- Backend REST/gateway/track routes, analytics, Blockscout proxy paths. - Frontend wallet and liquidity surfaces; MetaMask token list alignment. - Deployment docs, verification scripts, address inventory updates. Check: go build ./... under backend/ (pass). Made-with: Cursor
6.2 KiB
6.2 KiB
Live Deployment Map
Current production deployment map for explorer.d-bis.org.
This file is the authoritative reference for the live explorer stack as of 2026-04-05. It supersedes the older monolithic deployment notes in this directory when the question is "what is running in production right now?"
Public Entry Point
- Public domain:
https://explorer.d-bis.org - Primary container: VMID
5000(192.168.11.140,blockscout-1) - Public edge: nginx on VMID
5000
VMID 5000 Internal Topology
| Surface | Internal listener | Owner | Public paths |
|---|---|---|---|
| nginx | 80, 443 |
VMID 5000 |
terminates public traffic |
| Next frontend | 127.0.0.1:3000 |
solacescanscout-frontend.service |
/, /bridge, /routes, /more, /wallet, /liquidity, /pools, /analytics, /operator, /system, /weth |
| Explorer config/API | 127.0.0.1:8081 |
explorer-config-api.service |
/api/config/*, /explorer-api/v1/* |
| Blockscout | 127.0.0.1:4000 |
existing Blockscout stack | /api/v2/* and Blockscout-backed explorer data |
| Token aggregation | 127.0.0.1:3001 |
token-aggregation service | /token-aggregation/api/v1/* |
| Static config assets | /var/www/html/config, /var/www/html/token-icons |
nginx static files | /config/*, /token-icons/* |
Canonical Deploy Scripts
| Component | Canonical deploy path | Notes |
|---|---|---|
| Next frontend | deploy-next-frontend-to-vmid5000.sh |
Builds the Next standalone bundle and installs solacescanscout-frontend.service on port 3000 |
| Explorer config assets | deploy-explorer-config-to-vmid5000.sh |
Publishes token list, networks, capabilities, topology, verification example, and token icons |
| Explorer config/API backend | deploy-explorer-ai-to-vmid5000.sh |
Builds and installs explorer-config-api.service on port 8081 and normalizes nginx /explorer-api/v1/* routing |
Relay Topology
CCIP relay workers do not run inside VMID 5000. They run on host r630-01 and are consumed by the explorer API through relay-health probes.
| Service file | Profile | Port | Current role |
|---|---|---|---|
ccip-relay.service |
mainnet-weth |
9860 |
Mainnet WETH lane, intentionally paused |
ccip-relay-mainnet-cw.service |
mainnet-cw |
9863 |
Mainnet cW lane |
ccip-relay-bsc.service |
bsc |
9861 |
BSC lane |
ccip-relay-avax.service |
avax |
9862 |
Avalanche lane |
ccip-relay-avax-cw.service |
avax-cw |
9864 |
Avalanche cW lane |
ccip-relay-avax-to-138.service |
avax-to-138 |
9865 |
Reverse Avalanche to Chain 138 lane |
The explorer backend reads these through CCIP_RELAY_HEALTH_URL or CCIP_RELAY_HEALTH_URLS; see backend/api/rest/README.md.
Public Verification Points
The following endpoints currently describe the live deployment contract:
https://explorer.d-bis.org/https://explorer.d-bis.org/bridgehttps://explorer.d-bis.org/routeshttps://explorer.d-bis.org/liquidityhttps://explorer.d-bis.org/api/config/capabilitieshttps://explorer.d-bis.org/config/CHAIN138_RPC_CAPABILITIES.jsonhttps://explorer.d-bis.org/explorer-api/v1/featureshttps://explorer.d-bis.org/explorer-api/v1/track1/bridge/statushttps://explorer.d-bis.org/explorer-api/v1/mission-control/streamhttps://explorer.d-bis.org/token-aggregation/api/v1/routes/matrix
Recommended Rollout Order
When a change spans multiple explorer surfaces, use this order:
- Deploy static config assets with
deploy-explorer-config-to-vmid5000.sh. - Deploy the explorer config/API backend with
deploy-explorer-ai-to-vmid5000.sh. - Deploy the Next frontend with
deploy-next-frontend-to-vmid5000.sh. - If nginx routing changed, verify the VMID
5000nginx site before reload. - Run
check-explorer-health.shagainst the public domain. - Confirm relay visibility on
/explorer-api/v1/track1/bridge/statusand mission-control SSE.
When a change spans relays as well:
- Deploy or restart the relevant
ccip-relay*.serviceunit onr630-01. - Ensure the explorer backend relay probe env still matches the active host ports.
- Recheck
/explorer-api/v1/track1/bridge/statusand/explorer-api/v1/mission-control/stream.
Current Gaps And Legacy Footguns
- Older docs in this directory still describe a monolithic
explorer-api.serviceplusexplorer-frontend.servicepackage. That is no longer the production deployment shape. ALL_VMIDS_ENDPOINTS.mdis still correct at the public ingress level, but it intentionally compresses the explorer into:80/:443and Blockscout:4000. Use this file for the detailed internal listener split.- There is no single one-shot script in this repo that fully deploys Blockscout, nginx, token aggregation, explorer-config-api, Next frontend, and host-side relays together. Production is currently assembled from the component deploy scripts above.
mainnet-wethis deployed but intentionally paused until that bridge lane is funded again.EtherlinkandXDC Zeroremain separate bridge programs; they are not part of the current CCIP relay fleet described here.
Source Of Truth
Use these in order:
- This file for the live explorer deployment map.
ALL_VMIDS_ENDPOINTS.mdfor VMID, IP, and public ingress inventory.- The deploy scripts themselves for exact install behavior.
check-explorer-health.shpluscheck-explorer-e2e.shfor public verification.