From 8ea3f5b7d59aa73d56596e6a878a92ea64d396e3 Mon Sep 17 00:00:00 2001 From: Para Dox Date: Tue, 15 Apr 2025 11:15:12 +0700 Subject: [PATCH] fix --- arb/nitro/alephzero-mainnet-nitro-archive-pebble-hash.yml | 4 ++-- arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml | 4 ++-- arb/nitro/alephzero-sepolia-nitro-archive-pebble-hash.yml | 4 ++-- arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml | 4 ++-- arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml | 4 ++-- arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml | 4 ++-- arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml | 4 ++-- arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml | 4 ++-- arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml | 4 ++-- arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml | 4 ++-- arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml | 4 ++-- arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml | 4 ++-- arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml | 4 ++-- .../opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml | 4 ++-- .../opencampuscodex-sepolia-nitro-pruned-pebble-path.yml | 4 ++-- arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml | 4 ++-- arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml | 4 ++-- arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml | 4 ++-- arb/nitro/real-mainnet-nitro-archive-pebble-hash.yml | 4 ++-- arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml | 4 ++-- avalanche/go/avalanche-fuji-go-archive-leveldb.yml | 4 ++-- avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml | 4 ++-- avalanche/go/avalanche-mainnet-go-archive-leveldb.yml | 4 ++-- avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml | 4 ++-- berachain/reth/berachain-bartio-reth-archive-trace.yml | 4 ++-- berachain/reth/berachain-bepolia-reth-archive-trace.yml | 4 ++-- berachain/reth/berachain-mainnet-reth-archive-trace.yml | 4 ++-- bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml | 4 ++-- bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml | 4 ++-- celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml | 4 ++-- celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml | 4 ++-- core/core/core-buffalo-core-pruned-pebble-path.yml | 4 ++-- core/core/core-mainnet-core-archive-leveldb-hash.yml | 4 ++-- core/core/core-mainnet-core-pruned-leveldb-hash.yml | 4 ++-- core/core/core-pigeon-core-pruned-pebble-path.yml | 4 ++-- .../cronos-zkevm-mainnet-external-node-archive.yml | 4 ++-- .../cronos-zkevm-mainnet-external-node-pruned.yml | 4 ++-- .../cronos-zkevm-testnet-external-node-archive.yml | 4 ++-- .../cronos-zkevm-testnet-external-node-pruned.yml | 4 ++-- ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml | 4 ++-- ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml | 4 ++-- ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml | 4 ++-- ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml | 4 ++-- ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml | 4 ++-- ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml | 4 ++-- ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml | 4 ++-- ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml | 4 ++-- ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml | 4 ++-- ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml | 4 ++-- ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml | 4 ++-- ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml | 4 ++-- ethereum/reth/ethereum-holesky-reth-archive-trace.yml | 4 ++-- ethereum/reth/ethereum-mainnet-reth-archive-trace.yml | 4 ++-- ethereum/reth/ethereum-sepolia-reth-archive-trace.yml | 4 ++-- fantom/opera/fantom-mainnet-opera-archive-trace.yml | 4 ++-- fantom/opera/fantom-mainnet-opera-archive.yml | 4 ++-- fantom/opera/fantom-mainnet-opera-pruned-trace.yml | 4 ++-- fantom/opera/fantom-mainnet-opera-pruned.yml | 4 ++-- fantom/opera/fantom-testnet-opera-archive-trace.yml | 4 ++-- fantom/opera/fantom-testnet-opera-archive.yml | 4 ++-- fantom/opera/fantom-testnet-opera-pruned-trace.yml | 4 ++-- fantom/opera/fantom-testnet-opera-pruned.yml | 4 ++-- fantom/sonic/fantom-mainnet-sonic-archive.yml | 4 ++-- fantom/sonic/fantom-testnet-sonic-archive.yml | 4 ++-- gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml | 4 ++-- gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml | 4 ++-- gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml | 4 ++-- gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml | 4 ++-- gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml | 4 ++-- gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml | 4 ++-- goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml | 4 ++-- goat/geth/goat-mainnet-geth-pruned-pebble-path.yml | 4 ++-- goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml | 4 ++-- goat/geth/goat-testnet3-geth-pruned-pebble-path.yml | 4 ++-- haqq/haqq/haqq-mainnet-haqq-pruned.yml | 4 ++-- lens/external-node/lens-mainnet-external-node-archive.yml | 4 ++-- lens/external-node/lens-mainnet-external-node-pruned.yml | 4 ++-- lens/external-node/lens-testnet-external-node-archive.yml | 4 ++-- lens/external-node/lens-testnet-external-node-pruned.yml | 4 ++-- linea/erigon3/linea-mainnet-erigon3-archive-trace.yml | 4 ++-- linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml | 4 ++-- linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml | 4 ++-- linea/erigon3/linea-sepolia-erigon3-archive-trace.yml | 4 ++-- linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml | 4 ++-- linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml | 4 ++-- op/erigon/base-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/base-sepolia-op-erigon-archive-trace.yml | 4 ++-- op/erigon/bob-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/boba-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/boba-sepolia-op-erigon-archive-trace.yml | 4 ++-- op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/ink-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/ink-sepolia-op-erigon-archive-trace.yml | 4 ++-- op/erigon/lisk-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/metal-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/mode-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/mode-sepolia-op-erigon-archive-trace.yml | 4 ++-- op/erigon/op-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/op-sepolia-op-erigon-archive-trace.yml | 4 ++-- op/erigon/snax-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/soneium-minato-op-erigon-archive-trace.yml | 4 ++-- op/erigon/swell-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/unichain-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/unichain-sepolia-op-erigon-archive-trace.yml | 4 ++-- op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml | 4 ++-- op/erigon/zora-mainnet-op-erigon-archive-trace.yml | 4 ++-- op/erigon/zora-sepolia-op-erigon-archive-trace.yml | 4 ++-- op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/base-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/base-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/boba-mainnet-op-geth-pruned.yml | 4 ++-- op/geth/boba-sepolia-op-geth-pruned.yml | 4 ++-- op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/celo-alfajores-op-geth-pruned-leveldb-hash.yml | 4 ++-- op/geth/celo-alfajores-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/celo-mainnet-op-geth-pruned-leveldb-hash.yml | 4 ++-- op/geth/celo-mainnet-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/lisk-mainnet-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/lisk-sepolia-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/manta-pacific-mainnet-op-geth-archive-pebble-hash.yml | 4 ++-- op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml | 4 ++-- op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml | 4 ++-- op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/mode-mainnet-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/mode-sepolia-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/op-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/op-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/soneium-minato-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/zircuit-garfield-op-geth-archive-pebble-hash.yml | 4 ++-- op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/zircuit-garfield-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/zircuit-mainnet-op-geth-archive-pebble-hash.yml | 4 ++-- op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/zircuit-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/zircuit-testnet-op-geth-archive-pebble-hash.yml | 4 ++-- op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/zircuit-testnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/zora-mainnet-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml | 4 ++-- op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml | 4 ++-- op/geth/zora-sepolia-op-geth-pruned-pebble-hash.yml | 4 ++-- op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml | 4 ++-- op/reth/base-mainnet-op-reth-archive-trace.yml | 4 ++-- op/reth/base-mainnet-op-reth-pruned-trace.yml | 4 ++-- op/reth/base-sepolia-op-reth-archive-trace.yml | 4 ++-- op/reth/base-sepolia-op-reth-pruned-trace.yml | 4 ++-- op/reth/lisk-mainnet-op-reth-archive-trace.yml | 4 ++-- op/reth/lisk-mainnet-op-reth-pruned-trace.yml | 4 ++-- op/reth/op-mainnet-op-reth-archive-trace.yml | 4 ++-- op/reth/op-mainnet-op-reth-pruned-trace.yml | 4 ++-- op/reth/op-sepolia-op-reth-archive-trace.yml | 4 ++-- op/reth/op-sepolia-op-reth-pruned-trace.yml | 4 ++-- polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml | 4 ++-- polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml | 4 ++-- polygon/erigon3/polygon-amoy-erigon3-archive-trace.yml | 4 ++-- polygon/erigon3/polygon-amoy-erigon3-minimal-trace.yml | 4 ++-- polygon/erigon3/polygon-amoy-erigon3-pruned-trace.yml | 4 ++-- polygon/erigon3/polygon-mainnet-erigon3-archive-trace.yml | 4 ++-- polygon/erigon3/polygon-mainnet-erigon3-minimal-trace.yml | 4 ++-- polygon/erigon3/polygon-mainnet-erigon3-pruned-trace.yml | 4 ++-- ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml | 4 ++-- ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml | 4 ++-- ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml | 4 ++-- ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml | 4 ++-- rootstock/rskj/rootstock-bamboo-rskj-archive.yml | 4 ++-- rootstock/rskj/rootstock-mainnet-rskj-archive.yml | 4 ++-- scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml | 4 ++-- scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml | 4 ++-- sonic/sonic/sonic-mainnet-sonic-archive.yml | 4 ++-- taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml | 4 ++-- taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml | 4 ++-- taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml | 4 ++-- taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml | 4 ++-- .../thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml | 4 ++-- .../thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml | 4 ++-- tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml | 4 ++-- viction/node/viction-mainnet-node-archive-leveldb-hash.yml | 4 ++-- viction/node/viction-mainnet-node-pruned-leveldb-hash.yml | 4 ++-- viction/node/viction-testnet-node-archive-leveldb-hash.yml | 4 ++-- viction/node/viction-testnet-node-pruned-leveldb-hash.yml | 4 ++-- .../zksync-era-boojnet-external-node-archive.yml | 4 ++-- .../external-node/zksync-era-boojnet-external-node-pruned.yml | 4 ++-- .../zksync-era-mainnet-external-node-archive.yml | 4 ++-- .../external-node/zksync-era-mainnet-external-node-pruned.yml | 4 ++-- 236 files changed, 472 insertions(+), 472 deletions(-) diff --git a/arb/nitro/alephzero-mainnet-nitro-archive-pebble-hash.yml b/arb/nitro/alephzero-mainnet-nitro-archive-pebble-hash.yml index 68943dbf..95ab4170 100644 --- a/arb/nitro/alephzero-mainnet-nitro-archive-pebble-hash.yml +++ b/arb/nitro/alephzero-mainnet-nitro-archive-pebble-hash.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.alephzero-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=PathRegex(`^/alephzero-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`)} - traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml b/arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml index ee434522..5098e26a 100644 --- a/arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml +++ b/arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.alephzero-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/alephzero-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`)} - traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/alephzero-sepolia-nitro-archive-pebble-hash.yml b/arb/nitro/alephzero-sepolia-nitro-archive-pebble-hash.yml index 7f7c5768..00092839 100644 --- a/arb/nitro/alephzero-sepolia-nitro-archive-pebble-hash.yml +++ b/arb/nitro/alephzero-sepolia-nitro-archive-pebble-hash.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.alephzero-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=PathRegex(`^/alephzero-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`)} - traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml b/arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml index 41372f53..82c524fc 100644 --- a/arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml +++ b/arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.alephzero-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/alephzero-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`)} - traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml b/arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml index b3e12802..d7504d72 100644 --- a/arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml @@ -55,8 +55,8 @@ services: - traefik.http.services.arbitrum-nova-nitro-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-nova-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=PathRegex(`^/arbitrum-nova-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`))} + - ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`)} - traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml b/arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml index d5a9464c..91e21177 100644 --- a/arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml +++ b/arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml @@ -55,8 +55,8 @@ services: - traefik.http.services.arbitrum-nova-nitro-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-nova/?$`)} - - ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=PathRegex(`^/arbitrum-nova/?$`)} + - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`))} + - ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`)} - traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml b/arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml index 45c21731..d6b382fc 100644 --- a/arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml @@ -55,8 +55,8 @@ services: - traefik.http.services.arbitrum-one-nitro-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-one-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=PathRegex(`^/arbitrum-one-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`))} + - ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`)} - traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml b/arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml index cbd3a0ca..0fc14984 100644 --- a/arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml +++ b/arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml @@ -55,8 +55,8 @@ services: - traefik.http.services.arbitrum-one-nitro-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-one/?$`)} - - ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=PathRegex(`^/arbitrum-one/?$`)} + - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one`) || Path(`/arbitrum-one/`))} + - ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-one`) || Path(`/arbitrum-one/`)} - traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml b/arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml index bd712ba6..8c392ca7 100644 --- a/arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml +++ b/arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml @@ -55,8 +55,8 @@ services: - traefik.http.services.arbitrum-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=PathRegex(`^/arbitrum-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`)} - traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml b/arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml index 31d65bc1..7e679216 100644 --- a/arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.connext-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/connext-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=PathRegex(`^/connext-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`)} - traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml b/arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml index 7a107ac4..7ec3aab8 100644 --- a/arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml +++ b/arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.connext-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/connext-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/connext-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia`) || Path(`/connext-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Path(`/connext-sepolia`) || Path(`/connext-sepolia/`)} - traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml b/arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml index e9338f50..ec175ad0 100644 --- a/arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.everclear-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/everclear-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/everclear-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`)} - traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml b/arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml index ac94e812..da393a7c 100644 --- a/arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml +++ b/arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.everclear-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/everclear-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/everclear-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`)} - traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml b/arb/nitro/opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml index 9af81951..f4238a6b 100644 --- a/arb/nitro/opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.opencampuscodex-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/opencampuscodex-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=PathRegex(`^/opencampuscodex-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`)} - traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/opencampuscodex-sepolia-nitro-pruned-pebble-path.yml b/arb/nitro/opencampuscodex-sepolia-nitro-pruned-pebble-path.yml index 1ca4c40b..6d148c36 100644 --- a/arb/nitro/opencampuscodex-sepolia-nitro-pruned-pebble-path.yml +++ b/arb/nitro/opencampuscodex-sepolia-nitro-pruned-pebble-path.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.opencampuscodex-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/opencampuscodex-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/opencampuscodex-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`)} - traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml b/arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml index 020ab5a6..2331883c 100644 --- a/arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.playblock-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/playblock-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/playblock-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`)} - traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml b/arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml index a6d5effe..302c60eb 100644 --- a/arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml +++ b/arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.playblock-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/playblock-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/playblock-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`)} - traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml b/arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml index ad42d8ca..73334b57 100644 --- a/arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.real-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/real-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)} - traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/real-mainnet-nitro-archive-pebble-hash.yml b/arb/nitro/real-mainnet-nitro-archive-pebble-hash.yml index 2f6cb0e9..5a2d5baf 100644 --- a/arb/nitro/real-mainnet-nitro-archive-pebble-hash.yml +++ b/arb/nitro/real-mainnet-nitro-archive-pebble-hash.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.real-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=PathRegex(`^/real-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)} - traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist volumes: diff --git a/arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml b/arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml index e7e201f9..fc79cae9 100644 --- a/arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml +++ b/arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.real-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/real-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet`) || Path(`/real-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Path(`/real-mainnet`) || Path(`/real-mainnet/`)} - traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/avalanche/go/avalanche-fuji-go-archive-leveldb.yml b/avalanche/go/avalanche-fuji-go-archive-leveldb.yml index 2c51fb46..eeb2d6d9 100644 --- a/avalanche/go/avalanche-fuji-go-archive-leveldb.yml +++ b/avalanche/go/avalanche-fuji-go-archive-leveldb.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.avalanche-fuji-go-archive-leveldb.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-fuji-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=PathRegex(`^/avalanche-fuji-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`))} + - ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`)} - traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipwhitelist volumes: diff --git a/avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml b/avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml index c70c2432..d080c574 100644 --- a/avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml +++ b/avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.avalanche-fuji-go-pruned-pebbledb.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-fuji/?$`)} - - ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=PathRegex(`^/avalanche-fuji/?$`)} + - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`))} + - ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`)} - traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipwhitelist volumes: diff --git a/avalanche/go/avalanche-mainnet-go-archive-leveldb.yml b/avalanche/go/avalanche-mainnet-go-archive-leveldb.yml index f99979f6..7ded0fed 100644 --- a/avalanche/go/avalanche-mainnet-go-archive-leveldb.yml +++ b/avalanche/go/avalanche-mainnet-go-archive-leveldb.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.avalanche-mainnet-go-archive-leveldb.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=PathRegex(`^/avalanche-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`)} - traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipwhitelist volumes: diff --git a/avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml b/avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml index 9168ffeb..a237c3fe 100644 --- a/avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml +++ b/avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.avalanche-mainnet-go-pruned-pebbledb.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=PathRegex(`^/avalanche-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`)} - traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipwhitelist volumes: diff --git a/berachain/reth/berachain-bartio-reth-archive-trace.yml b/berachain/reth/berachain-bartio-reth-archive-trace.yml index 129c526d..a3e25854 100644 --- a/berachain/reth/berachain-bartio-reth-archive-trace.yml +++ b/berachain/reth/berachain-bartio-reth-archive-trace.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.berachain-bartio-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-bartio-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=PathRegex(`^/berachain-bartio-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`))} + - ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`)} - traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist berachain-bartio-archive-node: diff --git a/berachain/reth/berachain-bepolia-reth-archive-trace.yml b/berachain/reth/berachain-bepolia-reth-archive-trace.yml index 5ba12d00..dc6fe9f1 100644 --- a/berachain/reth/berachain-bepolia-reth-archive-trace.yml +++ b/berachain/reth/berachain-bepolia-reth-archive-trace.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.berachain-bepolia-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-bepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=PathRegex(`^/berachain-bepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`)} - traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist berachain-bepolia-archive-node: diff --git a/berachain/reth/berachain-mainnet-reth-archive-trace.yml b/berachain/reth/berachain-mainnet-reth-archive-trace.yml index 8082ee3d..cd9fe3dc 100644 --- a/berachain/reth/berachain-mainnet-reth-archive-trace.yml +++ b/berachain/reth/berachain-mainnet-reth-archive-trace.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.berachain-mainnet-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=PathRegex(`^/berachain-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`)} - traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist berachain-mainnet-archive-node: diff --git a/bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml b/bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml index c2f9417a..baab200d 100644 --- a/bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml +++ b/bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.bsc-chapel-bsc-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/bsc-chapel/?$`)} - - ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=PathRegex(`^/bsc-chapel/?$`)} + - ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))} + - ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)} - traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml b/bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml index f5e896ed..be3a0f15 100644 --- a/bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml +++ b/bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.bsc-mainnet-bsc-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/bsc-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=PathRegex(`^/bsc-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)} - traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml b/celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml index edf28419..3915166b 100644 --- a/celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml +++ b/celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml @@ -56,8 +56,8 @@ services: - traefik.http.services.celo-alfajores-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-alfajores-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=PathRegex(`^/celo-alfajores-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`))} + - ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`)} - traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml b/celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml index cda5b69b..fbca8867 100644 --- a/celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml +++ b/celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml @@ -56,8 +56,8 @@ services: - traefik.http.services.celo-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=PathRegex(`^/celo-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`)} - traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/core/core/core-buffalo-core-pruned-pebble-path.yml b/core/core/core-buffalo-core-pruned-pebble-path.yml index f1526eb3..3ad80079 100644 --- a/core/core/core-buffalo-core-pruned-pebble-path.yml +++ b/core/core/core-buffalo-core-pruned-pebble-path.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.core-buffalo-core-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/core-buffalo/?$`)} - - ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=PathRegex(`^/core-buffalo/?$`)} + - ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-buffalo`) || Path(`/core-buffalo/`))} + - ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Path(`/core-buffalo`) || Path(`/core-buffalo/`)} - traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/core/core/core-mainnet-core-archive-leveldb-hash.yml b/core/core/core-mainnet-core-archive-leveldb-hash.yml index 31690033..dd915796 100644 --- a/core/core/core-mainnet-core-archive-leveldb-hash.yml +++ b/core/core/core-mainnet-core-archive-leveldb-hash.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.core-mainnet-core-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/core-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=PathRegex(`^/core-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`)} - traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/core/core/core-mainnet-core-pruned-leveldb-hash.yml b/core/core/core-mainnet-core-pruned-leveldb-hash.yml index c5053fa0..873e2abb 100644 --- a/core/core/core-mainnet-core-pruned-leveldb-hash.yml +++ b/core/core/core-mainnet-core-pruned-leveldb-hash.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.core-mainnet-core-pruned-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/core-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=PathRegex(`^/core-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet`) || Path(`/core-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Path(`/core-mainnet`) || Path(`/core-mainnet/`)} - traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/core/core/core-pigeon-core-pruned-pebble-path.yml b/core/core/core-pigeon-core-pruned-pebble-path.yml index 910b04f9..12be2ed4 100644 --- a/core/core/core-pigeon-core-pruned-pebble-path.yml +++ b/core/core/core-pigeon-core-pruned-pebble-path.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.core-pigeon-core-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/core-pigeon/?$`)} - - ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=PathRegex(`^/core-pigeon/?$`)} + - ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-pigeon`) || Path(`/core-pigeon/`))} + - ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Path(`/core-pigeon`) || Path(`/core-pigeon/`)} - traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/cronos-zkevm/external-node/cronos-zkevm-mainnet-external-node-archive.yml b/cronos-zkevm/external-node/cronos-zkevm-mainnet-external-node-archive.yml index f07c5919..bf1663d4 100644 --- a/cronos-zkevm/external-node/cronos-zkevm-mainnet-external-node-archive.yml +++ b/cronos-zkevm/external-node/cronos-zkevm-mainnet-external-node-archive.yml @@ -78,8 +78,8 @@ services: - traefik.http.services.cronos-zkevm-mainnet-external-node-archive.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=PathRegex(`^/cronos-zkevm-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)} - traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipwhitelist cronos-zkevm-mainnet-archive-db: diff --git a/cronos-zkevm/external-node/cronos-zkevm-mainnet-external-node-pruned.yml b/cronos-zkevm/external-node/cronos-zkevm-mainnet-external-node-pruned.yml index 0bb71858..bb4b373b 100644 --- a/cronos-zkevm/external-node/cronos-zkevm-mainnet-external-node-pruned.yml +++ b/cronos-zkevm/external-node/cronos-zkevm-mainnet-external-node-pruned.yml @@ -78,8 +78,8 @@ services: - traefik.http.services.cronos-zkevm-mainnet-external-node-pruned.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=PathRegex(`^/cronos-zkevm-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)} - traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipwhitelist cronos-zkevm-mainnet-db: diff --git a/cronos-zkevm/external-node/cronos-zkevm-testnet-external-node-archive.yml b/cronos-zkevm/external-node/cronos-zkevm-testnet-external-node-archive.yml index 3fd96479..74c36054 100644 --- a/cronos-zkevm/external-node/cronos-zkevm-testnet-external-node-archive.yml +++ b/cronos-zkevm/external-node/cronos-zkevm-testnet-external-node-archive.yml @@ -78,8 +78,8 @@ services: - traefik.http.services.cronos-zkevm-testnet-external-node-archive.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=PathRegex(`^/cronos-zkevm-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)} - traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipwhitelist cronos-zkevm-testnet-archive-db: diff --git a/cronos-zkevm/external-node/cronos-zkevm-testnet-external-node-pruned.yml b/cronos-zkevm/external-node/cronos-zkevm-testnet-external-node-pruned.yml index 35ab5941..803cfa7b 100644 --- a/cronos-zkevm/external-node/cronos-zkevm-testnet-external-node-pruned.yml +++ b/cronos-zkevm/external-node/cronos-zkevm-testnet-external-node-pruned.yml @@ -78,8 +78,8 @@ services: - traefik.http.services.cronos-zkevm-testnet-external-node-pruned.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-testnet/?$`)} - - ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=PathRegex(`^/cronos-zkevm-testnet/?$`)} + - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`))} + - ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)} - traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipwhitelist cronos-zkevm-testnet-db: diff --git a/ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml b/ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml index c68b5969..8e8b75e8 100644 --- a/ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml +++ b/ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-holesky-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=PathRegex(`^/ethereum-holesky-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)} - traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace - traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node diff --git a/ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml b/ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml index 742fd60f..60622dac 100644 --- a/ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml +++ b/ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-holesky-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-holesky-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`)} - traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace - traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node diff --git a/ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml b/ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml index cad046fe..11d22ad8 100644 --- a/ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml +++ b/ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-holesky-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-holesky/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)} - traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace - traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node diff --git a/ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml b/ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml index 927a32c5..00b80dab 100644 --- a/ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml +++ b/ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=PathRegex(`^/ethereum-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)} - traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace - traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node diff --git a/ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml b/ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml index 0c477e00..b1f60a21 100644 --- a/ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml +++ b/ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-mainnet-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`)} - traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace - traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node diff --git a/ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml b/ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml index 8022bae4..2bad37a1 100644 --- a/ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml +++ b/ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)} - traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace - traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node diff --git a/ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml b/ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml index 7f3be255..a3859aa8 100644 --- a/ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml +++ b/ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=PathRegex(`^/ethereum-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)} - traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace - traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node diff --git a/ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml b/ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml index 729d7b96..13b9c905 100644 --- a/ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml +++ b/ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-sepolia-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`)} - traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace - traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node diff --git a/ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml b/ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml index d0f5a907..a3946bdd 100644 --- a/ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml +++ b/ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.ethereum-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)} - traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace - traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node diff --git a/ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml b/ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml index 32aa2a58..9aedcb4e 100644 --- a/ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml +++ b/ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.ethereum-holesky-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-holesky/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)} - traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist ethereum-holesky-node: diff --git a/ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml b/ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml index 0a44c4b2..1591897f 100644 --- a/ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml +++ b/ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.ethereum-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)} - traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist ethereum-mainnet-node: diff --git a/ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml b/ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml index 2a862ac9..4181d60c 100644 --- a/ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml +++ b/ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.ethereum-sepolia-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)} - traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist ethereum-sepolia-node: diff --git a/ethereum/reth/ethereum-holesky-reth-archive-trace.yml b/ethereum/reth/ethereum-holesky-reth-archive-trace.yml index b927dcd7..432d7a34 100644 --- a/ethereum/reth/ethereum-holesky-reth-archive-trace.yml +++ b/ethereum/reth/ethereum-holesky-reth-archive-trace.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.ethereum-holesky-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=PathRegex(`^/ethereum-holesky-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)} - traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist ethereum-holesky-archive-node: diff --git a/ethereum/reth/ethereum-mainnet-reth-archive-trace.yml b/ethereum/reth/ethereum-mainnet-reth-archive-trace.yml index 386c7b67..091e2feb 100644 --- a/ethereum/reth/ethereum-mainnet-reth-archive-trace.yml +++ b/ethereum/reth/ethereum-mainnet-reth-archive-trace.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.ethereum-mainnet-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=PathRegex(`^/ethereum-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)} - traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist ethereum-mainnet-archive-node: diff --git a/ethereum/reth/ethereum-sepolia-reth-archive-trace.yml b/ethereum/reth/ethereum-sepolia-reth-archive-trace.yml index 26d8cd47..c8dc75b3 100644 --- a/ethereum/reth/ethereum-sepolia-reth-archive-trace.yml +++ b/ethereum/reth/ethereum-sepolia-reth-archive-trace.yml @@ -60,8 +60,8 @@ services: - traefik.http.services.ethereum-sepolia-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=PathRegex(`^/ethereum-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)} - traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist ethereum-sepolia-archive-node: diff --git a/fantom/opera/fantom-mainnet-opera-archive-trace.yml b/fantom/opera/fantom-mainnet-opera-archive-trace.yml index 29586668..b3a14df1 100644 --- a/fantom/opera/fantom-mainnet-opera-archive-trace.yml +++ b/fantom/opera/fantom-mainnet-opera-archive-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.fantom-mainnet-opera-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=PathRegex(`^/fantom-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)} - traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist volumes: diff --git a/fantom/opera/fantom-mainnet-opera-archive.yml b/fantom/opera/fantom-mainnet-opera-archive.yml index 8a1d1f6a..ebcf21d6 100644 --- a/fantom/opera/fantom-mainnet-opera-archive.yml +++ b/fantom/opera/fantom-mainnet-opera-archive.yml @@ -64,8 +64,8 @@ services: - traefik.http.services.fantom-mainnet-opera-archive.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=PathRegex(`^/fantom-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)} - traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist volumes: diff --git a/fantom/opera/fantom-mainnet-opera-pruned-trace.yml b/fantom/opera/fantom-mainnet-opera-pruned-trace.yml index fd870080..caf63a8a 100644 --- a/fantom/opera/fantom-mainnet-opera-pruned-trace.yml +++ b/fantom/opera/fantom-mainnet-opera-pruned-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.fantom-mainnet-opera-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=PathRegex(`^/fantom-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)} - traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist volumes: diff --git a/fantom/opera/fantom-mainnet-opera-pruned.yml b/fantom/opera/fantom-mainnet-opera-pruned.yml index 29456aa7..327b584d 100644 --- a/fantom/opera/fantom-mainnet-opera-pruned.yml +++ b/fantom/opera/fantom-mainnet-opera-pruned.yml @@ -64,8 +64,8 @@ services: - traefik.http.services.fantom-mainnet-opera-pruned.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=PathRegex(`^/fantom-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)} - traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist volumes: diff --git a/fantom/opera/fantom-testnet-opera-archive-trace.yml b/fantom/opera/fantom-testnet-opera-archive-trace.yml index ede0768c..69b36112 100644 --- a/fantom/opera/fantom-testnet-opera-archive-trace.yml +++ b/fantom/opera/fantom-testnet-opera-archive-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.fantom-testnet-opera-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=PathRegex(`^/fantom-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)} - traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist volumes: diff --git a/fantom/opera/fantom-testnet-opera-archive.yml b/fantom/opera/fantom-testnet-opera-archive.yml index 72344c3d..6fae8d33 100644 --- a/fantom/opera/fantom-testnet-opera-archive.yml +++ b/fantom/opera/fantom-testnet-opera-archive.yml @@ -64,8 +64,8 @@ services: - traefik.http.services.fantom-testnet-opera-archive.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=PathRegex(`^/fantom-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)} - traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist volumes: diff --git a/fantom/opera/fantom-testnet-opera-pruned-trace.yml b/fantom/opera/fantom-testnet-opera-pruned-trace.yml index 4fe10207..8a87c724 100644 --- a/fantom/opera/fantom-testnet-opera-pruned-trace.yml +++ b/fantom/opera/fantom-testnet-opera-pruned-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.fantom-testnet-opera-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=PathRegex(`^/fantom-testnet/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))} + - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)} - traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist volumes: diff --git a/fantom/opera/fantom-testnet-opera-pruned.yml b/fantom/opera/fantom-testnet-opera-pruned.yml index 4b7e0973..d0212dbf 100644 --- a/fantom/opera/fantom-testnet-opera-pruned.yml +++ b/fantom/opera/fantom-testnet-opera-pruned.yml @@ -64,8 +64,8 @@ services: - traefik.http.services.fantom-testnet-opera-pruned.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=PathRegex(`^/fantom-testnet/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))} + - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)} - traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist volumes: diff --git a/fantom/sonic/fantom-mainnet-sonic-archive.yml b/fantom/sonic/fantom-mainnet-sonic-archive.yml index 34bc33ce..419501cd 100644 --- a/fantom/sonic/fantom-mainnet-sonic-archive.yml +++ b/fantom/sonic/fantom-mainnet-sonic-archive.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.fantom-mainnet-sonic-archive.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=PathRegex(`^/fantom-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)} - traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist volumes: diff --git a/fantom/sonic/fantom-testnet-sonic-archive.yml b/fantom/sonic/fantom-testnet-sonic-archive.yml index a969a3fb..5a6df20d 100644 --- a/fantom/sonic/fantom-testnet-sonic-archive.yml +++ b/fantom/sonic/fantom-testnet-sonic-archive.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.fantom-testnet-sonic-archive.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=PathRegex(`^/fantom-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)} - traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist volumes: diff --git a/gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml b/gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml index 37e15935..a08b959a 100644 --- a/gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml +++ b/gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.gnosis-chiado-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=PathRegex(`^/gnosis-chiado-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`))} + - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`)} - traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-chiado-erigon3-archive-trace.service=gnosis-chiado-erigon3-archive-trace - traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.service=gnosis-chiado-erigon3-archive-trace-node diff --git a/gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml b/gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml index cfecd7bc..14f2dce2 100644 --- a/gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml +++ b/gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.gnosis-chiado-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=PathRegex(`^/gnosis-chiado-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`))} + - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`)} - traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.service=gnosis-chiado-erigon3-minimal-trace - traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.service=gnosis-chiado-erigon3-minimal-trace-node diff --git a/gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml b/gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml index dfbbfa0f..ff9212c6 100644 --- a/gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml +++ b/gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.gnosis-chiado-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado/?$`)} - - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=PathRegex(`^/gnosis-chiado/?$`)} + - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`))} + - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`)} - traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.service=gnosis-chiado-erigon3-pruned-trace - traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.service=gnosis-chiado-erigon3-pruned-trace-node diff --git a/gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml b/gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml index e9fb1231..83b3de6b 100644 --- a/gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml +++ b/gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.gnosis-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=PathRegex(`^/gnosis-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`)} - traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.service=gnosis-mainnet-erigon3-archive-trace - traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.service=gnosis-mainnet-erigon3-archive-trace-node diff --git a/gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml b/gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml index 56b10bf5..878bcd2e 100644 --- a/gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml +++ b/gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.gnosis-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/gnosis-mainnet-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`))} + - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`)} - traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.service=gnosis-mainnet-erigon3-minimal-trace - traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.service=gnosis-mainnet-erigon3-minimal-trace-node diff --git a/gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml b/gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml index 8ff3a052..5302033b 100644 --- a/gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml +++ b/gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.gnosis-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/gnosis-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`)} - traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.service=gnosis-mainnet-erigon3-pruned-trace - traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.service=gnosis-mainnet-erigon3-pruned-trace-node diff --git a/goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml b/goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml index 8bf597f6..c50eec54 100644 --- a/goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml +++ b/goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml @@ -37,8 +37,8 @@ services: - traefik.http.services.goat-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=PathRegex(`^/goat-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`)} - traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/goat/geth/goat-mainnet-geth-pruned-pebble-path.yml b/goat/geth/goat-mainnet-geth-pruned-pebble-path.yml index b9cc3aff..eada482d 100644 --- a/goat/geth/goat-mainnet-geth-pruned-pebble-path.yml +++ b/goat/geth/goat-mainnet-geth-pruned-pebble-path.yml @@ -37,8 +37,8 @@ services: - traefik.http.services.goat-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=PathRegex(`^/goat-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet`) || Path(`/goat-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Path(`/goat-mainnet`) || Path(`/goat-mainnet/`)} - traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml b/goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml index 5d1f357e..4fc6e88c 100644 --- a/goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml +++ b/goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml @@ -37,8 +37,8 @@ services: - traefik.http.services.goat-testnet3-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-testnet3-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=PathRegex(`^/goat-testnet3-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`))} + - ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`)} - traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/goat/geth/goat-testnet3-geth-pruned-pebble-path.yml b/goat/geth/goat-testnet3-geth-pruned-pebble-path.yml index 39824ae1..d44a0d15 100644 --- a/goat/geth/goat-testnet3-geth-pruned-pebble-path.yml +++ b/goat/geth/goat-testnet3-geth-pruned-pebble-path.yml @@ -37,8 +37,8 @@ services: - traefik.http.services.goat-testnet3-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-testnet3/?$`)} - - ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=PathRegex(`^/goat-testnet3/?$`)} + - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3`) || Path(`/goat-testnet3/`))} + - ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Path(`/goat-testnet3`) || Path(`/goat-testnet3/`)} - traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/haqq/haqq/haqq-mainnet-haqq-pruned.yml b/haqq/haqq/haqq-mainnet-haqq-pruned.yml index e3d91a32..f21acf6a 100644 --- a/haqq/haqq/haqq-mainnet-haqq-pruned.yml +++ b/haqq/haqq/haqq-mainnet-haqq-pruned.yml @@ -37,8 +37,8 @@ services: - traefik.http.services.haqq-mainnet-haqq-pruned.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/haqq-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=PathRegex(`^/haqq-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && (Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)} - traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist volumes: diff --git a/lens/external-node/lens-mainnet-external-node-archive.yml b/lens/external-node/lens-mainnet-external-node-archive.yml index 7be2b1dc..368fb21a 100644 --- a/lens/external-node/lens-mainnet-external-node-archive.yml +++ b/lens/external-node/lens-mainnet-external-node-archive.yml @@ -83,8 +83,8 @@ services: - traefik.http.services.lens-mainnet-external-node-archive.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=PathRegex(`^/lens-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)} - traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipwhitelist lens-mainnet-archive-db: diff --git a/lens/external-node/lens-mainnet-external-node-pruned.yml b/lens/external-node/lens-mainnet-external-node-pruned.yml index 1c90205e..7774751a 100644 --- a/lens/external-node/lens-mainnet-external-node-pruned.yml +++ b/lens/external-node/lens-mainnet-external-node-pruned.yml @@ -83,8 +83,8 @@ services: - traefik.http.services.lens-mainnet-external-node-pruned.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=PathRegex(`^/lens-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet`) || Path(`/lens-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)} - traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipwhitelist lens-mainnet-db: diff --git a/lens/external-node/lens-testnet-external-node-archive.yml b/lens/external-node/lens-testnet-external-node-archive.yml index f97cf712..2b7e7e29 100644 --- a/lens/external-node/lens-testnet-external-node-archive.yml +++ b/lens/external-node/lens-testnet-external-node-archive.yml @@ -82,8 +82,8 @@ services: - traefik.http.services.lens-testnet-external-node-archive.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=PathRegex(`^/lens-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)} - traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipwhitelist lens-testnet-archive-db: diff --git a/lens/external-node/lens-testnet-external-node-pruned.yml b/lens/external-node/lens-testnet-external-node-pruned.yml index 3889f674..497218d9 100644 --- a/lens/external-node/lens-testnet-external-node-pruned.yml +++ b/lens/external-node/lens-testnet-external-node-pruned.yml @@ -82,8 +82,8 @@ services: - traefik.http.services.lens-testnet-external-node-pruned.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-testnet/?$`)} - - ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=PathRegex(`^/lens-testnet/?$`)} + - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet`) || Path(`/lens-testnet/`))} + - ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=Path(`/lens-testnet`) || Path(`/lens-testnet/`)} - traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipwhitelist lens-testnet-db: diff --git a/linea/erigon3/linea-mainnet-erigon3-archive-trace.yml b/linea/erigon3/linea-mainnet-erigon3-archive-trace.yml index 7ce71506..d9a5c98f 100644 --- a/linea/erigon3/linea-mainnet-erigon3-archive-trace.yml +++ b/linea/erigon3/linea-mainnet-erigon3-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.linea-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=PathRegex(`^/linea-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`)} - traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist volumes: diff --git a/linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml b/linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml index 7f57234d..01ec7a4d 100644 --- a/linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml +++ b/linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.linea-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/linea-mainnet-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`))} + - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`)} - traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist volumes: diff --git a/linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml b/linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml index c3383fb7..7b6a873c 100644 --- a/linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml +++ b/linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.linea-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/linea-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet`) || Path(`/linea-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)} - traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist volumes: diff --git a/linea/erigon3/linea-sepolia-erigon3-archive-trace.yml b/linea/erigon3/linea-sepolia-erigon3-archive-trace.yml index 44b866db..2c2c86bd 100644 --- a/linea/erigon3/linea-sepolia-erigon3-archive-trace.yml +++ b/linea/erigon3/linea-sepolia-erigon3-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.linea-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=PathRegex(`^/linea-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`)} - traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist volumes: diff --git a/linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml b/linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml index 3d3c208c..dd39480c 100644 --- a/linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml +++ b/linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.linea-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=PathRegex(`^/linea-sepolia-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`))} + - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`)} - traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist volumes: diff --git a/linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml b/linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml index 9937f183..6b791ca3 100644 --- a/linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml +++ b/linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.linea-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=PathRegex(`^/linea-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia`) || Path(`/linea-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)} - traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist volumes: diff --git a/op/erigon/base-mainnet-op-erigon-archive-trace.yml b/op/erigon/base-mainnet-op-erigon-archive-trace.yml index 3e500ab8..99dc40f3 100644 --- a/op/erigon/base-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/base-mainnet-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.base-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/base-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`)} - traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist base-mainnet-archive-node: diff --git a/op/erigon/base-sepolia-op-erigon-archive-trace.yml b/op/erigon/base-sepolia-op-erigon-archive-trace.yml index ce6484a3..d9256d67 100644 --- a/op/erigon/base-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/base-sepolia-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.base-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/base-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`)} - traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist base-sepolia-archive-node: diff --git a/op/erigon/bob-mainnet-op-erigon-archive-trace.yml b/op/erigon/bob-mainnet-op-erigon-archive-trace.yml index 42238058..0fa158a5 100644 --- a/op/erigon/bob-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/bob-mainnet-op-erigon-archive-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.bob-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/bob-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/bob-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`)} - traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist bob-mainnet-archive-node: diff --git a/op/erigon/boba-mainnet-op-erigon-archive-trace.yml b/op/erigon/boba-mainnet-op-erigon-archive-trace.yml index 7d71d5c2..3d5897d2 100644 --- a/op/erigon/boba-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/boba-mainnet-op-erigon-archive-trace.yml @@ -64,8 +64,8 @@ services: - traefik.http.services.boba-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/boba-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/boba-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`)} - traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist boba-mainnet-archive-node: diff --git a/op/erigon/boba-sepolia-op-erigon-archive-trace.yml b/op/erigon/boba-sepolia-op-erigon-archive-trace.yml index 73a5268f..cc2fd87c 100644 --- a/op/erigon/boba-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/boba-sepolia-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.boba-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/boba-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/boba-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/boba-sepolia-archive`) || Path(`/boba-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Path(`/boba-sepolia-archive`) || Path(`/boba-sepolia-archive/`)} - traefik.http.routers.boba-sepolia-op-erigon-archive-trace.middlewares=boba-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist boba-sepolia-archive-node: diff --git a/op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml b/op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml index 0c2357c8..7839fe94 100644 --- a/op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.hashkeychain-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/hashkeychain-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/hashkeychain-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/hashkeychain-mainnet-archive`) || Path(`/hashkeychain-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Path(`/hashkeychain-mainnet-archive`) || Path(`/hashkeychain-mainnet-archive/`)} - traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.middlewares=hashkeychain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist hashkeychain-mainnet-archive-node: diff --git a/op/erigon/ink-mainnet-op-erigon-archive-trace.yml b/op/erigon/ink-mainnet-op-erigon-archive-trace.yml index 84b38b2f..e79b37d2 100644 --- a/op/erigon/ink-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/ink-mainnet-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.ink-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/ink-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ink-mainnet-archive`) || Path(`/ink-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Path(`/ink-mainnet-archive`) || Path(`/ink-mainnet-archive/`)} - traefik.http.routers.ink-mainnet-op-erigon-archive-trace.middlewares=ink-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist ink-mainnet-archive-node: diff --git a/op/erigon/ink-sepolia-op-erigon-archive-trace.yml b/op/erigon/ink-sepolia-op-erigon-archive-trace.yml index 575bb2be..44a7ffd2 100644 --- a/op/erigon/ink-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/ink-sepolia-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.ink-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/ink-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ink-sepolia-archive`) || Path(`/ink-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Path(`/ink-sepolia-archive`) || Path(`/ink-sepolia-archive/`)} - traefik.http.routers.ink-sepolia-op-erigon-archive-trace.middlewares=ink-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist ink-sepolia-archive-node: diff --git a/op/erigon/lisk-mainnet-op-erigon-archive-trace.yml b/op/erigon/lisk-mainnet-op-erigon-archive-trace.yml index d70c34cc..854ba545 100644 --- a/op/erigon/lisk-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/lisk-mainnet-op-erigon-archive-trace.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.lisk-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/lisk-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/lisk-mainnet-archive`) || Path(`/lisk-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Path(`/lisk-mainnet-archive`) || Path(`/lisk-mainnet-archive/`)} - traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.middlewares=lisk-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist lisk-mainnet-archive-node: diff --git a/op/erigon/metal-mainnet-op-erigon-archive-trace.yml b/op/erigon/metal-mainnet-op-erigon-archive-trace.yml index 442f20f2..35d2d559 100644 --- a/op/erigon/metal-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/metal-mainnet-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.metal-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/metal-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/metal-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/metal-mainnet-archive`) || Path(`/metal-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Path(`/metal-mainnet-archive`) || Path(`/metal-mainnet-archive/`)} - traefik.http.routers.metal-mainnet-op-erigon-archive-trace.middlewares=metal-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist metal-mainnet-archive-node: diff --git a/op/erigon/mode-mainnet-op-erigon-archive-trace.yml b/op/erigon/mode-mainnet-op-erigon-archive-trace.yml index f864e180..4c5a122b 100644 --- a/op/erigon/mode-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/mode-mainnet-op-erigon-archive-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.mode-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/mode-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/mode-mainnet-archive`) || Path(`/mode-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Path(`/mode-mainnet-archive`) || Path(`/mode-mainnet-archive/`)} - traefik.http.routers.mode-mainnet-op-erigon-archive-trace.middlewares=mode-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist mode-mainnet-archive-node: diff --git a/op/erigon/mode-sepolia-op-erigon-archive-trace.yml b/op/erigon/mode-sepolia-op-erigon-archive-trace.yml index 6a2fd715..3a8c15f8 100644 --- a/op/erigon/mode-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/mode-sepolia-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.mode-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/mode-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/mode-sepolia-archive`) || Path(`/mode-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Path(`/mode-sepolia-archive`) || Path(`/mode-sepolia-archive/`)} - traefik.http.routers.mode-sepolia-op-erigon-archive-trace.middlewares=mode-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist mode-sepolia-archive-node: diff --git a/op/erigon/op-mainnet-op-erigon-archive-trace.yml b/op/erigon/op-mainnet-op-erigon-archive-trace.yml index 35194a43..b1f03913 100644 --- a/op/erigon/op-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/op-mainnet-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.op-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/op-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/op-mainnet-archive`) || Path(`/op-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Path(`/op-mainnet-archive`) || Path(`/op-mainnet-archive/`)} - traefik.http.routers.op-mainnet-op-erigon-archive-trace.middlewares=op-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist op-mainnet-archive-node: diff --git a/op/erigon/op-sepolia-op-erigon-archive-trace.yml b/op/erigon/op-sepolia-op-erigon-archive-trace.yml index c0c360d2..bcbbe821 100644 --- a/op/erigon/op-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/op-sepolia-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.op-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/op-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/op-sepolia-archive`) || Path(`/op-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Path(`/op-sepolia-archive`) || Path(`/op-sepolia-archive/`)} - traefik.http.routers.op-sepolia-op-erigon-archive-trace.middlewares=op-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist op-sepolia-archive-node: diff --git a/op/erigon/snax-mainnet-op-erigon-archive-trace.yml b/op/erigon/snax-mainnet-op-erigon-archive-trace.yml index 61e9558c..116e3653 100644 --- a/op/erigon/snax-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/snax-mainnet-op-erigon-archive-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.snax-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/snax-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/snax-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/snax-mainnet-archive`) || Path(`/snax-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Path(`/snax-mainnet-archive`) || Path(`/snax-mainnet-archive/`)} - traefik.http.routers.snax-mainnet-op-erigon-archive-trace.middlewares=snax-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist snax-mainnet-archive-node: diff --git a/op/erigon/soneium-minato-op-erigon-archive-trace.yml b/op/erigon/soneium-minato-op-erigon-archive-trace.yml index 3b22b994..0d27c29a 100644 --- a/op/erigon/soneium-minato-op-erigon-archive-trace.yml +++ b/op/erigon/soneium-minato-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.soneium-minato-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.soneium-minato-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.soneium-minato-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/soneium-minato-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=PathRegex(`^/soneium-minato-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/soneium-minato-archive`) || Path(`/soneium-minato-archive/`))} + - ${NO_SSL:+traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=Path(`/soneium-minato-archive`) || Path(`/soneium-minato-archive/`)} - traefik.http.routers.soneium-minato-op-erigon-archive-trace.middlewares=soneium-minato-op-erigon-archive-trace-stripprefix, ipwhitelist soneium-minato-archive-node: diff --git a/op/erigon/swell-mainnet-op-erigon-archive-trace.yml b/op/erigon/swell-mainnet-op-erigon-archive-trace.yml index 5d240bf6..347d6afd 100644 --- a/op/erigon/swell-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/swell-mainnet-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.swell-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/swell-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/swell-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/swell-mainnet-archive`) || Path(`/swell-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=Path(`/swell-mainnet-archive`) || Path(`/swell-mainnet-archive/`)} - traefik.http.routers.swell-mainnet-op-erigon-archive-trace.middlewares=swell-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist swell-mainnet-archive-node: diff --git a/op/erigon/unichain-mainnet-op-erigon-archive-trace.yml b/op/erigon/unichain-mainnet-op-erigon-archive-trace.yml index fd12ac2f..1e65c1ec 100644 --- a/op/erigon/unichain-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/unichain-mainnet-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.unichain-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/unichain-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/unichain-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/unichain-mainnet-archive`) || Path(`/unichain-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=Path(`/unichain-mainnet-archive`) || Path(`/unichain-mainnet-archive/`)} - traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.middlewares=unichain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist unichain-mainnet-archive-node: diff --git a/op/erigon/unichain-sepolia-op-erigon-archive-trace.yml b/op/erigon/unichain-sepolia-op-erigon-archive-trace.yml index a627d5e0..ec451587 100644 --- a/op/erigon/unichain-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/unichain-sepolia-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.unichain-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/unichain-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/unichain-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/unichain-sepolia-archive`) || Path(`/unichain-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=Path(`/unichain-sepolia-archive`) || Path(`/unichain-sepolia-archive/`)} - traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.middlewares=unichain-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist unichain-sepolia-archive-node: diff --git a/op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml b/op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml index be8adf16..3ad81fd2 100644 --- a/op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.worldchain-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/worldchain-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/worldchain-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/worldchain-mainnet-archive`) || Path(`/worldchain-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=Path(`/worldchain-mainnet-archive`) || Path(`/worldchain-mainnet-archive/`)} - traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.middlewares=worldchain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist worldchain-mainnet-archive-node: diff --git a/op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml b/op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml index e9974024..bc7048b4 100644 --- a/op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.worldchain-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/worldchain-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/worldchain-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/worldchain-sepolia-archive`) || Path(`/worldchain-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=Path(`/worldchain-sepolia-archive`) || Path(`/worldchain-sepolia-archive/`)} - traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.middlewares=worldchain-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist worldchain-sepolia-archive-node: diff --git a/op/erigon/zora-mainnet-op-erigon-archive-trace.yml b/op/erigon/zora-mainnet-op-erigon-archive-trace.yml index a5cbbb4f..5d0fe2d6 100644 --- a/op/erigon/zora-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/zora-mainnet-op-erigon-archive-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.zora-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/zora-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/zora-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/zora-mainnet-archive`) || Path(`/zora-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=Path(`/zora-mainnet-archive`) || Path(`/zora-mainnet-archive/`)} - traefik.http.routers.zora-mainnet-op-erigon-archive-trace.middlewares=zora-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist zora-mainnet-archive-node: diff --git a/op/erigon/zora-sepolia-op-erigon-archive-trace.yml b/op/erigon/zora-sepolia-op-erigon-archive-trace.yml index d5ad076b..495da45d 100644 --- a/op/erigon/zora-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/zora-sepolia-op-erigon-archive-trace.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.zora-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-erigon-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/zora-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/zora-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/zora-sepolia-archive`) || Path(`/zora-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=Path(`/zora-sepolia-archive`) || Path(`/zora-sepolia-archive/`)} - traefik.http.routers.zora-sepolia-op-erigon-archive-trace.middlewares=zora-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist zora-sepolia-archive-node: diff --git a/op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml index cc967a0a..e74d6f8f 100644 --- a/op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.base-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/base-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/base-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`)} - traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.middlewares=base-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist base-mainnet-archive-node: diff --git a/op/geth/base-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/base-mainnet-op-geth-pruned-pebble-path.yml index 74ca81c1..c0651480 100644 --- a/op/geth/base-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/base-mainnet-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.base-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/base-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/base-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet`) || Path(`/base-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.rule=Path(`/base-mainnet`) || Path(`/base-mainnet/`)} - traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.middlewares=base-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist base-mainnet-node: diff --git a/op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml index 32b020f5..72b2e175 100644 --- a/op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.base-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/base-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/base-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`)} - traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.middlewares=base-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist base-sepolia-archive-node: diff --git a/op/geth/base-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/base-sepolia-op-geth-pruned-pebble-path.yml index f684554d..b04b96df 100644 --- a/op/geth/base-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/base-sepolia-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.base-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/base-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/base-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia`) || Path(`/base-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.rule=Path(`/base-sepolia`) || Path(`/base-sepolia/`)} - traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.middlewares=base-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist base-sepolia-node: diff --git a/op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml index 6d2b6555..152834f1 100644 --- a/op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.blast-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/blast-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/blast-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/blast-mainnet-archive`) || Path(`/blast-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/blast-mainnet-archive`) || Path(`/blast-mainnet-archive/`)} - traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.middlewares=blast-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist blast-mainnet-archive-node: diff --git a/op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml index e0cb8516..e01e451e 100644 --- a/op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.blast-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/blast-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/blast-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/blast-mainnet`) || Path(`/blast-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.rule=Path(`/blast-mainnet`) || Path(`/blast-mainnet/`)} - traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.middlewares=blast-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist blast-mainnet-node: diff --git a/op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml b/op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml index 335c9aa5..6ae9f66f 100644 --- a/op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml +++ b/op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.blast-sepolia-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/blast-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.rule=PathRegex(`^/blast-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/blast-sepolia`) || Path(`/blast-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.rule=Path(`/blast-sepolia`) || Path(`/blast-sepolia/`)} - traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.middlewares=blast-sepolia-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist blast-sepolia-node: diff --git a/op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml index e41a9398..6d106962 100644 --- a/op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.bob-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/bob-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/bob-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`)} - traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.middlewares=bob-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist bob-mainnet-archive-node: diff --git a/op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml b/op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml index 4fa93087..935c120c 100644 --- a/op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.bob-mainnet-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/bob-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.rule=PathRegex(`^/bob-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/bob-mainnet`) || Path(`/bob-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.rule=Path(`/bob-mainnet`) || Path(`/bob-mainnet/`)} - traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.middlewares=bob-mainnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist bob-mainnet-node: diff --git a/op/geth/boba-mainnet-op-geth-pruned.yml b/op/geth/boba-mainnet-op-geth-pruned.yml index 19eb6cd1..d833e2d7 100644 --- a/op/geth/boba-mainnet-op-geth-pruned.yml +++ b/op/geth/boba-mainnet-op-geth-pruned.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.boba-mainnet-op-geth-pruned.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-geth-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-geth-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-geth-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/boba-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.boba-mainnet-op-geth-pruned.rule=PathRegex(`^/boba-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-geth-pruned.rule=Host(`$DOMAIN`) && (Path(`/boba-mainnet`) || Path(`/boba-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.boba-mainnet-op-geth-pruned.rule=Path(`/boba-mainnet`) || Path(`/boba-mainnet/`)} - traefik.http.routers.boba-mainnet-op-geth-pruned.middlewares=boba-mainnet-op-geth-pruned-stripprefix, ipwhitelist boba-mainnet-node: diff --git a/op/geth/boba-sepolia-op-geth-pruned.yml b/op/geth/boba-sepolia-op-geth-pruned.yml index 7a004f37..b3bf0c14 100644 --- a/op/geth/boba-sepolia-op-geth-pruned.yml +++ b/op/geth/boba-sepolia-op-geth-pruned.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.boba-sepolia-op-geth-pruned.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-geth-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-geth-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-geth-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/boba-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.boba-sepolia-op-geth-pruned.rule=PathRegex(`^/boba-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-geth-pruned.rule=Host(`$DOMAIN`) && (Path(`/boba-sepolia`) || Path(`/boba-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.boba-sepolia-op-geth-pruned.rule=Path(`/boba-sepolia`) || Path(`/boba-sepolia/`)} - traefik.http.routers.boba-sepolia-op-geth-pruned.middlewares=boba-sepolia-op-geth-pruned-stripprefix, ipwhitelist boba-sepolia-node: diff --git a/op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml b/op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml index ba9752d9..75ba96e3 100644 --- a/op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml +++ b/op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.celo-alfajores-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-alfajores-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.rule=PathRegex(`^/celo-alfajores-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`))} + - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.rule=Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`)} - traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.middlewares=celo-alfajores-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist celo-alfajores-archive-node: diff --git a/op/geth/celo-alfajores-op-geth-pruned-leveldb-hash.yml b/op/geth/celo-alfajores-op-geth-pruned-leveldb-hash.yml index 89f14c7f..8ea6b629 100644 --- a/op/geth/celo-alfajores-op-geth-pruned-leveldb-hash.yml +++ b/op/geth/celo-alfajores-op-geth-pruned-leveldb-hash.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.celo-alfajores-op-geth-pruned-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-alfajores/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-pruned-leveldb-hash.rule=PathRegex(`^/celo-alfajores/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores`) || Path(`/celo-alfajores/`))} + - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-pruned-leveldb-hash.rule=Path(`/celo-alfajores`) || Path(`/celo-alfajores/`)} - traefik.http.routers.celo-alfajores-op-geth-pruned-leveldb-hash.middlewares=celo-alfajores-op-geth-pruned-leveldb-hash-stripprefix, ipwhitelist celo-alfajores-node: diff --git a/op/geth/celo-alfajores-op-geth-pruned-pebble-hash.yml b/op/geth/celo-alfajores-op-geth-pruned-pebble-hash.yml index 22702a81..c96bd792 100644 --- a/op/geth/celo-alfajores-op-geth-pruned-pebble-hash.yml +++ b/op/geth/celo-alfajores-op-geth-pruned-pebble-hash.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.celo-alfajores-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-alfajores/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-hash.rule=PathRegex(`^/celo-alfajores/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores`) || Path(`/celo-alfajores/`))} + - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-hash.rule=Path(`/celo-alfajores`) || Path(`/celo-alfajores/`)} - traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-hash.middlewares=celo-alfajores-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist celo-alfajores-node: diff --git a/op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml b/op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml index b3dd6cc6..8b8eb669 100644 --- a/op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml +++ b/op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.celo-alfajores-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-alfajores/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.rule=PathRegex(`^/celo-alfajores/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores`) || Path(`/celo-alfajores/`))} + - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.rule=Path(`/celo-alfajores`) || Path(`/celo-alfajores/`)} - traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.middlewares=celo-alfajores-op-geth-pruned-pebble-path-stripprefix, ipwhitelist celo-alfajores-node: diff --git a/op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml index c1e4482a..3f8f479f 100644 --- a/op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.celo-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/celo-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`)} - traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.middlewares=celo-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist celo-mainnet-archive-node: diff --git a/op/geth/celo-mainnet-op-geth-pruned-leveldb-hash.yml b/op/geth/celo-mainnet-op-geth-pruned-leveldb-hash.yml index 934a17a9..a8275e77 100644 --- a/op/geth/celo-mainnet-op-geth-pruned-leveldb-hash.yml +++ b/op/geth/celo-mainnet-op-geth-pruned-leveldb-hash.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.celo-mainnet-op-geth-pruned-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-pruned-leveldb-hash.rule=PathRegex(`^/celo-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet`) || Path(`/celo-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-pruned-leveldb-hash.rule=Path(`/celo-mainnet`) || Path(`/celo-mainnet/`)} - traefik.http.routers.celo-mainnet-op-geth-pruned-leveldb-hash.middlewares=celo-mainnet-op-geth-pruned-leveldb-hash-stripprefix, ipwhitelist celo-mainnet-node: diff --git a/op/geth/celo-mainnet-op-geth-pruned-pebble-hash.yml b/op/geth/celo-mainnet-op-geth-pruned-pebble-hash.yml index ecc8b013..de777be1 100644 --- a/op/geth/celo-mainnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/celo-mainnet-op-geth-pruned-pebble-hash.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.celo-mainnet-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-hash.rule=PathRegex(`^/celo-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet`) || Path(`/celo-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-hash.rule=Path(`/celo-mainnet`) || Path(`/celo-mainnet/`)} - traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-hash.middlewares=celo-mainnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist celo-mainnet-node: diff --git a/op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml index 1affac4e..7b93afb3 100644 --- a/op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml @@ -71,8 +71,8 @@ services: - traefik.http.services.celo-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/celo-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet`) || Path(`/celo-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.rule=Path(`/celo-mainnet`) || Path(`/celo-mainnet/`)} - traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.middlewares=celo-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist celo-mainnet-node: diff --git a/op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml index e2bee95e..e48dcdd4 100644 --- a/op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml @@ -73,8 +73,8 @@ services: - traefik.http.services.fraxtal-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/fraxtal-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/fraxtal-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/fraxtal-mainnet-archive`) || Path(`/fraxtal-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/fraxtal-mainnet-archive`) || Path(`/fraxtal-mainnet-archive/`)} - traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.middlewares=fraxtal-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist fraxtal-mainnet-archive-node: diff --git a/op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml index 3883da41..caaf8cd5 100644 --- a/op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml @@ -73,8 +73,8 @@ services: - traefik.http.services.fraxtal-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/fraxtal-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/fraxtal-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/fraxtal-mainnet`) || Path(`/fraxtal-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.rule=Path(`/fraxtal-mainnet`) || Path(`/fraxtal-mainnet/`)} - traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.middlewares=fraxtal-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist fraxtal-mainnet-node: diff --git a/op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml b/op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml index 42081940..d1dcb7a0 100644 --- a/op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml @@ -72,8 +72,8 @@ services: - traefik.http.services.fraxtal-testnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/fraxtal-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/fraxtal-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/fraxtal-testnet-archive`) || Path(`/fraxtal-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.rule=Path(`/fraxtal-testnet-archive`) || Path(`/fraxtal-testnet-archive/`)} - traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.middlewares=fraxtal-testnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist fraxtal-testnet-archive-node: diff --git a/op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml b/op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml index 360bf1e7..8629b0d2 100644 --- a/op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml @@ -72,8 +72,8 @@ services: - traefik.http.services.fraxtal-testnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/fraxtal-testnet/?$`)} - - ${NO_SSL:+traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/fraxtal-testnet/?$`)} + - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/fraxtal-testnet`) || Path(`/fraxtal-testnet/`))} + - ${NO_SSL:+traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.rule=Path(`/fraxtal-testnet`) || Path(`/fraxtal-testnet/`)} - traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.middlewares=fraxtal-testnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist fraxtal-testnet-node: diff --git a/op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml index d7786a04..365645ef 100644 --- a/op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.hashkeychain-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/hashkeychain-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/hashkeychain-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/hashkeychain-mainnet-archive`) || Path(`/hashkeychain-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/hashkeychain-mainnet-archive`) || Path(`/hashkeychain-mainnet-archive/`)} - traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.middlewares=hashkeychain-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist hashkeychain-mainnet-archive-node: diff --git a/op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml index a5a989de..70bd8d69 100644 --- a/op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.hashkeychain-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/hashkeychain-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/hashkeychain-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/hashkeychain-mainnet`) || Path(`/hashkeychain-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.rule=Path(`/hashkeychain-mainnet`) || Path(`/hashkeychain-mainnet/`)} - traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.middlewares=hashkeychain-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist hashkeychain-mainnet-node: diff --git a/op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml index 3582e2ad..ba930b77 100644 --- a/op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.ink-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/ink-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/ink-mainnet-archive`) || Path(`/ink-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/ink-mainnet-archive`) || Path(`/ink-mainnet-archive/`)} - traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.middlewares=ink-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist ink-mainnet-archive-node: diff --git a/op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml index 78a25627..d162e4d4 100644 --- a/op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.ink-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/ink-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ink-mainnet`) || Path(`/ink-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.rule=Path(`/ink-mainnet`) || Path(`/ink-mainnet/`)} - traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.middlewares=ink-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist ink-mainnet-node: diff --git a/op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml index c8c2b626..e4d7512f 100644 --- a/op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.ink-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/ink-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/ink-sepolia-archive`) || Path(`/ink-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/ink-sepolia-archive`) || Path(`/ink-sepolia-archive/`)} - traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.middlewares=ink-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist ink-sepolia-archive-node: diff --git a/op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml index 6b069f64..67c7ff65 100644 --- a/op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.ink-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/ink-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ink-sepolia`) || Path(`/ink-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.rule=Path(`/ink-sepolia`) || Path(`/ink-sepolia/`)} - traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.middlewares=ink-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist ink-sepolia-node: diff --git a/op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml index fe709262..2a91f4ed 100644 --- a/op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml @@ -69,8 +69,8 @@ services: - traefik.http.services.lisk-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/lisk-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/lisk-mainnet-archive`) || Path(`/lisk-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/lisk-mainnet-archive`) || Path(`/lisk-mainnet-archive/`)} - traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.middlewares=lisk-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist lisk-mainnet-archive-node: diff --git a/op/geth/lisk-mainnet-op-geth-pruned-pebble-hash.yml b/op/geth/lisk-mainnet-op-geth-pruned-pebble-hash.yml index 51efa5a1..9bfdeb68 100644 --- a/op/geth/lisk-mainnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/lisk-mainnet-op-geth-pruned-pebble-hash.yml @@ -69,8 +69,8 @@ services: - traefik.http.services.lisk-mainnet-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-hash.rule=PathRegex(`^/lisk-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/lisk-mainnet`) || Path(`/lisk-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-hash.rule=Path(`/lisk-mainnet`) || Path(`/lisk-mainnet/`)} - traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-hash.middlewares=lisk-mainnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist lisk-mainnet-node: diff --git a/op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml index e5fdfcd2..636c6e32 100644 --- a/op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml @@ -69,8 +69,8 @@ services: - traefik.http.services.lisk-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/lisk-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/lisk-mainnet`) || Path(`/lisk-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.rule=Path(`/lisk-mainnet`) || Path(`/lisk-mainnet/`)} - traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.middlewares=lisk-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist lisk-mainnet-node: diff --git a/op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml index d314366a..1d98078a 100644 --- a/op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml @@ -69,8 +69,8 @@ services: - traefik.http.services.lisk-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/lisk-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/lisk-sepolia-archive`) || Path(`/lisk-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/lisk-sepolia-archive`) || Path(`/lisk-sepolia-archive/`)} - traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.middlewares=lisk-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist lisk-sepolia-archive-node: diff --git a/op/geth/lisk-sepolia-op-geth-pruned-pebble-hash.yml b/op/geth/lisk-sepolia-op-geth-pruned-pebble-hash.yml index cada0ed6..539a2b97 100644 --- a/op/geth/lisk-sepolia-op-geth-pruned-pebble-hash.yml +++ b/op/geth/lisk-sepolia-op-geth-pruned-pebble-hash.yml @@ -69,8 +69,8 @@ services: - traefik.http.services.lisk-sepolia-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-hash.rule=PathRegex(`^/lisk-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/lisk-sepolia`) || Path(`/lisk-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-hash.rule=Path(`/lisk-sepolia`) || Path(`/lisk-sepolia/`)} - traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-hash.middlewares=lisk-sepolia-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist lisk-sepolia-node: diff --git a/op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml index 9dda2fa7..5f89301e 100644 --- a/op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml @@ -69,8 +69,8 @@ services: - traefik.http.services.lisk-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/lisk-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/lisk-sepolia`) || Path(`/lisk-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.rule=Path(`/lisk-sepolia`) || Path(`/lisk-sepolia/`)} - traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.middlewares=lisk-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist lisk-sepolia-node: diff --git a/op/geth/manta-pacific-mainnet-op-geth-archive-pebble-hash.yml b/op/geth/manta-pacific-mainnet-op-geth-archive-pebble-hash.yml index 75205786..1935003c 100644 --- a/op/geth/manta-pacific-mainnet-op-geth-archive-pebble-hash.yml +++ b/op/geth/manta-pacific-mainnet-op-geth-archive-pebble-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.manta-pacific-mainnet-op-geth-archive-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.manta-pacific-mainnet-op-geth-archive-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.manta-pacific-mainnet-op-geth-archive-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.manta-pacific-mainnet-op-geth-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/manta-pacific-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.manta-pacific-mainnet-op-geth-archive-pebble-hash.rule=PathRegex(`^/manta-pacific-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.manta-pacific-mainnet-op-geth-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/manta-pacific-mainnet-archive`) || Path(`/manta-pacific-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.manta-pacific-mainnet-op-geth-archive-pebble-hash.rule=Path(`/manta-pacific-mainnet-archive`) || Path(`/manta-pacific-mainnet-archive/`)} - traefik.http.routers.manta-pacific-mainnet-op-geth-archive-pebble-hash.middlewares=manta-pacific-mainnet-op-geth-archive-pebble-hash-stripprefix, ipwhitelist manta-pacific-mainnet-archive-node: diff --git a/op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml index d3fa17d1..8e4b9ae5 100644 --- a/op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml @@ -66,8 +66,8 @@ services: - traefik.http.services.mantle-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/mantle-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/mantle-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/mantle-mainnet-archive`) || Path(`/mantle-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/mantle-mainnet-archive`) || Path(`/mantle-mainnet-archive/`)} - traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.middlewares=mantle-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist mantle-mainnet-archive-node: diff --git a/op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml b/op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml index f7f1f77a..2392447d 100644 --- a/op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml +++ b/op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml @@ -66,8 +66,8 @@ services: - traefik.http.services.mantle-mainnet-op-geth-pruned-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/mantle-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.rule=PathRegex(`^/mantle-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/mantle-mainnet`) || Path(`/mantle-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.rule=Path(`/mantle-mainnet`) || Path(`/mantle-mainnet/`)} - traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.middlewares=mantle-mainnet-op-geth-pruned-leveldb-hash-stripprefix, ipwhitelist mantle-mainnet-node: diff --git a/op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml index 4fc52585..6ecae620 100644 --- a/op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml @@ -64,8 +64,8 @@ services: - traefik.http.services.mantle-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/mantle-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/mantle-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/mantle-sepolia-archive`) || Path(`/mantle-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/mantle-sepolia-archive`) || Path(`/mantle-sepolia-archive/`)} - traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.middlewares=mantle-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist mantle-sepolia-archive-node: diff --git a/op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml b/op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml index f68dc6d5..3352c011 100644 --- a/op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml +++ b/op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml @@ -64,8 +64,8 @@ services: - traefik.http.services.mantle-sepolia-op-geth-pruned-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/mantle-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.rule=PathRegex(`^/mantle-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/mantle-sepolia`) || Path(`/mantle-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.rule=Path(`/mantle-sepolia`) || Path(`/mantle-sepolia/`)} - traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.middlewares=mantle-sepolia-op-geth-pruned-leveldb-hash-stripprefix, ipwhitelist mantle-sepolia-node: diff --git a/op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml index 685a2327..7f91d1f3 100644 --- a/op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.metal-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/metal-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/metal-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metal-mainnet-archive`) || Path(`/metal-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/metal-mainnet-archive`) || Path(`/metal-mainnet-archive/`)} - traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.middlewares=metal-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist metal-mainnet-archive-node: diff --git a/op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml index f5fc5107..2e324daa 100644 --- a/op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.metal-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/metal-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/metal-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/metal-mainnet`) || Path(`/metal-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.rule=Path(`/metal-mainnet`) || Path(`/metal-mainnet/`)} - traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.middlewares=metal-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist metal-mainnet-node: diff --git a/op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml index c0cc2b1d..59cdad42 100644 --- a/op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.metal-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/metal-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/metal-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metal-sepolia-archive`) || Path(`/metal-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/metal-sepolia-archive`) || Path(`/metal-sepolia-archive/`)} - traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.middlewares=metal-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist metal-sepolia-archive-node: diff --git a/op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml index f475adae..8084c2dd 100644 --- a/op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.metal-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/metal-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/metal-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/metal-sepolia`) || Path(`/metal-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.rule=Path(`/metal-sepolia`) || Path(`/metal-sepolia/`)} - traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.middlewares=metal-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist metal-sepolia-node: diff --git a/op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml index c9b2ad45..6f42baed 100644 --- a/op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.mode-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/mode-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/mode-mainnet-archive`) || Path(`/mode-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/mode-mainnet-archive`) || Path(`/mode-mainnet-archive/`)} - traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.middlewares=mode-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist mode-mainnet-archive-node: diff --git a/op/geth/mode-mainnet-op-geth-pruned-pebble-hash.yml b/op/geth/mode-mainnet-op-geth-pruned-pebble-hash.yml index 58ae63ae..a68db44e 100644 --- a/op/geth/mode-mainnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/mode-mainnet-op-geth-pruned-pebble-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.mode-mainnet-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-hash.rule=PathRegex(`^/mode-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/mode-mainnet`) || Path(`/mode-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-hash.rule=Path(`/mode-mainnet`) || Path(`/mode-mainnet/`)} - traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-hash.middlewares=mode-mainnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist mode-mainnet-node: diff --git a/op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml index ee735c23..1b73a9aa 100644 --- a/op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.mode-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/mode-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/mode-mainnet`) || Path(`/mode-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.rule=Path(`/mode-mainnet`) || Path(`/mode-mainnet/`)} - traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.middlewares=mode-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist mode-mainnet-node: diff --git a/op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml index a970ca24..987ffb80 100644 --- a/op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.mode-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/mode-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/mode-sepolia-archive`) || Path(`/mode-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/mode-sepolia-archive`) || Path(`/mode-sepolia-archive/`)} - traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.middlewares=mode-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist mode-sepolia-archive-node: diff --git a/op/geth/mode-sepolia-op-geth-pruned-pebble-hash.yml b/op/geth/mode-sepolia-op-geth-pruned-pebble-hash.yml index b67cc0b6..4dc5dec1 100644 --- a/op/geth/mode-sepolia-op-geth-pruned-pebble-hash.yml +++ b/op/geth/mode-sepolia-op-geth-pruned-pebble-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.mode-sepolia-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-hash.rule=PathRegex(`^/mode-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/mode-sepolia`) || Path(`/mode-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-hash.rule=Path(`/mode-sepolia`) || Path(`/mode-sepolia/`)} - traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-hash.middlewares=mode-sepolia-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist mode-sepolia-node: diff --git a/op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml index ba9f2bc0..94ea21d7 100644 --- a/op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.mode-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/mode-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/mode-sepolia`) || Path(`/mode-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.rule=Path(`/mode-sepolia`) || Path(`/mode-sepolia/`)} - traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.middlewares=mode-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist mode-sepolia-node: diff --git a/op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml index 3a6988ed..20b0f0c9 100644 --- a/op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.op-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/op-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/op-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/op-mainnet-archive`) || Path(`/op-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/op-mainnet-archive`) || Path(`/op-mainnet-archive/`)} - traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.middlewares=op-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist op-mainnet-archive-node: diff --git a/op/geth/op-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/op-mainnet-op-geth-pruned-pebble-path.yml index 6fec3ec8..5c61915b 100644 --- a/op/geth/op-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/op-mainnet-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.op-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/op-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/op-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/op-mainnet`) || Path(`/op-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.rule=Path(`/op-mainnet`) || Path(`/op-mainnet/`)} - traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.middlewares=op-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist op-mainnet-node: diff --git a/op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml index 44985f20..54dc5d42 100644 --- a/op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.op-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/op-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/op-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/op-sepolia-archive`) || Path(`/op-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/op-sepolia-archive`) || Path(`/op-sepolia-archive/`)} - traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.middlewares=op-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist op-sepolia-archive-node: diff --git a/op/geth/op-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/op-sepolia-op-geth-pruned-pebble-path.yml index 7116d62f..4ce208c9 100644 --- a/op/geth/op-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/op-sepolia-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.op-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/op-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/op-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/op-sepolia`) || Path(`/op-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.rule=Path(`/op-sepolia`) || Path(`/op-sepolia/`)} - traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.middlewares=op-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist op-sepolia-node: diff --git a/op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml index c941c11f..08cb74b2 100644 --- a/op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.snax-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/snax-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/snax-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/snax-mainnet-archive`) || Path(`/snax-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/snax-mainnet-archive`) || Path(`/snax-mainnet-archive/`)} - traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.middlewares=snax-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist snax-mainnet-archive-node: diff --git a/op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml index fd14fa88..4a388d14 100644 --- a/op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.snax-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/snax-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/snax-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/snax-mainnet`) || Path(`/snax-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.rule=Path(`/snax-mainnet`) || Path(`/snax-mainnet/`)} - traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.middlewares=snax-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist snax-mainnet-node: diff --git a/op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml b/op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml index 44d4b006..e2912131 100644 --- a/op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml +++ b/op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.soneium-minato-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/soneium-minato-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.rule=PathRegex(`^/soneium-minato-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/soneium-minato-archive`) || Path(`/soneium-minato-archive/`))} + - ${NO_SSL:+traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.rule=Path(`/soneium-minato-archive`) || Path(`/soneium-minato-archive/`)} - traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.middlewares=soneium-minato-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist soneium-minato-archive-node: diff --git a/op/geth/soneium-minato-op-geth-pruned-pebble-path.yml b/op/geth/soneium-minato-op-geth-pruned-pebble-path.yml index 197e457b..f436ae35 100644 --- a/op/geth/soneium-minato-op-geth-pruned-pebble-path.yml +++ b/op/geth/soneium-minato-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.soneium-minato-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/soneium-minato/?$`)} - - ${NO_SSL:+traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.rule=PathRegex(`^/soneium-minato/?$`)} + - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/soneium-minato`) || Path(`/soneium-minato/`))} + - ${NO_SSL:+traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.rule=Path(`/soneium-minato`) || Path(`/soneium-minato/`)} - traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.middlewares=soneium-minato-op-geth-pruned-pebble-path-stripprefix, ipwhitelist soneium-minato-node: diff --git a/op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml index 13c5dc2f..c5a92b07 100644 --- a/op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.swell-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/swell-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/swell-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/swell-mainnet-archive`) || Path(`/swell-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/swell-mainnet-archive`) || Path(`/swell-mainnet-archive/`)} - traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.middlewares=swell-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist swell-mainnet-archive-node: diff --git a/op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml index f01e3321..45e09ccc 100644 --- a/op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.swell-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/swell-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/swell-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/swell-mainnet`) || Path(`/swell-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.rule=Path(`/swell-mainnet`) || Path(`/swell-mainnet/`)} - traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.middlewares=swell-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist swell-mainnet-node: diff --git a/op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml index bc1f17fb..928bea4d 100644 --- a/op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.unichain-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/unichain-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/unichain-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/unichain-mainnet-archive`) || Path(`/unichain-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/unichain-mainnet-archive`) || Path(`/unichain-mainnet-archive/`)} - traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.middlewares=unichain-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist unichain-mainnet-archive-node: diff --git a/op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml index b91f482e..d73dc86d 100644 --- a/op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.unichain-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/unichain-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/unichain-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/unichain-mainnet`) || Path(`/unichain-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.rule=Path(`/unichain-mainnet`) || Path(`/unichain-mainnet/`)} - traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.middlewares=unichain-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist unichain-mainnet-node: diff --git a/op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml index 0e5376cb..c02a34de 100644 --- a/op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.unichain-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/unichain-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/unichain-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/unichain-sepolia-archive`) || Path(`/unichain-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/unichain-sepolia-archive`) || Path(`/unichain-sepolia-archive/`)} - traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.middlewares=unichain-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist unichain-sepolia-archive-node: diff --git a/op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml index e9098527..d888f88b 100644 --- a/op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.unichain-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/unichain-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/unichain-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/unichain-sepolia`) || Path(`/unichain-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.rule=Path(`/unichain-sepolia`) || Path(`/unichain-sepolia/`)} - traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.middlewares=unichain-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist unichain-sepolia-node: diff --git a/op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml index 5c8418e6..050378c5 100644 --- a/op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.worldchain-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/worldchain-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/worldchain-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/worldchain-mainnet-archive`) || Path(`/worldchain-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/worldchain-mainnet-archive`) || Path(`/worldchain-mainnet-archive/`)} - traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.middlewares=worldchain-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist worldchain-mainnet-archive-node: diff --git a/op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml index 16767270..7abc55b5 100644 --- a/op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.worldchain-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/worldchain-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/worldchain-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/worldchain-mainnet`) || Path(`/worldchain-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.rule=Path(`/worldchain-mainnet`) || Path(`/worldchain-mainnet/`)} - traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.middlewares=worldchain-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist worldchain-mainnet-node: diff --git a/op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml index 90e169ee..ac30dcff 100644 --- a/op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.worldchain-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/worldchain-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/worldchain-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/worldchain-sepolia-archive`) || Path(`/worldchain-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/worldchain-sepolia-archive`) || Path(`/worldchain-sepolia-archive/`)} - traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.middlewares=worldchain-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist worldchain-sepolia-archive-node: diff --git a/op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml index bad01fb9..e9f5e751 100644 --- a/op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml @@ -65,8 +65,8 @@ services: - traefik.http.services.worldchain-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/worldchain-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/worldchain-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/worldchain-sepolia`) || Path(`/worldchain-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.rule=Path(`/worldchain-sepolia`) || Path(`/worldchain-sepolia/`)} - traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.middlewares=worldchain-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist worldchain-sepolia-node: diff --git a/op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml b/op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml index d28ca661..2a48914a 100644 --- a/op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-garfield-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-garfield-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.rule=PathRegex(`^/zircuit-garfield-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-garfield-archive`) || Path(`/zircuit-garfield-archive/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.rule=Path(`/zircuit-garfield-archive`) || Path(`/zircuit-garfield-archive/`)} - traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.middlewares=zircuit-garfield-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist zircuit-garfield-archive-node: diff --git a/op/geth/zircuit-garfield-op-geth-archive-pebble-hash.yml b/op/geth/zircuit-garfield-op-geth-archive-pebble-hash.yml index 3f31011b..d98054ba 100644 --- a/op/geth/zircuit-garfield-op-geth-archive-pebble-hash.yml +++ b/op/geth/zircuit-garfield-op-geth-archive-pebble-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-garfield-op-geth-archive-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-garfield-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-archive-pebble-hash.rule=PathRegex(`^/zircuit-garfield-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-garfield-archive`) || Path(`/zircuit-garfield-archive/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-archive-pebble-hash.rule=Path(`/zircuit-garfield-archive`) || Path(`/zircuit-garfield-archive/`)} - traefik.http.routers.zircuit-garfield-op-geth-archive-pebble-hash.middlewares=zircuit-garfield-op-geth-archive-pebble-hash-stripprefix, ipwhitelist zircuit-garfield-archive-node: diff --git a/op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml b/op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml index c7758756..8ebf3ab3 100644 --- a/op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml +++ b/op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-garfield-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-garfield/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.rule=PathRegex(`^/zircuit-garfield/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-garfield`) || Path(`/zircuit-garfield/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.rule=Path(`/zircuit-garfield`) || Path(`/zircuit-garfield/`)} - traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.middlewares=zircuit-garfield-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist zircuit-garfield-node: diff --git a/op/geth/zircuit-garfield-op-geth-pruned-pebble-path.yml b/op/geth/zircuit-garfield-op-geth-pruned-pebble-path.yml index f474af45..81d82746 100644 --- a/op/geth/zircuit-garfield-op-geth-pruned-pebble-path.yml +++ b/op/geth/zircuit-garfield-op-geth-pruned-pebble-path.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-garfield-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-garfield/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-path.rule=PathRegex(`^/zircuit-garfield/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/zircuit-garfield`) || Path(`/zircuit-garfield/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-path.rule=Path(`/zircuit-garfield`) || Path(`/zircuit-garfield/`)} - traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-path.middlewares=zircuit-garfield-op-geth-pruned-pebble-path-stripprefix, ipwhitelist zircuit-garfield-node: diff --git a/op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml index 436ea31e..bde1ad11 100644 --- a/op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/zircuit-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-mainnet-archive`) || Path(`/zircuit-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/zircuit-mainnet-archive`) || Path(`/zircuit-mainnet-archive/`)} - traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.middlewares=zircuit-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist zircuit-mainnet-archive-node: diff --git a/op/geth/zircuit-mainnet-op-geth-archive-pebble-hash.yml b/op/geth/zircuit-mainnet-op-geth-archive-pebble-hash.yml index 5444e8ab..c57db6d1 100644 --- a/op/geth/zircuit-mainnet-op-geth-archive-pebble-hash.yml +++ b/op/geth/zircuit-mainnet-op-geth-archive-pebble-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-mainnet-op-geth-archive-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-archive-pebble-hash.rule=PathRegex(`^/zircuit-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-mainnet-archive`) || Path(`/zircuit-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-archive-pebble-hash.rule=Path(`/zircuit-mainnet-archive`) || Path(`/zircuit-mainnet-archive/`)} - traefik.http.routers.zircuit-mainnet-op-geth-archive-pebble-hash.middlewares=zircuit-mainnet-op-geth-archive-pebble-hash-stripprefix, ipwhitelist zircuit-mainnet-archive-node: diff --git a/op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml b/op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml index 91dab7ab..3e27f184 100644 --- a/op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-mainnet-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.rule=PathRegex(`^/zircuit-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-mainnet`) || Path(`/zircuit-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.rule=Path(`/zircuit-mainnet`) || Path(`/zircuit-mainnet/`)} - traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.middlewares=zircuit-mainnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist zircuit-mainnet-node: diff --git a/op/geth/zircuit-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/zircuit-mainnet-op-geth-pruned-pebble-path.yml index 14d7f49d..bc778b80 100644 --- a/op/geth/zircuit-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/zircuit-mainnet-op-geth-pruned-pebble-path.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/zircuit-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/zircuit-mainnet`) || Path(`/zircuit-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-path.rule=Path(`/zircuit-mainnet`) || Path(`/zircuit-mainnet/`)} - traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-path.middlewares=zircuit-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist zircuit-mainnet-node: diff --git a/op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml b/op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml index d4b1299a..8f22e565 100644 --- a/op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-testnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/zircuit-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-testnet-archive`) || Path(`/zircuit-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.rule=Path(`/zircuit-testnet-archive`) || Path(`/zircuit-testnet-archive/`)} - traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.middlewares=zircuit-testnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist zircuit-testnet-archive-node: diff --git a/op/geth/zircuit-testnet-op-geth-archive-pebble-hash.yml b/op/geth/zircuit-testnet-op-geth-archive-pebble-hash.yml index 06fd61c3..c0b694ba 100644 --- a/op/geth/zircuit-testnet-op-geth-archive-pebble-hash.yml +++ b/op/geth/zircuit-testnet-op-geth-archive-pebble-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-testnet-op-geth-archive-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-archive-pebble-hash.rule=PathRegex(`^/zircuit-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-testnet-archive`) || Path(`/zircuit-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-archive-pebble-hash.rule=Path(`/zircuit-testnet-archive`) || Path(`/zircuit-testnet-archive/`)} - traefik.http.routers.zircuit-testnet-op-geth-archive-pebble-hash.middlewares=zircuit-testnet-op-geth-archive-pebble-hash-stripprefix, ipwhitelist zircuit-testnet-archive-node: diff --git a/op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml b/op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml index cc6972bc..92a74480 100644 --- a/op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-testnet-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-testnet/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.rule=PathRegex(`^/zircuit-testnet/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/zircuit-testnet`) || Path(`/zircuit-testnet/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.rule=Path(`/zircuit-testnet`) || Path(`/zircuit-testnet/`)} - traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.middlewares=zircuit-testnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist zircuit-testnet-node: diff --git a/op/geth/zircuit-testnet-op-geth-pruned-pebble-path.yml b/op/geth/zircuit-testnet-op-geth-pruned-pebble-path.yml index 46a13961..83e93e70 100644 --- a/op/geth/zircuit-testnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/zircuit-testnet-op-geth-pruned-pebble-path.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.zircuit-testnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/zircuit-testnet/?$`)} - - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/zircuit-testnet/?$`)} + - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/zircuit-testnet`) || Path(`/zircuit-testnet/`))} + - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-path.rule=Path(`/zircuit-testnet`) || Path(`/zircuit-testnet/`)} - traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-path.middlewares=zircuit-testnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist zircuit-testnet-node: diff --git a/op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml index fef8325b..abd20307 100644 --- a/op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.zora-mainnet-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zora-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.rule=PathRegex(`^/zora-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/zora-mainnet-archive`) || Path(`/zora-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.rule=Path(`/zora-mainnet-archive`) || Path(`/zora-mainnet-archive/`)} - traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.middlewares=zora-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist zora-mainnet-archive-node: diff --git a/op/geth/zora-mainnet-op-geth-pruned-pebble-hash.yml b/op/geth/zora-mainnet-op-geth-pruned-pebble-hash.yml index ea4a92e3..63cf450b 100644 --- a/op/geth/zora-mainnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/zora-mainnet-op-geth-pruned-pebble-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.zora-mainnet-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zora-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-hash.rule=PathRegex(`^/zora-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/zora-mainnet`) || Path(`/zora-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-hash.rule=Path(`/zora-mainnet`) || Path(`/zora-mainnet/`)} - traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-hash.middlewares=zora-mainnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist zora-mainnet-node: diff --git a/op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml index 06cdb590..65125ed2 100644 --- a/op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.zora-mainnet-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/zora-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.rule=PathRegex(`^/zora-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/zora-mainnet`) || Path(`/zora-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.rule=Path(`/zora-mainnet`) || Path(`/zora-mainnet/`)} - traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.middlewares=zora-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist zora-mainnet-node: diff --git a/op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml index 2bdbf429..455ad469 100644 --- a/op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.zora-sepolia-op-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zora-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.rule=PathRegex(`^/zora-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/zora-sepolia-archive`) || Path(`/zora-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.rule=Path(`/zora-sepolia-archive`) || Path(`/zora-sepolia-archive/`)} - traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.middlewares=zora-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist zora-sepolia-archive-node: diff --git a/op/geth/zora-sepolia-op-geth-pruned-pebble-hash.yml b/op/geth/zora-sepolia-op-geth-pruned-pebble-hash.yml index 00e14382..688b1c46 100644 --- a/op/geth/zora-sepolia-op-geth-pruned-pebble-hash.yml +++ b/op/geth/zora-sepolia-op-geth-pruned-pebble-hash.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.zora-sepolia-op-geth-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/zora-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-hash.rule=PathRegex(`^/zora-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/zora-sepolia`) || Path(`/zora-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-hash.rule=Path(`/zora-sepolia`) || Path(`/zora-sepolia/`)} - traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-hash.middlewares=zora-sepolia-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist zora-sepolia-node: diff --git a/op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml index bf32a686..da2db168 100644 --- a/op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml @@ -67,8 +67,8 @@ services: - traefik.http.services.zora-sepolia-op-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/zora-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.rule=PathRegex(`^/zora-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/zora-sepolia`) || Path(`/zora-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.rule=Path(`/zora-sepolia`) || Path(`/zora-sepolia/`)} - traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.middlewares=zora-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist zora-sepolia-node: diff --git a/op/reth/base-mainnet-op-reth-archive-trace.yml b/op/reth/base-mainnet-op-reth-archive-trace.yml index 80bbd061..0245b9bd 100644 --- a/op/reth/base-mainnet-op-reth-archive-trace.yml +++ b/op/reth/base-mainnet-op-reth-archive-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.base-mainnet-op-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.base-mainnet-op-reth-archive-trace.rule=PathRegex(`^/base-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.base-mainnet-op-reth-archive-trace.rule=Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`)} - traefik.http.routers.base-mainnet-op-reth-archive-trace.middlewares=base-mainnet-op-reth-archive-trace-stripprefix, ipwhitelist base-mainnet-archive-node: diff --git a/op/reth/base-mainnet-op-reth-pruned-trace.yml b/op/reth/base-mainnet-op-reth-pruned-trace.yml index 5f33c1a8..2bbbe649 100644 --- a/op/reth/base-mainnet-op-reth-pruned-trace.yml +++ b/op/reth/base-mainnet-op-reth-pruned-trace.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.base-mainnet-op-reth-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.base-mainnet-op-reth-pruned-trace.rule=PathRegex(`^/base-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet`) || Path(`/base-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.base-mainnet-op-reth-pruned-trace.rule=Path(`/base-mainnet`) || Path(`/base-mainnet/`)} - traefik.http.routers.base-mainnet-op-reth-pruned-trace.middlewares=base-mainnet-op-reth-pruned-trace-stripprefix, ipwhitelist base-mainnet-node: diff --git a/op/reth/base-sepolia-op-reth-archive-trace.yml b/op/reth/base-sepolia-op-reth-archive-trace.yml index 1b8c6cee..3f0ff943 100644 --- a/op/reth/base-sepolia-op-reth-archive-trace.yml +++ b/op/reth/base-sepolia-op-reth-archive-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.base-sepolia-op-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.base-sepolia-op-reth-archive-trace.rule=PathRegex(`^/base-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.base-sepolia-op-reth-archive-trace.rule=Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`)} - traefik.http.routers.base-sepolia-op-reth-archive-trace.middlewares=base-sepolia-op-reth-archive-trace-stripprefix, ipwhitelist base-sepolia-archive-node: diff --git a/op/reth/base-sepolia-op-reth-pruned-trace.yml b/op/reth/base-sepolia-op-reth-pruned-trace.yml index 9ccf071e..1b1eeb01 100644 --- a/op/reth/base-sepolia-op-reth-pruned-trace.yml +++ b/op/reth/base-sepolia-op-reth-pruned-trace.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.base-sepolia-op-reth-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.base-sepolia-op-reth-pruned-trace.rule=PathRegex(`^/base-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia`) || Path(`/base-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.base-sepolia-op-reth-pruned-trace.rule=Path(`/base-sepolia`) || Path(`/base-sepolia/`)} - traefik.http.routers.base-sepolia-op-reth-pruned-trace.middlewares=base-sepolia-op-reth-pruned-trace-stripprefix, ipwhitelist base-sepolia-node: diff --git a/op/reth/lisk-mainnet-op-reth-archive-trace.yml b/op/reth/lisk-mainnet-op-reth-archive-trace.yml index 9c25c46a..e2bcff04 100644 --- a/op/reth/lisk-mainnet-op-reth-archive-trace.yml +++ b/op/reth/lisk-mainnet-op-reth-archive-trace.yml @@ -63,8 +63,8 @@ services: - traefik.http.services.lisk-mainnet-op-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-reth-archive-trace.rule=PathRegex(`^/lisk-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/lisk-mainnet-archive`) || Path(`/lisk-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-reth-archive-trace.rule=Path(`/lisk-mainnet-archive`) || Path(`/lisk-mainnet-archive/`)} - traefik.http.routers.lisk-mainnet-op-reth-archive-trace.middlewares=lisk-mainnet-op-reth-archive-trace-stripprefix, ipwhitelist lisk-mainnet-archive-node: diff --git a/op/reth/lisk-mainnet-op-reth-pruned-trace.yml b/op/reth/lisk-mainnet-op-reth-pruned-trace.yml index 3f6fcb12..4b85eda2 100644 --- a/op/reth/lisk-mainnet-op-reth-pruned-trace.yml +++ b/op/reth/lisk-mainnet-op-reth-pruned-trace.yml @@ -64,8 +64,8 @@ services: - traefik.http.services.lisk-mainnet-op-reth-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.rule=PathRegex(`^/lisk-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/lisk-mainnet`) || Path(`/lisk-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.rule=Path(`/lisk-mainnet`) || Path(`/lisk-mainnet/`)} - traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.middlewares=lisk-mainnet-op-reth-pruned-trace-stripprefix, ipwhitelist lisk-mainnet-node: diff --git a/op/reth/op-mainnet-op-reth-archive-trace.yml b/op/reth/op-mainnet-op-reth-archive-trace.yml index 1eb73e3a..d0a7485d 100644 --- a/op/reth/op-mainnet-op-reth-archive-trace.yml +++ b/op/reth/op-mainnet-op-reth-archive-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.op-mainnet-op-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.op-mainnet-op-reth-archive-trace.rule=PathRegex(`^/op-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/op-mainnet-archive`) || Path(`/op-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.op-mainnet-op-reth-archive-trace.rule=Path(`/op-mainnet-archive`) || Path(`/op-mainnet-archive/`)} - traefik.http.routers.op-mainnet-op-reth-archive-trace.middlewares=op-mainnet-op-reth-archive-trace-stripprefix, ipwhitelist op-mainnet-archive-node: diff --git a/op/reth/op-mainnet-op-reth-pruned-trace.yml b/op/reth/op-mainnet-op-reth-pruned-trace.yml index 6209d244..ccd80509 100644 --- a/op/reth/op-mainnet-op-reth-pruned-trace.yml +++ b/op/reth/op-mainnet-op-reth-pruned-trace.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.op-mainnet-op-reth-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.op-mainnet-op-reth-pruned-trace.rule=PathRegex(`^/op-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/op-mainnet`) || Path(`/op-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.op-mainnet-op-reth-pruned-trace.rule=Path(`/op-mainnet`) || Path(`/op-mainnet/`)} - traefik.http.routers.op-mainnet-op-reth-pruned-trace.middlewares=op-mainnet-op-reth-pruned-trace-stripprefix, ipwhitelist op-mainnet-node: diff --git a/op/reth/op-sepolia-op-reth-archive-trace.yml b/op/reth/op-sepolia-op-reth-archive-trace.yml index db07ae8f..20584c71 100644 --- a/op/reth/op-sepolia-op-reth-archive-trace.yml +++ b/op/reth/op-sepolia-op-reth-archive-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.op-sepolia-op-reth-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.op-sepolia-op-reth-archive-trace.rule=PathRegex(`^/op-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/op-sepolia-archive`) || Path(`/op-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.op-sepolia-op-reth-archive-trace.rule=Path(`/op-sepolia-archive`) || Path(`/op-sepolia-archive/`)} - traefik.http.routers.op-sepolia-op-reth-archive-trace.middlewares=op-sepolia-op-reth-archive-trace-stripprefix, ipwhitelist op-sepolia-archive-node: diff --git a/op/reth/op-sepolia-op-reth-pruned-trace.yml b/op/reth/op-sepolia-op-reth-pruned-trace.yml index 09a317a4..ffc47765 100644 --- a/op/reth/op-sepolia-op-reth-pruned-trace.yml +++ b/op/reth/op-sepolia-op-reth-pruned-trace.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.op-sepolia-op-reth-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-sepolia/?$`)} - - ${NO_SSL:+traefik.http.routers.op-sepolia-op-reth-pruned-trace.rule=PathRegex(`^/op-sepolia/?$`)} + - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/op-sepolia`) || Path(`/op-sepolia/`))} + - ${NO_SSL:+traefik.http.routers.op-sepolia-op-reth-pruned-trace.rule=Path(`/op-sepolia`) || Path(`/op-sepolia/`)} - traefik.http.routers.op-sepolia-op-reth-pruned-trace.middlewares=op-sepolia-op-reth-pruned-trace-stripprefix, ipwhitelist op-sepolia-node: diff --git a/polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml b/polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml index 355cf495..f7ef1a82 100644 --- a/polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml +++ b/polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.polygon-amoy-bor-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/polygon-amoy/?$`)} - - ${NO_SSL:+traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.rule=PathRegex(`^/polygon-amoy/?$`)} + - ${NO_SSL:-traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/polygon-amoy`) || Path(`/polygon-amoy/`))} + - ${NO_SSL:+traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.rule=Path(`/polygon-amoy`) || Path(`/polygon-amoy/`)} - traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.middlewares=polygon-amoy-bor-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml b/polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml index eb2f0ded..6efb3e10 100644 --- a/polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml +++ b/polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.polygon-mainnet-bor-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/polygon-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.rule=PathRegex(`^/polygon-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/polygon-mainnet`) || Path(`/polygon-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.rule=Path(`/polygon-mainnet`) || Path(`/polygon-mainnet/`)} - traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.middlewares=polygon-mainnet-bor-pruned-pebble-path-stripprefix, ipwhitelist volumes: diff --git a/polygon/erigon3/polygon-amoy-erigon3-archive-trace.yml b/polygon/erigon3/polygon-amoy-erigon3-archive-trace.yml index b201f856..e3fdd64c 100644 --- a/polygon/erigon3/polygon-amoy-erigon3-archive-trace.yml +++ b/polygon/erigon3/polygon-amoy-erigon3-archive-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.polygon-amoy-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/polygon-amoy-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.polygon-amoy-erigon3-archive-trace.rule=PathRegex(`^/polygon-amoy-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/polygon-amoy-archive`) || Path(`/polygon-amoy-archive/`))} + - ${NO_SSL:+traefik.http.routers.polygon-amoy-erigon3-archive-trace.rule=Path(`/polygon-amoy-archive`) || Path(`/polygon-amoy-archive/`)} - traefik.http.routers.polygon-amoy-erigon3-archive-trace.middlewares=polygon-amoy-erigon3-archive-trace-stripprefix, ipwhitelist volumes: diff --git a/polygon/erigon3/polygon-amoy-erigon3-minimal-trace.yml b/polygon/erigon3/polygon-amoy-erigon3-minimal-trace.yml index c979c31a..550bb5bf 100644 --- a/polygon/erigon3/polygon-amoy-erigon3-minimal-trace.yml +++ b/polygon/erigon3/polygon-amoy-erigon3-minimal-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.polygon-amoy-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/polygon-amoy-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.polygon-amoy-erigon3-minimal-trace.rule=PathRegex(`^/polygon-amoy-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/polygon-amoy-minimal`) || Path(`/polygon-amoy-minimal/`))} + - ${NO_SSL:+traefik.http.routers.polygon-amoy-erigon3-minimal-trace.rule=Path(`/polygon-amoy-minimal`) || Path(`/polygon-amoy-minimal/`)} - traefik.http.routers.polygon-amoy-erigon3-minimal-trace.middlewares=polygon-amoy-erigon3-minimal-trace-stripprefix, ipwhitelist volumes: diff --git a/polygon/erigon3/polygon-amoy-erigon3-pruned-trace.yml b/polygon/erigon3/polygon-amoy-erigon3-pruned-trace.yml index b9f9f814..7b0aa8ed 100644 --- a/polygon/erigon3/polygon-amoy-erigon3-pruned-trace.yml +++ b/polygon/erigon3/polygon-amoy-erigon3-pruned-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.polygon-amoy-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/polygon-amoy/?$`)} - - ${NO_SSL:+traefik.http.routers.polygon-amoy-erigon3-pruned-trace.rule=PathRegex(`^/polygon-amoy/?$`)} + - ${NO_SSL:-traefik.http.routers.polygon-amoy-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/polygon-amoy`) || Path(`/polygon-amoy/`))} + - ${NO_SSL:+traefik.http.routers.polygon-amoy-erigon3-pruned-trace.rule=Path(`/polygon-amoy`) || Path(`/polygon-amoy/`)} - traefik.http.routers.polygon-amoy-erigon3-pruned-trace.middlewares=polygon-amoy-erigon3-pruned-trace-stripprefix, ipwhitelist volumes: diff --git a/polygon/erigon3/polygon-mainnet-erigon3-archive-trace.yml b/polygon/erigon3/polygon-mainnet-erigon3-archive-trace.yml index d29d5da8..07ebf88f 100644 --- a/polygon/erigon3/polygon-mainnet-erigon3-archive-trace.yml +++ b/polygon/erigon3/polygon-mainnet-erigon3-archive-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.polygon-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-archive-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-archive-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/polygon-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.polygon-mainnet-erigon3-archive-trace.rule=PathRegex(`^/polygon-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/polygon-mainnet-archive`) || Path(`/polygon-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.polygon-mainnet-erigon3-archive-trace.rule=Path(`/polygon-mainnet-archive`) || Path(`/polygon-mainnet-archive/`)} - traefik.http.routers.polygon-mainnet-erigon3-archive-trace.middlewares=polygon-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist volumes: diff --git a/polygon/erigon3/polygon-mainnet-erigon3-minimal-trace.yml b/polygon/erigon3/polygon-mainnet-erigon3-minimal-trace.yml index bf657b48..d3b556bd 100644 --- a/polygon/erigon3/polygon-mainnet-erigon3-minimal-trace.yml +++ b/polygon/erigon3/polygon-mainnet-erigon3-minimal-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.polygon-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-minimal-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/polygon-mainnet-minimal/?$`)} - - ${NO_SSL:+traefik.http.routers.polygon-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/polygon-mainnet-minimal/?$`)} + - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/polygon-mainnet-minimal`) || Path(`/polygon-mainnet-minimal/`))} + - ${NO_SSL:+traefik.http.routers.polygon-mainnet-erigon3-minimal-trace.rule=Path(`/polygon-mainnet-minimal`) || Path(`/polygon-mainnet-minimal/`)} - traefik.http.routers.polygon-mainnet-erigon3-minimal-trace.middlewares=polygon-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist volumes: diff --git a/polygon/erigon3/polygon-mainnet-erigon3-pruned-trace.yml b/polygon/erigon3/polygon-mainnet-erigon3-pruned-trace.yml index a000bf7d..e5061160 100644 --- a/polygon/erigon3/polygon-mainnet-erigon3-pruned-trace.yml +++ b/polygon/erigon3/polygon-mainnet-erigon3-pruned-trace.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.polygon-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-pruned-trace.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/polygon-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.polygon-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/polygon-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.polygon-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/polygon-mainnet`) || Path(`/polygon-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.polygon-mainnet-erigon3-pruned-trace.rule=Path(`/polygon-mainnet`) || Path(`/polygon-mainnet/`)} - traefik.http.routers.polygon-mainnet-erigon3-pruned-trace.middlewares=polygon-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist volumes: diff --git a/ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml b/ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml index de5e004a..5fc0b952 100644 --- a/ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml +++ b/ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml @@ -54,8 +54,8 @@ services: - traefik.http.services.ronin-mainnet-ronin-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/ronin-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.rule=PathRegex(`^/ronin-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/ronin-mainnet-archive`) || Path(`/ronin-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.rule=Path(`/ronin-mainnet-archive`) || Path(`/ronin-mainnet-archive/`)} - traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.middlewares=ronin-mainnet-ronin-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml b/ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml index df33f74c..376d58d1 100644 --- a/ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml +++ b/ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml @@ -54,8 +54,8 @@ services: - traefik.http.services.ronin-mainnet-ronin-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/ronin-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.rule=PathRegex(`^/ronin-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/ronin-mainnet`) || Path(`/ronin-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.rule=Path(`/ronin-mainnet`) || Path(`/ronin-mainnet/`)} - traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.middlewares=ronin-mainnet-ronin-pruned-pebble-hash-stripprefix, ipwhitelist volumes: diff --git a/ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml b/ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml index 765177cb..c5b2d105 100644 --- a/ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml +++ b/ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml @@ -55,8 +55,8 @@ services: - traefik.http.services.ronin-saigon-ronin-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/ronin-saigon-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.rule=PathRegex(`^/ronin-saigon-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/ronin-saigon-archive`) || Path(`/ronin-saigon-archive/`))} + - ${NO_SSL:+traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.rule=Path(`/ronin-saigon-archive`) || Path(`/ronin-saigon-archive/`)} - traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.middlewares=ronin-saigon-ronin-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml b/ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml index 8cf23d98..1edf087c 100644 --- a/ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml +++ b/ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml @@ -55,8 +55,8 @@ services: - traefik.http.services.ronin-saigon-ronin-pruned-pebble-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/ronin-saigon/?$`)} - - ${NO_SSL:+traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.rule=PathRegex(`^/ronin-saigon/?$`)} + - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/ronin-saigon`) || Path(`/ronin-saigon/`))} + - ${NO_SSL:+traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.rule=Path(`/ronin-saigon`) || Path(`/ronin-saigon/`)} - traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.middlewares=ronin-saigon-ronin-pruned-pebble-hash-stripprefix, ipwhitelist volumes: diff --git a/rootstock/rskj/rootstock-bamboo-rskj-archive.yml b/rootstock/rskj/rootstock-bamboo-rskj-archive.yml index 340d0c7b..7c733935 100644 --- a/rootstock/rskj/rootstock-bamboo-rskj-archive.yml +++ b/rootstock/rskj/rootstock-bamboo-rskj-archive.yml @@ -54,8 +54,8 @@ services: - traefik.http.services.rootstock-bamboo-rskj-archive.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.rootstock-bamboo-rskj-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.rootstock-bamboo-rskj-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.rootstock-bamboo-rskj-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/rootstock-bamboo-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.rootstock-bamboo-rskj-archive.rule=PathRegex(`^/rootstock-bamboo-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.rootstock-bamboo-rskj-archive.rule=Host(`$DOMAIN`) && (Path(`/rootstock-bamboo-archive`) || Path(`/rootstock-bamboo-archive/`))} + - ${NO_SSL:+traefik.http.routers.rootstock-bamboo-rskj-archive.rule=Path(`/rootstock-bamboo-archive`) || Path(`/rootstock-bamboo-archive/`)} - traefik.http.routers.rootstock-bamboo-rskj-archive.middlewares=rootstock-bamboo-rskj-archive-stripprefix, ipwhitelist volumes: diff --git a/rootstock/rskj/rootstock-mainnet-rskj-archive.yml b/rootstock/rskj/rootstock-mainnet-rskj-archive.yml index 9defce0a..4c4384db 100644 --- a/rootstock/rskj/rootstock-mainnet-rskj-archive.yml +++ b/rootstock/rskj/rootstock-mainnet-rskj-archive.yml @@ -54,8 +54,8 @@ services: - traefik.http.services.rootstock-mainnet-rskj-archive.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.rootstock-mainnet-rskj-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.rootstock-mainnet-rskj-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.rootstock-mainnet-rskj-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/rootstock-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.rootstock-mainnet-rskj-archive.rule=PathRegex(`^/rootstock-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.rootstock-mainnet-rskj-archive.rule=Host(`$DOMAIN`) && (Path(`/rootstock-mainnet-archive`) || Path(`/rootstock-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.rootstock-mainnet-rskj-archive.rule=Path(`/rootstock-mainnet-archive`) || Path(`/rootstock-mainnet-archive/`)} - traefik.http.routers.rootstock-mainnet-rskj-archive.middlewares=rootstock-mainnet-rskj-archive-stripprefix, ipwhitelist volumes: diff --git a/scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml b/scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml index 90b7053e..e7be9a6c 100644 --- a/scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml +++ b/scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml @@ -59,8 +59,8 @@ services: - traefik.http.services.scroll-mainnet-l2geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/scroll-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.rule=PathRegex(`^/scroll-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/scroll-mainnet-archive`) || Path(`/scroll-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.rule=Path(`/scroll-mainnet-archive`) || Path(`/scroll-mainnet-archive/`)} - traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.middlewares=scroll-mainnet-l2geth-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml b/scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml index 8e82178e..a8844736 100644 --- a/scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml +++ b/scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml @@ -61,8 +61,8 @@ services: - traefik.http.services.scroll-sepolia-l2geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/scroll-sepolia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.rule=PathRegex(`^/scroll-sepolia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/scroll-sepolia-archive`) || Path(`/scroll-sepolia-archive/`))} + - ${NO_SSL:+traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.rule=Path(`/scroll-sepolia-archive`) || Path(`/scroll-sepolia-archive/`)} - traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.middlewares=scroll-sepolia-l2geth-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/sonic/sonic/sonic-mainnet-sonic-archive.yml b/sonic/sonic/sonic-mainnet-sonic-archive.yml index 81f52591..bc6a983e 100644 --- a/sonic/sonic/sonic-mainnet-sonic-archive.yml +++ b/sonic/sonic/sonic-mainnet-sonic-archive.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.sonic-mainnet-sonic-archive.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.sonic-mainnet-sonic-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.sonic-mainnet-sonic-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.sonic-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/sonic-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.sonic-mainnet-sonic-archive.rule=PathRegex(`^/sonic-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.sonic-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/sonic-mainnet-archive`) || Path(`/sonic-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.sonic-mainnet-sonic-archive.rule=Path(`/sonic-mainnet-archive`) || Path(`/sonic-mainnet-archive/`)} - traefik.http.routers.sonic-mainnet-sonic-archive.middlewares=sonic-mainnet-sonic-archive-stripprefix, ipwhitelist volumes: diff --git a/taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml b/taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml index 9a9a07d7..4f54beef 100644 --- a/taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml +++ b/taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.taiko-alethia-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/taiko-alethia-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.rule=PathRegex(`^/taiko-alethia-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/taiko-alethia-archive`) || Path(`/taiko-alethia-archive/`))} + - ${NO_SSL:+traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.rule=Path(`/taiko-alethia-archive`) || Path(`/taiko-alethia-archive/`)} - traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.middlewares=taiko-alethia-geth-archive-leveldb-hash-stripprefix, ipwhitelist taiko-alethia-archive-node: diff --git a/taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml b/taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml index ede96ae6..57332b00 100644 --- a/taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml +++ b/taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.taiko-alethia-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/taiko-alethia/?$`)} - - ${NO_SSL:+traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.rule=PathRegex(`^/taiko-alethia/?$`)} + - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/taiko-alethia`) || Path(`/taiko-alethia/`))} + - ${NO_SSL:+traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.rule=Path(`/taiko-alethia`) || Path(`/taiko-alethia/`)} - traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.middlewares=taiko-alethia-geth-pruned-pebble-path-stripprefix, ipwhitelist taiko-alethia-node: diff --git a/taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml b/taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml index cb0a2996..37bcbd10 100644 --- a/taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml +++ b/taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.taiko-hekla-geth-archive-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/taiko-hekla-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.rule=PathRegex(`^/taiko-hekla-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/taiko-hekla-archive`) || Path(`/taiko-hekla-archive/`))} + - ${NO_SSL:+traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.rule=Path(`/taiko-hekla-archive`) || Path(`/taiko-hekla-archive/`)} - traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.middlewares=taiko-hekla-geth-archive-leveldb-hash-stripprefix, ipwhitelist taiko-hekla-archive-node: diff --git a/taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml b/taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml index 91538733..c78b4f57 100644 --- a/taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml +++ b/taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml @@ -68,8 +68,8 @@ services: - traefik.http.services.taiko-hekla-geth-pruned-pebble-path.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/taiko-hekla/?$`)} - - ${NO_SSL:+traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.rule=PathRegex(`^/taiko-hekla/?$`)} + - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/taiko-hekla`) || Path(`/taiko-hekla/`))} + - ${NO_SSL:+traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.rule=Path(`/taiko-hekla`) || Path(`/taiko-hekla/`)} - traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.middlewares=taiko-hekla-geth-pruned-pebble-path-stripprefix, ipwhitelist taiko-hekla-node: diff --git a/thundercore/thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml b/thundercore/thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml index 18330378..60d01efe 100644 --- a/thundercore/thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml +++ b/thundercore/thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml @@ -40,8 +40,8 @@ services: - traefik.http.services.thundercore-venus-thunder-pruned-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/thundercore-venus/?$`)} - - ${NO_SSL:+traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.rule=PathRegex(`^/thundercore-venus/?$`)} + - ${NO_SSL:-traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/thundercore-venus`) || Path(`/thundercore-venus/`))} + - ${NO_SSL:+traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.rule=Path(`/thundercore-venus`) || Path(`/thundercore-venus/`)} - traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.middlewares=thundercore-venus-thunder-pruned-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/thundercore/thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml b/thundercore/thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml index ce55d11b..86cd6501 100644 --- a/thundercore/thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml +++ b/thundercore/thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml @@ -40,8 +40,8 @@ services: - traefik.http.services.thundercore-zeus-thunder-pruned-leveldb-hash.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/thundercore-zeus/?$`)} - - ${NO_SSL:+traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.rule=PathRegex(`^/thundercore-zeus/?$`)} + - ${NO_SSL:-traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/thundercore-zeus`) || Path(`/thundercore-zeus/`))} + - ${NO_SSL:+traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.rule=Path(`/thundercore-zeus`) || Path(`/thundercore-zeus/`)} - traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.middlewares=thundercore-zeus-thunder-pruned-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml b/tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml index 5b6ef4ce..0da07494 100644 --- a/tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml +++ b/tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml @@ -37,8 +37,8 @@ services: - traefik.http.services.tron-mainnet-java-tron-pruned-rocksdb.loadbalancer.server.port=8545 - ${NO_SSL:-traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.rule=Host(`$DOMAIN`) && PathRegex(`^/tron-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.rule=PathRegex(`^/tron-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.rule=Host(`$DOMAIN`) && (Path(`/tron-mainnet`) || Path(`/tron-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.rule=Path(`/tron-mainnet`) || Path(`/tron-mainnet/`)} - traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.middlewares=tron-mainnet-java-tron-pruned-rocksdb-stripprefix, ipwhitelist volumes: diff --git a/viction/node/viction-mainnet-node-archive-leveldb-hash.yml b/viction/node/viction-mainnet-node-archive-leveldb-hash.yml index 100cd627..117fa915 100644 --- a/viction/node/viction-mainnet-node-archive-leveldb-hash.yml +++ b/viction/node/viction-mainnet-node-archive-leveldb-hash.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.viction-mainnet-node-archive-leveldb-hash.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.viction-mainnet-node-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.viction-mainnet-node-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.viction-mainnet-node-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/viction-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.viction-mainnet-node-archive-leveldb-hash.rule=PathRegex(`^/viction-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.viction-mainnet-node-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/viction-mainnet-archive`) || Path(`/viction-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.viction-mainnet-node-archive-leveldb-hash.rule=Path(`/viction-mainnet-archive`) || Path(`/viction-mainnet-archive/`)} - traefik.http.routers.viction-mainnet-node-archive-leveldb-hash.middlewares=viction-mainnet-node-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/viction/node/viction-mainnet-node-pruned-leveldb-hash.yml b/viction/node/viction-mainnet-node-pruned-leveldb-hash.yml index 0bda1985..776115f7 100644 --- a/viction/node/viction-mainnet-node-pruned-leveldb-hash.yml +++ b/viction/node/viction-mainnet-node-pruned-leveldb-hash.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.viction-mainnet-node-pruned-leveldb-hash.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.viction-mainnet-node-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.viction-mainnet-node-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.viction-mainnet-node-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/viction-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.viction-mainnet-node-pruned-leveldb-hash.rule=PathRegex(`^/viction-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.viction-mainnet-node-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/viction-mainnet`) || Path(`/viction-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.viction-mainnet-node-pruned-leveldb-hash.rule=Path(`/viction-mainnet`) || Path(`/viction-mainnet/`)} - traefik.http.routers.viction-mainnet-node-pruned-leveldb-hash.middlewares=viction-mainnet-node-pruned-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/viction/node/viction-testnet-node-archive-leveldb-hash.yml b/viction/node/viction-testnet-node-archive-leveldb-hash.yml index d1ed8224..b42456c9 100644 --- a/viction/node/viction-testnet-node-archive-leveldb-hash.yml +++ b/viction/node/viction-testnet-node-archive-leveldb-hash.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.viction-testnet-node-archive-leveldb-hash.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.viction-testnet-node-archive-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.viction-testnet-node-archive-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.viction-testnet-node-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/viction-testnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.viction-testnet-node-archive-leveldb-hash.rule=PathRegex(`^/viction-testnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.viction-testnet-node-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/viction-testnet-archive`) || Path(`/viction-testnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.viction-testnet-node-archive-leveldb-hash.rule=Path(`/viction-testnet-archive`) || Path(`/viction-testnet-archive/`)} - traefik.http.routers.viction-testnet-node-archive-leveldb-hash.middlewares=viction-testnet-node-archive-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/viction/node/viction-testnet-node-pruned-leveldb-hash.yml b/viction/node/viction-testnet-node-pruned-leveldb-hash.yml index 3019ccde..51a62dc8 100644 --- a/viction/node/viction-testnet-node-pruned-leveldb-hash.yml +++ b/viction/node/viction-testnet-node-pruned-leveldb-hash.yml @@ -62,8 +62,8 @@ services: - traefik.http.services.viction-testnet-node-pruned-leveldb-hash.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.viction-testnet-node-pruned-leveldb-hash.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.viction-testnet-node-pruned-leveldb-hash.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.viction-testnet-node-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/viction-testnet/?$`)} - - ${NO_SSL:+traefik.http.routers.viction-testnet-node-pruned-leveldb-hash.rule=PathRegex(`^/viction-testnet/?$`)} + - ${NO_SSL:-traefik.http.routers.viction-testnet-node-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/viction-testnet`) || Path(`/viction-testnet/`))} + - ${NO_SSL:+traefik.http.routers.viction-testnet-node-pruned-leveldb-hash.rule=Path(`/viction-testnet`) || Path(`/viction-testnet/`)} - traefik.http.routers.viction-testnet-node-pruned-leveldb-hash.middlewares=viction-testnet-node-pruned-leveldb-hash-stripprefix, ipwhitelist volumes: diff --git a/zksync-era/external-node/zksync-era-boojnet-external-node-archive.yml b/zksync-era/external-node/zksync-era-boojnet-external-node-archive.yml index 71cb550a..787fc737 100644 --- a/zksync-era/external-node/zksync-era-boojnet-external-node-archive.yml +++ b/zksync-era/external-node/zksync-era-boojnet-external-node-archive.yml @@ -72,8 +72,8 @@ services: - traefik.http.services.zksync-era-boojnet-external-node-archive.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/zksync-era-boojnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zksync-era-boojnet-external-node-archive.rule=PathRegex(`^/zksync-era-boojnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-boojnet-archive`) || Path(`/zksync-era-boojnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.zksync-era-boojnet-external-node-archive.rule=Path(`/zksync-era-boojnet-archive`) || Path(`/zksync-era-boojnet-archive/`)} - traefik.http.routers.zksync-era-boojnet-external-node-archive.middlewares=zksync-era-boojnet-external-node-archive-stripprefix, ipwhitelist zksync-era-boojnet-archive-db: diff --git a/zksync-era/external-node/zksync-era-boojnet-external-node-pruned.yml b/zksync-era/external-node/zksync-era-boojnet-external-node-pruned.yml index 98638745..15c657da 100644 --- a/zksync-era/external-node/zksync-era-boojnet-external-node-pruned.yml +++ b/zksync-era/external-node/zksync-era-boojnet-external-node-pruned.yml @@ -72,8 +72,8 @@ services: - traefik.http.services.zksync-era-boojnet-external-node-pruned.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/zksync-era-boojnet/?$`)} - - ${NO_SSL:+traefik.http.routers.zksync-era-boojnet-external-node-pruned.rule=PathRegex(`^/zksync-era-boojnet/?$`)} + - ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-boojnet`) || Path(`/zksync-era-boojnet/`))} + - ${NO_SSL:+traefik.http.routers.zksync-era-boojnet-external-node-pruned.rule=Path(`/zksync-era-boojnet`) || Path(`/zksync-era-boojnet/`)} - traefik.http.routers.zksync-era-boojnet-external-node-pruned.middlewares=zksync-era-boojnet-external-node-pruned-stripprefix, ipwhitelist zksync-era-boojnet-db: diff --git a/zksync-era/external-node/zksync-era-mainnet-external-node-archive.yml b/zksync-era/external-node/zksync-era-mainnet-external-node-archive.yml index 5fc95866..6743a03b 100644 --- a/zksync-era/external-node/zksync-era-mainnet-external-node-archive.yml +++ b/zksync-era/external-node/zksync-era-mainnet-external-node-archive.yml @@ -74,8 +74,8 @@ services: - traefik.http.services.zksync-era-mainnet-external-node-archive.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/zksync-era-mainnet-archive/?$`)} - - ${NO_SSL:+traefik.http.routers.zksync-era-mainnet-external-node-archive.rule=PathRegex(`^/zksync-era-mainnet-archive/?$`)} + - ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-mainnet-archive`) || Path(`/zksync-era-mainnet-archive/`))} + - ${NO_SSL:+traefik.http.routers.zksync-era-mainnet-external-node-archive.rule=Path(`/zksync-era-mainnet-archive`) || Path(`/zksync-era-mainnet-archive/`)} - traefik.http.routers.zksync-era-mainnet-external-node-archive.middlewares=zksync-era-mainnet-external-node-archive-stripprefix, ipwhitelist zksync-era-mainnet-archive-db: diff --git a/zksync-era/external-node/zksync-era-mainnet-external-node-pruned.yml b/zksync-era/external-node/zksync-era-mainnet-external-node-pruned.yml index e70db3f9..1c4019e1 100644 --- a/zksync-era/external-node/zksync-era-mainnet-external-node-pruned.yml +++ b/zksync-era/external-node/zksync-era-mainnet-external-node-pruned.yml @@ -74,8 +74,8 @@ services: - traefik.http.services.zksync-era-mainnet-external-node-pruned.loadbalancer.server.port=80 - ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned.entrypoints=websecure} - ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned.tls.certresolver=myresolver} - - ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/zksync-era-mainnet/?$`)} - - ${NO_SSL:+traefik.http.routers.zksync-era-mainnet-external-node-pruned.rule=PathRegex(`^/zksync-era-mainnet/?$`)} + - ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-mainnet`) || Path(`/zksync-era-mainnet/`))} + - ${NO_SSL:+traefik.http.routers.zksync-era-mainnet-external-node-pruned.rule=Path(`/zksync-era-mainnet`) || Path(`/zksync-era-mainnet/`)} - traefik.http.routers.zksync-era-mainnet-external-node-pruned.middlewares=zksync-era-mainnet-external-node-pruned-stripprefix, ipwhitelist zksync-era-mainnet-db: