Compare commits

...

2 commits

Author SHA1 Message Date
5f7d4fa5f3 mumble cose 2022-01-12 23:27:36 +01:00
les
9507493160 update nginx role 2021-12-18 10:32:41 +01:00
3 changed files with 16 additions and 28 deletions

View file

@ -20,7 +20,7 @@
git: git:
repo: "https://github.com/ether/etherpad-lite" repo: "https://github.com/ether/etherpad-lite"
dest: "/srv/etherpad/etherpad" dest: "/srv/etherpad/etherpad"
version: "1.8.7" version: "1.8.14"
force: true force: true
become: true become: true
become_user: "etherpad" become_user: "etherpad"

View file

@ -23,13 +23,13 @@
- name: copy mumble-web unit file - name: copy mumble-web unit file
template: template:
src: mumble-web.service.j2 src: mumble-web-proxy.service.j2
dest: /etc/systemd/system/mumble-web.service dest: /etc/systemd/system/mumble-web-proxy.service
owner: root owner: root
group: root group: root
mode: 0644 mode: 0644
register: servicefile register: servicefile
notify: restart mumble-web notify: restart mumble-web-proxy
- name: Allow to python to inherit socket binding capability - name: Allow to python to inherit socket binding capability
capabilities: capabilities:
@ -47,7 +47,7 @@
- name: enable and start mumble-web - name: enable and start mumble-web
systemd: systemd:
name: mumble-web name: mumble-web-proxy
daemon-reload: yes daemon-reload: yes
enabled: True enabled: True
state: started state: started

View file

@ -1,27 +1,15 @@
[Unit] [Unit]
Description=Mumble-web Description=Mumble Web Proxy
After=network.target auditd.service
[Service] [Service]
SyslogIdentifier=mumble-web Type=simple
ExecStart=/usr/bin/python2.7 /usr/bin/python2-websockify \ ExecStart=/usr/bin/mumble-web-proxy --listen-ws 64737 --server farma.cisti.org:64738 --ice-port-min 20000 --ice-port-max 21000 --ice-ipv4 185.105.3.28
{% if mumble_web_ssl_activated %} Restart=on-failure
--cert={{ murmur_sslcert }} --key={{ murmur_sslkey }} --ssl-only \ PIDFile=/tmp/mumble-web-proxy.pid
{% endif %} User=mumble-server
{% if mumble_web_ssl_target %} WorkingDirectory=/var/lib/mumble-server
--ssl-target \
{% endif %}
--web={{ mumble_web_path }}/dist {{ mumble_web_listen }} localhost:{{ murmur_port }}
DynamicUser=true
; we need access to the certs
{% if mumble_web_supplementary_groups is defined %}
SupplementaryGroups={{ mumble_web_supplementary_groups }}
{% endif %}
; The following additional security directives only work with systemd v229 or later.
AmbientCapabilities=CAP_NET_BIND_SERVICE
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
NoNewPrivileges=true
; Always run
Restart=always
[Install] [Install]
WantedBy=multi-user.target WantedBy=multi-user.target