fix
This commit is contained in:
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.alephzero-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.alephzero-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=PathRegex(`^/alephzero-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`)}
|
||||||
- traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.alephzero-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.alephzero-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/alephzero-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`)}
|
||||||
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.alephzero-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.alephzero-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=PathRegex(`^/alephzero-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`)}
|
||||||
- traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.alephzero-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.alephzero-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/alephzero-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/alephzero-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`)}
|
||||||
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-nova-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-nova-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-nova-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=PathRegex(`^/arbitrum-nova-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`)}
|
||||||
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-nova-nitro-pruned-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-nova-nitro-pruned-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-nova/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=PathRegex(`^/arbitrum-nova/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`)}
|
||||||
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-one-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-one-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-one-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=PathRegex(`^/arbitrum-one-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`)}
|
||||||
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-one-nitro-pruned-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-one-nitro-pruned-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-one/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one`) || Path(`/arbitrum-one/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=PathRegex(`^/arbitrum-one/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-one`) || Path(`/arbitrum-one/`)}
|
||||||
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -55,8 +55,8 @@ services:
|
|||||||
- traefik.http.services.arbitrum-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.arbitrum-sepolia-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/arbitrum-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=PathRegex(`^/arbitrum-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`)}
|
||||||
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.connext-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.connext-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/connext-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=PathRegex(`^/connext-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`)}
|
||||||
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.connext-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.connext-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/connext-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia`) || Path(`/connext-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/connext-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Path(`/connext-sepolia`) || Path(`/connext-sepolia/`)}
|
||||||
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.everclear-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.everclear-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/everclear-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/everclear-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`)}
|
||||||
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.everclear-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.everclear-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/everclear-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/everclear-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`)}
|
||||||
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.opencampuscodex-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.opencampuscodex-sepolia-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/opencampuscodex-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=PathRegex(`^/opencampuscodex-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`)}
|
||||||
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.opencampuscodex-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.opencampuscodex-sepolia-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/opencampuscodex-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=PathRegex(`^/opencampuscodex-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`)}
|
||||||
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.playblock-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.playblock-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/playblock-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/playblock-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`)}
|
||||||
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.playblock-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.playblock-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/playblock-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/playblock-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`)}
|
||||||
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.real-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.real-mainnet-nitro-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=PathRegex(`^/real-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.real-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
- traefik.http.services.real-mainnet-nitro-archive-pebble-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=PathRegex(`^/real-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -61,8 +61,8 @@ services:
|
|||||||
- traefik.http.services.real-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.real-mainnet-nitro-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/real-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet`) || Path(`/real-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=PathRegex(`^/real-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Path(`/real-mainnet`) || Path(`/real-mainnet/`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.avalanche-fuji-go-archive-leveldb.loadbalancer.server.port=80
|
- traefik.http.services.avalanche-fuji-go-archive-leveldb.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-fuji-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=PathRegex(`^/avalanche-fuji-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`)}
|
||||||
- traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.avalanche-fuji-go-pruned-pebbledb.loadbalancer.server.port=80
|
- traefik.http.services.avalanche-fuji-go-pruned-pebbledb.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-fuji/?$`)}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=PathRegex(`^/avalanche-fuji/?$`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`)}
|
||||||
- traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.avalanche-mainnet-go-archive-leveldb.loadbalancer.server.port=80
|
- traefik.http.services.avalanche-mainnet-go-archive-leveldb.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=PathRegex(`^/avalanche-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`)}
|
||||||
- traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.avalanche-mainnet-go-pruned-pebbledb.loadbalancer.server.port=80
|
- traefik.http.services.avalanche-mainnet-go-pruned-pebbledb.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && PathRegex(`^/avalanche-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=PathRegex(`^/avalanche-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`)}
|
||||||
- traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ services:
|
|||||||
- traefik.http.services.berachain-bartio-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.berachain-bartio-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-bartio-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=PathRegex(`^/berachain-bartio-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`)}
|
||||||
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
berachain-bartio-archive-node:
|
berachain-bartio-archive-node:
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ services:
|
|||||||
- traefik.http.services.berachain-bepolia-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.berachain-bepolia-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-bepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=PathRegex(`^/berachain-bepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`)}
|
||||||
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
berachain-bepolia-archive-node:
|
berachain-bepolia-archive-node:
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ services:
|
|||||||
- traefik.http.services.berachain-mainnet-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.berachain-mainnet-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/berachain-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=PathRegex(`^/berachain-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`)}
|
||||||
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
berachain-mainnet-archive-node:
|
berachain-mainnet-archive-node:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.bsc-chapel-bsc-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.bsc-chapel-bsc-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/bsc-chapel/?$`)}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=PathRegex(`^/bsc-chapel/?$`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)}
|
||||||
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.bsc-mainnet-bsc-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.bsc-mainnet-bsc-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/bsc-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=PathRegex(`^/bsc-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)}
|
||||||
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -56,8 +56,8 @@ services:
|
|||||||
- traefik.http.services.celo-alfajores-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.celo-alfajores-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-alfajores-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=PathRegex(`^/celo-alfajores-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`)}
|
||||||
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -56,8 +56,8 @@ services:
|
|||||||
- traefik.http.services.celo-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.celo-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/celo-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=PathRegex(`^/celo-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`)}
|
||||||
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.core-buffalo-core-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.core-buffalo-core-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/core-buffalo/?$`)}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-buffalo`) || Path(`/core-buffalo/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=PathRegex(`^/core-buffalo/?$`)}
|
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Path(`/core-buffalo`) || Path(`/core-buffalo/`)}
|
||||||
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.core-mainnet-core-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.core-mainnet-core-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/core-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=PathRegex(`^/core-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`)}
|
||||||
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.core-mainnet-core-pruned-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.core-mainnet-core-pruned-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/core-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet`) || Path(`/core-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=PathRegex(`^/core-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Path(`/core-mainnet`) || Path(`/core-mainnet/`)}
|
||||||
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.core-pigeon-core-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.core-pigeon-core-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/core-pigeon/?$`)}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-pigeon`) || Path(`/core-pigeon/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=PathRegex(`^/core-pigeon/?$`)}
|
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Path(`/core-pigeon`) || Path(`/core-pigeon/`)}
|
||||||
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -78,8 +78,8 @@ services:
|
|||||||
- traefik.http.services.cronos-zkevm-mainnet-external-node-archive.loadbalancer.server.port=80
|
- traefik.http.services.cronos-zkevm-mainnet-external-node-archive.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=PathRegex(`^/cronos-zkevm-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)}
|
||||||
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
cronos-zkevm-mainnet-archive-db:
|
cronos-zkevm-mainnet-archive-db:
|
||||||
|
|||||||
@@ -78,8 +78,8 @@ services:
|
|||||||
- traefik.http.services.cronos-zkevm-mainnet-external-node-pruned.loadbalancer.server.port=80
|
- traefik.http.services.cronos-zkevm-mainnet-external-node-pruned.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=PathRegex(`^/cronos-zkevm-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)}
|
||||||
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
cronos-zkevm-mainnet-db:
|
cronos-zkevm-mainnet-db:
|
||||||
|
|||||||
@@ -78,8 +78,8 @@ services:
|
|||||||
- traefik.http.services.cronos-zkevm-testnet-external-node-archive.loadbalancer.server.port=80
|
- traefik.http.services.cronos-zkevm-testnet-external-node-archive.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=PathRegex(`^/cronos-zkevm-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)}
|
||||||
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
cronos-zkevm-testnet-archive-db:
|
cronos-zkevm-testnet-archive-db:
|
||||||
|
|||||||
@@ -78,8 +78,8 @@ services:
|
|||||||
- traefik.http.services.cronos-zkevm-testnet-external-node-pruned.loadbalancer.server.port=80
|
- traefik.http.services.cronos-zkevm-testnet-external-node-pruned.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/cronos-zkevm-testnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=PathRegex(`^/cronos-zkevm-testnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)}
|
||||||
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
cronos-zkevm-testnet-db:
|
cronos-zkevm-testnet-db:
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=PathRegex(`^/ethereum-holesky-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-holesky-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-holesky/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=PathRegex(`^/ethereum-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-mainnet-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=PathRegex(`^/ethereum-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=PathRegex(`^/ethereum-sepolia-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=PathRegex(`^/ethereum-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-holesky/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-holesky-node:
|
ethereum-holesky-node:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-mainnet-node:
|
ethereum-mainnet-node:
|
||||||
|
|||||||
@@ -62,8 +62,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=PathRegex(`^/ethereum-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-sepolia-node:
|
ethereum-sepolia-node:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-holesky-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-holesky-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-holesky-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=PathRegex(`^/ethereum-holesky-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-holesky-archive-node:
|
ethereum-holesky-archive-node:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-mainnet-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-mainnet-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=PathRegex(`^/ethereum-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-mainnet-archive-node:
|
ethereum-mainnet-archive-node:
|
||||||
|
|||||||
@@ -60,8 +60,8 @@ services:
|
|||||||
- traefik.http.services.ethereum-sepolia-reth-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ethereum-sepolia-reth-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ethereum-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=PathRegex(`^/ethereum-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ethereum-sepolia-archive-node:
|
ethereum-sepolia-archive-node:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-opera-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-opera-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=PathRegex(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-opera-archive.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-opera-archive.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=PathRegex(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-opera-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-opera-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=PathRegex(`^/fantom-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-opera-pruned.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-opera-pruned.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=PathRegex(`^/fantom-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-opera-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-opera-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=PathRegex(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-opera-archive.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-opera-archive.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=PathRegex(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-opera-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-opera-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=PathRegex(`^/fantom-testnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-opera-pruned.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-opera-pruned.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=PathRegex(`^/fantom-testnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.fantom-mainnet-sonic-archive.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-mainnet-sonic-archive.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=PathRegex(`^/fantom-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.fantom-testnet-sonic-archive.loadbalancer.server.port=8545
|
- traefik.http.services.fantom-testnet-sonic-archive.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=PathRegex(`^/fantom-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-chiado-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-chiado-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=PathRegex(`^/gnosis-chiado-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.service=gnosis-chiado-erigon3-archive-trace
|
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.service=gnosis-chiado-erigon3-archive-trace
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.service=gnosis-chiado-erigon3-archive-trace-node
|
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.service=gnosis-chiado-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-chiado-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-chiado-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=PathRegex(`^/gnosis-chiado-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.service=gnosis-chiado-erigon3-minimal-trace
|
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.service=gnosis-chiado-erigon3-minimal-trace
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.service=gnosis-chiado-erigon3-minimal-trace-node
|
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.service=gnosis-chiado-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-chiado-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-chiado-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-chiado/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=PathRegex(`^/gnosis-chiado/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.service=gnosis-chiado-erigon3-pruned-trace
|
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.service=gnosis-chiado-erigon3-pruned-trace
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.service=gnosis-chiado-erigon3-pruned-trace-node
|
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.service=gnosis-chiado-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=PathRegex(`^/gnosis-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.service=gnosis-mainnet-erigon3-archive-trace
|
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.service=gnosis-mainnet-erigon3-archive-trace
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.service=gnosis-mainnet-erigon3-archive-trace-node
|
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.service=gnosis-mainnet-erigon3-archive-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/gnosis-mainnet-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.service=gnosis-mainnet-erigon3-minimal-trace
|
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.service=gnosis-mainnet-erigon3-minimal-trace
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.service=gnosis-mainnet-erigon3-minimal-trace-node
|
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.service=gnosis-mainnet-erigon3-minimal-trace-node
|
||||||
|
|||||||
@@ -71,8 +71,8 @@ services:
|
|||||||
- traefik.http.services.gnosis-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.gnosis-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/gnosis-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/gnosis-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.service=gnosis-mainnet-erigon3-pruned-trace
|
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.service=gnosis-mainnet-erigon3-pruned-trace
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.service=gnosis-mainnet-erigon3-pruned-trace-node
|
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.service=gnosis-mainnet-erigon3-pruned-trace-node
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.goat-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.goat-mainnet-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=PathRegex(`^/goat-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`)}
|
||||||
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.goat-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.goat-mainnet-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet`) || Path(`/goat-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=PathRegex(`^/goat-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Path(`/goat-mainnet`) || Path(`/goat-mainnet/`)}
|
||||||
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.goat-testnet3-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
- traefik.http.services.goat-testnet3-geth-archive-leveldb-hash.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-testnet3-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=PathRegex(`^/goat-testnet3-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`)}
|
||||||
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.goat-testnet3-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
- traefik.http.services.goat-testnet3-geth-pruned-pebble-path.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathRegex(`^/goat-testnet3/?$`)}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3`) || Path(`/goat-testnet3/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=PathRegex(`^/goat-testnet3/?$`)}
|
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Path(`/goat-testnet3`) || Path(`/goat-testnet3/`)}
|
||||||
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ services:
|
|||||||
- traefik.http.services.haqq-mainnet-haqq-pruned.loadbalancer.server.port=8545
|
- traefik.http.services.haqq-mainnet-haqq-pruned.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/haqq-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && (Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=PathRegex(`^/haqq-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)}
|
||||||
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -83,8 +83,8 @@ services:
|
|||||||
- traefik.http.services.lens-mainnet-external-node-archive.loadbalancer.server.port=80
|
- traefik.http.services.lens-mainnet-external-node-archive.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=PathRegex(`^/lens-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)}
|
||||||
- traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lens-mainnet-archive-db:
|
lens-mainnet-archive-db:
|
||||||
|
|||||||
@@ -83,8 +83,8 @@ services:
|
|||||||
- traefik.http.services.lens-mainnet-external-node-pruned.loadbalancer.server.port=80
|
- traefik.http.services.lens-mainnet-external-node-pruned.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet`) || Path(`/lens-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=PathRegex(`^/lens-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)}
|
||||||
- traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lens-mainnet-db:
|
lens-mainnet-db:
|
||||||
|
|||||||
@@ -82,8 +82,8 @@ services:
|
|||||||
- traefik.http.services.lens-testnet-external-node-archive.loadbalancer.server.port=80
|
- traefik.http.services.lens-testnet-external-node-archive.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-testnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=PathRegex(`^/lens-testnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)}
|
||||||
- traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lens-testnet-archive-db:
|
lens-testnet-archive-db:
|
||||||
|
|||||||
@@ -82,8 +82,8 @@ services:
|
|||||||
- traefik.http.services.lens-testnet-external-node-pruned.loadbalancer.server.port=80
|
- traefik.http.services.lens-testnet-external-node-pruned.loadbalancer.server.port=80
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && PathRegex(`^/lens-testnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet`) || Path(`/lens-testnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=PathRegex(`^/lens-testnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=Path(`/lens-testnet`) || Path(`/lens-testnet/`)}
|
||||||
- traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lens-testnet-db:
|
lens-testnet-db:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-mainnet-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=PathRegex(`^/linea-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-mainnet-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=PathRegex(`^/linea-mainnet-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-mainnet-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-mainnet/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet`) || Path(`/linea-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=PathRegex(`^/linea-mainnet/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-sepolia-erigon3-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=PathRegex(`^/linea-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-sepolia-erigon3-minimal-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia-minimal/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=PathRegex(`^/linea-sepolia-minimal/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.linea-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545
|
- traefik.http.services.linea-sepolia-erigon3-pruned-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/linea-sepolia/?$`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia`) || Path(`/linea-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=PathRegex(`^/linea-sepolia/?$`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.base-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.base-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/base-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`)}
|
||||||
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
base-mainnet-archive-node:
|
base-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.base-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.base-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/base-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/base-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`)}
|
||||||
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
base-sepolia-archive-node:
|
base-sepolia-archive-node:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.bob-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.bob-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/bob-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/bob-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`)}
|
||||||
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
bob-mainnet-archive-node:
|
bob-mainnet-archive-node:
|
||||||
|
|||||||
@@ -64,8 +64,8 @@ services:
|
|||||||
- traefik.http.services.boba-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.boba-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/boba-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/boba-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`)}
|
||||||
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
boba-mainnet-archive-node:
|
boba-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.boba-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.boba-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/boba-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/boba-sepolia-archive`) || Path(`/boba-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/boba-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Path(`/boba-sepolia-archive`) || Path(`/boba-sepolia-archive/`)}
|
||||||
- traefik.http.routers.boba-sepolia-op-erigon-archive-trace.middlewares=boba-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.boba-sepolia-op-erigon-archive-trace.middlewares=boba-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
boba-sepolia-archive-node:
|
boba-sepolia-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.hashkeychain-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.hashkeychain-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/hashkeychain-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/hashkeychain-mainnet-archive`) || Path(`/hashkeychain-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/hashkeychain-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Path(`/hashkeychain-mainnet-archive`) || Path(`/hashkeychain-mainnet-archive/`)}
|
||||||
- traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.middlewares=hashkeychain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.middlewares=hashkeychain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
hashkeychain-mainnet-archive-node:
|
hashkeychain-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.ink-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ink-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ink-mainnet-archive`) || Path(`/ink-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/ink-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Path(`/ink-mainnet-archive`) || Path(`/ink-mainnet-archive/`)}
|
||||||
- traefik.http.routers.ink-mainnet-op-erigon-archive-trace.middlewares=ink-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ink-mainnet-op-erigon-archive-trace.middlewares=ink-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ink-mainnet-archive-node:
|
ink-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.ink-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.ink-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/ink-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ink-sepolia-archive`) || Path(`/ink-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/ink-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Path(`/ink-sepolia-archive`) || Path(`/ink-sepolia-archive/`)}
|
||||||
- traefik.http.routers.ink-sepolia-op-erigon-archive-trace.middlewares=ink-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ink-sepolia-op-erigon-archive-trace.middlewares=ink-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
ink-sepolia-archive-node:
|
ink-sepolia-archive-node:
|
||||||
|
|||||||
@@ -67,8 +67,8 @@ services:
|
|||||||
- traefik.http.services.lisk-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.lisk-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/lisk-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/lisk-mainnet-archive`) || Path(`/lisk-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/lisk-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Path(`/lisk-mainnet-archive`) || Path(`/lisk-mainnet-archive/`)}
|
||||||
- traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.middlewares=lisk-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.middlewares=lisk-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
lisk-mainnet-archive-node:
|
lisk-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.metal-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.metal-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/metal-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/metal-mainnet-archive`) || Path(`/metal-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/metal-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Path(`/metal-mainnet-archive`) || Path(`/metal-mainnet-archive/`)}
|
||||||
- traefik.http.routers.metal-mainnet-op-erigon-archive-trace.middlewares=metal-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.metal-mainnet-op-erigon-archive-trace.middlewares=metal-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
metal-mainnet-archive-node:
|
metal-mainnet-archive-node:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.mode-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.mode-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/mode-mainnet-archive`) || Path(`/mode-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/mode-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Path(`/mode-mainnet-archive`) || Path(`/mode-mainnet-archive/`)}
|
||||||
- traefik.http.routers.mode-mainnet-op-erigon-archive-trace.middlewares=mode-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.mode-mainnet-op-erigon-archive-trace.middlewares=mode-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
mode-mainnet-archive-node:
|
mode-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.mode-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.mode-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/mode-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/mode-sepolia-archive`) || Path(`/mode-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/mode-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Path(`/mode-sepolia-archive`) || Path(`/mode-sepolia-archive/`)}
|
||||||
- traefik.http.routers.mode-sepolia-op-erigon-archive-trace.middlewares=mode-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.mode-sepolia-op-erigon-archive-trace.middlewares=mode-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
mode-sepolia-archive-node:
|
mode-sepolia-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.op-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.op-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/op-mainnet-archive`) || Path(`/op-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/op-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Path(`/op-mainnet-archive`) || Path(`/op-mainnet-archive/`)}
|
||||||
- traefik.http.routers.op-mainnet-op-erigon-archive-trace.middlewares=op-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.op-mainnet-op-erigon-archive-trace.middlewares=op-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
op-mainnet-archive-node:
|
op-mainnet-archive-node:
|
||||||
|
|||||||
@@ -63,8 +63,8 @@ services:
|
|||||||
- traefik.http.services.op-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.op-sepolia-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/op-sepolia-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/op-sepolia-archive`) || Path(`/op-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=PathRegex(`^/op-sepolia-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Path(`/op-sepolia-archive`) || Path(`/op-sepolia-archive/`)}
|
||||||
- traefik.http.routers.op-sepolia-op-erigon-archive-trace.middlewares=op-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.op-sepolia-op-erigon-archive-trace.middlewares=op-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
op-sepolia-archive-node:
|
op-sepolia-archive-node:
|
||||||
|
|||||||
@@ -65,8 +65,8 @@ services:
|
|||||||
- traefik.http.services.snax-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
- traefik.http.services.snax-mainnet-op-erigon-archive-trace.loadbalancer.server.port=8545
|
||||||
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.entrypoints=websecure}
|
||||||
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathRegex(`^/snax-mainnet-archive/?$`)}
|
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/snax-mainnet-archive`) || Path(`/snax-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=PathRegex(`^/snax-mainnet-archive/?$`)}
|
- ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Path(`/snax-mainnet-archive`) || Path(`/snax-mainnet-archive/`)}
|
||||||
- traefik.http.routers.snax-mainnet-op-erigon-archive-trace.middlewares=snax-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.snax-mainnet-op-erigon-archive-trace.middlewares=snax-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
|
|
||||||
snax-mainnet-archive-node:
|
snax-mainnet-archive-node:
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user