mirror of
https://github.com/spantaleev/matrix-docker-ansible-deploy.git
synced 2024-12-25 10:28:29 +01:00
f4ba995d9b
We no longer validate that there's an IP address defined. Seems like Coturn can start without one as well, so there's no need to require it. If people populate `matrix_coturn_turn_external_ip_addresses` directly to specify multiple addresses, they can leave `matrix_coturn_turn_external_ip_address` empty. We use the "select not equal to empty string" thing in the for loop to avoid `matrix_coturn_turn_external_ip_address` leading to `matrix_coturn_turn_external_ip_addresses: ['']` leading to `external-ip=` in the Coturn configuration. Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/1741
48 lines
1.1 KiB
Django/Jinja
48 lines
1.1 KiB
Django/Jinja
#jinja2: lstrip_blocks: "True"
|
|
use-auth-secret
|
|
static-auth-secret={{ matrix_coturn_turn_static_auth_secret }}
|
|
realm=turn.{{ matrix_server_fqn_matrix }}
|
|
|
|
min-port={{ matrix_coturn_turn_udp_min_port }}
|
|
max-port={{ matrix_coturn_turn_udp_max_port }}
|
|
{% for ip in matrix_coturn_turn_external_ip_addresses|select('ne', '') %}
|
|
external-ip={{ ip }}
|
|
{% endfor %}
|
|
|
|
log-file=stdout
|
|
pidfile=/var/tmp/turnserver.pid
|
|
userdb=/var/tmp/turnserver.db
|
|
|
|
no-cli
|
|
|
|
{% if matrix_coturn_tls_enabled %}
|
|
cert={{ matrix_coturn_tls_cert_path }}
|
|
pkey={{ matrix_coturn_tls_key_path }}
|
|
{% if not matrix_coturn_tls_v1_enabled %}
|
|
no-tlsv1
|
|
{% endif %}
|
|
{% if not matrix_coturn_tls_v1_1_enabled %}
|
|
no-tlsv1_1
|
|
{% endif %}
|
|
{% else %}
|
|
no-tls
|
|
no-dtls
|
|
{% endif %}
|
|
|
|
prod
|
|
no-tcp-relay
|
|
|
|
{% if matrix_coturn_user_quota != None %}
|
|
user-quota={{ matrix_coturn_user_quota }}
|
|
{% endif %}
|
|
{% if matrix_coturn_total_quota != None %}
|
|
total-quota={{ matrix_coturn_total_quota }}
|
|
{% endif %}
|
|
|
|
{% for ip_range in matrix_coturn_denied_peer_ips %}
|
|
denied-peer-ip={{ ip_range }}
|
|
{% endfor %}
|
|
{% for ip_range in matrix_coturn_allowed_peer_ips %}
|
|
allowed-peer-ip={{ ip_range }}
|
|
{% endfor %}
|