1
0
Fork 0

Use the same case every where for entryPoints.

This commit is contained in:
Ludovic Fernandez 2019-04-15 11:14:05 +02:00 committed by Traefiker Bot
parent b9f826554c
commit 8389b46b5c
74 changed files with 248 additions and 248 deletions

View file

@ -50,8 +50,8 @@ Once a day (the first call begins 10 minutes after the start of Traefik), we col
??? example "Original configuration"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[api]
@ -80,8 +80,8 @@ Once a day (the first call begins 10 minutes after the start of Traefik), we col
??? example "Resulting Obfuscated Configuration"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[api]

View file

@ -13,11 +13,11 @@ You can configure Traefik to use an ACME provider (like Let's Encrypt) for autom
??? example "Enabling ACME"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[entrypoints.http-tls]
[entryPoints.http-tls]
address = ":443"
[acme] # every router with TLS enabled will now be able to use ACME for its certificates
@ -31,11 +31,11 @@ You can configure Traefik to use an ACME provider (like Let's Encrypt) for autom
??? example "Configuring Wildcard Certificates"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[entrypoints.http-tls]
[entryPoints.http-tls]
address = ":443"
[acme]

View file

@ -14,11 +14,11 @@ Checking the Health of Your Traefik Instances
??? example "Enabling /ping on a dedicated EntryPoint"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[entrypoints.ping]
[entryPoints.ping]
address = ":8082"
[ping]

View file

@ -28,7 +28,7 @@ You can write these configuration elements:
# Add the router
[http.routers]
[http.routers.router0]
entrypoints = ["web"]
entryPoints = ["web"]
middlewares = ["my-basic-auth"]
service = "service-foo"
rule = "Path(`foo`)"

View file

@ -28,7 +28,7 @@ metadata:
name: ingressroutefoo.crd
spec:
entrypoints:
entryPoints:
- web
routes:
# Match is the rule corresponding to an underlying router.
@ -63,7 +63,7 @@ metadata:
name: stripprefix
spec:
stripprefix:
stripPrefix:
prefixes:
- /stripit
@ -74,7 +74,7 @@ metadata:
name: ingressroutebar.crd
spec:
entrypoints:
entryPoints:
- web
routes:
- match: Host(`bar.com`) && PathPrefix(`/stripit`)

View file

@ -32,7 +32,7 @@ kind: IngressRoute
metadata:
name: ingressroute.crd
spec:
entrypoints:
entryPoints:
- web
- web-secure
routes:
@ -45,21 +45,21 @@ spec:
services:
- name: s1
port: 80
healthcheck:
healthCheck:
path: /health
host: baz.com
intervalseconds: 7
timeoutseconds: 60
intervalSeconds: 7
timeoutSeconds: 60
# strategy defines the load balancing strategy between the servers. It defaults
# to Round Robin, and for now only Round Robin is supported anyway.
strategy: RoundRobin
- name: s2
port: 433
healthcheck:
healthCheck:
path: /health
host: baz.com
intervalseconds: 7
timeoutseconds: 60
intervalSeconds: 7
timeoutSeconds: 60
- match: PathPrefix(`/misc`)
services:
- name: s3

View file

@ -13,8 +13,8 @@ They define the port which will receive the requests (whether HTTP or TCP).
??? example "Port 80 only"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
```
@ -23,11 +23,11 @@ They define the port which will receive the requests (whether HTTP or TCP).
??? example "Port 80 & 443"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[entrypoints.web-secure]
[entryPoints.web-secure]
address = ":443"
```
@ -118,11 +118,11 @@ Traefik supports [ProxyProtocol](https://www.haproxy.org/download/1.8/doc/proxy-
??? example "Enabling Proxy Protocol with Trusted IPs"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[entrypoints.web.proxyProtocol]
[entryPoints.web.proxyProtocol]
trustedIPs = ["127.0.0.1/32", "192.168.1.7"]
```
@ -133,11 +133,11 @@ Traefik supports [ProxyProtocol](https://www.haproxy.org/download/1.8/doc/proxy-
In a test environments, you can configure Traefik to trust every incoming connection. Doing so, every remote client address will be replaced (`trustedIPs` won't have any effect)
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[entrypoints.web.proxyProtocol]
[entryPoints.web.proxyProtocol]
insecure = true
```
@ -153,21 +153,21 @@ You can configure Traefik to trust the forwarded headers information (`X-Forward
??? example "Trusting Forwarded Headers from specific IPs"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[entrypoints.web.forwardedHeaders]
[entryPoints.web.forwardedHeaders]
trustedIPs = ["127.0.0.1/32", "192.168.1.7"]
```
??? example "Insecure Mode -- Always Trusting Forwarded Headers"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":80"
[entrypoints.web.forwardedHeaders]
[entryPoints.web.forwardedHeaders]
insecure = true
```

View file

@ -25,8 +25,8 @@ Below is an example of a full configuration file for the [file provider](../prov
In the process, Traefik will make sure that the user is authenticated (using the [BasicAuth middleware](../middlewares/basicauth.md)).
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":8081" # Listen on port 8081 for incoming requests
[providers]
@ -62,8 +62,8 @@ In the process, Traefik will make sure that the user is authenticated (using the
??? example "Adding a TCP route for TLS requests on whoami.traefik.io"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
address = ":8081" # Listen on port 8081 for incoming requests
[providers]

View file

@ -32,16 +32,16 @@ In the process, routers may use pieces of [middleware](../../middlewares/overvie
??? example "Forwarding all (non-tls) requests on port 3306 to a database service"
```toml
[entrypoints]
[entrypoints.mysql-default]
[entryPoints]
[entryPoints.mysql-default]
address = ":80"
[entrypoints.mysql-default]
[entryPoints.mysql-default]
address = ":3306"
[tcp]
[tcp.routers]
[tcp.routers.to-database]
entrypoints = ["mysql-default"]
entryPoints = ["mysql-default"]
rule = "HostSNI(`*`)" # Catch every request (only available rule for non-tls routers. See below.)
service = "database"
```
@ -56,12 +56,12 @@ If you want to limit the router scope to a set of entrypoint, set the entrypoint
??? example "Listens to Every EntryPoint"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
# ...
[entrypoints.web-secure]
[entryPoints.web-secure]
# ...
[entrypoints.other]
[entryPoints.other]
# ...
[http.routers]
@ -74,12 +74,12 @@ If you want to limit the router scope to a set of entrypoint, set the entrypoint
??? example "Listens to Specific EntryPoints"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
# ...
[entrypoint.web-secure]
[entryPoints.web-secure]
# ...
[entrypoint.other]
[entryPoints.other]
# ...
[http.routers]
@ -211,12 +211,12 @@ If you want to limit the router scope to a set of entrypoints, set the entrypoin
??? example "Listens to Every EntryPoint"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
# ...
[entrypoints.web-secure]
[entryPoints.web-secure]
# ...
[entrypoints.other]
[entryPoints.other]
# ...
[tcp.routers]
@ -230,12 +230,12 @@ If you want to limit the router scope to a set of entrypoints, set the entrypoin
??? example "Listens to Specific EntryPoints"
```toml
[entrypoints]
[entrypoints.web]
[entryPoints]
[entryPoints.web]
# ...
[entrypoint.web-secure]
[entryPoints.web-secure]
# ...
[entrypoint.other]
[entryPoints.other]
# ...
[tcp.routers]

View file

@ -3,7 +3,7 @@ kind: IngressRoute
metadata:
name: simpleingressroute
spec:
entrypoints:
entryPoints:
- web
routes:
- match: Host(`your.domain.com`) && PathPrefix(`/notls`)
@ -18,7 +18,7 @@ kind: IngressRoute
metadata:
name: ingressroutetls
spec:
entrypoints:
entryPoints:
- websecure
routes:
- match: Host(`your.domain.com`) && PathPrefix(`/tls`)