2.1 KiB
TURN server
The playbook installs a Coturn TURN server by default, so that clients can make audio/video calls even from NAT-ed networks.
By default, the Synapse chat server is configured, so that it points to the Coturn TURN server installed by the playbook.
Disabling Coturn
If, for some reason, you'd like to prevent the playbook from installing Coturn, you can use the following configuration:
matrix_coturn_enabled: false
In that case, Synapse would not point to any Coturn servers and audio/video call functionality may fail.
Using your own external Coturn server
If you'd like to use another TURN server (be it Coturn or some other one), you can configure the playbook like this:
# Disable integrated Coturn server
matrix_coturn_enabled: false
# Point Synapse to your other Coturn server
matrix_synapse_turn_uris:
- turns:HOSTNAME_OR_IP?transport=udp
- turns:HOSTNAME_OR_IP?transport=tcp
- turn:HOSTNAME_OR_IP?transport=udp
- turn:HOSTNAME_OR_IP?transport=tcp
Note: Add this item to your vars.yml file, even when you have the default Coturn-Server via the playbook if you have matrix_ssl_retrieval_method: manually-managed BUT still use Let's-Encrypt for your certificates. There is a known upstream-bug in Elements and its forks (e.g. Schildichat) not beeing able to use a coturn-server with those certificates and the playbook only takes care of it with this commit when SSL-certificates are managed by the playbook matrix_ssl_retrieval_method: "lets-encrypt" (which is the default).
If you have or want to enable Jitsi, you might want to enable the TURN server there too. If you do not do it, Jitsi will fall back to an upstream service.
matrix_jitsi_web_stun_servers:
- stun:HOSTNAME_OR_IP:PORT
You can put multiple host/port combinations if you like.