathRegexp(`^/opencampuscodex-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=PathRegex(`^/opencampuscodex-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.opencampuscodex-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.opencampuscodex-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/opencampuscodex-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/opencampuscodex-sepolia/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=PathRegexp(`^/opencampuscodex-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/opencampuscodex-sepolia/?$`)}
|
||||||
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.playblock-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.playblock-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/playblock-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/playblock-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=PathRegexp(`^/playblock-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/playblock-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.playblock-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.playblock-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/playblock-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/playblock-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=PathRegexp(`^/playblock-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/playblock-mainnet/?$`)}
|
||||||
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.real-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.real-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/real-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=PathRegexp(`^/real-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/real-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.real-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.real-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/real-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=PathRegexp(`^/real-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=PathRegex(`^/real-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.real-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.real-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/real-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=PathRegexp(`^/real-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/real-mainnet/?$`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.avalanche-fuji-go-archive-leveldb.loadbalancer.server.port=80
|
- traefik.http.services.avalanche-fuji-go-archive-leveldb.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && PathRegexp(`^/avalanche-fuji-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-fuji-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=PathRegexp(`^/avalanche-fuji-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=PathRegex(`^/avalanche-fuji-archive/?$`)}
|
||||||
- traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.avalanche-fuji-go-pruned-pebbledb.loadbalancer.server.port=80
|
- traefik.http.services.avalanche-fuji-go-pruned-pebbledb.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && PathRegexp(`^/avalanche-fuji/?$`)}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-fuji/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=PathRegexp(`^/avalanche-fuji/?$`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=PathRegex(`^/avalanche-fuji/?$`)}
|
||||||
- traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.avalanche-mainnet-go-archive-leveldb.loadbalancer.server.port=80
|
- traefik.http.services.avalanche-mainnet-go-archive-leveldb.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && PathRegexp(`^/avalanche-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=PathRegexp(`^/avalanche-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=PathRegex(`^/avalanche-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.avalanche-mainnet-go-pruned-pebbledb.loadbalancer.server.port=80
|
- traefik.http.services.avalanche-mainnet-go-pruned-pebbledb.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && PathRegexp(`^/avalanche-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=PathRegexp(`^/avalanche-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=PathRegex(`^/avalanche-mainnet/?$`)}
|
||||||
- traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ services:
|
|||||||
- traefik.http.services.berachain-bartio-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.berachain-bartio-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/berachain-bartio-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-bartio-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=PathRegexp(`^/berachain-bartio-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=PathRegex(`^/berachain-bartio-archive/?$`)}
|
||||||
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
berachain-bartio-archive-node:
|
berachain-bartio-archive-node:
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ services:
|
|||||||
- traefik.http.services.berachain-bepolia-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.berachain-bepolia-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/berachain-bepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-bepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=PathRegexp(`^/berachain-bepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=PathRegex(`^/berachain-bepolia-archive/?$`)}
|
||||||
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
berachain-bepolia-archive-node:
|
berachain-bepolia-archive-node:
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ services:
|
|||||||
- traefik.http.services.berachain-mainnet-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.berachain-mainnet-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/berachain-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=PathRegexp(`^/berachain-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=PathRegex(`^/berachain-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
berachain-mainnet-archive-node:
|
berachain-mainnet-archive-node:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.bsc-chapel-bsc-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.bsc-chapel-bsc-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/bsc-chapel/?$`)}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/bsc-chapel/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=PathRegexp(`^/bsc-chapel/?$`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=PathRegex(`^/bsc-chapel/?$`)}
|
||||||
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.bsc-mainnet-bsc-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.bsc-mainnet-bsc-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/bsc-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/bsc-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=PathRegexp(`^/bsc-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=PathRegex(`^/bsc-mainnet/?$`)}
|
||||||
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -56,8 +56,8 @@ services:
|
|||||||
- traefik.http.services.celo-alfajores-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.celo-alfajores-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/celo-alfajores-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-alfajores-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=PathRegexp(`^/celo-alfajores-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=PathRegex(`^/celo-alfajores-archive/?$`)}
|
||||||
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -56,8 +56,8 @@ services:
|
|||||||
- traefik.http.services.celo-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.celo-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/celo-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=PathRegexp(`^/celo-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=PathRegex(`^/celo-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.core-buffalo-core-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.core-buffalo-core-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/core-buffalo/?$`)}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/core-buffalo/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=PathRegexp(`^/core-buffalo/?$`)}
|
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=PathRegex(`^/core-buffalo/?$`)}
|
||||||
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.core-mainnet-core-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.core-mainnet-core-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/core-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/core-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=PathRegexp(`^/core-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=PathRegex(`^/core-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.core-mainnet-core-pruned-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.core-mainnet-core-pruned-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/core-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/core-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=PathRegexp(`^/core-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=PathRegex(`^/core-mainnet/?$`)}
|
||||||
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.core-pigeon-core-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.core-pigeon-core-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/core-pigeon/?$`)}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/core-pigeon/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=PathRegexp(`^/core-pigeon/?$`)}
|
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=PathRegex(`^/core-pigeon/?$`)}
|
||||||
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -78,8 +78,8 @@ services:
|
|||||||
- traefik.http.services.cronos-zkevm-mainnet-external-node-archive.loadbalancer.server.port=80
|
- traefik.http.services.cronos-zkevm-mainnet-external-node-archive.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegexp(`^/cronos-zkevm-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=PathRegexp(`^/cronos-zkevm-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=PathRegex(`^/cronos-zkevm-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
cronos-zkevm-mainnet-archive-db:
|
cronos-zkevm-mainnet-archive-db:
|
||||||
|
|||||||
@@ -78,8 +78,8 @@ services:
|
|||||||
- traefik.http.services.cronos-zkevm-mainnet-external-node-pruned.loadbalancer.server.port=80
|
- traefik.http.services.cronos-zkevm-mainnet-external-node-pruned.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegexp(`^/cronos-zkevm-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=PathRegexp(`^/cronos-zkevm-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=PathRegex(`^/cronos-zkevm-mainnet/?$`)}
|
||||||
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
cronos-zkevm-mainnet-db:
|
cronos-zkevm-mainnet-db:
|
||||||
|
|||||||
@@ -78,8 +78,8 @@ services:
|
|||||||
- traefik.http.services.cronos-zkevm-testnet-external-node-archive.loadbalancer.server.port=80
|
- traefik.http.services.cronos-zkevm-testnet-external-node-archive.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegexp(`^/cronos-zkevm-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-testnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=PathRegexp(`^/cronos-zkevm-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=PathRegex(`^/cronos-zkevm-testnet-archive/?$`)}
|
||||||
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
cronos-zkevm-testnet-archive-db:
|
cronos-zkevm-testnet-archive-db:
|
||||||
|
|||||||
@@ -78,8 +78,8 @@ services:
|
|||||||
- traefik.http.services.cronos-zkevm-testnet-external-node-pruned.loadbalancer.server.port=80
|
- traefik.http.services.cronos-zkevm-testnet-external-node-pruned.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegexp(`^/cronos-zkevm-testnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-testnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=PathRegexp(`^/cronos-zkevm-testnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=PathRegex(`^/cronos-zkevm-testnet/?$`)}
|
||||||
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
cronos-zkevm-testnet-db:
|
cronos-zkevm-testnet-db:
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-holesky-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=PathRegexp(`^/ethereum-holesky-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=PathRegex(`^/ethereum-holesky-archive/?$`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-holesky-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-minimal/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=PathRegexp(`^/ethereum-holesky-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-holesky-minimal/?$`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-holesky/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=PathRegexp(`^/ethereum-holesky/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-holesky/?$`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=PathRegexp(`^/ethereum-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=PathRegex(`^/ethereum-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-mainnet-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-minimal/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=PathRegexp(`^/ethereum-mainnet-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-mainnet-minimal/?$`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=PathRegexp(`^/ethereum-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-mainnet/?$`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=PathRegexp(`^/ethereum-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=PathRegex(`^/ethereum-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-sepolia-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-minimal/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=PathRegexp(`^/ethereum-sepolia-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-sepolia-minimal/?$`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=PathRegexp(`^/ethereum-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-sepolia/?$`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-holesky/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=PathRegexp(`^/ethereum-holesky/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-holesky/?$`)}
|
||||||
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-holesky-node:
|
ethereum-holesky-node:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=PathRegexp(`^/ethereum-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-mainnet/?$`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-mainnet-node:
|
ethereum-mainnet-node:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=PathRegexp(`^/ethereum-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-sepolia/?$`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-sepolia-node:
|
ethereum-sepolia-node:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-holesky-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=PathRegexp(`^/ethereum-holesky-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=PathRegex(`^/ethereum-holesky-archive/?$`)}
|
||||||
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-holesky-archive-node:
|
ethereum-holesky-archive-node:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=PathRegexp(`^/ethereum-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=PathRegex(`^/ethereum-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-mainnet-archive-node:
|
ethereum-mainnet-archive-node:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ethereum-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=PathRegexp(`^/ethereum-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=PathRegex(`^/ethereum-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-sepolia-archive-node:
|
ethereum-sepolia-archive-node:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-opera-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-opera-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=PathRegexp(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=PathRegex(`^/fantom-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-opera-archive.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-opera-archive.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=PathRegexp(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=PathRegex(`^/fantom-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-opera-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-opera-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=PathRegexp(`^/fantom-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=PathRegex(`^/fantom-mainnet/?$`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-opera-pruned.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-opera-pruned.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=PathRegexp(`^/fantom-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=PathRegex(`^/fantom-mainnet/?$`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-opera-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-opera-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=PathRegexp(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=PathRegex(`^/fantom-testnet-archive/?$`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-opera-archive.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-opera-archive.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=PathRegexp(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=PathRegex(`^/fantom-testnet-archive/?$`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-opera-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-opera-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-testnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=PathRegexp(`^/fantom-testnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=PathRegex(`^/fantom-testnet/?$`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-opera-pruned.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-opera-pruned.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-testnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=PathRegexp(`^/fantom-testnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=PathRegex(`^/fantom-testnet/?$`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-sonic-archive.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-sonic-archive.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=PathRegexp(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=PathRegex(`^/fantom-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-sonic-archive.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-sonic-archive.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegexp(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=PathRegexp(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=PathRegex(`^/fantom-testnet-archive/?$`)}
|
||||||
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-chiado-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-chiado-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/gnosis-chiado-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=PathRegexp(`^/gnosis-chiado-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=PathRegex(`^/gnosis-chiado-archive/?$`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.service=gnosis-chiado-erigon3-archive-trace
|
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.service=gnosis-chiado-erigon3-archive-trace
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.service=gnosis-chiado-erigon3-archive-trace-node
|
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.service=gnosis-chiado-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-chiado-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-chiado-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/gnosis-chiado-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado-minimal/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=PathRegexp(`^/gnosis-chiado-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=PathRegex(`^/gnosis-chiado-minimal/?$`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.service=gnosis-chiado-erigon3-minimal-trace
|
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.service=gnosis-chiado-erigon3-minimal-trace
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.service=gnosis-chiado-erigon3-minimal-trace-node
|
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.service=gnosis-chiado-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-chiado-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-chiado-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/gnosis-chiado/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=PathRegexp(`^/gnosis-chiado/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=PathRegex(`^/gnosis-chiado/?$`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.service=gnosis-chiado-erigon3-pruned-trace
|
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.service=gnosis-chiado-erigon3-pruned-trace
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.service=gnosis-chiado-erigon3-pruned-trace-node
|
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.service=gnosis-chiado-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/gnosis-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=PathRegexp(`^/gnosis-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=PathRegex(`^/gnosis-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.service=gnosis-mainnet-erigon3-archive-trace
|
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.service=gnosis-mainnet-erigon3-archive-trace
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.service=gnosis-mainnet-erigon3-archive-trace-node
|
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.service=gnosis-mainnet-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/gnosis-mainnet-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet-minimal/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=PathRegexp(`^/gnosis-mainnet-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/gnosis-mainnet-minimal/?$`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.service=gnosis-mainnet-erigon3-minimal-trace
|
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.service=gnosis-mainnet-erigon3-minimal-trace
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.service=gnosis-mainnet-erigon3-minimal-trace-node
|
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.service=gnosis-mainnet-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/gnosis-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=PathRegexp(`^/gnosis-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/gnosis-mainnet/?$`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.service=gnosis-mainnet-erigon3-pruned-trace
|
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.service=gnosis-mainnet-erigon3-pruned-trace
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.service=gnosis-mainnet-erigon3-pruned-trace-node
|
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.service=gnosis-mainnet-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.goat-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.goat-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/goat-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=PathRegexp(`^/goat-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=PathRegex(`^/goat-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.goat-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.goat-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/goat-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=PathRegexp(`^/goat-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=PathRegex(`^/goat-mainnet/?$`)}
|
||||||
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.goat-testnet3-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.goat-testnet3-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegexp(`^/goat-testnet3-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-testnet3-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=PathRegexp(`^/goat-testnet3-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=PathRegex(`^/goat-testnet3-archive/?$`)}
|
||||||
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.goat-testnet3-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.goat-testnet3-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegexp(`^/goat-testnet3/?$`)}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-testnet3/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=PathRegexp(`^/goat-testnet3/?$`)}
|
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=PathRegex(`^/goat-testnet3/?$`)}
|
||||||
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.haqq-mainnet-haqq-pruned.loadbalancer.server.port=8545
|
- traefik.http.services.haqq-mainnet-haqq-pruned.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && PathRegexp(`^/haqq-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/haqq-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=PathRegexp(`^/haqq-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=PathRegex(`^/haqq-mainnet/?$`)}
|
||||||
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -83,8 +83,8 @@ services:
|
|||||||
- traefik.http.services.lens-mainnet-external-node-archive.loadbalancer.server.port=80
|
- traefik.http.services.lens-mainnet-external-node-archive.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegexp(`^/lens-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=PathRegexp(`^/lens-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=PathRegex(`^/lens-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lens-mainnet-archive-db:
|
lens-mainnet-archive-db:
|
||||||
|
|||||||
@@ -83,8 +83,8 @@ services:
|
|||||||
- traefik.http.services.lens-mainnet-external-node-pruned.loadbalancer.server.port=80
|
- traefik.http.services.lens-mainnet-external-node-pruned.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegexp(`^/lens-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=PathRegexp(`^/lens-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=PathRegex(`^/lens-mainnet/?$`)}
|
||||||
- traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lens-mainnet-db:
|
lens-mainnet-db:
|
||||||
|
|||||||
@@ -82,8 +82,8 @@ services:
|
|||||||
- traefik.http.services.lens-testnet-external-node-archive.loadbalancer.server.port=80
|
- traefik.http.services.lens-testnet-external-node-archive.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegexp(`^/lens-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-testnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=PathRegexp(`^/lens-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=PathRegex(`^/lens-testnet-archive/?$`)}
|
||||||
- traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lens-testnet-archive-db:
|
lens-testnet-archive-db:
|
||||||
|
|||||||
@@ -82,8 +82,8 @@ services:
|
|||||||
- traefik.http.services.lens-testnet-external-node-pruned.loadbalancer.server.port=80
|
- traefik.http.services.lens-testnet-external-node-pruned.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegexp(`^/lens-testnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-testnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=PathRegexp(`^/lens-testnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=PathRegex(`^/lens-testnet/?$`)}
|
||||||
- traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lens-testnet-db:
|
lens-testnet-db:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/linea-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=PathRegexp(`^/linea-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=PathRegex(`^/linea-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/linea-mainnet-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet-minimal/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=PathRegexp(`^/linea-mainnet-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/linea-mainnet-minimal/?$`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/linea-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=PathRegexp(`^/linea-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/linea-mainnet/?$`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/linea-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=PathRegexp(`^/linea-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=PathRegex(`^/linea-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/linea-sepolia-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia-minimal/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=PathRegexp(`^/linea-sepolia-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=PathRegex(`^/linea-sepolia-minimal/?$`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/linea-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=PathRegexp(`^/linea-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=PathRegex(`^/linea-sepolia/?$`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.base-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.base-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/base-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/base-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/base-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
base-mainnet-archive-node:
|
base-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.base-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.base-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/base-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=PathRegexp(`^/base-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/base-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
base-sepolia-archive-node:
|
base-sepolia-archive-node:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.bob-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.bob-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/bob-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/bob-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/bob-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/bob-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
bob-mainnet-archive-node:
|
bob-mainnet-archive-node:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.boba-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.boba-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/boba-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/boba-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/boba-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/boba-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
boba-mainnet-archive-node:
|
boba-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.boba-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.boba-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/boba-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/boba-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=PathRegexp(`^/boba-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/boba-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.boba-sepolia-op-erigon-archive-trace.middlewares=boba-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.boba-sepolia-op-erigon-archive-trace.middlewares=boba-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
boba-sepolia-archive-node:
|
boba-sepolia-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.hashkeychain-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.hashkeychain-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/hashkeychain-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/hashkeychain-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/hashkeychain-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/hashkeychain-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.middlewares=hashkeychain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.middlewares=hashkeychain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
hashkeychain-mainnet-archive-node:
|
hashkeychain-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.ink-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ink-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ink-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/ink-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/ink-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.ink-mainnet-op-erigon-archive-trace.middlewares=ink-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ink-mainnet-op-erigon-archive-trace.middlewares=ink-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ink-mainnet-archive-node:
|
ink-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.ink-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ink-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/ink-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=PathRegexp(`^/ink-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/ink-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.ink-sepolia-op-erigon-archive-trace.middlewares=ink-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ink-sepolia-op-erigon-archive-trace.middlewares=ink-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ink-sepolia-archive-node:
|
ink-sepolia-archive-node:
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ services:
|
|||||||
- traefik.http.services.lisk-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.lisk-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/lisk-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/lisk-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/lisk-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.middlewares=lisk-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.middlewares=lisk-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lisk-mainnet-archive-node:
|
lisk-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.metal-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.metal-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/metal-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/metal-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/metal-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/metal-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.metal-mainnet-op-erigon-archive-trace.middlewares=metal-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.metal-mainnet-op-erigon-archive-trace.middlewares=metal-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
metal-mainnet-archive-node:
|
metal-mainnet-archive-node:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.mode-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.mode-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/mode-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/mode-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/mode-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.mode-mainnet-op-erigon-archive-trace.middlewares=mode-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.mode-mainnet-op-erigon-archive-trace.middlewares=mode-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
mode-mainnet-archive-node:
|
mode-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.mode-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.mode-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/mode-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=PathRegexp(`^/mode-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/mode-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.mode-sepolia-op-erigon-archive-trace.middlewares=mode-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.mode-sepolia-op-erigon-archive-trace.middlewares=mode-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
mode-sepolia-archive-node:
|
mode-sepolia-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.op-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.op-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/op-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/op-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/op-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.op-mainnet-op-erigon-archive-trace.middlewares=op-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.op-mainnet-op-erigon-archive-trace.middlewares=op-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
op-mainnet-archive-node:
|
op-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.op-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.op-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/op-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-sepolia-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=PathRegexp(`^/op-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/op-sepolia-archive/?$`)}
|
||||||
- traefik.http.routers.op-sepolia-op-erigon-archive-trace.middlewares=op-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.op-sepolia-op-erigon-archive-trace.middlewares=op-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
op-sepolia-archive-node:
|
op-sepolia-archive-node:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.snax-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.snax-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegexp(`^/snax-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/snax-mainnet-archive/?$`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=PathRegexp(`^/snax-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/snax-mainnet-archive/?$`)}
|
||||||
- traefik.http.routers.snax-mainnet-op-erigon-archive-trace.middlewares=snax-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.snax-mainnet-op-erigon-archive-trace.middlewares=snax-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
snax-mainnet-archive-node:
|
snax-mainnet-archive-node:
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user