diff --git a/configuration/services/conduit/default.nix b/configuration/services/conduit/default.nix index a9987ed..4ba5271 100644 --- a/configuration/services/conduit/default.nix +++ b/configuration/services/conduit/default.nix @@ -34,22 +34,22 @@ in server = "${domain}:443"; }; - # turn_uris = - # let - # address = "${config.services.coturn.realm}:${toString config.services.coturn.listening-port}"; - # tls-address = "${config.services.coturn.realm}:${toString config.services.coturn.tls-listening-port}"; - # in - # [ - # "turn:${address}?transport=udp" - # "turn:${address}?transport=tcp" - # "turns:${tls-address}?transport=udp" - # "turns:${tls-address}?transport=tcp" - # ]; + turn_uris = + let + address = "${config.services.coturn.realm}:${toString config.services.coturn.listening-port}"; + tls-address = "${config.services.coturn.realm}:${toString config.services.coturn.tls-listening-port}"; + in + [ + "turn:${address}?transport=udp" + "turn:${address}?transport=tcp" + "turns:${tls-address}?transport=udp" + "turns:${tls-address}?transport=tcp" + ]; }; }; coturn = { - enable = false; + enable = true; no-cli = true; use-auth-secret = true; static-auth-secret-file = config.sops.secrets."turn/secret".path; @@ -173,7 +173,7 @@ in # upstream module currently. # # See also https://gitlab.com/famedly/conduit/-/issues/314 - # EnvironmentFile = config.sops.secrets."turn/env".path; + EnvironmentFile = config.sops.secrets."turn/env".path; }; systemd.services.coturn.serviceConfig.SupplementaryGroups = [ diff --git a/configuration/sops.nix b/configuration/sops.nix index bc59df8..0337438 100644 --- a/configuration/sops.nix +++ b/configuration/sops.nix @@ -67,16 +67,16 @@ "steam/tlater" = { }; # Turn - # "turn/env" = { }; - # "turn/secret" = { - # owner = "turnserver"; - # }; - # "turn/ssl-key" = { - # owner = "turnserver"; - # }; - # "turn/ssl-cert" = { - # owner = "turnserver"; - # }; + "turn/env" = { }; + "turn/secret" = { + owner = "turnserver"; + }; + "turn/ssl-key" = { + owner = "turnserver"; + }; + "turn/ssl-cert" = { + owner = "turnserver"; + }; # Wireguard "wireguard/server-key" = {