"Fossies" - the Fresh Open Source Software Archive 
Member "jitsi-meet-7688/doc/debian/jitsi-meet-prosody/prosody.cfg.lua-jvb.example" (1 Dec 2023, 5661 Bytes) of package /linux/misc/jitsi-meet-7688.tar.gz:
As a special service "Fossies" has tried to format the requested text file into HTML format (style:
standard) with prefixed line numbers.
Alternatively you can here
view or
download the uninterpreted source code file.
1 plugin_paths = { "/usr/share/jitsi-meet/prosody-plugins/" }
2
3 -- domain mapper options, must at least have domain base set to use the mapper
4 muc_mapper_domain_base = "jitmeet.example.com";
5
6 external_service_secret = "__turnSecret__";
7 external_services = {
8 { type = "stun", host = "jitmeet.example.com", port = 3478 },
9 { type = "turn", host = "jitmeet.example.com", port = 3478, transport = "udp", secret = true, ttl = 86400, algorithm = "turn" },
10 { type = "turns", host = "jitmeet.example.com", port = 5349, transport = "tcp", secret = true, ttl = 86400, algorithm = "turn" }
11 };
12
13 cross_domain_bosh = false;
14 consider_bosh_secure = true;
15 -- https_ports = { }; -- Remove this line to prevent listening on port 5284
16
17 -- by default prosody 0.12 sends cors headers, if you want to disable it uncomment the following (the config is available on 0.12.1)
18 --http_cors_override = {
19 -- bosh = {
20 -- enabled = false;
21 -- };
22 -- websocket = {
23 -- enabled = false;
24 -- };
25 --}
26
27 -- https://ssl-config.mozilla.org/#server=haproxy&version=2.1&config=intermediate&openssl=1.1.0g&guideline=5.4
28 ssl = {
29 protocol = "tlsv1_2+";
30 ciphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"
31 }
32
33 unlimited_jids = {
34 "focusUser@auth.jitmeet.example.com",
35 "jvb@auth.jitmeet.example.com"
36 }
37
38 VirtualHost "jitmeet.example.com"
39 authentication = "jitsi-anonymous" -- do not delete me
40 -- Properties below are modified by jitsi-meet-tokens package config
41 -- and authentication above is switched to "token"
42 --app_id="example_app_id"
43 --app_secret="example_app_secret"
44 -- Assign this host a certificate for TLS, otherwise it would use the one
45 -- set in the global section (if any).
46 -- Note that old-style SSL on port 5223 only supports one certificate, and will always
47 -- use the global one.
48 ssl = {
49 key = "/etc/prosody/certs/jitmeet.example.com.key";
50 certificate = "/etc/prosody/certs/jitmeet.example.com.crt";
51 }
52 av_moderation_component = "avmoderation.jitmeet.example.com"
53 speakerstats_component = "speakerstats.jitmeet.example.com"
54 conference_duration_component = "conferenceduration.jitmeet.example.com"
55 end_conference_component = "endconference.jitmeet.example.com"
56 -- we need bosh
57 modules_enabled = {
58 "bosh";
59 "pubsub";
60 "ping"; -- Enable mod_ping
61 "speakerstats";
62 "external_services";
63 "conference_duration";
64 "end_conference";
65 "muc_lobby_rooms";
66 "muc_breakout_rooms";
67 "av_moderation";
68 "room_metadata";
69 }
70 c2s_require_encryption = false
71 lobby_muc = "lobby.jitmeet.example.com"
72 breakout_rooms_muc = "breakout.jitmeet.example.com"
73 room_metadata_component = "metadata.jitmeet.example.com"
74 main_muc = "conference.jitmeet.example.com"
75 -- muc_lobby_whitelist = { "recorder.jitmeet.example.com" } -- Here we can whitelist jibri to enter lobby enabled rooms
76
77 Component "conference.jitmeet.example.com" "muc"
78 restrict_room_creation = true
79 storage = "memory"
80 modules_enabled = {
81 "muc_hide_all";
82 "muc_meeting_id";
83 "muc_domain_mapper";
84 "polls";
85 --"token_verification";
86 "muc_rate_limit";
87 "muc_password_whitelist";
88 }
89 admins = { "focusUser@auth.jitmeet.example.com" }
90 muc_password_whitelist = {
91 "focusUser@auth.jitmeet.example.com"
92 }
93 muc_room_locking = false
94 muc_room_default_public_jids = true
95
96 Component "breakout.jitmeet.example.com" "muc"
97 restrict_room_creation = true
98 storage = "memory"
99 modules_enabled = {
100 "muc_hide_all";
101 "muc_meeting_id";
102 "muc_domain_mapper";
103 "muc_rate_limit";
104 "polls";
105 }
106 admins = { "focusUser@auth.jitmeet.example.com" }
107 muc_room_locking = false
108 muc_room_default_public_jids = true
109
110 -- internal muc component
111 Component "internal.auth.jitmeet.example.com" "muc"
112 storage = "memory"
113 modules_enabled = {
114 "muc_hide_all";
115 "ping";
116 }
117 admins = { "focusUser@auth.jitmeet.example.com", "jvb@auth.jitmeet.example.com" }
118 muc_room_locking = false
119 muc_room_default_public_jids = true
120
121 VirtualHost "auth.jitmeet.example.com"
122 modules_enabled = {
123 "limits_exception";
124 }
125 authentication = "internal_hashed"
126
127 -- Proxy to jicofo's user JID, so that it doesn't have to register as a component.
128 Component "focus.jitmeet.example.com" "client_proxy"
129 target_address = "focusUser@auth.jitmeet.example.com"
130
131 Component "speakerstats.jitmeet.example.com" "speakerstats_component"
132 muc_component = "conference.jitmeet.example.com"
133
134 Component "conferenceduration.jitmeet.example.com" "conference_duration_component"
135 muc_component = "conference.jitmeet.example.com"
136
137 Component "endconference.jitmeet.example.com" "end_conference"
138 muc_component = "conference.jitmeet.example.com"
139
140 Component "avmoderation.jitmeet.example.com" "av_moderation_component"
141 muc_component = "conference.jitmeet.example.com"
142
143 Component "lobby.jitmeet.example.com" "muc"
144 storage = "memory"
145 restrict_room_creation = true
146 muc_room_locking = false
147 muc_room_default_public_jids = true
148 modules_enabled = {
149 "muc_hide_all";
150 "muc_rate_limit";
151 "polls";
152 }
153
154 Component "metadata.jitmeet.example.com" "room_metadata_component"
155 muc_component = "conference.jitmeet.example.com"
156 breakout_rooms_component = "breakout.jitmeet.example.com"