coturn
- Anbox Charmers
Channel | Revision | Published | Runs on |
---|---|---|---|
latest/stable | 19 | 12 Jul 2022 | |
1.24/stable | 601 | Yesterday | |
1.24/candidate | 601 | 06 Dec 2024 | |
1.24/beta | 601 | 06 Dec 2024 | |
1.24/edge | 611 | Yesterday | |
1.24/edge | 472 | 27 Aug 2024 | |
1.25/beta | 606 | 09 Dec 2024 | |
1.25/edge | 610 | Yesterday | |
1.23/stable | 547 | 16 Oct 2024 | |
1.23/stable | 546 | 16 Oct 2024 | |
1.23/candidate | 547 | 12 Oct 2024 | |
1.23/candidate | 546 | 12 Oct 2024 | |
1.23/beta | 547 | 11 Oct 2024 | |
1.23/beta | 546 | 11 Oct 2024 | |
1.23/edge | 561 | 23 Oct 2024 | |
1.23/edge | 560 | 23 Oct 2024 | |
1.22/stable | 419 | 15 May 2024 | |
1.22/stable | 418 | 15 May 2024 | |
1.22/candidate | 419 | 11 May 2024 | |
1.22/candidate | 418 | 11 May 2024 | |
1.22/edge | 417 | 11 May 2024 | |
1.22/edge | 416 | 11 May 2024 | |
1.21/stable | 309 | 14 Feb 2024 | |
1.21/stable | 308 | 14 Feb 2024 | |
1.21/candidate | 309 | 09 Feb 2024 | |
1.21/candidate | 308 | 09 Feb 2024 | |
1.21/edge | 291 | 03 Jan 2024 | |
1.21/edge | 290 | 03 Jan 2024 | |
1.20/stable | 261 | 13 Dec 2023 | |
1.20/stable | 260 | 13 Dec 2023 | |
1.20/candidate | 261 | 06 Dec 2023 | |
1.20/candidate | 260 | 06 Dec 2023 | |
1.20/edge | 216 | 03 Nov 2023 | |
1.20/edge | 215 | 03 Nov 2023 | |
1.19/stable | 210 | 11 Oct 2023 | |
1.19/stable | 209 | 11 Oct 2023 | |
1.19/candidate | 210 | 04 Oct 2023 | |
1.19/candidate | 209 | 04 Oct 2023 | |
1.19/edge | 238 | 15 Nov 2023 | |
1.19/edge | 237 | 15 Nov 2023 | |
1.18/stable | 137 | 12 Jul 2023 | |
1.18/stable | 136 | 12 Jul 2023 | |
1.18/candidate | 137 | 10 Jul 2023 | |
1.18/candidate | 136 | 10 Jul 2023 | |
1.18/edge | 115 | 10 May 2023 | |
1.18/edge | 114 | 10 May 2023 | |
1.17/stable | 105 | 17 Apr 2023 | |
1.17/stable | 104 | 17 Apr 2023 | |
1.17/candidate | 105 | 17 Apr 2023 | |
1.17/candidate | 104 | 17 Apr 2023 | |
1.17/edge | 95 | 10 Feb 2023 | |
1.17/edge | 94 | 10 Feb 2023 | |
1.16/stable | 71 | 10 Jan 2023 | |
1.16/stable | 70 | 14 Dec 2022 | |
1.16/candidate | 79 | 11 Jan 2023 | |
1.16/candidate | 78 | 11 Jan 2023 | |
1.16/edge | 55 | 11 Nov 2022 | |
1.16/edge | 54 | 11 Nov 2022 | |
1.16/edge | 51 | 04 Nov 2022 | |
1.15/stable | 47 | 12 Oct 2022 | |
1.15/candidate | 47 | 10 Oct 2022 | |
1.15/edge | 37 | 11 Aug 2022 | |
1.14/stable | 19 | 12 Jul 2022 | |
1.14/candidate | 19 | 19 May 2022 | |
1.14/beta | 15 | 17 May 2022 | |
1.14/edge | 14 | 16 May 2022 |
juju deploy coturn --channel 1.24/stable
Deploy universal operators easily with Juju, the Universal Operator Lifecycle Manager.
Platform:
-
auth_realm | string
Default: coturn
Authentication realm for coturn
-
block_non_public_peer_addresses | boolean
Block various non public IP subnets from being specified in the XOR-PEER-ADDRES attribute of TURN requests.
-
enable_tcp_relay | boolean
Default: True
Enable relaying traffic via TURN over TCP
-
enable_udp_relay | boolean
Default: True
Enable relaying traffic via TURN over UDP. This will need the UDP port range to be accessible on the public endpoint
-
external_address_from_location | boolean
Default: True
Take external addresses of the server from the configured location. This will let the charm resolve the given DNS name and add all found addresses as external ones to the coturn configuration.
-
extra_packages | string
Space separated list of extra deb packages to install.
-
install_keys | string
List of signing keys for install_sources package sources, per charmhelpers standard format (a yaml list of strings encoded as a string). The keys should be the full ASCII armoured GPG public keys. While GPG key ids are also supported and looked up on a keyserver, operators should be aware that this mechanism is insecure. null can be used if a standard package signing key is used that will already be installed on the machine, and for PPA sources where the package signing key is securely retrieved from Launchpad.
-
install_sources | string
List of extra apt sources, per charm-helpers standard format (a yaml list of strings encoded as a string). Each source may be either a line that can be added directly to sources.list(5), or in the form ppa:<user>/<ppa-name> for adding Personal Package Archives, or a distribution component to enable.
-
internal_addresses | string
Comma separated list of additional internal addresses to consider when establishing an address mapping for coturn. Each external address will be mapped onto each given internal address. The special value "private-address" will be replaced with the units private address. See https://github.com/coturn/coturn/blob/master/examples/etc/turnserver.conf#L108 for more details on how coturn uses the mappings.
-
location | string
Location the coturn is available on. If not set its public address will be used.
-
nagios_context | string
Default: juju
Used by the nrpe subordinate charms. A string that will be prepended to instance name to set the host name in nagios. So for instance the hostname would be something like: juju-myservice-0 If you're running multiple environments with the same services in them this allows you to differentiate between them.
-
nagios_servicegroups | string
A comma-separated list of nagios servicegroups. If left empty, the nagios_context will be used as the servicegroup
-
package_status | string
Default: install
The status of service-affecting packages will be set to this value in the dpkg database. Valid values are "install" and "hold".
-
port | int
Default: 5349
Port coturn listens on for incoming connections
-
public_address | string
Public address of the instance coturn is deployed on
-
public_interface | string
Identifies which network interface to use for the public address
-
tls_cert_path | string
Default: /etc/coturn/tls/cert.pem
Path to the TLS certificate on the machine coturn is deployed to
-
tls_key_path | string
Default: /etc/coturn/tls/key.pem
Path to the TLS private key on the machine coturn is deployed to
-
udp_relay_port_range | string
Default: 50000-51000
Port range Coturn will use when relaying TURN traffic
-
use_secure_stun | boolean
Enable support for authenticated STUN. As per RFC 5389 authenticated STUN is not recommended as it takes more effort to process authentication than it takes to process the binding request. Also not every WebRTC client implementation support authenticated STUN.