openvidu-deployment: single-node-pro - azure - Allow empty domains withj sslip

master
cruizba 2025-09-07 19:56:14 +02:00
parent a2098d1e85
commit 5cf8a32190
3 changed files with 133 additions and 90 deletions

View File

@ -2,18 +2,16 @@
param stackName string param stackName string
@description(''' @description('''
[selfsigned] Not recommended for production use. If you don't have a FQDN, (DomainName parameter) you can use this option to generate a self-signed certificate. [selfsigned] Not recommended for production use. Just for testing purposes or development environments. You don't need a FQDN to use this option.
[owncert] Valid for productions environments. If you have a FQDN, (DomainName parameter) [owncert] Valid for production environments. Use your own certificate. You need a FQDN to use this option.
and an Elastic IP, you can use this option to use your own certificate. [letsencrypt] Valid for production environments. Can be used with or without a FQDN (if no FQDN is provided, a random sslip.io domain will be used).
[letsencrypt] Valid for production environments. If you have a FQDN, (DomainName parameter)
and an Elastic IP, you can use this option to generate a Let's Encrypt certificate.
''') ''')
@allowed([ @allowed([
'selfsigned' 'selfsigned'
'owncert' 'owncert'
'letsencrypt' 'letsencrypt'
]) ])
param certificateType string = 'selfsigned' param certificateType string = 'letsencrypt'
@description('Previously created Public IP address for the OpenVidu Deployment. Blank will generate a public IP') @description('Previously created Public IP address for the OpenVidu Deployment. Blank will generate a public IP')
param publicIpAddressObject object param publicIpAddressObject object
@ -27,9 +25,6 @@ param ownPublicCertificate string = ''
@description('If certificate type is \'owncert\', this parameter will be used to specify the private certificate') @description('If certificate type is \'owncert\', this parameter will be used to specify the private certificate')
param ownPrivateCertificate string = '' param ownPrivateCertificate string = ''
@description('If certificate type is \'letsencrypt\', this email will be used for Let\'s Encrypt notifications')
param letsEncryptEmail string = ''
@description('(Optional) Domain name for the TURN server with TLS. Only needed if your users are behind restrictive firewalls') @description('(Optional) Domain name for the TURN server with TLS. Only needed if your users are behind restrictive firewalls')
param turnDomainName string = '' param turnDomainName string = ''
@ -191,7 +186,7 @@ var networkSettings = {
} }
var openviduVMSettings = { var openviduVMSettings = {
vmName: '${stackName}-VM-CE' vmName: '${stackName}-VM-Pro'
osDiskType: 'StandardSSD_LRS' osDiskType: 'StandardSSD_LRS'
ubuntuOSVersion: { ubuntuOSVersion: {
publisher: 'Canonical' publisher: 'Canonical'
@ -212,7 +207,6 @@ var openviduVMSettings = {
} }
} }
var fqdn = isEmptyIp ? publicIP_OV.properties.dnsSettings.fqdn : domainName
//KeyVault for secrets //KeyVault for secrets
var keyVaultName = '${stackName}-keyvault' var keyVaultName = '${stackName}-keyvault'
@ -267,10 +261,8 @@ resource openviduSharedInfo 'Microsoft.KeyVault/vaults@2023-07-01' = {
//Parms for not string interpolation support for multiline //Parms for not string interpolation support for multiline
var stringInterpolationParams = { var stringInterpolationParams = {
domainName: domainName domainName: domainName
fqdn: fqdn
turnDomainName: turnDomainName turnDomainName: turnDomainName
certificateType: certificateType certificateType: certificateType
letsEncryptEmail: letsEncryptEmail
ownPublicCertificate: ownPublicCertificate ownPublicCertificate: ownPublicCertificate
ownPrivateCertificate: ownPrivateCertificate ownPrivateCertificate: ownPrivateCertificate
turnOwnPublicCertificate: turnOwnPublicCertificate turnOwnPublicCertificate: turnOwnPublicCertificate
@ -295,8 +287,18 @@ apt-get update && apt-get install -y \
# Configure Domain # Configure Domain
if [[ "${domainName}" == '' ]]; then if [[ "${domainName}" == '' ]]; then
[ ! -d "/usr/share/openvidu" ] && mkdir -p /usr/share/openvidu [ ! -d "/usr/share/openvidu" ] && mkdir -p /usr/share/openvidu
DOMAIN=${fqdn} # Get public IP using the get_public_ip.sh script
echo ${fqdn} > /usr/share/openvidu/old-host-name PUBLIC_IP=$(/usr/local/bin/get_public_ip.sh 2>/dev/null)
if [[ $? -ne 0 || -z "${PUBLIC_IP}" ]]; then
echo "Could not determine public IP."
exit 1
fi
RANDOM_DOMAIN_STRING=$(tr -dc 'a-z' < /dev/urandom | head -c 8)
DOMAIN="openvidu-$RANDOM_DOMAIN_STRING-$(echo "$PUBLIC_IP" | tr '.' '-').sslip.io"
TURN_DOMAIN_NAME_SSLIP_IO="turn-$RANDOM_DOMAIN_STRING-$(echo "$PUBLIC_IP" | tr '.' '-').sslip.io"
echo $RANDOM_DOMAIN_STRING > /usr/share/openvidu/random-domain-string
echo $PUBLIC_IP > /usr/share/openvidu/public-ip
else else
DOMAIN=${domainName} DOMAIN=${domainName}
fi fi
@ -369,6 +371,11 @@ if [[ "${turnDomainName}" != '' ]]; then
COMMON_ARGS+=( COMMON_ARGS+=(
"--turn-domain-name=$LIVEKIT_TURN_DOMAIN_NAME" "--turn-domain-name=$LIVEKIT_TURN_DOMAIN_NAME"
) )
elif [[ "${TURN_DOMAIN_NAME_SSLIP_IO}" != '' ]]; then
LIVEKIT_TURN_DOMAIN_NAME=$(/usr/local/bin/store_secret.sh save LIVEKIT-TURN-DOMAIN-NAME "${TURN_DOMAIN_NAME_SSLIP_IO}")
COMMON_ARGS+=(
"--turn-domain-name=$LIVEKIT_TURN_DOMAIN_NAME"
)
fi fi
# Certificate arguments # Certificate arguments
@ -377,10 +384,8 @@ if [[ "${certificateType}" == "selfsigned" ]]; then
"--certificate-type=selfsigned" "--certificate-type=selfsigned"
) )
elif [[ "${certificateType}" == "letsencrypt" ]]; then elif [[ "${certificateType}" == "letsencrypt" ]]; then
LETSENCRYPT_EMAIL=$(/usr/local/bin/store_secret.sh save LETSENCRYPT-EMAIL "${letsEncryptEmail}")
CERT_ARGS=( CERT_ARGS=(
"--certificate-type=letsencrypt" "--certificate-type=letsencrypt"
"--letsencrypt-email=${letsEncryptEmail}"
) )
else else
# Download owncert files # Download owncert files
@ -432,12 +437,16 @@ az login --identity --allow-no-subscriptions > /dev/null
# Generate URLs # Generate URLs
DOMAIN=$(az keyvault secret show --vault-name ${keyVaultName} --name DOMAIN-NAME --query value -o tsv) DOMAIN=$(az keyvault secret show --vault-name ${keyVaultName} --name DOMAIN-NAME --query value -o tsv)
OPENVIDU_URL="https://${DOMAIN}/"
LIVEKIT_URL="wss://${DOMAIN}/"
DASHBOARD_URL="https://${DOMAIN}/dashboard/" DASHBOARD_URL="https://${DOMAIN}/dashboard/"
GRAFANA_URL="https://${DOMAIN}/grafana/" GRAFANA_URL="https://${DOMAIN}/grafana/"
MINIO_URL="https://${DOMAIN}/minio-console/" MINIO_URL="https://${DOMAIN}/minio-console/"
# Update shared secret # Update shared secret
az keyvault secret set --vault-name ${keyVaultName} --name DOMAIN-NAME --value $DOMAIN az keyvault secret set --vault-name ${keyVaultName} --name DOMAIN-NAME --value $DOMAIN
az keyvault secret set --vault-name ${keyVaultName} --name OPENVIDU-URL --value $OPENVIDU_URL
az keyvault secret set --vault-name ${keyVaultName} --name LIVEKIT-URL --value $LIVEKIT_URL
az keyvault secret set --vault-name ${keyVaultName} --name DASHBOARD-URL --value $DASHBOARD_URL az keyvault secret set --vault-name ${keyVaultName} --name DASHBOARD-URL --value $DASHBOARD_URL
az keyvault secret set --vault-name ${keyVaultName} --name GRAFANA-URL --value $GRAFANA_URL az keyvault secret set --vault-name ${keyVaultName} --name GRAFANA-URL --value $GRAFANA_URL
az keyvault secret set --vault-name ${keyVaultName} --name MINIO-URL --value $MINIO_URL az keyvault secret set --vault-name ${keyVaultName} --name MINIO-URL --value $MINIO_URL
@ -461,6 +470,14 @@ CONFIG_DIR="${INSTALL_DIR}/config"
# Replace DOMAIN_NAME # Replace DOMAIN_NAME
export DOMAIN=$(az keyvault secret show --vault-name ${keyVaultName} --name DOMAIN-NAME --query value -o tsv) export DOMAIN=$(az keyvault secret show --vault-name ${keyVaultName} --name DOMAIN-NAME --query value -o tsv)
if [[ $DOMAIN == *"sslip.io"* ]] || [[ -z $DOMAIN ]]; then
PUBLIC_IP=$(/usr/local/bin/get_public_ip.sh 2>/dev/null || echo "")
if [[ -n "$PUBLIC_IP" ]] && [[ -f "/usr/share/openvidu/random-domain-string" ]]; then
RANDOM_DOMAIN_STRING=$(cat /usr/share/openvidu/random-domain-string)
DOMAIN="openvidu-$RANDOM_DOMAIN_STRING-$(echo "$PUBLIC_IP" | tr '.' '-').sslip.io"
fi
fi
if [[ -n "$DOMAIN" ]]; then if [[ -n "$DOMAIN" ]]; then
sed -i "s/DOMAIN_NAME=.*/DOMAIN_NAME=$DOMAIN/" "${CONFIG_DIR}/openvidu.env" sed -i "s/DOMAIN_NAME=.*/DOMAIN_NAME=$DOMAIN/" "${CONFIG_DIR}/openvidu.env"
else else
@ -469,15 +486,18 @@ fi
# Replace LIVEKIT_TURN_DOMAIN_NAME # Replace LIVEKIT_TURN_DOMAIN_NAME
export LIVEKIT_TURN_DOMAIN_NAME=$(az keyvault secret show --vault-name ${keyVaultName} --name LIVEKIT-TURN-DOMAIN-NAME --query value -o tsv) export LIVEKIT_TURN_DOMAIN_NAME=$(az keyvault secret show --vault-name ${keyVaultName} --name LIVEKIT-TURN-DOMAIN-NAME --query value -o tsv)
if [[ $LIVEKIT_TURN_DOMAIN_NAME == *"sslip.io"* ]] || [[ -z $LIVEKIT_TURN_DOMAIN_NAME ]]; then
PUBLIC_IP=$(/usr/local/bin/get_public_ip.sh 2>/dev/null || echo "")
if [[ -n "$PUBLIC_IP" ]] && [[ -f "/usr/share/openvidu/random-domain-string" ]]; then
RANDOM_DOMAIN_STRING=$(cat /usr/share/openvidu/random-domain-string)
LIVEKIT_TURN_DOMAIN_NAME="turn-$RANDOM_DOMAIN_STRING-$(echo "$PUBLIC_IP" | tr '.' '-').sslip.io"
fi
fi
if [[ -n "$LIVEKIT_TURN_DOMAIN_NAME" ]]; then if [[ -n "$LIVEKIT_TURN_DOMAIN_NAME" ]]; then
sed -i "s/LIVEKIT_TURN_DOMAIN_NAME=.*/LIVEKIT_TURN_DOMAIN_NAME=$LIVEKIT_TURN_DOMAIN_NAME/" "${CONFIG_DIR}/openvidu.env" sed -i "s/LIVEKIT_TURN_DOMAIN_NAME=.*/LIVEKIT_TURN_DOMAIN_NAME=$LIVEKIT_TURN_DOMAIN_NAME/" "${CONFIG_DIR}/openvidu.env"
fi fi
if [[ ${certificateType} == "letsencrypt" ]]; then
export LETSENCRYPT_EMAIL=$(az keyvault secret show --vault-name ${keyVaultName} --name LETSENCRYPT-EMAIL --query value -o tsv)
sed -i "s/LETSENCRYPT_EMAIL=.*/LETSENCRYPT_EMAIL=$LETSENCRYPT_EMAIL/" "${CONFIG_DIR}/openvidu.env"
fi
# Get the rest of the values # Get the rest of the values
export REDIS_PASSWORD=$(az keyvault secret show --vault-name ${keyVaultName} --name REDIS-PASSWORD --query value -o tsv) export REDIS_PASSWORD=$(az keyvault secret show --vault-name ${keyVaultName} --name REDIS-PASSWORD --query value -o tsv)
export OPENVIDU_RTC_ENGINE=$(az keyvault secret show --vault-name ${keyVaultName} --name OPENVIDU-RTC-ENGINE --query value -o tsv) export OPENVIDU_RTC_ENGINE=$(az keyvault secret show --vault-name ${keyVaultName} --name OPENVIDU-RTC-ENGINE --query value -o tsv)
@ -521,12 +541,16 @@ sed -i "s/ENABLED_MODULES=.*/ENABLED_MODULES=$ENABLED_MODULES/" "${CONFIG_DIR}/o
# Update URLs in secret # Update URLs in secret
OPENVIDU_URL="https://${DOMAIN}/"
LIVEKIT_URL="wss://${DOMAIN}/"
DASHBOARD_URL="https://${DOMAIN}/dashboard/" DASHBOARD_URL="https://${DOMAIN}/dashboard/"
GRAFANA_URL="https://${DOMAIN}/grafana/" GRAFANA_URL="https://${DOMAIN}/grafana/"
MINIO_URL="https://${DOMAIN}/minio-console/" MINIO_URL="https://${DOMAIN}/minio-console/"
# Update shared secret # Update shared secret
az keyvault secret set --vault-name ${keyVaultName} --name DOMAIN-NAME --value $DOMAIN az keyvault secret set --vault-name ${keyVaultName} --name DOMAIN-NAME --value $DOMAIN
az keyvault secret set --vault-name ${keyVaultName} --name OPENVIDU-URL --value $OPENVIDU_URL
az keyvault secret set --vault-name ${keyVaultName} --name LIVEKIT-URL --value $LIVEKIT_URL
az keyvault secret set --vault-name ${keyVaultName} --name DASHBOARD-URL --value $DASHBOARD_URL az keyvault secret set --vault-name ${keyVaultName} --name DASHBOARD-URL --value $DASHBOARD_URL
az keyvault secret set --vault-name ${keyVaultName} --name GRAFANA-URL --value $GRAFANA_URL az keyvault secret set --vault-name ${keyVaultName} --name GRAFANA-URL --value $GRAFANA_URL
az keyvault secret set --vault-name ${keyVaultName} --name MINIO-URL --value $MINIO_URL az keyvault secret set --vault-name ${keyVaultName} --name MINIO-URL --value $MINIO_URL
@ -666,6 +690,32 @@ else
fi fi
''' '''
var get_public_ip = '''
#!/bin/bash
# List of services to check public IP
services=(
"https://checkip.amazonaws.com"
"https://ifconfig.me/ip"
"https://ipinfo.io/ip"
"https://api.ipify.org"
"https://icanhazip.com"
)
for service in "${services[@]}"; do
ip=$(curl -s --max-time 5 "$service")
if [[ -n "$ip" && "$ip" =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]]; then
echo "$ip"
exit 0
else
echo "Failed to get IP from $service" >&2
fi
done
echo "Could not retrieve public IP from any service." >&2
exit 1
'''
var check_app_ready = ''' var check_app_ready = '''
#!/bin/bash #!/bin/bash
while true; do while true; do
@ -758,6 +808,7 @@ var base64update_config_from_secret = base64(update_config_from_secretScript)
var base64update_secret_from_config = base64(update_secret_from_configScript) var base64update_secret_from_config = base64(update_secret_from_configScript)
var base64get_value_from_config = base64(get_value_from_configScript) var base64get_value_from_config = base64(get_value_from_configScript)
var base64store_secret = base64(store_secretScript) var base64store_secret = base64(store_secretScript)
var base64get_public_ip = base64(get_public_ip)
var base64check_app_ready = base64(check_app_ready) var base64check_app_ready = base64(check_app_ready)
var base64restart = base64(restart) var base64restart = base64(restart)
var base64config_blobStorage = base64(config_blobStorageScript) var base64config_blobStorage = base64(config_blobStorageScript)
@ -769,6 +820,7 @@ var userDataParams = {
base64update_secret_from_config: base64update_secret_from_config base64update_secret_from_config: base64update_secret_from_config
base64get_value_from_config: base64get_value_from_config base64get_value_from_config: base64get_value_from_config
base64store_secret: base64store_secret base64store_secret: base64store_secret
base64get_public_ip: base64get_public_ip
base64check_app_ready: base64check_app_ready base64check_app_ready: base64check_app_ready
base64restart: base64restart base64restart: base64restart
base64config_blobStorage: base64config_blobStorage base64config_blobStorage: base64config_blobStorage
@ -801,6 +853,10 @@ chmod +x /usr/local/bin/get_value_from_config.sh
echo ${base64store_secret} | base64 -d > /usr/local/bin/store_secret.sh echo ${base64store_secret} | base64 -d > /usr/local/bin/store_secret.sh
chmod +x /usr/local/bin/store_secret.sh chmod +x /usr/local/bin/store_secret.sh
# get_public_ip.sh
echo ${base64get_public_ip} | base64 -d > /usr/local/bin/get_public_ip.sh
chmod +x /usr/local/bin/get_public_ip.sh
echo ${base64check_app_ready} | base64 -d > /usr/local/bin/check_app_ready.sh echo ${base64check_app_ready} | base64 -d > /usr/local/bin/check_app_ready.sh
chmod +x /usr/local/bin/check_app_ready.sh chmod +x /usr/local/bin/check_app_ready.sh
@ -892,9 +948,16 @@ resource roleAssignmentOpenViduServer 'Microsoft.Authorization/roleAssignments@2
} }
/*------------------------------------------- NETWORK -------------------------------------------*/ /*------------------------------------------- NETWORK -------------------------------------------*/
//Create publicIPAddress if convinient var ipExists = publicIpAddressObject.newOrExistingOrNone == 'existing'
resource publicIP_OV 'Microsoft.Network/publicIPAddresses@2023-11-01' = if (isEmptyIp == true) {
name: '${stackName}-publicIP' resource publicIP_OV_ifExisting 'Microsoft.Network/publicIPAddresses@2023-11-01' existing = if (ipExists == true) {
name: publicIpAddressObject.name
}
var ipNew = publicIpAddressObject.newOrExistingOrNone == 'new'
resource publicIP_OV_ifNew 'Microsoft.Network/publicIPAddresses@2023-11-01' = if (ipNew == true) {
name: publicIpAddressObject.name
location: location location: location
sku: { sku: {
name: 'Standard' name: 'Standard'
@ -905,23 +968,10 @@ resource publicIP_OV 'Microsoft.Network/publicIPAddresses@2023-11-01' = if (isEm
publicIPAllocationMethod: 'Static' publicIPAllocationMethod: 'Static'
dnsSettings: { dnsSettings: {
domainNameLabel: isEmptyDomain ? toLower('${stackName}') : null domainNameLabel: isEmptyDomain ? toLower('${stackName}') : null
fqdn: isEmptyDomain ? null : domainName
} }
} }
} }
var ipExists = publicIpAddressObject.newOrExistingOrNone == 'existing'
resource publicIP_OV_ifExisting 'Microsoft.Network/publicIPAddresses@2023-11-01' existing = if (ipExists == true) {
name: publicIpAddressObject.name
}
var ipNew = publicIpAddressObject.newOrExistingOrNone == 'new'
resource publicIP_OV_ifNew 'Microsoft.Network/publicIPAddresses@2023-11-01' existing = if (ipNew == true) {
name: publicIpAddressObject.name
}
// Create the virtual network // Create the virtual network
resource vnet_OV 'Microsoft.Network/virtualNetworks@2023-11-01' = { resource vnet_OV 'Microsoft.Network/virtualNetworks@2023-11-01' = {
name: networkSettings.vNetName name: networkSettings.vNetName
@ -960,8 +1010,8 @@ resource netInterface_OV 'Microsoft.Network/networkInterfaces@2023-11-01' = {
subnet: { subnet: {
id: resourceId('Microsoft.Network/virtualNetworks/subnets', vnet_OV.name, networkSettings.subnetName) id: resourceId('Microsoft.Network/virtualNetworks/subnets', vnet_OV.name, networkSettings.subnetName)
} }
publicIPAddress: { publicIPAddress: isEmptyIp ? null : {
id: isEmptyIp ? publicIP_OV.id : ipNew ? publicIP_OV_ifNew.id : publicIP_OV_ifExisting.id id: ipNew ? publicIP_OV_ifNew.id : publicIP_OV_ifExisting.id
} }
} }
} }

File diff suppressed because one or more lines are too long

View File

@ -46,7 +46,7 @@
"type": "Microsoft.Common.DropDown", "type": "Microsoft.Common.DropDown",
"label": "Certificate Type", "label": "Certificate Type",
"subLabel": "", "subLabel": "",
"defaultValue": "selfsigned", "defaultValue": "letsencrypt",
"toolTip": "[[selfsigned] Not recommended for production use. If you don't have a FQDN, (DomainName parameter) you can use this option to generate a self-signed certificate.\n[owncert] Valid for productions environments. If you have a FQDN, (DomainName parameter)\nand an Elastic IP, you can use this option to use your own certificate.\n[letsencrypt] Valid for production environments. If you have a FQDN, (DomainName parameter)\nand an Elastic IP, you can use this option to generate a Let's Encrypt certificate.\n", "toolTip": "[[selfsigned] Not recommended for production use. If you don't have a FQDN, (DomainName parameter) you can use this option to generate a self-signed certificate.\n[owncert] Valid for productions environments. If you have a FQDN, (DomainName parameter)\nand an Elastic IP, you can use this option to use your own certificate.\n[letsencrypt] Valid for production environments. If you have a FQDN, (DomainName parameter)\nand an Elastic IP, you can use this option to generate a Let's Encrypt certificate.\n",
"constraints": { "constraints": {
"required": true, "required": true,
@ -82,7 +82,7 @@
"publicIpAddressName": "defaultName" "publicIpAddressName": "defaultName"
}, },
"options": { "options": {
"hideNone": false, "hideNone": true,
"hideDomainNameLabel": true, "hideDomainNameLabel": true,
"hideExisting": false "hideExisting": false
}, },
@ -101,8 +101,8 @@
"validationMessage": "Please enter a valid domain name or leave it blank to generate", "validationMessage": "Please enter a valid domain name or leave it blank to generate",
"validations": [ "validations": [
{ {
"isValid": "[if(or(equals(steps('parameters SSL').certificateType, 'letsencrypt'), equals(steps('parameters SSL').certificateType, 'owncert')), not(empty(steps('parameters SSL').domainName)), true)]", "isValid": "[if(equals(steps('parameters SSL').certificateType, 'owncert'), not(empty(steps('parameters SSL').domainName)), true)]",
"message": "You need to fill this parameter because you've selected another certificate type that is not selfsigned." "message": "You need to fill this parameter because you've selected owncert certificate type."
} }
] ]
}, },
@ -150,27 +150,6 @@
}, },
"infoMessages": [], "infoMessages": [],
"visible": true "visible": true
},
{
"name": "letsEncryptEmail",
"type": "Microsoft.Common.TextBox",
"label": "Lets Encrypt Email",
"subLabel": "\nIf certificate type is 'letsencrypt', this email will be used for Let's Encrypt notifications",
"defaultValue": "",
"toolTip": "",
"constraints": {
"required": false,
"regex": "",
"validationMessage": "",
"validations": [
{
"isValid": "[if(equals(steps('parameters SSL').certificateType, 'letsencrypt'), not(empty(steps('parameters SSL').letsEncryptEmail)), true)]",
"message": "You need to fill this parameter because you've selected letsencrypt certificate type."
}
]
},
"infoMessages": [],
"visible": true
} }
] ]
}, },