2019-01-16 16:05:48 +00:00
|
|
|
matrix_coturn_enabled: true
|
2020-03-15 08:10:41 +00:00
|
|
|
|
2020-03-15 08:15:27 +00:00
|
|
|
matrix_coturn_container_image_self_build: false
|
2020-11-28 19:34:14 +00:00
|
|
|
matrix_coturn_container_image_self_build_repo: "https://github.com/instrumentisto/coturn-docker-image.git"
|
2019-01-16 16:05:48 +00:00
|
|
|
|
2021-01-17 22:41:47 +00:00
|
|
|
matrix_coturn_docker_image: "{{ matrix_coturn_docker_image_name_prefix }}instrumentisto/coturn:4.5.2"
|
2020-11-14 20:47:14 +00:00
|
|
|
matrix_coturn_docker_image_name_prefix: "{{ 'localhost/' if matrix_coturn_container_image_self_build else 'docker.io/' }}"
|
2019-06-10 11:23:51 +00:00
|
|
|
matrix_coturn_docker_image_force_pull: "{{ matrix_coturn_docker_image.endswith(':latest') }}"
|
2019-01-12 15:53:00 +00:00
|
|
|
|
2019-03-18 15:36:00 +00:00
|
|
|
# The Docker network that Coturn would be put into.
|
|
|
|
#
|
|
|
|
# Because Coturn relays traffic to unvalidated IP addresses,
|
|
|
|
# using a dedicated network, isolated from other Docker (and local) services is preferrable.
|
|
|
|
#
|
|
|
|
# Setting up deny/allow rules with `matrix_coturn_allowed_peer_ips`/`matrix_coturn_denied_peer_ips` is also
|
|
|
|
# possible for achieving such isolation, but is more complicated due to the dynamic nature of Docker networking.
|
|
|
|
matrix_coturn_docker_network: "matrix-coturn"
|
|
|
|
|
2019-01-12 15:53:00 +00:00
|
|
|
matrix_coturn_base_path: "{{ matrix_base_data_path }}/coturn"
|
2020-03-07 23:28:14 +00:00
|
|
|
matrix_coturn_docker_src_files_path: "{{ matrix_coturn_base_path }}/docker-src"
|
2019-01-12 15:53:00 +00:00
|
|
|
matrix_coturn_config_path: "{{ matrix_coturn_base_path }}/turnserver.conf"
|
|
|
|
|
2019-01-16 16:05:48 +00:00
|
|
|
# List of systemd services that matrix-coturn.service depends on
|
|
|
|
matrix_coturn_systemd_required_services_list: ['docker.service']
|
|
|
|
|
2019-03-19 07:16:30 +00:00
|
|
|
# A list of additional "volumes" to mount in the container.
|
|
|
|
# This list gets populated dynamically at runtime. You can provide a different default value,
|
|
|
|
# if you wish to mount your own files into the container.
|
|
|
|
# Contains definition objects like this: `{"src": "/outside", "dst": "/inside", "options": "rw|ro|slave|.."}
|
|
|
|
matrix_coturn_container_additional_volumes: []
|
|
|
|
|
2019-04-30 14:35:18 +00:00
|
|
|
# A list of extra arguments to pass to the container
|
|
|
|
matrix_coturn_container_extra_arguments: []
|
|
|
|
|
2019-12-20 10:21:43 +00:00
|
|
|
# Controls whether the Coturn container exposes its plain STUN port (tcp/3478 and udp/3478 in the container).
|
|
|
|
#
|
|
|
|
# Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:3478"), or empty string to not expose.
|
|
|
|
matrix_coturn_container_stun_plain_host_bind_port: '3478'
|
|
|
|
|
|
|
|
# Controls whether the Coturn container exposes its TLS STUN port (tcp/5349 and udp/5349 in the container).
|
|
|
|
#
|
|
|
|
# Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:5349"), or empty string to not expose.
|
|
|
|
matrix_coturn_container_stun_tls_host_bind_port: '5349'
|
|
|
|
|
|
|
|
# Controls whether the Coturn container exposes its TURN UDP port range and which interface to do it on.
|
|
|
|
#
|
|
|
|
# Takes an interface "<ip address>" (e.g. "127.0.0.1"), or empty string to listen on all interfaces.
|
|
|
|
# Takes a null/none value (`~`) to prevent listening.
|
|
|
|
#
|
|
|
|
# The UDP port-range itself is specified using `matrix_coturn_turn_udp_min_port` and `matrix_coturn_turn_udp_max_port`.
|
|
|
|
matrix_coturn_container_turn_range_listen_interface: ''
|
2019-01-12 15:53:00 +00:00
|
|
|
|
|
|
|
# UDP port-range to use for TURN
|
|
|
|
matrix_coturn_turn_udp_min_port: 49152
|
|
|
|
matrix_coturn_turn_udp_max_port: 49172
|
|
|
|
|
2019-12-20 10:21:43 +00:00
|
|
|
# A shared secret (between Synapse and Coturn) used for authentication.
|
|
|
|
# You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`).
|
|
|
|
matrix_coturn_turn_static_auth_secret: ""
|
|
|
|
|
2019-03-18 15:04:40 +00:00
|
|
|
# The external IP address of the machine where Coturn is.
|
|
|
|
matrix_coturn_turn_external_ip_address: ''
|
|
|
|
|
2019-03-18 11:44:40 +00:00
|
|
|
matrix_coturn_allowed_peer_ips: []
|
|
|
|
matrix_coturn_denied_peer_ips: []
|
2019-03-18 11:58:52 +00:00
|
|
|
matrix_coturn_user_quota: null
|
|
|
|
matrix_coturn_total_quota: null
|
2019-03-19 08:24:39 +00:00
|
|
|
|
|
|
|
# To enable TLS, you need to provide paths to certificates.
|
|
|
|
# Paths defined in `matrix_coturn_tls_cert_path` and `matrix_coturn_tls_key_path` are in-container paths.
|
|
|
|
# Files on the host can be mounted into the container using `matrix_coturn_container_additional_volumes`.
|
|
|
|
matrix_coturn_tls_enabled: false
|
|
|
|
matrix_coturn_tls_cert_path: ~
|
|
|
|
matrix_coturn_tls_key_path: ~
|