mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-29 15:06:26 +02:00
Semi bsr for applications[] to prevent heavy to debug bugs in j2 - part 1
This commit is contained in:
@@ -5,7 +5,7 @@
|
||||
name: docker-compose
|
||||
vars:
|
||||
database_instance: "{{ application_id }}"
|
||||
database_password: "{{ applications[application_id].credentials.postgresql_secret }}"
|
||||
database_password: "{{ applications | get_app_conf(application_id, 'credentials.postgresql_secret', True) }}"
|
||||
database_username: "postgres"
|
||||
database_name: "" # Multiple databases
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
include_tasks: "{{ playbook_dir }}/roles/sys-bkp-docker-to-local/tasks/seed-database-to-backup.yml"
|
||||
vars:
|
||||
database_instance: "{{ application_id }}"
|
||||
database_password: "{{ applications[application_id].credentials.postgresql_secret }}"
|
||||
database_password: "{{ applications | get_app_conf(application_id, 'credentials.postgresql_secret', True) }}"
|
||||
database_username: "postgres"
|
||||
database_name: "" # Multiple databases
|
||||
|
||||
|
@@ -1,7 +1,7 @@
|
||||
ENABLE_COTURN=true
|
||||
COTURN_TLS_CERT_PATH={{ certbot_cert_path }}/{{ ssl_cert_folder }}/fullchain.pem
|
||||
COTURN_TLS_KEY_PATH={{ certbot_cert_path }}/{{ ssl_cert_folder }}/privkey.pem
|
||||
ENABLE_GREENLIGHT={{applications[application_id].enable_greenlight}}
|
||||
ENABLE_GREENLIGHT={{applications | get_app_conf(application_id, 'enable_greenlight', True)}}
|
||||
|
||||
# Enable Webhooks
|
||||
# used by some integrations
|
||||
@@ -27,11 +27,11 @@ RECORDING_MAX_AGE_DAYS=365
|
||||
# SECRETS
|
||||
# ====================================
|
||||
# important! change these to any random values
|
||||
SHARED_SECRET={{applications[application_id].credentials.shared_secret}}
|
||||
ETHERPAD_API_KEY={{applications[application_id].credentials.etherpad_api_key}}
|
||||
RAILS_SECRET={{applications[application_id].credentials.rails_secret}}
|
||||
POSTGRESQL_SECRET={{applications[application_id].credentials.postgresql_secret}}
|
||||
FSESL_PASSWORD={{applications[application_id].credentials.fsesl_password}}
|
||||
SHARED_SECRET={{applications | get_app_conf(application_id, 'credentials.shared_secret', True)}}
|
||||
ETHERPAD_API_KEY={{applications | get_app_conf(application_id, 'credentials.etherpad_api_key', True)}}
|
||||
RAILS_SECRET={{applications | get_app_conf(application_id, 'credentials.rails_secret', True)}}
|
||||
POSTGRESQL_SECRET={{applications | get_app_conf(application_id, 'credentials.postgresql_secret', True)}}
|
||||
FSESL_PASSWORD={{applications | get_app_conf(application_id, 'credentials.fsesl_password', True)}}
|
||||
|
||||
# ====================================
|
||||
# CONNECTION
|
||||
@@ -51,7 +51,7 @@ STUN_PORT={{ ports.public.stun[application_id] }}
|
||||
# TURN SERVER
|
||||
# uncomment and adjust following two lines to add an external TURN server
|
||||
TURN_SERVER=turns:{{domains | get_domain(application_id)}}:{{ ports.public.turn[application_id] }}?transport=tcp
|
||||
TURN_SECRET={{applications[application_id].credentials.turn_secret}}
|
||||
TURN_SECRET={{applications | get_app_conf(application_id, 'credentials.turn_secret', True)}}
|
||||
|
||||
# Allowed SIP IPs
|
||||
# due to high traffic caused by bots, by default the SIP port is blocked.
|
||||
|
Reference in New Issue
Block a user