coturn/coturn.service
Johannes Weberhofer ab957dfa08 Accepting request 817809 from home:weberho:branches:network:telephony
- Version 4.5.1.3:
  * Remove reference to SSLv3: gh#coturn/coturn#566
  * Ignore MD5 for BoringSSL: gh#coturn/coturn#579
  * STUN response buffer not initialized properly; he issue found and 
    reported gh#coturn/coturn#583 by Felix Dörre all credits belongs to 
    him. CVE-2020-4067
- Let coturn allow binding to ports below 1024 per default

OBS-URL: https://build.opensuse.org/request/show/817809
OBS-URL: https://build.opensuse.org/package/show/network:telephony/coturn?expand=0&rev=10
2020-06-30 08:03:55 +00:00

29 lines
724 B
Desktop File

[Unit]
Description=STUN and TURN relay server for VoIP and WebRTC
Documentation=man:coturn(1) man:turnadmin(1) man:turnserver(1)
After=syslog.target network.target
[Service]
User=coturn
Group=coturn
Type=forking
EnvironmentFile=-/etc/sysconfig/coturn
PIDFile=/run/coturn/turnserver.pid
ExecStart=/usr/bin/turnserver -o -c /etc/coturn/turnserver.conf --pidfile /run/coturn/turnserver.pid $EXTRA_OPTIONS
Restart=on-abort
ExecReload=/bin/kill -HUP $MAINPID
# next line allows coturn to bind to a port below 1024
AmbientCapabilities=CAP_NET_BIND_SERVICE
LimitCORE=infinity
LimitNOFILE=999999
LimitNPROC=60000
LimitRTPRIO=infinity
LimitRTTIME=7000000
CPUSchedulingPolicy=other
UMask=0007
[Install]
WantedBy=multi-user.target