"Fossies" - the Fresh Open Source Software Archive

Member "jitsi-meet-6316/doc/debian/jitsi-meet-prosody/prosody.cfg.lua-jvb.example" (5 Jul 2022, 5673 Bytes) of package /linux/misc/jitsi-meet-6316.tar.gz:


As a special service "Fossies" has tried to format the requested text file into HTML format (style: standard) with prefixed line numbers. Alternatively you can here view or download the uninterpreted source code file.

    1 plugin_paths = { "/usr/share/jitsi-meet/prosody-plugins/" }
    2 
    3 -- domain mapper options, must at least have domain base set to use the mapper
    4 muc_mapper_domain_base = "jitmeet.example.com";
    5 
    6 external_service_secret = "__turnSecret__";
    7 external_services = {
    8      { type = "stun", host = "jitmeet.example.com", port = 3478 },
    9      { type = "turn", host = "jitmeet.example.com", port = 3478, transport = "udp", secret = true, ttl = 86400, algorithm = "turn" },
   10      { type = "turns", host = "jitmeet.example.com", port = 5349, transport = "tcp", secret = true, ttl = 86400, algorithm = "turn" }
   11 };
   12 
   13 cross_domain_bosh = false;
   14 consider_bosh_secure = true;
   15 -- https_ports = { }; -- Remove this line to prevent listening on port 5284
   16 
   17 -- by default prosody 0.12 sends cors headers, if you want to disable it uncomment the following (the config is available on 0.12.1)
   18 --http_cors_override = {
   19 --    bosh = {
   20 --        enabled = false;
   21 --    };
   22 --    websocket = {
   23 --        enabled = false;
   24 --    };
   25 --}
   26 
   27 -- https://ssl-config.mozilla.org/#server=haproxy&version=2.1&config=intermediate&openssl=1.1.0g&guideline=5.4
   28 ssl = {
   29     protocol = "tlsv1_2+";
   30     ciphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"
   31 }
   32 
   33 unlimited_jids = {
   34     "focusUser@auth.jitmeet.example.com",
   35     "jvb@auth.jitmeet.example.com"
   36 }
   37 
   38 VirtualHost "jitmeet.example.com"
   39     -- enabled = false -- Remove this line to enable this host
   40     authentication = "anonymous"
   41     -- Properties below are modified by jitsi-meet-tokens package config
   42     -- and authentication above is switched to "token"
   43     --app_id="example_app_id"
   44     --app_secret="example_app_secret"
   45     -- Assign this host a certificate for TLS, otherwise it would use the one
   46     -- set in the global section (if any).
   47     -- Note that old-style SSL on port 5223 only supports one certificate, and will always
   48     -- use the global one.
   49     ssl = {
   50         key = "/etc/prosody/certs/jitmeet.example.com.key";
   51         certificate = "/etc/prosody/certs/jitmeet.example.com.crt";
   52     }
   53     av_moderation_component = "avmoderation.jitmeet.example.com"
   54     speakerstats_component = "speakerstats.jitmeet.example.com"
   55     conference_duration_component = "conferenceduration.jitmeet.example.com"
   56     -- we need bosh
   57     modules_enabled = {
   58         "bosh";
   59         "pubsub";
   60         "ping"; -- Enable mod_ping
   61         "speakerstats";
   62         "external_services";
   63         "conference_duration";
   64         "muc_lobby_rooms";
   65         "muc_breakout_rooms";
   66         "av_moderation";
   67     }
   68     c2s_require_encryption = false
   69     lobby_muc = "lobby.jitmeet.example.com"
   70     breakout_rooms_muc = "breakout.jitmeet.example.com"
   71     main_muc = "conference.jitmeet.example.com"
   72     -- muc_lobby_whitelist = { "recorder.jitmeet.example.com" } -- Here we can whitelist jibri to enter lobby enabled rooms
   73 
   74 Component "conference.jitmeet.example.com" "muc"
   75     restrict_room_creation = true
   76     storage = "memory"
   77     modules_enabled = {
   78         "muc_meeting_id";
   79         "muc_domain_mapper";
   80         "polls";
   81         --"token_verification";
   82         "muc_rate_limit";
   83     }
   84     admins = { "focusUser@auth.jitmeet.example.com" }
   85     muc_room_locking = false
   86     muc_room_default_public_jids = true
   87 
   88 Component "breakout.jitmeet.example.com" "muc"
   89     restrict_room_creation = true
   90     storage = "memory"
   91     modules_enabled = {
   92         "muc_meeting_id";
   93         "muc_domain_mapper";
   94         --"token_verification";
   95         "muc_rate_limit";
   96         "polls";
   97     }
   98     admins = { "focusUser@auth.jitmeet.example.com" }
   99     muc_room_locking = false
  100     muc_room_default_public_jids = true
  101 
  102 -- internal muc component
  103 Component "internal.auth.jitmeet.example.com" "muc"
  104     storage = "memory"
  105     modules_enabled = {
  106         "ping";
  107     }
  108     admins = { "focusUser@auth.jitmeet.example.com", "jvb@auth.jitmeet.example.com" }
  109     muc_room_locking = false
  110     muc_room_default_public_jids = true
  111 
  112 VirtualHost "auth.jitmeet.example.com"
  113     modules_enabled = {
  114         "limits_exception";
  115     }
  116     authentication = "internal_hashed"
  117 
  118 -- Proxy to jicofo's user JID, so that it doesn't have to register as a component.
  119 Component "focus.jitmeet.example.com" "client_proxy"
  120     target_address = "focusUser@auth.jitmeet.example.com"
  121 
  122 Component "speakerstats.jitmeet.example.com" "speakerstats_component"
  123     muc_component = "conference.jitmeet.example.com"
  124 
  125 Component "conferenceduration.jitmeet.example.com" "conference_duration_component"
  126     muc_component = "conference.jitmeet.example.com"
  127 
  128 Component "avmoderation.jitmeet.example.com" "av_moderation_component"
  129     muc_component = "conference.jitmeet.example.com"
  130 
  131 Component "lobby.jitmeet.example.com" "muc"
  132     storage = "memory"
  133     restrict_room_creation = true
  134     muc_room_locking = false
  135     muc_room_default_public_jids = true
  136     modules_enabled = {
  137         "muc_rate_limit";
  138         "polls";
  139     }
  140 
  141 -- Enables dial-in for Jitsi meet components customers
  142 -- Note: make sure you have the following packages installed: lua-basexx, liblua5.3-dev, libssl-dev, luarocks
  143 -- and execute $ sudo luarocks install luajwtjitsi 3.0-0
  144 VirtualHost "jigasi.meet.jitsi"
  145     enabled = false -- Jitsi meet components customers remove this line
  146     modules_enabled = {
  147       "ping";
  148       "bosh";
  149     }
  150     authentication = "token"
  151     app_id = "jitsi";
  152     asap_key_server = "https://jaas-public-keys.jitsi.net/jitsi-components/prod-8x8"
  153     asap_accepted_issuers = { "jaas-components" }
  154     asap_accepted_audiences = { "jigasi.jitmeet.example.com" }