"Fossies" - the Fresh Open Source Software Archive 
Member "jitsi-meet-6316/doc/debian/jitsi-meet-prosody/prosody.cfg.lua-jvb.example" (5 Jul 2022, 5673 Bytes) of package /linux/misc/jitsi-meet-6316.tar.gz:
As a special service "Fossies" has tried to format the requested text file into HTML format (style:
standard) with prefixed line numbers.
Alternatively you can here
view or
download the uninterpreted source code file.
1 plugin_paths = { "/usr/share/jitsi-meet/prosody-plugins/" }
2
3 -- domain mapper options, must at least have domain base set to use the mapper
4 muc_mapper_domain_base = "jitmeet.example.com";
5
6 external_service_secret = "__turnSecret__";
7 external_services = {
8 { type = "stun", host = "jitmeet.example.com", port = 3478 },
9 { type = "turn", host = "jitmeet.example.com", port = 3478, transport = "udp", secret = true, ttl = 86400, algorithm = "turn" },
10 { type = "turns", host = "jitmeet.example.com", port = 5349, transport = "tcp", secret = true, ttl = 86400, algorithm = "turn" }
11 };
12
13 cross_domain_bosh = false;
14 consider_bosh_secure = true;
15 -- https_ports = { }; -- Remove this line to prevent listening on port 5284
16
17 -- by default prosody 0.12 sends cors headers, if you want to disable it uncomment the following (the config is available on 0.12.1)
18 --http_cors_override = {
19 -- bosh = {
20 -- enabled = false;
21 -- };
22 -- websocket = {
23 -- enabled = false;
24 -- };
25 --}
26
27 -- https://ssl-config.mozilla.org/#server=haproxy&version=2.1&config=intermediate&openssl=1.1.0g&guideline=5.4
28 ssl = {
29 protocol = "tlsv1_2+";
30 ciphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"
31 }
32
33 unlimited_jids = {
34 "focusUser@auth.jitmeet.example.com",
35 "jvb@auth.jitmeet.example.com"
36 }
37
38 VirtualHost "jitmeet.example.com"
39 -- enabled = false -- Remove this line to enable this host
40 authentication = "anonymous"
41 -- Properties below are modified by jitsi-meet-tokens package config
42 -- and authentication above is switched to "token"
43 --app_id="example_app_id"
44 --app_secret="example_app_secret"
45 -- Assign this host a certificate for TLS, otherwise it would use the one
46 -- set in the global section (if any).
47 -- Note that old-style SSL on port 5223 only supports one certificate, and will always
48 -- use the global one.
49 ssl = {
50 key = "/etc/prosody/certs/jitmeet.example.com.key";
51 certificate = "/etc/prosody/certs/jitmeet.example.com.crt";
52 }
53 av_moderation_component = "avmoderation.jitmeet.example.com"
54 speakerstats_component = "speakerstats.jitmeet.example.com"
55 conference_duration_component = "conferenceduration.jitmeet.example.com"
56 -- we need bosh
57 modules_enabled = {
58 "bosh";
59 "pubsub";
60 "ping"; -- Enable mod_ping
61 "speakerstats";
62 "external_services";
63 "conference_duration";
64 "muc_lobby_rooms";
65 "muc_breakout_rooms";
66 "av_moderation";
67 }
68 c2s_require_encryption = false
69 lobby_muc = "lobby.jitmeet.example.com"
70 breakout_rooms_muc = "breakout.jitmeet.example.com"
71 main_muc = "conference.jitmeet.example.com"
72 -- muc_lobby_whitelist = { "recorder.jitmeet.example.com" } -- Here we can whitelist jibri to enter lobby enabled rooms
73
74 Component "conference.jitmeet.example.com" "muc"
75 restrict_room_creation = true
76 storage = "memory"
77 modules_enabled = {
78 "muc_meeting_id";
79 "muc_domain_mapper";
80 "polls";
81 --"token_verification";
82 "muc_rate_limit";
83 }
84 admins = { "focusUser@auth.jitmeet.example.com" }
85 muc_room_locking = false
86 muc_room_default_public_jids = true
87
88 Component "breakout.jitmeet.example.com" "muc"
89 restrict_room_creation = true
90 storage = "memory"
91 modules_enabled = {
92 "muc_meeting_id";
93 "muc_domain_mapper";
94 --"token_verification";
95 "muc_rate_limit";
96 "polls";
97 }
98 admins = { "focusUser@auth.jitmeet.example.com" }
99 muc_room_locking = false
100 muc_room_default_public_jids = true
101
102 -- internal muc component
103 Component "internal.auth.jitmeet.example.com" "muc"
104 storage = "memory"
105 modules_enabled = {
106 "ping";
107 }
108 admins = { "focusUser@auth.jitmeet.example.com", "jvb@auth.jitmeet.example.com" }
109 muc_room_locking = false
110 muc_room_default_public_jids = true
111
112 VirtualHost "auth.jitmeet.example.com"
113 modules_enabled = {
114 "limits_exception";
115 }
116 authentication = "internal_hashed"
117
118 -- Proxy to jicofo's user JID, so that it doesn't have to register as a component.
119 Component "focus.jitmeet.example.com" "client_proxy"
120 target_address = "focusUser@auth.jitmeet.example.com"
121
122 Component "speakerstats.jitmeet.example.com" "speakerstats_component"
123 muc_component = "conference.jitmeet.example.com"
124
125 Component "conferenceduration.jitmeet.example.com" "conference_duration_component"
126 muc_component = "conference.jitmeet.example.com"
127
128 Component "avmoderation.jitmeet.example.com" "av_moderation_component"
129 muc_component = "conference.jitmeet.example.com"
130
131 Component "lobby.jitmeet.example.com" "muc"
132 storage = "memory"
133 restrict_room_creation = true
134 muc_room_locking = false
135 muc_room_default_public_jids = true
136 modules_enabled = {
137 "muc_rate_limit";
138 "polls";
139 }
140
141 -- Enables dial-in for Jitsi meet components customers
142 -- Note: make sure you have the following packages installed: lua-basexx, liblua5.3-dev, libssl-dev, luarocks
143 -- and execute $ sudo luarocks install luajwtjitsi 3.0-0
144 VirtualHost "jigasi.meet.jitsi"
145 enabled = false -- Jitsi meet components customers remove this line
146 modules_enabled = {
147 "ping";
148 "bosh";
149 }
150 authentication = "token"
151 app_id = "jitsi";
152 asap_key_server = "https://jaas-public-keys.jitsi.net/jitsi-components/prod-8x8"
153 asap_accepted_issuers = { "jaas-components" }
154 asap_accepted_audiences = { "jigasi.jitmeet.example.com" }