blob: a35734a89fbd918a3529754a40378bd6846bad9b (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
|
---
- name: add group for coturn
group:
name: coturn
gid: "{{ coturn_gid }}"
- name: add user for coturn
user:
name: coturn
uid: "{{ coturn_uid }}"
group: coturn
password: "!"
- name: create coturn config subdirectory
file:
path: "{{ coturn_base_path }}/{{ coturn_realm }}/config"
state: directory
- name: create coturn config
template:
src: turnserver.conf.j2
dest: "{{ coturn_base_path }}/{{ coturn_realm }}/config/turnserver.conf"
group: coturn
mode: 0640
- name: create coturn ssl subdirectory
file:
path: "{{ coturn_base_path }}/{{ coturn_realm }}/config/ssl"
state: directory
owner: root
group: coturn
mode: 0750
- name: generate Diffie-Hellman parameters
openssl_dhparam:
path: "{{ coturn_base_path }}/{{ coturn_realm }}/config/ssl/dhparams.pem"
size: "{{ coturn_dhparam_size }}"
owner: root
group: coturn
mode: 0644
- name: install acmetool hook script
template:
src: acmetool-reload.sh.j2
dest: "/etc/acme/hooks/coturn-{{ coturn_realm }}"
mode: 0755
- name: install acmetool systemd unit snippet
copy:
dest: "/etc/systemd/system/acmetool.service.d/coturn-{{ coturn_realm }}.conf"
content: |
[Service]
ReadWritePaths={{ coturn_base_path }}/{{ coturn_realm }}/config/ssl
register: coturn_acmetool_snippet
- name: reload systemd
when: coturn_acmetool_snippet is changed
systemd:
daemon_reload: yes
- name: configure nginx vhost
when: coturn_install_nginx_vhost
vars:
nginx_vhost:
name: "coturn-{{ coturn_realm }}"
content: "{{ lookup('template', 'nginx-vhost.conf.j2') }}"
acme: true
hostnames: "{{ coturn_hostnames }}"
include_role:
name: nginx/vhost
- name: get certificate using acmetool
when: not coturn_install_nginx_vhost
import_role:
name: acmetool/cert
vars:
acmetool_cert_name: "coturn-{{ coturn_realm }}"
acmetool_cert_hostnames: "{{ coturn_hostnames }}"
- name: apply hacky fix to support binding to privileged ports
when: (coturn_listening_port < 1024) or (coturn_tls_listening_port < 1024)
import_tasks: privileged-ports-hack.yml
- name: install pod manifest
vars:
kubernetes_standalone_pod:
name: "coturn-{{ coturn_realm }}"
spec: "{{ lookup('template', 'pod-spec.yml.j2') }}"
mode: "0600"
config_hash_items:
- path: "{{ coturn_base_path }}/{{ coturn_realm }}/config/turnserver.conf"
properties:
- checksum
include_role:
name: kubernetes/standalone/pod
|