Optimized cloudflare implementation

This commit is contained in:
2025-04-29 02:20:10 +02:00
parent d796158c61
commit e5e394d470
13 changed files with 249 additions and 117 deletions

View File

@@ -4,6 +4,14 @@
include_role:
name: docker-compose
- name: "Seed BigBlueButton Database for Backup"
include_tasks: "{{ playbook_dir }}/roles/backup-docker-to-local/tasks/seed-database-to-backup.yml"
vars:
database_instance: "{{ application_id }}"
database_password: "{{ applications[application_id].credentials.postgresql_secret }}"
database_username: "postgres"
database_name: "" # Multiple databases
- name: "include role nginx-domain-setup for {{application_id}}"
include_role:
name: nginx-domain-setup

View File

@@ -1,7 +1,7 @@
ENABLE_COTURN=true
COTURN_TLS_CERT_PATH={{ certbot_cert_path }}/{{ ssl_cert_folder }}/fullchain.pem
COTURN_TLS_KEY_PATH={{ certbot_cert_path }}/{{ ssl_cert_folder }}/privkey.pem
ENABLE_GREENLIGHT={{applications.bigbluebutton.enable_greenlight}}
ENABLE_GREENLIGHT={{applications[application_id].enable_greenlight}}
# Enable Webhooks
# used by some integrations
@@ -27,11 +27,11 @@ RECORDING_MAX_AGE_DAYS=365
# SECRETS
# ====================================
# important! change these to any random values
SHARED_SECRET={{applications.bigbluebutton.credentials.shared_secret}}
ETHERPAD_API_KEY={{applications.bigbluebutton.credentials.etherpad_api_key}}
RAILS_SECRET={{applications.bigbluebutton.credentials.rails_secret}}
POSTGRESQL_SECRET={{applications.bigbluebutton.credentials.postgresql_secret}}
FSESL_PASSWORD={{applications.bigbluebutton.credentials.fsesl_password}}
SHARED_SECRET={{applications[application_id].credentials.shared_secret}}
ETHERPAD_API_KEY={{applications[application_id].credentials.etherpad_api_key}}
RAILS_SECRET={{applications[application_id].credentials.rails_secret}}
POSTGRESQL_SECRET={{applications[application_id].credentials.postgresql_secret}}
FSESL_PASSWORD={{applications[application_id].credentials.fsesl_password}}
# ====================================
# CONNECTION
@@ -51,7 +51,7 @@ STUN_PORT={{ ports.public.stun[application_id] }}
# TURN SERVER
# uncomment and adjust following two lines to add an external TURN server
TURN_SERVER=turns:{{domains[application_id]}}:{{ ports.public.turn[application_id] }}?transport=tcp
TURN_SECRET={{applications.bigbluebutton.credentials.turn_secret}}
TURN_SECRET={{applications[application_id].credentials.turn_secret}}
# Allowed SIP IPs
# due to high traffic caused by bots, by default the SIP port is blocked.