chore(coturn): Disable the coturn server

Seems it's been picked up by someone doing naughty things, let's
disable this for now as I don't really have a use case for matrix
calls anymore...
This commit is contained in:
Tristan Daniël Maat 2025-05-28 04:05:26 +08:00
parent 94ec261a94
commit 86fcaf7eb6
Signed by: tlater
GPG key ID: 49670FD774E43268
2 changed files with 23 additions and 23 deletions
configuration
services/conduit
sops.nix

View file

@ -34,22 +34,22 @@ in
server = "${domain}:443"; server = "${domain}:443";
}; };
turn_uris = # turn_uris =
let # let
address = "${config.services.coturn.realm}:${toString config.services.coturn.listening-port}"; # address = "${config.services.coturn.realm}:${toString config.services.coturn.listening-port}";
tls-address = "${config.services.coturn.realm}:${toString config.services.coturn.tls-listening-port}"; # tls-address = "${config.services.coturn.realm}:${toString config.services.coturn.tls-listening-port}";
in # in
[ # [
"turn:${address}?transport=udp" # "turn:${address}?transport=udp"
"turn:${address}?transport=tcp" # "turn:${address}?transport=tcp"
"turns:${tls-address}?transport=udp" # "turns:${tls-address}?transport=udp"
"turns:${tls-address}?transport=tcp" # "turns:${tls-address}?transport=tcp"
]; # ];
}; };
}; };
coturn = { coturn = {
enable = true; enable = false;
no-cli = true; no-cli = true;
use-auth-secret = true; use-auth-secret = true;
static-auth-secret-file = config.sops.secrets."turn/secret".path; static-auth-secret-file = config.sops.secrets."turn/secret".path;
@ -173,7 +173,7 @@ in
# upstream module currently. # upstream module currently.
# #
# See also https://gitlab.com/famedly/conduit/-/issues/314 # See also https://gitlab.com/famedly/conduit/-/issues/314
EnvironmentFile = config.sops.secrets."turn/env".path; # EnvironmentFile = config.sops.secrets."turn/env".path;
}; };
systemd.services.coturn.serviceConfig.SupplementaryGroups = [ systemd.services.coturn.serviceConfig.SupplementaryGroups = [

View file

@ -67,16 +67,16 @@
"steam/tlater" = { }; "steam/tlater" = { };
# Turn # Turn
"turn/env" = { }; # "turn/env" = { };
"turn/secret" = { # "turn/secret" = {
owner = "turnserver"; # owner = "turnserver";
}; # };
"turn/ssl-key" = { # "turn/ssl-key" = {
owner = "turnserver"; # owner = "turnserver";
}; # };
"turn/ssl-cert" = { # "turn/ssl-cert" = {
owner = "turnserver"; # owner = "turnserver";
}; # };
# Wireguard # Wireguard
"wireguard/server-key" = { "wireguard/server-key" = {