Matrix Docker Ansible eploy
Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

137 строки
6.6 KiB

  1. ---
  2. # Project source code URL: https://github.com/coturn/coturn
  3. matrix_coturn_enabled: true
  4. matrix_coturn_container_image_self_build: false
  5. matrix_coturn_container_image_self_build_repo: "https://github.com/coturn/coturn"
  6. matrix_coturn_container_image_self_build_repo_version: "docker/{{ matrix_coturn_version }}"
  7. matrix_coturn_container_image_self_build_repo_dockerfile_path: "docker/coturn/alpine/Dockerfile"
  8. matrix_coturn_version: 4.6.1-r2
  9. matrix_coturn_docker_image: "{{ matrix_coturn_docker_image_name_prefix }}coturn/coturn:{{ matrix_coturn_version }}-alpine"
  10. matrix_coturn_docker_image_name_prefix: "{{ 'localhost/' if matrix_coturn_container_image_self_build else matrix_container_global_registry_prefix }}"
  11. matrix_coturn_docker_image_force_pull: "{{ matrix_coturn_docker_image.endswith(':latest') }}"
  12. # The Docker network that Coturn would be put into.
  13. #
  14. # Because Coturn relays traffic to unvalidated IP addresses,
  15. # using a dedicated network, isolated from other Docker (and local) services is preferrable.
  16. #
  17. # Setting up deny/allow rules with `matrix_coturn_allowed_peer_ips`/`matrix_coturn_denied_peer_ips` is also
  18. # possible for achieving such isolation, but is more complicated due to the dynamic nature of Docker networking.
  19. #
  20. # Setting `matrix_coturn_docker_network` to 'host' will run the container with host networking,
  21. # which will drastically improve performance when thousands of ports are opened due to Docker not having to set up forwarding rules for each port.
  22. # Running with host networking can be dangerous, as it potentially exposes your local network and its services to Coturn peers.
  23. # Regardless of the networking mode, we apply a deny list which via `matrix_coturn_denied_peer_ips`,
  24. # which hopefully prevents access to such private network ranges.
  25. # When running in host-networking mode, you need to adjust the firewall yourself, so that ports are opened.
  26. matrix_coturn_docker_network: "matrix-coturn"
  27. matrix_coturn_base_path: "{{ matrix_base_data_path }}/coturn"
  28. matrix_coturn_docker_src_files_path: "{{ matrix_coturn_base_path }}/docker-src"
  29. matrix_coturn_config_path: "{{ matrix_coturn_base_path }}/turnserver.conf"
  30. # List of systemd services that matrix-coturn.service depends on
  31. matrix_coturn_systemd_required_services_list: ['docker.service']
  32. # A list of additional "volumes" to mount in the container.
  33. # This list gets populated dynamically at runtime. You can provide a different default value,
  34. # if you wish to mount your own files into the container.
  35. # Contains definition objects like this: `{"type": "bind", "src": "/outside", "dst": "/inside", "options": "readonly"}.
  36. # See the `--mount` documentation for the `docker run` command.
  37. matrix_coturn_container_additional_volumes: []
  38. # A list of extra arguments to pass to the container
  39. matrix_coturn_container_extra_arguments: []
  40. # Controls whether the Coturn container exposes its plain STUN port (tcp/3478 and udp/3478 in the container).
  41. #
  42. # Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:3478"), or empty string to not expose.
  43. matrix_coturn_container_stun_plain_host_bind_port: "{{ '3478' if matrix_coturn_docker_network != 'host' else '' }}"
  44. # Controls whether the Coturn container exposes its TLS STUN port (tcp/5349 and udp/5349 in the container).
  45. #
  46. # Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:5349"), or empty string to not expose.
  47. matrix_coturn_container_stun_tls_host_bind_port: "{{ '5349' if matrix_coturn_docker_network != 'host' else '' }}"
  48. # Controls whether the Coturn container exposes its TURN UDP port range and which interface to do it on.
  49. #
  50. # Takes an interface "<ip address>" (e.g. "127.0.0.1"), or empty string to listen on all interfaces.
  51. # Takes a null/none value (`~`) or 'none' (as a string) to prevent listening.
  52. #
  53. # The UDP port-range itself is specified using `matrix_coturn_turn_udp_min_port` and `matrix_coturn_turn_udp_max_port`.
  54. matrix_coturn_container_turn_range_listen_interface: "{{ '' if matrix_coturn_docker_network != 'host' else 'none' }}"
  55. # UDP port-range to use for TURN
  56. matrix_coturn_turn_udp_min_port: 49152
  57. matrix_coturn_turn_udp_max_port: 49172
  58. # A shared secret (between Synapse and Coturn) used for authentication.
  59. # You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`).
  60. matrix_coturn_turn_static_auth_secret: ""
  61. # The external IP address of the machine where Coturn is.
  62. matrix_coturn_turn_external_ip_address: ''
  63. matrix_coturn_turn_external_ip_addresses: ["{{ matrix_coturn_turn_external_ip_address }}"]
  64. matrix_coturn_allowed_peer_ips: []
  65. # We block loopback interfaces and private networks by default to prevent private resources from being accessible.
  66. # This is especially important when Coturn does not run within a container network (e.g. `matrix_coturn_docker_network: host`).
  67. #
  68. # Learn more: https://www.rtcsec.com/article/cve-2020-26262-bypass-of-coturns-access-control-protection/
  69. #
  70. # If you're running Coturn for local network peers, you may wish to override these rules.
  71. matrix_coturn_denied_peer_ips:
  72. - 0.0.0.0-0.255.255.255
  73. - 10.0.0.0-10.255.255.255
  74. - 100.64.0.0-100.127.255.255
  75. - 127.0.0.0-127.255.255.255
  76. - 169.254.0.0-169.254.255.255
  77. - 172.16.0.0-172.31.255.255
  78. - 192.0.0.0-192.0.0.255
  79. - 192.0.2.0-192.0.2.255
  80. - 192.88.99.0-192.88.99.255
  81. - 192.168.0.0-192.168.255.255
  82. - 198.18.0.0-198.19.255.255
  83. - 198.51.100.0-198.51.100.255
  84. - 203.0.113.0-203.0.113.255
  85. - 240.0.0.0-255.255.255.255
  86. - ::1
  87. - 64:ff9b::-64:ff9b::ffff:ffff
  88. - ::ffff:0.0.0.0-::ffff:255.255.255.255
  89. - 100::-100::ffff:ffff:ffff:ffff
  90. - 2001::-2001:1ff:ffff:ffff:ffff:ffff:ffff:ffff
  91. - 2002::-2002:ffff:ffff:ffff:ffff:ffff:ffff:ffff
  92. - fc00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
  93. - fe80::-febf:ffff:ffff:ffff:ffff:ffff:ffff:ffff
  94. matrix_coturn_user_quota: null
  95. matrix_coturn_total_quota: null
  96. # Controls whether `no-tcp-relay` is added to the configuration
  97. matrix_coturn_no_tcp_relay_enabled: true
  98. # Controls whether `no-multicast-peers` is added to the configuration
  99. matrix_coturn_no_multicast_peers_enabled: true
  100. # Additional configuration to be passed to turnserver.conf
  101. # Example:
  102. # matrix_coturn_additional_configuration: |
  103. # simple-log
  104. # aux-server=1.2.3.4
  105. # relay-ip=4.3.2.1
  106. matrix_coturn_additional_configuration: ''
  107. # To enable TLS, you need to provide paths to certificates.
  108. # Paths defined in `matrix_coturn_tls_cert_path` and `matrix_coturn_tls_key_path` are in-container paths.
  109. # Files on the host can be mounted into the container using `matrix_coturn_container_additional_volumes`.
  110. matrix_coturn_tls_enabled: false
  111. matrix_coturn_tls_cert_path: ~
  112. matrix_coturn_tls_key_path: ~
  113. matrix_coturn_tls_v1_enabled: false
  114. matrix_coturn_tls_v1_1_enabled: false