154 lines
5.5 KiB
Plaintext
154 lines
5.5 KiB
Plaintext
plugin_paths = { "/usr/share/jitsi-meet/prosody-plugins/" }
|
|
|
|
-- domain mapper options, must at least have domain base set to use the mapper
|
|
muc_mapper_domain_base = "jitmeet.example.com";
|
|
|
|
external_service_secret = "__turnSecret__";
|
|
external_services = {
|
|
{ type = "stun", host = "jitmeet.example.com", port = 3478 },
|
|
{ type = "turn", host = "jitmeet.example.com", port = 3478, transport = "udp", secret = true, ttl = 86400, algorithm = "turn" },
|
|
{ type = "turns", host = "jitmeet.example.com", port = 5349, transport = "tcp", secret = true, ttl = 86400, algorithm = "turn" }
|
|
};
|
|
|
|
cross_domain_bosh = false;
|
|
consider_bosh_secure = true;
|
|
-- https_ports = { }; -- Remove this line to prevent listening on port 5284
|
|
|
|
-- by default prosody 0.12 sends cors headers, if you want to disable it uncomment the following (the config is available on 0.12.1)
|
|
--http_cors_override = {
|
|
-- bosh = {
|
|
-- enabled = false;
|
|
-- };
|
|
-- websocket = {
|
|
-- enabled = false;
|
|
-- };
|
|
--}
|
|
|
|
-- https://ssl-config.mozilla.org/#server=haproxy&version=2.1&config=intermediate&openssl=1.1.0g&guideline=5.4
|
|
ssl = {
|
|
protocol = "tlsv1_2+";
|
|
ciphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"
|
|
}
|
|
|
|
unlimited_jids = {
|
|
"focusUser@auth.jitmeet.example.com",
|
|
"jvb@auth.jitmeet.example.com"
|
|
}
|
|
|
|
VirtualHost "jitmeet.example.com"
|
|
authentication = "jitsi-anonymous" -- do not delete me
|
|
-- Properties below are modified by jitsi-meet-tokens package config
|
|
-- and authentication above is switched to "token"
|
|
--app_id="example_app_id"
|
|
--app_secret="example_app_secret"
|
|
-- Assign this host a certificate for TLS, otherwise it would use the one
|
|
-- set in the global section (if any).
|
|
-- Note that old-style SSL on port 5223 only supports one certificate, and will always
|
|
-- use the global one.
|
|
ssl = {
|
|
key = "/etc/prosody/certs/jitmeet.example.com.key";
|
|
certificate = "/etc/prosody/certs/jitmeet.example.com.crt";
|
|
}
|
|
av_moderation_component = "avmoderation.jitmeet.example.com"
|
|
speakerstats_component = "speakerstats.jitmeet.example.com"
|
|
conference_duration_component = "conferenceduration.jitmeet.example.com"
|
|
-- we need bosh
|
|
modules_enabled = {
|
|
"bosh";
|
|
"pubsub";
|
|
"ping"; -- Enable mod_ping
|
|
"speakerstats";
|
|
"external_services";
|
|
"conference_duration";
|
|
"muc_lobby_rooms";
|
|
"muc_breakout_rooms";
|
|
"av_moderation";
|
|
}
|
|
c2s_require_encryption = false
|
|
lobby_muc = "lobby.jitmeet.example.com"
|
|
breakout_rooms_muc = "breakout.jitmeet.example.com"
|
|
main_muc = "conference.jitmeet.example.com"
|
|
-- muc_lobby_whitelist = { "recorder.jitmeet.example.com" } -- Here we can whitelist jibri to enter lobby enabled rooms
|
|
|
|
Component "conference.jitmeet.example.com" "muc"
|
|
restrict_room_creation = true
|
|
storage = "memory"
|
|
modules_enabled = {
|
|
"muc_meeting_id";
|
|
"muc_domain_mapper";
|
|
"polls";
|
|
--"token_verification";
|
|
"muc_rate_limit";
|
|
}
|
|
admins = { "focusUser@auth.jitmeet.example.com" }
|
|
muc_room_locking = false
|
|
muc_room_default_public_jids = true
|
|
|
|
Component "breakout.jitmeet.example.com" "muc"
|
|
restrict_room_creation = true
|
|
storage = "memory"
|
|
modules_enabled = {
|
|
"muc_meeting_id";
|
|
"muc_domain_mapper";
|
|
--"token_verification";
|
|
"muc_rate_limit";
|
|
"polls";
|
|
}
|
|
admins = { "focusUser@auth.jitmeet.example.com" }
|
|
muc_room_locking = false
|
|
muc_room_default_public_jids = true
|
|
|
|
-- internal muc component
|
|
Component "internal.auth.jitmeet.example.com" "muc"
|
|
storage = "memory"
|
|
modules_enabled = {
|
|
"ping";
|
|
}
|
|
admins = { "focusUser@auth.jitmeet.example.com", "jvb@auth.jitmeet.example.com" }
|
|
muc_room_locking = false
|
|
muc_room_default_public_jids = true
|
|
|
|
VirtualHost "auth.jitmeet.example.com"
|
|
modules_enabled = {
|
|
"limits_exception";
|
|
}
|
|
authentication = "internal_hashed"
|
|
|
|
-- Proxy to jicofo's user JID, so that it doesn't have to register as a component.
|
|
Component "focus.jitmeet.example.com" "client_proxy"
|
|
target_address = "focusUser@auth.jitmeet.example.com"
|
|
|
|
Component "speakerstats.jitmeet.example.com" "speakerstats_component"
|
|
muc_component = "conference.jitmeet.example.com"
|
|
|
|
Component "conferenceduration.jitmeet.example.com" "conference_duration_component"
|
|
muc_component = "conference.jitmeet.example.com"
|
|
|
|
Component "avmoderation.jitmeet.example.com" "av_moderation_component"
|
|
muc_component = "conference.jitmeet.example.com"
|
|
|
|
Component "lobby.jitmeet.example.com" "muc"
|
|
storage = "memory"
|
|
restrict_room_creation = true
|
|
muc_room_locking = false
|
|
muc_room_default_public_jids = true
|
|
modules_enabled = {
|
|
"muc_rate_limit";
|
|
"polls";
|
|
}
|
|
|
|
-- Enables dial-in for Jitsi meet components customers
|
|
-- Note: make sure you have the following packages installed: lua-basexx, liblua5.3-dev, libssl-dev, luarocks
|
|
-- and execute $ sudo luarocks install luajwtjitsi 3.0-0
|
|
VirtualHost "jigasi.meet.jitsi"
|
|
enabled = false -- Jitsi meet components customers remove this line
|
|
modules_enabled = {
|
|
"ping";
|
|
"bosh";
|
|
}
|
|
authentication = "token"
|
|
app_id = "jitsi";
|
|
asap_key_server = "https://jaas-public-keys.jitsi.net/jitsi-components/prod-8x8"
|
|
asap_accepted_issuers = { "jaas-components" }
|
|
asap_accepted_audiences = { "jigasi.jitmeet.example.com" }
|