plugin_paths = { "/usr/share/jitsi-meet/prosody-plugins/" } -- domain mapper options, must at least have domain base set to use the mapper muc_mapper_domain_base = "jitmeet.example.com"; turncredentials_secret = "__turnSecret__"; turncredentials = { { type = "stun", host = "jitmeet.example.com", port = "3478" }, { type = "turn", host = "jitmeet.example.com", port = "3478", transport = "udp" }, { type = "turns", host = "jitmeet.example.com", port = "5349", transport = "tcp" } }; cross_domain_bosh = false; consider_bosh_secure = true; -- https_ports = { }; -- Remove this line to prevent listening on port 5284 -- https://ssl-config.mozilla.org/#server=haproxy&version=2.1&config=intermediate&openssl=1.1.0g&guideline=5.4 ssl = { protocol = "tlsv1_2+"; ciphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384" } VirtualHost "jitmeet.example.com" -- enabled = false -- Remove this line to enable this host authentication = "anonymous" -- Properties below are modified by jitsi-meet-tokens package config -- and authentication above is switched to "token" --app_id="example_app_id" --app_secret="example_app_secret" -- Assign this host a certificate for TLS, otherwise it would use the one -- set in the global section (if any). -- Note that old-style SSL on port 5223 only supports one certificate, and will always -- use the global one. ssl = { key = "/etc/prosody/certs/jitmeet.example.com.key"; certificate = "/etc/prosody/certs/jitmeet.example.com.crt"; } speakerstats_component = "speakerstats.jitmeet.example.com" conference_duration_component = "conferenceduration.jitmeet.example.com" -- we need bosh modules_enabled = { "bosh"; "pubsub"; "ping"; -- Enable mod_ping "speakerstats"; "turncredentials"; "conference_duration"; "muc_lobby_rooms"; } c2s_require_encryption = false lobby_muc = "lobby.jitmeet.example.com" main_muc = "conference.jitmeet.example.com" -- muc_lobby_whitelist = { "recorder.jitmeet.example.com" } -- Here we can whitelist jibri to enter lobby enabled rooms Component "conference.jitmeet.example.com" "muc" storage = "memory" modules_enabled = { "muc_meeting_id"; "muc_domain_mapper"; --"token_verification"; } admins = { "focusUser@auth.jitmeet.example.com" } muc_room_locking = false muc_room_default_public_jids = true -- internal muc component Component "internal.auth.jitmeet.example.com" "muc" storage = "memory" modules_enabled = { "ping"; } admins = { "focusUser@auth.jitmeet.example.com", "jvb@auth.jitmeet.example.com" } muc_room_locking = false muc_room_default_public_jids = true VirtualHost "auth.jitmeet.example.com" authentication = "internal_plain" -- Proxy to jicofo's user JID, so that it doesn't have to register as a component. Component "focus.jitmeet.example.com" "client_proxy" target_address = "focusUser@auth.jitmeet.example.com" Component "speakerstats.jitmeet.example.com" "speakerstats_component" muc_component = "conference.jitmeet.example.com" Component "conferenceduration.jitmeet.example.com" "conference_duration_component" muc_component = "conference.jitmeet.example.com" Component "lobby.jitmeet.example.com" "muc" storage = "memory" restrict_room_creation = true muc_room_locking = false muc_room_default_public_jids = true