no more nginx

This commit is contained in:
goldsquid
2025-06-22 15:08:21 +07:00
parent 04db729cb7
commit 9c39f7ac1d
24 changed files with 273 additions and 557 deletions

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
abstract-mainnet-archive-client:
abstract-mainnet-archive:
image: ${ABSTRACT_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${ABSTRACT_MAINNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -83,35 +83,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
abstract-mainnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: abstract-mainnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- abstract-mainnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.abstract-mainnet-external-node-archive-stripprefix.stripprefix.prefixes=/abstract-mainnet-archive
- traefik.http.services.abstract-mainnet-external-node-archive.loadbalancer.server.port=80
- traefik.http.services.abstract-mainnet-external-node-archive.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-archive.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/abstract-mainnet-archive`) || Path(`/abstract-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.abstract-mainnet-external-node-archive.rule=Path(`/abstract-mainnet-archive`) || Path(`/abstract-mainnet-archive/`)}
- traefik.http.routers.abstract-mainnet-external-node-archive.middlewares=abstract-mainnet-external-node-archive-stripprefix, ipallowlist
- traefik.http.routers.abstract-mainnet-external-node-archive.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.abstract-mainnet-external-node-archive-ws.priority=100 # answers GET requests first
- traefik.http.services.abstract-mainnet-external-node-archive-ws.loadbalancer.server.port=8546
- traefik.http.routers.abstract-mainnet-external-node-archive-ws.service=abstract-mainnet-external-node-archive-ws
- traefik.http.routers.abstract-mainnet-external-node-archive.service=abstract-mainnet-external-node-archive
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-archive-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-archive-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-archive-ws.rule=Host(`$DOMAIN`) && (Path(`/abstract-mainnet-archive`) || Path(`/abstract-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.abstract-mainnet-external-node-archive-ws.rule=(Path(`/abstract-mainnet-archive`) || Path(`/abstract-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.abstract-mainnet-external-node-archive-ws.middlewares=abstract-mainnet-external-node-archive-stripprefix, ipallowlist
abstract-mainnet-archive-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
abstract-mainnet-client:
abstract-mainnet:
image: ${ABSTRACT_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${ABSTRACT_MAINNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -83,35 +83,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
abstract-mainnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: abstract-mainnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- abstract-mainnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.abstract-mainnet-external-node-pruned-stripprefix.stripprefix.prefixes=/abstract-mainnet
- traefik.http.services.abstract-mainnet-external-node-pruned.loadbalancer.server.port=80
- traefik.http.services.abstract-mainnet-external-node-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/abstract-mainnet`) || Path(`/abstract-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.abstract-mainnet-external-node-pruned.rule=Path(`/abstract-mainnet`) || Path(`/abstract-mainnet/`)}
- traefik.http.routers.abstract-mainnet-external-node-pruned.middlewares=abstract-mainnet-external-node-pruned-stripprefix, ipallowlist
- traefik.http.routers.abstract-mainnet-external-node-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.abstract-mainnet-external-node-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.abstract-mainnet-external-node-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.abstract-mainnet-external-node-pruned-ws.service=abstract-mainnet-external-node-pruned-ws
- traefik.http.routers.abstract-mainnet-external-node-pruned.service=abstract-mainnet-external-node-pruned
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.abstract-mainnet-external-node-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/abstract-mainnet`) || Path(`/abstract-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.abstract-mainnet-external-node-pruned-ws.rule=(Path(`/abstract-mainnet`) || Path(`/abstract-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.abstract-mainnet-external-node-pruned-ws.middlewares=abstract-mainnet-external-node-pruned-stripprefix, ipallowlist
abstract-mainnet-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
abstract-testnet-archive-client:
abstract-testnet-archive:
image: ${ABSTRACT_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${ABSTRACT_TESTNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -83,35 +83,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
abstract-testnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: abstract-testnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- abstract-testnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.abstract-testnet-external-node-archive-stripprefix.stripprefix.prefixes=/abstract-testnet-archive
- traefik.http.services.abstract-testnet-external-node-archive.loadbalancer.server.port=80
- traefik.http.services.abstract-testnet-external-node-archive.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-archive.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/abstract-testnet-archive`) || Path(`/abstract-testnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.abstract-testnet-external-node-archive.rule=Path(`/abstract-testnet-archive`) || Path(`/abstract-testnet-archive/`)}
- traefik.http.routers.abstract-testnet-external-node-archive.middlewares=abstract-testnet-external-node-archive-stripprefix, ipallowlist
- traefik.http.routers.abstract-testnet-external-node-archive.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.abstract-testnet-external-node-archive-ws.priority=100 # answers GET requests first
- traefik.http.services.abstract-testnet-external-node-archive-ws.loadbalancer.server.port=8546
- traefik.http.routers.abstract-testnet-external-node-archive-ws.service=abstract-testnet-external-node-archive-ws
- traefik.http.routers.abstract-testnet-external-node-archive.service=abstract-testnet-external-node-archive
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-archive-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-archive-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-archive-ws.rule=Host(`$DOMAIN`) && (Path(`/abstract-testnet-archive`) || Path(`/abstract-testnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.abstract-testnet-external-node-archive-ws.rule=(Path(`/abstract-testnet-archive`) || Path(`/abstract-testnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.abstract-testnet-external-node-archive-ws.middlewares=abstract-testnet-external-node-archive-stripprefix, ipallowlist
abstract-testnet-archive-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
abstract-testnet-client:
abstract-testnet:
image: ${ABSTRACT_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${ABSTRACT_TESTNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -83,35 +83,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
abstract-testnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: abstract-testnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- abstract-testnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.abstract-testnet-external-node-pruned-stripprefix.stripprefix.prefixes=/abstract-testnet
- traefik.http.services.abstract-testnet-external-node-pruned.loadbalancer.server.port=80
- traefik.http.services.abstract-testnet-external-node-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/abstract-testnet`) || Path(`/abstract-testnet/`))}
- ${NO_SSL:+traefik.http.routers.abstract-testnet-external-node-pruned.rule=Path(`/abstract-testnet`) || Path(`/abstract-testnet/`)}
- traefik.http.routers.abstract-testnet-external-node-pruned.middlewares=abstract-testnet-external-node-pruned-stripprefix, ipallowlist
- traefik.http.routers.abstract-testnet-external-node-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.abstract-testnet-external-node-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.abstract-testnet-external-node-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.abstract-testnet-external-node-pruned-ws.service=abstract-testnet-external-node-pruned-ws
- traefik.http.routers.abstract-testnet-external-node-pruned.service=abstract-testnet-external-node-pruned
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.abstract-testnet-external-node-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/abstract-testnet`) || Path(`/abstract-testnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.abstract-testnet-external-node-pruned-ws.rule=(Path(`/abstract-testnet`) || Path(`/abstract-testnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.abstract-testnet-external-node-pruned-ws.middlewares=abstract-testnet-external-node-pruned-stripprefix, ipallowlist
abstract-testnet-db:
image: postgres:14

View File

@@ -32,7 +32,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
cronos-zkevm-mainnet-archive-client:
cronos-zkevm-mainnet-archive:
image: ${CRONOS_ZKEVM_EXTERNAL_NODE_IMAGE:-ghcr.io/cronos-labs/external-node}:${CRONOS_ZKEVM_MAINNET_EXTERNAL_NODE_VERSION:-v27.5.3-patch}
sysctls:
# TCP Performance
@@ -87,35 +87,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
cronos-zkevm-mainnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: cronos-zkevm-mainnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- cronos-zkevm-mainnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.cronos-zkevm-mainnet-external-node-archive-stripprefix.stripprefix.prefixes=/cronos-zkevm-mainnet-archive
- traefik.http.services.cronos-zkevm-mainnet-external-node-archive.loadbalancer.server.port=80
- traefik.http.services.cronos-zkevm-mainnet-external-node-archive.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)}
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipallowlist
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive-ws.priority=100 # answers GET requests first
- traefik.http.services.cronos-zkevm-mainnet-external-node-archive-ws.loadbalancer.server.port=8546
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive-ws.service=cronos-zkevm-mainnet-external-node-archive-ws
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.service=cronos-zkevm-mainnet-external-node-archive
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive-ws.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive-ws.rule=(Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive-ws.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipallowlist
cronos-zkevm-mainnet-archive-db:
image: postgres:14

View File

@@ -32,7 +32,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
cronos-zkevm-mainnet-client:
cronos-zkevm-mainnet:
image: ${CRONOS_ZKEVM_EXTERNAL_NODE_IMAGE:-ghcr.io/cronos-labs/external-node}:${CRONOS_ZKEVM_MAINNET_EXTERNAL_NODE_VERSION:-v27.5.3-patch}
sysctls:
# TCP Performance
@@ -87,35 +87,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
cronos-zkevm-mainnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: cronos-zkevm-mainnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- cronos-zkevm-mainnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.cronos-zkevm-mainnet-external-node-pruned-stripprefix.stripprefix.prefixes=/cronos-zkevm-mainnet
- traefik.http.services.cronos-zkevm-mainnet-external-node-pruned.loadbalancer.server.port=80
- traefik.http.services.cronos-zkevm-mainnet-external-node-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)}
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipallowlist
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.cronos-zkevm-mainnet-external-node-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned-ws.service=cronos-zkevm-mainnet-external-node-pruned-ws
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.service=cronos-zkevm-mainnet-external-node-pruned
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned-ws.rule=(Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned-ws.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipallowlist
cronos-zkevm-mainnet-db:
image: postgres:14

View File

@@ -32,7 +32,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
cronos-zkevm-testnet-archive-client:
cronos-zkevm-testnet-archive:
image: ${CRONOS_ZKEVM_EXTERNAL_NODE_IMAGE:-ghcr.io/cronos-labs/external-node}:${CRONOS_ZKEVM_TESTNET_EXTERNAL_NODE_VERSION:-v27.5.3-patch}
sysctls:
# TCP Performance
@@ -87,35 +87,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
cronos-zkevm-testnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: cronos-zkevm-testnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- cronos-zkevm-testnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.cronos-zkevm-testnet-external-node-archive-stripprefix.stripprefix.prefixes=/cronos-zkevm-testnet-archive
- traefik.http.services.cronos-zkevm-testnet-external-node-archive.loadbalancer.server.port=80
- traefik.http.services.cronos-zkevm-testnet-external-node-archive.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)}
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipallowlist
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive-ws.priority=100 # answers GET requests first
- traefik.http.services.cronos-zkevm-testnet-external-node-archive-ws.loadbalancer.server.port=8546
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive-ws.service=cronos-zkevm-testnet-external-node-archive-ws
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.service=cronos-zkevm-testnet-external-node-archive
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive-ws.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive-ws.rule=(Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive-ws.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipallowlist
cronos-zkevm-testnet-archive-db:
image: postgres:14

View File

@@ -32,7 +32,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
cronos-zkevm-testnet-client:
cronos-zkevm-testnet:
image: ${CRONOS_ZKEVM_EXTERNAL_NODE_IMAGE:-ghcr.io/cronos-labs/external-node}:${CRONOS_ZKEVM_TESTNET_EXTERNAL_NODE_VERSION:-v27.5.3-patch}
sysctls:
# TCP Performance
@@ -87,35 +87,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
cronos-zkevm-testnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: cronos-zkevm-testnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- cronos-zkevm-testnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.cronos-zkevm-testnet-external-node-pruned-stripprefix.stripprefix.prefixes=/cronos-zkevm-testnet
- traefik.http.services.cronos-zkevm-testnet-external-node-pruned.loadbalancer.server.port=80
- traefik.http.services.cronos-zkevm-testnet-external-node-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`))}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)}
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipallowlist
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.cronos-zkevm-testnet-external-node-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned-ws.service=cronos-zkevm-testnet-external-node-pruned-ws
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.service=cronos-zkevm-testnet-external-node-pruned
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned-ws.rule=(Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned-ws.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipallowlist
cronos-zkevm-testnet-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
ethereum-classic-besu-client:
ethereum-classic-besu:
image: ${ETHEREUM_BESU_IMAGE:-hyperledger/besu}:${ETHEREUM_CLASSIC_BESU_VERSION:-25.6.0}
sysctls:
# TCP Performance
@@ -86,35 +86,24 @@ services:
- prometheus-scrape.enabled=true
- prometheus-scrape.port=9545
- prometheus-scrape.path=/metrics
ethereum-classic-besu:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: ethereum-classic-besu-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- ethereum-classic-besu-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.ethereum-classic-besu-pruned-bonsai-stripprefix.stripprefix.prefixes=/ethereum-classic-besu
- traefik.http.services.ethereum-classic-besu-pruned-bonsai.loadbalancer.server.port=80
- traefik.http.services.ethereum-classic-besu-pruned-bonsai.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.ethereum-classic-besu-pruned-bonsai.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.ethereum-classic-besu-pruned-bonsai.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-classic-besu-pruned-bonsai.rule=Host(`$DOMAIN`) && (Path(`/ethereum-classic-besu`) || Path(`/ethereum-classic-besu/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-classic-besu-pruned-bonsai.rule=Path(`/ethereum-classic-besu`) || Path(`/ethereum-classic-besu/`)}
- traefik.http.routers.ethereum-classic-besu-pruned-bonsai.middlewares=ethereum-classic-besu-pruned-bonsai-stripprefix, ipallowlist
- traefik.http.routers.ethereum-classic-besu-pruned-bonsai.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.ethereum-classic-besu-pruned-bonsai-ws.priority=100 # answers GET requests first
- traefik.http.services.ethereum-classic-besu-pruned-bonsai-ws.loadbalancer.server.port=8546
- traefik.http.routers.ethereum-classic-besu-pruned-bonsai-ws.service=ethereum-classic-besu-pruned-bonsai-ws
- traefik.http.routers.ethereum-classic-besu-pruned-bonsai.service=ethereum-classic-besu-pruned-bonsai
- ${NO_SSL:-traefik.http.routers.ethereum-classic-besu-pruned-bonsai-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.ethereum-classic-besu-pruned-bonsai-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-classic-besu-pruned-bonsai-ws.rule=Host(`$DOMAIN`) && (Path(`/ethereum-classic-besu`) || Path(`/ethereum-classic-besu/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.ethereum-classic-besu-pruned-bonsai-ws.rule=(Path(`/ethereum-classic-besu`) || Path(`/ethereum-classic-besu/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.ethereum-classic-besu-pruned-bonsai-ws.middlewares=ethereum-classic-besu-pruned-bonsai-stripprefix, ipallowlist
volumes:
ethereum-classic-besu-pruned-bonsai:

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
ethereum-mainnet-besu-client:
ethereum-mainnet-besu:
image: ${ETHEREUM_BESU_IMAGE:-hyperledger/besu}:${ETHEREUM_MAINNET_BESU_VERSION:-25.6.0}
sysctls:
# TCP Performance
@@ -91,35 +91,24 @@ services:
- prometheus-scrape.enabled=true
- prometheus-scrape.port=9545
- prometheus-scrape.path=/metrics
ethereum-mainnet-besu:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: ethereum-mainnet-besu-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- ethereum-mainnet-besu-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.ethereum-mainnet-besu-pruned-bonsai-stripprefix.stripprefix.prefixes=/ethereum-mainnet-besu
- traefik.http.services.ethereum-mainnet-besu-pruned-bonsai.loadbalancer.server.port=80
- traefik.http.services.ethereum-mainnet-besu-pruned-bonsai.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-besu`) || Path(`/ethereum-mainnet-besu/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai.rule=Path(`/ethereum-mainnet-besu`) || Path(`/ethereum-mainnet-besu/`)}
- traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai.middlewares=ethereum-mainnet-besu-pruned-bonsai-stripprefix, ipallowlist
- traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai-ws.priority=100 # answers GET requests first
- traefik.http.services.ethereum-mainnet-besu-pruned-bonsai-ws.loadbalancer.server.port=8546
- traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai-ws.service=ethereum-mainnet-besu-pruned-bonsai-ws
- traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai.service=ethereum-mainnet-besu-pruned-bonsai
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai-ws.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-besu`) || Path(`/ethereum-mainnet-besu/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai-ws.rule=(Path(`/ethereum-mainnet-besu`) || Path(`/ethereum-mainnet-besu/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.ethereum-mainnet-besu-pruned-bonsai-ws.middlewares=ethereum-mainnet-besu-pruned-bonsai-stripprefix, ipallowlist
ethereum-mainnet-besu-node:
image: ${ETHEREUM_NIMBUS_IMAGE:-statusim/nimbus-eth2}:${ETHEREUM_MAINNET_NIMBUS_VERSION:-amd64-v25.6.0}
@@ -142,10 +131,10 @@ services:
- --rest-port=3500
- --tcp-port=18205
- --udp-port=18205
- --web3-url=http://ethereum-mainnet-besu-client:8551
- --web3-url=http://ethereum-mainnet-besu:8551
restart: unless-stopped
depends_on:
- ethereum-mainnet-besu-client
- ethereum-mainnet-besu
networks:
- chains
volumes:

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
haqq-mainnet-client:
haqq-mainnet:
image: ${HAQQ_HAQQ_IMAGE:-alhaqq/haqq}:${HAQQ_MAINNET_HAQQ_VERSION:-v1.8.3}
sysctls:
# TCP Performance
@@ -63,35 +63,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
haqq-mainnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: haqq-mainnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- haqq-mainnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.haqq-mainnet-haqq-pruned-stripprefix.stripprefix.prefixes=/haqq-mainnet
- traefik.http.services.haqq-mainnet-haqq-pruned.loadbalancer.server.port=80
- traefik.http.services.haqq-mainnet-haqq-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && (Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)}
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipallowlist
- traefik.http.routers.haqq-mainnet-haqq-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.haqq-mainnet-haqq-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.haqq-mainnet-haqq-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.haqq-mainnet-haqq-pruned-ws.service=haqq-mainnet-haqq-pruned-ws
- traefik.http.routers.haqq-mainnet-haqq-pruned.service=haqq-mainnet-haqq-pruned
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned-ws.rule=(Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.haqq-mainnet-haqq-pruned-ws.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipallowlist
volumes:
haqq-mainnet-haqq-pruned:

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
lens-mainnet-archive-client:
lens-mainnet-archive:
image: ${LENS_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${LENS_MAINNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -92,35 +92,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
lens-mainnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: lens-mainnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- lens-mainnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.lens-mainnet-external-node-archive-stripprefix.stripprefix.prefixes=/lens-mainnet-archive
- traefik.http.services.lens-mainnet-external-node-archive.loadbalancer.server.port=80
- traefik.http.services.lens-mainnet-external-node-archive.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)}
- traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipallowlist
- traefik.http.routers.lens-mainnet-external-node-archive.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.lens-mainnet-external-node-archive-ws.priority=100 # answers GET requests first
- traefik.http.services.lens-mainnet-external-node-archive-ws.loadbalancer.server.port=8546
- traefik.http.routers.lens-mainnet-external-node-archive-ws.service=lens-mainnet-external-node-archive-ws
- traefik.http.routers.lens-mainnet-external-node-archive.service=lens-mainnet-external-node-archive
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive-ws.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive-ws.rule=(Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.lens-mainnet-external-node-archive-ws.middlewares=lens-mainnet-external-node-archive-stripprefix, ipallowlist
lens-mainnet-archive-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
lens-mainnet-client:
lens-mainnet:
image: ${LENS_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${LENS_MAINNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -92,35 +92,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
lens-mainnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: lens-mainnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- lens-mainnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.lens-mainnet-external-node-pruned-stripprefix.stripprefix.prefixes=/lens-mainnet
- traefik.http.services.lens-mainnet-external-node-pruned.loadbalancer.server.port=80
- traefik.http.services.lens-mainnet-external-node-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet`) || Path(`/lens-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)}
- traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipallowlist
- traefik.http.routers.lens-mainnet-external-node-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.lens-mainnet-external-node-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.lens-mainnet-external-node-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.lens-mainnet-external-node-pruned-ws.service=lens-mainnet-external-node-pruned-ws
- traefik.http.routers.lens-mainnet-external-node-pruned.service=lens-mainnet-external-node-pruned
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned-ws.rule=(Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.lens-mainnet-external-node-pruned-ws.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipallowlist
lens-mainnet-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
lens-testnet-archive-client:
lens-testnet-archive:
image: ${LENS_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${LENS_TESTNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -91,35 +91,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
lens-testnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: lens-testnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- lens-testnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.lens-testnet-external-node-archive-stripprefix.stripprefix.prefixes=/lens-testnet-archive
- traefik.http.services.lens-testnet-external-node-archive.loadbalancer.server.port=80
- traefik.http.services.lens-testnet-external-node-archive.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)}
- traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipallowlist
- traefik.http.routers.lens-testnet-external-node-archive.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.lens-testnet-external-node-archive-ws.priority=100 # answers GET requests first
- traefik.http.services.lens-testnet-external-node-archive-ws.loadbalancer.server.port=8546
- traefik.http.routers.lens-testnet-external-node-archive-ws.service=lens-testnet-external-node-archive-ws
- traefik.http.routers.lens-testnet-external-node-archive.service=lens-testnet-external-node-archive
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive-ws.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive-ws.rule=(Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.lens-testnet-external-node-archive-ws.middlewares=lens-testnet-external-node-archive-stripprefix, ipallowlist
lens-testnet-archive-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
lens-testnet-client:
lens-testnet:
image: ${LENS_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${LENS_TESTNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -91,35 +91,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
lens-testnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: lens-testnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- lens-testnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.lens-testnet-external-node-pruned-stripprefix.stripprefix.prefixes=/lens-testnet
- traefik.http.services.lens-testnet-external-node-pruned.loadbalancer.server.port=80
- traefik.http.services.lens-testnet-external-node-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet`) || Path(`/lens-testnet/`))}
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=Path(`/lens-testnet`) || Path(`/lens-testnet/`)}
- traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipallowlist
- traefik.http.routers.lens-testnet-external-node-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.lens-testnet-external-node-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.lens-testnet-external-node-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.lens-testnet-external-node-pruned-ws.service=lens-testnet-external-node-pruned-ws
- traefik.http.routers.lens-testnet-external-node-pruned.service=lens-testnet-external-node-pruned
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet`) || Path(`/lens-testnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned-ws.rule=(Path(`/lens-testnet`) || Path(`/lens-testnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.lens-testnet-external-node-pruned-ws.middlewares=lens-testnet-external-node-pruned-stripprefix, ipallowlist
lens-testnet-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
linea-mainnet-client:
linea-mainnet:
image: ${LINEA_BESU_IMAGE:-consensys/linea-besu-package}:${LINEA_MAINNET_BESU_VERSION:-mainnet-latest}
sysctls:
# TCP Performance
@@ -89,35 +89,24 @@ services:
- prometheus-scrape.enabled=true
- prometheus-scrape.port=9545
- prometheus-scrape.path=/metrics
linea-mainnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: linea-mainnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- linea-mainnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.linea-mainnet-besu-pruned-bonsai-stripprefix.stripprefix.prefixes=/linea-mainnet
- traefik.http.services.linea-mainnet-besu-pruned-bonsai.loadbalancer.server.port=80
- traefik.http.services.linea-mainnet-besu-pruned-bonsai.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.linea-mainnet-besu-pruned-bonsai.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.linea-mainnet-besu-pruned-bonsai.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-mainnet-besu-pruned-bonsai.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet`) || Path(`/linea-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.linea-mainnet-besu-pruned-bonsai.rule=Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)}
- traefik.http.routers.linea-mainnet-besu-pruned-bonsai.middlewares=linea-mainnet-besu-pruned-bonsai-stripprefix, ipallowlist
- traefik.http.routers.linea-mainnet-besu-pruned-bonsai.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.linea-mainnet-besu-pruned-bonsai-ws.priority=100 # answers GET requests first
- traefik.http.services.linea-mainnet-besu-pruned-bonsai-ws.loadbalancer.server.port=8546
- traefik.http.routers.linea-mainnet-besu-pruned-bonsai-ws.service=linea-mainnet-besu-pruned-bonsai-ws
- traefik.http.routers.linea-mainnet-besu-pruned-bonsai.service=linea-mainnet-besu-pruned-bonsai
- ${NO_SSL:-traefik.http.routers.linea-mainnet-besu-pruned-bonsai-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.linea-mainnet-besu-pruned-bonsai-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-mainnet-besu-pruned-bonsai-ws.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.linea-mainnet-besu-pruned-bonsai-ws.rule=(Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.linea-mainnet-besu-pruned-bonsai-ws.middlewares=linea-mainnet-besu-pruned-bonsai-stripprefix, ipallowlist
volumes:
linea-mainnet-besu-pruned-bonsai:

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
linea-sepolia-client:
linea-sepolia:
image: ${LINEA_BESU_IMAGE:-consensys/linea-besu-package}:${LINEA_SEPOLIA_BESU_VERSION:-sepolia-latest}
sysctls:
# TCP Performance
@@ -89,35 +89,24 @@ services:
- prometheus-scrape.enabled=true
- prometheus-scrape.port=9545
- prometheus-scrape.path=/metrics
linea-sepolia:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: linea-sepolia-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- linea-sepolia-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.linea-sepolia-besu-pruned-bonsai-stripprefix.stripprefix.prefixes=/linea-sepolia
- traefik.http.services.linea-sepolia-besu-pruned-bonsai.loadbalancer.server.port=80
- traefik.http.services.linea-sepolia-besu-pruned-bonsai.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.linea-sepolia-besu-pruned-bonsai.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.linea-sepolia-besu-pruned-bonsai.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-sepolia-besu-pruned-bonsai.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia`) || Path(`/linea-sepolia/`))}
- ${NO_SSL:+traefik.http.routers.linea-sepolia-besu-pruned-bonsai.rule=Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)}
- traefik.http.routers.linea-sepolia-besu-pruned-bonsai.middlewares=linea-sepolia-besu-pruned-bonsai-stripprefix, ipallowlist
- traefik.http.routers.linea-sepolia-besu-pruned-bonsai.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.linea-sepolia-besu-pruned-bonsai-ws.priority=100 # answers GET requests first
- traefik.http.services.linea-sepolia-besu-pruned-bonsai-ws.loadbalancer.server.port=8546
- traefik.http.routers.linea-sepolia-besu-pruned-bonsai-ws.service=linea-sepolia-besu-pruned-bonsai-ws
- traefik.http.routers.linea-sepolia-besu-pruned-bonsai.service=linea-sepolia-besu-pruned-bonsai
- ${NO_SSL:-traefik.http.routers.linea-sepolia-besu-pruned-bonsai-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.linea-sepolia-besu-pruned-bonsai-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-sepolia-besu-pruned-bonsai-ws.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.linea-sepolia-besu-pruned-bonsai-ws.rule=(Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.linea-sepolia-besu-pruned-bonsai-ws.middlewares=linea-sepolia-besu-pruned-bonsai-stripprefix, ipallowlist
volumes:
linea-sepolia-besu-pruned-bonsai:

View File

@@ -30,7 +30,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
metis-andromeda-mainnet-archive-client:
metis-andromeda-mainnet-archive:
image: ${METIS_ANDROMEDA_L2GETH_IMAGE:-metisdao/l2geth}:${METIS_ANDROMEDA_MAINNET_L2GETH_VERSION:-v0.3.5}
sysctls:
# TCP Performance
@@ -106,35 +106,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
metis-andromeda-mainnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: metis-andromeda-mainnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- metis-andromeda-mainnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-stripprefix.stripprefix.prefixes=/metis-andromeda-mainnet-archive
- traefik.http.services.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.loadbalancer.server.port=80
- traefik.http.services.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`)}
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-mainnet-l2geth-archive-leveldb-hash-stripprefix, ipallowlist
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws.priority=100 # answers GET requests first
- traefik.http.services.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws.loadbalancer.server.port=8546
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws.service=metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.service=metis-andromeda-mainnet-l2geth-archive-leveldb-hash
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws.rule=(Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash-ws.middlewares=metis-andromeda-mainnet-l2geth-archive-leveldb-hash-stripprefix, ipallowlist
metis-andromeda-mainnet-archive-node:
image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_MAINNET_DTL_VERSION:-v0.1.3}
@@ -175,7 +164,7 @@ services:
- URL=https://metisprotocol.github.io/metis-networks/andromeda-mainnet/addresses.json
restart: unless-stopped
depends_on:
- metis-andromeda-mainnet-archive-client
- metis-andromeda-mainnet-archive
networks:
- chains
volumes:

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
solana-mainnet-client:
solana-mainnet:
image: ${SOLANA_FIRESOL_IMAGE:-ghcr.io/streamingfast/firehose-solana}:${SOLANA_MAINNET_FIRESOL_VERSION:-v1.1.3}
sysctls:
# TCP Performance
@@ -92,30 +92,9 @@ services:
- prometheus-scrape.enabled=true
- prometheus-scrape.port=12344
- prometheus-scrape.path=/metrics
solana-mainnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: solana-mainnet-client
RPC_PATH: ''
RPC_PORT: 8899
WS_PATH: ''
WS_PORT: 8899
restart: unless-stopped
depends_on:
- solana-mainnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.solana-mainnet-agave-pruned-rocksdb-stripprefix.stripprefix.prefixes=/solana-mainnet
- traefik.http.services.solana-mainnet-agave-pruned-rocksdb.loadbalancer.server.port=80
- traefik.http.services.solana-mainnet-agave-pruned-rocksdb.loadbalancer.server.port=8899
- ${NO_SSL:-traefik.http.routers.solana-mainnet-agave-pruned-rocksdb.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.solana-mainnet-agave-pruned-rocksdb.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.solana-mainnet-agave-pruned-rocksdb.rule=Host(`$DOMAIN`) && (Path(`/solana-mainnet`) || Path(`/solana-mainnet/`))}
@@ -134,7 +113,7 @@ services:
- --firehose-rate-limit-bucket-fill-rate=${SOLANA_MAINNET_FIREHOSE_RATE_LIMIT_BUCKET_FILL_RATE:-1s}
- --firehose-rate-limit-bucket-size=${SOLANA_MAINNET_FIREHOSE_RATE_LIMIT_BUCKET_SIZE:-200}
- --log-to-file=false
- --relayer-source=solana-mainnet-client:10010
- --relayer-source=solana-mainnet:10010
restart: unless-stopped
depends_on:
- solana-mainnet

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
solana-testnet-client:
solana-testnet:
image: ${SOLANA_FIRESOL_IMAGE:-ghcr.io/streamingfast/firehose-solana}:${SOLANA_TESTNET_FIRESOL_VERSION:-v1.1.3}
sysctls:
# TCP Performance
@@ -90,30 +90,9 @@ services:
- prometheus-scrape.enabled=true
- prometheus-scrape.port=12344
- prometheus-scrape.path=/metrics
solana-testnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: solana-testnet-client
RPC_PATH: ''
RPC_PORT: 8899
WS_PATH: ''
WS_PORT: 8899
restart: unless-stopped
depends_on:
- solana-testnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.solana-testnet-agave-pruned-rocksdb-stripprefix.stripprefix.prefixes=/solana-testnet
- traefik.http.services.solana-testnet-agave-pruned-rocksdb.loadbalancer.server.port=80
- traefik.http.services.solana-testnet-agave-pruned-rocksdb.loadbalancer.server.port=8899
- ${NO_SSL:-traefik.http.routers.solana-testnet-agave-pruned-rocksdb.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.solana-testnet-agave-pruned-rocksdb.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.solana-testnet-agave-pruned-rocksdb.rule=Host(`$DOMAIN`) && (Path(`/solana-testnet`) || Path(`/solana-testnet/`))}
@@ -132,7 +111,7 @@ services:
- --firehose-rate-limit-bucket-fill-rate=${SOLANA_TESTNET_FIREHOSE_RATE_LIMIT_BUCKET_FILL_RATE:-1s}
- --firehose-rate-limit-bucket-size=${SOLANA_TESTNET_FIREHOSE_RATE_LIMIT_BUCKET_SIZE:-200}
- --log-to-file=false
- --relayer-source=solana-testnet-client:10010
- --relayer-source=solana-testnet:10010
restart: unless-stopped
depends_on:
- solana-testnet

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
zksync-era-boojnet-archive-client:
zksync-era-boojnet-archive:
image: ${ZKSYNC_ERA_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${ZKSYNC_ERA_BOOJNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -81,35 +81,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
zksync-era-boojnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: zksync-era-boojnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- zksync-era-boojnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.zksync-era-boojnet-external-node-archive-stripprefix.stripprefix.prefixes=/zksync-era-boojnet-archive
- traefik.http.services.zksync-era-boojnet-external-node-archive.loadbalancer.server.port=80
- traefik.http.services.zksync-era-boojnet-external-node-archive.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-boojnet-archive`) || Path(`/zksync-era-boojnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.zksync-era-boojnet-external-node-archive.rule=Path(`/zksync-era-boojnet-archive`) || Path(`/zksync-era-boojnet-archive/`)}
- traefik.http.routers.zksync-era-boojnet-external-node-archive.middlewares=zksync-era-boojnet-external-node-archive-stripprefix, ipallowlist
- traefik.http.routers.zksync-era-boojnet-external-node-archive.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.zksync-era-boojnet-external-node-archive-ws.priority=100 # answers GET requests first
- traefik.http.services.zksync-era-boojnet-external-node-archive-ws.loadbalancer.server.port=8546
- traefik.http.routers.zksync-era-boojnet-external-node-archive-ws.service=zksync-era-boojnet-external-node-archive-ws
- traefik.http.routers.zksync-era-boojnet-external-node-archive.service=zksync-era-boojnet-external-node-archive
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-archive-ws.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-boojnet-archive`) || Path(`/zksync-era-boojnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.zksync-era-boojnet-external-node-archive-ws.rule=(Path(`/zksync-era-boojnet-archive`) || Path(`/zksync-era-boojnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.zksync-era-boojnet-external-node-archive-ws.middlewares=zksync-era-boojnet-external-node-archive-stripprefix, ipallowlist
zksync-era-boojnet-archive-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
zksync-era-boojnet-client:
zksync-era-boojnet:
image: ${ZKSYNC_ERA_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${ZKSYNC_ERA_BOOJNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -81,35 +81,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
zksync-era-boojnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: zksync-era-boojnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- zksync-era-boojnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.zksync-era-boojnet-external-node-pruned-stripprefix.stripprefix.prefixes=/zksync-era-boojnet
- traefik.http.services.zksync-era-boojnet-external-node-pruned.loadbalancer.server.port=80
- traefik.http.services.zksync-era-boojnet-external-node-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-boojnet`) || Path(`/zksync-era-boojnet/`))}
- ${NO_SSL:+traefik.http.routers.zksync-era-boojnet-external-node-pruned.rule=Path(`/zksync-era-boojnet`) || Path(`/zksync-era-boojnet/`)}
- traefik.http.routers.zksync-era-boojnet-external-node-pruned.middlewares=zksync-era-boojnet-external-node-pruned-stripprefix, ipallowlist
- traefik.http.routers.zksync-era-boojnet-external-node-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.zksync-era-boojnet-external-node-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.zksync-era-boojnet-external-node-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.zksync-era-boojnet-external-node-pruned-ws.service=zksync-era-boojnet-external-node-pruned-ws
- traefik.http.routers.zksync-era-boojnet-external-node-pruned.service=zksync-era-boojnet-external-node-pruned
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.zksync-era-boojnet-external-node-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-boojnet`) || Path(`/zksync-era-boojnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.zksync-era-boojnet-external-node-pruned-ws.rule=(Path(`/zksync-era-boojnet`) || Path(`/zksync-era-boojnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.zksync-era-boojnet-external-node-pruned-ws.middlewares=zksync-era-boojnet-external-node-pruned-stripprefix, ipallowlist
zksync-era-boojnet-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
zksync-era-mainnet-archive-client:
zksync-era-mainnet-archive:
image: ${ZKSYNC_ERA_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${ZKSYNC_ERA_MAINNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -83,35 +83,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
zksync-era-mainnet-archive:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: zksync-era-mainnet-archive-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- zksync-era-mainnet-archive-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.zksync-era-mainnet-external-node-archive-stripprefix.stripprefix.prefixes=/zksync-era-mainnet-archive
- traefik.http.services.zksync-era-mainnet-external-node-archive.loadbalancer.server.port=80
- traefik.http.services.zksync-era-mainnet-external-node-archive.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-mainnet-archive`) || Path(`/zksync-era-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.zksync-era-mainnet-external-node-archive.rule=Path(`/zksync-era-mainnet-archive`) || Path(`/zksync-era-mainnet-archive/`)}
- traefik.http.routers.zksync-era-mainnet-external-node-archive.middlewares=zksync-era-mainnet-external-node-archive-stripprefix, ipallowlist
- traefik.http.routers.zksync-era-mainnet-external-node-archive.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.zksync-era-mainnet-external-node-archive-ws.priority=100 # answers GET requests first
- traefik.http.services.zksync-era-mainnet-external-node-archive-ws.loadbalancer.server.port=8546
- traefik.http.routers.zksync-era-mainnet-external-node-archive-ws.service=zksync-era-mainnet-external-node-archive-ws
- traefik.http.routers.zksync-era-mainnet-external-node-archive.service=zksync-era-mainnet-external-node-archive
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-archive-ws.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-mainnet-archive`) || Path(`/zksync-era-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.zksync-era-mainnet-external-node-archive-ws.rule=(Path(`/zksync-era-mainnet-archive`) || Path(`/zksync-era-mainnet-archive/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.zksync-era-mainnet-external-node-archive-ws.middlewares=zksync-era-mainnet-external-node-archive-stripprefix, ipallowlist
zksync-era-mainnet-archive-db:
image: postgres:14

View File

@@ -29,7 +29,7 @@ x-logging-defaults: &logging-defaults
# --data '{"jsonrpc":"2.0","method":"eth_blockNumber","params":[],"id":1}'
services:
zksync-era-mainnet-client:
zksync-era-mainnet:
image: ${ZKSYNC_ERA_EXTERNAL_NODE_IMAGE:-matterlabs/external-node}:${ZKSYNC_ERA_MAINNET_EXTERNAL_NODE_VERSION:-v28.6.0}
sysctls:
# TCP Performance
@@ -83,35 +83,24 @@ services:
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
zksync-era-mainnet:
image: nginx
expose:
- '80'
environment:
PROXY_HOST: zksync-era-mainnet-client
RPC_PATH: ''
RPC_PORT: 8545
WS_PATH: ''
WS_PORT: 8546
restart: unless-stopped
depends_on:
- zksync-era-mainnet-client
networks:
- chains
volumes:
- ./nginx-proxy:/etc/nginx/templates
logging: *logging-defaults
labels:
- prometheus-scrape.enabled=false
- traefik.enable=true
- traefik.http.middlewares.zksync-era-mainnet-external-node-pruned-stripprefix.stripprefix.prefixes=/zksync-era-mainnet
- traefik.http.services.zksync-era-mainnet-external-node-pruned.loadbalancer.server.port=80
- traefik.http.services.zksync-era-mainnet-external-node-pruned.loadbalancer.server.port=8545
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-mainnet`) || Path(`/zksync-era-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.zksync-era-mainnet-external-node-pruned.rule=Path(`/zksync-era-mainnet`) || Path(`/zksync-era-mainnet/`)}
- traefik.http.routers.zksync-era-mainnet-external-node-pruned.middlewares=zksync-era-mainnet-external-node-pruned-stripprefix, ipallowlist
- traefik.http.routers.zksync-era-mainnet-external-node-pruned.priority=50 # gets any request that is not GET with UPGRADE header
- traefik.http.routers.zksync-era-mainnet-external-node-pruned-ws.priority=100 # answers GET requests first
- traefik.http.services.zksync-era-mainnet-external-node-pruned-ws.loadbalancer.server.port=8546
- traefik.http.routers.zksync-era-mainnet-external-node-pruned-ws.service=zksync-era-mainnet-external-node-pruned-ws
- traefik.http.routers.zksync-era-mainnet-external-node-pruned.service=zksync-era-mainnet-external-node-pruned
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned-ws.entrypoints=websecure}
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned-ws.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.zksync-era-mainnet-external-node-pruned-ws.rule=Host(`$DOMAIN`) && (Path(`/zksync-era-mainnet`) || Path(`/zksync-era-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- ${NO_SSL:+traefik.http.routers.zksync-era-mainnet-external-node-pruned-ws.rule=(Path(`/zksync-era-mainnet`) || Path(`/zksync-era-mainnet/`)) && Headers(`Upgrade`, `websocket`)}
- traefik.http.routers.zksync-era-mainnet-external-node-pruned-ws.middlewares=zksync-era-mainnet-external-node-pruned-stripprefix, ipallowlist
zksync-era-mainnet-db:
image: postgres:14