Use the same case every where for entryPoints.
This commit is contained in:
parent
b9f826554c
commit
8389b46b5c
74 changed files with 248 additions and 248 deletions
|
@ -50,8 +50,8 @@ Once a day (the first call begins 10 minutes after the start of Traefik), we col
|
|||
??? example "Original configuration"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[api]
|
||||
|
@ -80,8 +80,8 @@ Once a day (the first call begins 10 minutes after the start of Traefik), we col
|
|||
??? example "Resulting Obfuscated Configuration"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[api]
|
||||
|
|
|
@ -13,11 +13,11 @@ You can configure Traefik to use an ACME provider (like Let's Encrypt) for autom
|
|||
??? example "Enabling ACME"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[entrypoints.http-tls]
|
||||
[entryPoints.http-tls]
|
||||
address = ":443"
|
||||
|
||||
[acme] # every router with TLS enabled will now be able to use ACME for its certificates
|
||||
|
@ -31,11 +31,11 @@ You can configure Traefik to use an ACME provider (like Let's Encrypt) for autom
|
|||
??? example "Configuring Wildcard Certificates"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[entrypoints.http-tls]
|
||||
[entryPoints.http-tls]
|
||||
address = ":443"
|
||||
|
||||
[acme]
|
||||
|
|
|
@ -14,11 +14,11 @@ Checking the Health of Your Traefik Instances
|
|||
??? example "Enabling /ping on a dedicated EntryPoint"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[entrypoints.ping]
|
||||
[entryPoints.ping]
|
||||
address = ":8082"
|
||||
|
||||
[ping]
|
||||
|
|
|
@ -28,7 +28,7 @@ You can write these configuration elements:
|
|||
# Add the router
|
||||
[http.routers]
|
||||
[http.routers.router0]
|
||||
entrypoints = ["web"]
|
||||
entryPoints = ["web"]
|
||||
middlewares = ["my-basic-auth"]
|
||||
service = "service-foo"
|
||||
rule = "Path(`foo`)"
|
||||
|
|
|
@ -28,7 +28,7 @@ metadata:
|
|||
name: ingressroutefoo.crd
|
||||
|
||||
spec:
|
||||
entrypoints:
|
||||
entryPoints:
|
||||
- web
|
||||
routes:
|
||||
# Match is the rule corresponding to an underlying router.
|
||||
|
@ -63,7 +63,7 @@ metadata:
|
|||
name: stripprefix
|
||||
|
||||
spec:
|
||||
stripprefix:
|
||||
stripPrefix:
|
||||
prefixes:
|
||||
- /stripit
|
||||
|
||||
|
@ -74,7 +74,7 @@ metadata:
|
|||
name: ingressroutebar.crd
|
||||
|
||||
spec:
|
||||
entrypoints:
|
||||
entryPoints:
|
||||
- web
|
||||
routes:
|
||||
- match: Host(`bar.com`) && PathPrefix(`/stripit`)
|
||||
|
|
|
@ -32,7 +32,7 @@ kind: IngressRoute
|
|||
metadata:
|
||||
name: ingressroute.crd
|
||||
spec:
|
||||
entrypoints:
|
||||
entryPoints:
|
||||
- web
|
||||
- web-secure
|
||||
routes:
|
||||
|
@ -45,21 +45,21 @@ spec:
|
|||
services:
|
||||
- name: s1
|
||||
port: 80
|
||||
healthcheck:
|
||||
healthCheck:
|
||||
path: /health
|
||||
host: baz.com
|
||||
intervalseconds: 7
|
||||
timeoutseconds: 60
|
||||
intervalSeconds: 7
|
||||
timeoutSeconds: 60
|
||||
# strategy defines the load balancing strategy between the servers. It defaults
|
||||
# to Round Robin, and for now only Round Robin is supported anyway.
|
||||
strategy: RoundRobin
|
||||
- name: s2
|
||||
port: 433
|
||||
healthcheck:
|
||||
healthCheck:
|
||||
path: /health
|
||||
host: baz.com
|
||||
intervalseconds: 7
|
||||
timeoutseconds: 60
|
||||
intervalSeconds: 7
|
||||
timeoutSeconds: 60
|
||||
- match: PathPrefix(`/misc`)
|
||||
services:
|
||||
- name: s3
|
||||
|
|
|
@ -13,8 +13,8 @@ They define the port which will receive the requests (whether HTTP or TCP).
|
|||
??? example "Port 80 only"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
```
|
||||
|
||||
|
@ -23,11 +23,11 @@ They define the port which will receive the requests (whether HTTP or TCP).
|
|||
??? example "Port 80 & 443"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[entrypoints.web-secure]
|
||||
[entryPoints.web-secure]
|
||||
address = ":443"
|
||||
```
|
||||
|
||||
|
@ -118,11 +118,11 @@ Traefik supports [ProxyProtocol](https://www.haproxy.org/download/1.8/doc/proxy-
|
|||
??? example "Enabling Proxy Protocol with Trusted IPs"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[entrypoints.web.proxyProtocol]
|
||||
[entryPoints.web.proxyProtocol]
|
||||
trustedIPs = ["127.0.0.1/32", "192.168.1.7"]
|
||||
```
|
||||
|
||||
|
@ -133,11 +133,11 @@ Traefik supports [ProxyProtocol](https://www.haproxy.org/download/1.8/doc/proxy-
|
|||
In a test environments, you can configure Traefik to trust every incoming connection. Doing so, every remote client address will be replaced (`trustedIPs` won't have any effect)
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[entrypoints.web.proxyProtocol]
|
||||
[entryPoints.web.proxyProtocol]
|
||||
insecure = true
|
||||
```
|
||||
|
||||
|
@ -153,21 +153,21 @@ You can configure Traefik to trust the forwarded headers information (`X-Forward
|
|||
??? example "Trusting Forwarded Headers from specific IPs"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[entrypoints.web.forwardedHeaders]
|
||||
[entryPoints.web.forwardedHeaders]
|
||||
trustedIPs = ["127.0.0.1/32", "192.168.1.7"]
|
||||
```
|
||||
|
||||
??? example "Insecure Mode -- Always Trusting Forwarded Headers"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":80"
|
||||
|
||||
[entrypoints.web.forwardedHeaders]
|
||||
[entryPoints.web.forwardedHeaders]
|
||||
insecure = true
|
||||
```
|
||||
|
|
|
@ -25,8 +25,8 @@ Below is an example of a full configuration file for the [file provider](../prov
|
|||
In the process, Traefik will make sure that the user is authenticated (using the [BasicAuth middleware](../middlewares/basicauth.md)).
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":8081" # Listen on port 8081 for incoming requests
|
||||
|
||||
[providers]
|
||||
|
@ -62,8 +62,8 @@ In the process, Traefik will make sure that the user is authenticated (using the
|
|||
??? example "Adding a TCP route for TLS requests on whoami.traefik.io"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":8081" # Listen on port 8081 for incoming requests
|
||||
|
||||
[providers]
|
||||
|
|
|
@ -32,16 +32,16 @@ In the process, routers may use pieces of [middleware](../../middlewares/overvie
|
|||
??? example "Forwarding all (non-tls) requests on port 3306 to a database service"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.mysql-default]
|
||||
[entryPoints]
|
||||
[entryPoints.mysql-default]
|
||||
address = ":80"
|
||||
[entrypoints.mysql-default]
|
||||
[entryPoints.mysql-default]
|
||||
address = ":3306"
|
||||
|
||||
[tcp]
|
||||
[tcp.routers]
|
||||
[tcp.routers.to-database]
|
||||
entrypoints = ["mysql-default"]
|
||||
entryPoints = ["mysql-default"]
|
||||
rule = "HostSNI(`*`)" # Catch every request (only available rule for non-tls routers. See below.)
|
||||
service = "database"
|
||||
```
|
||||
|
@ -56,12 +56,12 @@ If you want to limit the router scope to a set of entrypoint, set the entrypoint
|
|||
??? example "Listens to Every EntryPoint"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
# ...
|
||||
[entrypoints.web-secure]
|
||||
[entryPoints.web-secure]
|
||||
# ...
|
||||
[entrypoints.other]
|
||||
[entryPoints.other]
|
||||
# ...
|
||||
|
||||
[http.routers]
|
||||
|
@ -74,12 +74,12 @@ If you want to limit the router scope to a set of entrypoint, set the entrypoint
|
|||
??? example "Listens to Specific EntryPoints"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
# ...
|
||||
[entrypoint.web-secure]
|
||||
[entryPoints.web-secure]
|
||||
# ...
|
||||
[entrypoint.other]
|
||||
[entryPoints.other]
|
||||
# ...
|
||||
|
||||
[http.routers]
|
||||
|
@ -211,12 +211,12 @@ If you want to limit the router scope to a set of entrypoints, set the entrypoin
|
|||
??? example "Listens to Every EntryPoint"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
# ...
|
||||
[entrypoints.web-secure]
|
||||
[entryPoints.web-secure]
|
||||
# ...
|
||||
[entrypoints.other]
|
||||
[entryPoints.other]
|
||||
# ...
|
||||
|
||||
[tcp.routers]
|
||||
|
@ -230,12 +230,12 @@ If you want to limit the router scope to a set of entrypoints, set the entrypoin
|
|||
??? example "Listens to Specific EntryPoints"
|
||||
|
||||
```toml
|
||||
[entrypoints]
|
||||
[entrypoints.web]
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
# ...
|
||||
[entrypoint.web-secure]
|
||||
[entryPoints.web-secure]
|
||||
# ...
|
||||
[entrypoint.other]
|
||||
[entryPoints.other]
|
||||
# ...
|
||||
|
||||
[tcp.routers]
|
||||
|
|
|
@ -3,7 +3,7 @@ kind: IngressRoute
|
|||
metadata:
|
||||
name: simpleingressroute
|
||||
spec:
|
||||
entrypoints:
|
||||
entryPoints:
|
||||
- web
|
||||
routes:
|
||||
- match: Host(`your.domain.com`) && PathPrefix(`/notls`)
|
||||
|
@ -18,7 +18,7 @@ kind: IngressRoute
|
|||
metadata:
|
||||
name: ingressroutetls
|
||||
spec:
|
||||
entrypoints:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`your.domain.com`) && PathPrefix(`/tls`)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue