mirror of https://github.com/jitsi/jitsi-meet
The Debian package's config files are the canonical example.pull/10159/head jitsi-meet_6463
parent
a6ce4fe368
commit
749f93ce1a
@ -1,8 +0,0 @@ |
||||
var config = { |
||||
hosts: { |
||||
domain: 'jitsi.example.com', |
||||
muc: 'conference.jitsi.example.com', // FIXME: use XEP-0030 |
||||
bridge: 'jitsi-videobridge.jitsi.example.com' // FIXME: use XEP-0030 |
||||
}, |
||||
bosh: '//jitsi.example.com/http-bind' // FIXME: use xep-0156 for that |
||||
}; |
@ -1,39 +0,0 @@ |
||||
server { |
||||
listen 80; |
||||
|
||||
server_name jitsi.example.com; |
||||
# set the root |
||||
root /srv/jitsi.example.com; |
||||
index index.html; |
||||
|
||||
location ~ ^/([a-zA-Z0-9=\?]+)$ { |
||||
rewrite ^/(.*)$ / break; |
||||
} |
||||
|
||||
location / { |
||||
ssi on; |
||||
} |
||||
|
||||
gzip on; |
||||
gzip_types text/plain text/css application/javascript application/json image/x-icon application/octet-stream application/wasm; |
||||
gzip_vary on; |
||||
gzip_proxied no-cache no-store private expired auth; |
||||
gzip_min_length 512; |
||||
|
||||
# BOSH |
||||
location /http-bind { |
||||
proxy_pass http://localhost:5280/http-bind; |
||||
proxy_set_header X-Forwarded-For $remote_addr; |
||||
proxy_set_header Host $http_host; |
||||
} |
||||
|
||||
# xmpp websockets |
||||
location /xmpp-websocket { |
||||
proxy_pass http://localhost:5280/xmpp-websocket; |
||||
proxy_http_version 1.1; |
||||
proxy_set_header Upgrade $http_upgrade; |
||||
proxy_set_header Connection "upgrade"; |
||||
proxy_set_header Host $host; |
||||
tcp_nodelay on; |
||||
} |
||||
} |
@ -1,14 +0,0 @@ |
||||
var subdomain = "<!--# echo var="subdomain" default="" -->"; |
||||
if (subdomain) { |
||||
subdomain = subdomain.substr(0,subdomain.length-1).split('.').join('_').toLowerCase() + '.'; |
||||
} |
||||
|
||||
var config = { |
||||
hosts: { |
||||
domain: 'jitsi.example.com', |
||||
muc: 'conference.'+subdomain+'jitsi.example.com', // FIXME: use XEP-0030 |
||||
focus: 'focus.jitsi.example.com', |
||||
}, |
||||
bosh: '//jitsi.example.com/http-bind', // FIXME: use xep-0156 for that |
||||
websocket: 'wss://jitsi.example.com/xmpp-websocket' |
||||
}; |
@ -1,76 +0,0 @@ |
||||
server { |
||||
listen 80; |
||||
|
||||
server_name jitsi.example.com; |
||||
# set the root |
||||
root /srv/jitsi.example.com; |
||||
# ssi on with javascript for multidomain variables in config.js |
||||
ssi on; |
||||
ssi_types application/x-javascript application/javascript; |
||||
index index.html; |
||||
set $prefix ""; |
||||
|
||||
# BOSH |
||||
location /http-bind { |
||||
proxy_pass http://localhost:5280/http-bind; |
||||
proxy_set_header X-Forwarded-For $remote_addr; |
||||
proxy_set_header Host $http_host; |
||||
} |
||||
|
||||
# xmpp websockets |
||||
location /xmpp-websocket { |
||||
proxy_pass http://localhost:5280/xmpp-websocket; |
||||
proxy_http_version 1.1; |
||||
proxy_set_header Upgrade $http_upgrade; |
||||
proxy_set_header Connection "upgrade"; |
||||
proxy_set_header Host $host; |
||||
tcp_nodelay on; |
||||
} |
||||
|
||||
gzip on; |
||||
gzip_types text/plain text/css application/javascript application/json image/x-icon application/octet-stream application/wasm; |
||||
gzip_vary on; |
||||
gzip_proxied no-cache no-store private expired auth; |
||||
gzip_min_length 512; |
||||
|
||||
location ~ ^/([^/?&:'"]+)$ { |
||||
try_files $uri @root_path; |
||||
} |
||||
|
||||
location @root_path { |
||||
rewrite ^/(.*)$ / break; |
||||
} |
||||
|
||||
location ~ ^/([^/?&:'"]+)/config.js$ |
||||
{ |
||||
set $subdomain "$1."; |
||||
set $subdir "$1/"; |
||||
|
||||
alias /etc/jitsi/meet/{{jitsi_meet_domain_name}}-config.js; |
||||
} |
||||
|
||||
# Anything that didn't match above, and isn't a real file, assume it's a room name and redirect to / |
||||
location ~ ^/([^/?&:'"]+)/(.*)$ { |
||||
set $subdomain "$1."; |
||||
set $subdir "$1/"; |
||||
rewrite ^/([^/?&:'"]+)/(.*)$ /$2; |
||||
} |
||||
|
||||
# BOSH for subdomains |
||||
location ~ ^/([^/?&:'"]+)/http-bind { |
||||
set $subdomain "$1."; |
||||
set $subdir "$1/"; |
||||
set $prefix "$1"; |
||||
|
||||
rewrite ^/(.*)$ /http-bind; |
||||
} |
||||
|
||||
# websockets for subdomains |
||||
location ~ ^/([^/?&:'"]+)/xmpp-websocket { |
||||
set $subdomain "$1."; |
||||
set $subdir "$1/"; |
||||
set $prefix "$1"; |
||||
|
||||
rewrite ^/(.*)$ /xmpp-websocket; |
||||
} |
||||
} |
@ -1,218 +0,0 @@ |
||||
-- Prosody XMPP Server Configuration |
||||
-- |
||||
-- Information on configuring Prosody can be found on our |
||||
-- website at http://prosody.im/doc/configure |
||||
-- |
||||
-- Tip: You can check that the syntax of this file is correct |
||||
-- when you have finished by running: prosodyctl check config |
||||
-- If there are any errors, it will let you know what and where |
||||
-- they are, otherwise it will keep quiet. |
||||
-- |
||||
-- Good luck, and happy Jabbering! |
||||
|
||||
|
||||
---------- Server-wide settings ---------- |
||||
-- Settings in this section apply to the whole server and are the default settings |
||||
-- for any virtual hosts |
||||
|
||||
-- This is a (by default, empty) list of accounts that are admins |
||||
-- for the server. Note that you must create the accounts separately |
||||
-- (see http://prosody.im/doc/creating_accounts for info) |
||||
-- Example: admins = { "user1@example.com", "user2@example.net" } |
||||
admins = { } |
||||
daemonize = true |
||||
cross_domain_bosh = true; |
||||
component_ports = { 5347 } |
||||
--component_interface = "192.168.0.10" |
||||
|
||||
-- Enable use of libevent for better performance under high load |
||||
-- For more information see: http://prosody.im/doc/libevent |
||||
--use_libevent = true |
||||
|
||||
-- This is the list of modules Prosody will load on startup. |
||||
-- It looks for mod_modulename.lua in the plugins folder, so make sure that exists too. |
||||
-- Documentation on modules can be found at: http://prosody.im/doc/modules |
||||
modules_enabled = { |
||||
|
||||
-- Generally required |
||||
"roster"; -- Allow users to have a roster. Recommended ;) |
||||
"saslauth"; -- Authentication for clients and servers. Recommended if you want to log in. |
||||
"tls"; -- Add support for secure TLS on c2s/s2s connections |
||||
"dialback"; -- s2s dialback support |
||||
"disco"; -- Service discovery |
||||
"posix"; -- POSIX functionality, sends server to background, enables syslog, etc. |
||||
|
||||
-- Not essential, but recommended |
||||
"private"; -- Private XML storage (for room bookmarks, etc.) |
||||
"vcard"; -- Allow users to set vCards |
||||
|
||||
-- These are commented by default as they have a performance impact |
||||
--"privacy"; -- Support privacy lists |
||||
"compression"; -- Stream compression (requires the lua-zlib package installed) |
||||
|
||||
-- Nice to have |
||||
"version"; -- Replies to server version requests |
||||
"uptime"; -- Report how long server has been running |
||||
"time"; -- Let others know the time here on this server |
||||
"ping"; -- Replies to XMPP pings with pongs |
||||
"pep"; -- Enables users to publish their mood, activity, playing music and more |
||||
"register"; -- Allow users to register on this server using a client and change passwords |
||||
|
||||
-- Admin interfaces |
||||
"admin_adhoc"; -- Allows administration via an XMPP client that supports ad-hoc commands |
||||
--"admin_telnet"; -- Opens telnet console interface on localhost port 5582 |
||||
|
||||
-- HTTP modules |
||||
"bosh"; -- Enable BOSH clients, aka "Jabber over HTTP" |
||||
--"http_files"; -- Serve static files from a directory over HTTP |
||||
|
||||
-- Other specific functionality |
||||
--"groups"; -- Shared roster support |
||||
--"announce"; -- Send announcement to all online users |
||||
--"welcome"; -- Welcome users who register accounts |
||||
--"watchregistrations"; -- Alert admins of registrations |
||||
--"motd"; -- Send a message to users when they log in |
||||
--"legacyauth"; -- Legacy authentication. Only used by some old clients and bots. |
||||
|
||||
-- jitsi |
||||
"smacks"; |
||||
"carbons"; |
||||
"mam"; |
||||
"lastactivity"; |
||||
"offline"; |
||||
"pubsub"; |
||||
"adhoc"; |
||||
"websocket"; |
||||
"http_altconnect"; |
||||
} |
||||
|
||||
-- domain mapper options, must at least have domain base set to use the mapper |
||||
muc_mapper_domain_base = "jitsi.example.com"; |
||||
|
||||
-- These modules are auto-loaded, but should you want |
||||
-- to disable them then uncomment them here: |
||||
modules_disabled = { |
||||
--"offline"; -- Store offline messages |
||||
--"c2s"; -- Handle client connections |
||||
--"s2s"; -- Handle server-to-server connections |
||||
} |
||||
|
||||
-- Disable account creation by default, for security |
||||
-- For more information see http://prosody.im/doc/creating_accounts |
||||
allow_registration = false |
||||
|
||||
-- These are the SSL/TLS-related settings. If you don't want |
||||
-- to use SSL/TLS, you may comment or remove this |
||||
ssl = { |
||||
key = "/etc/prosody/certs/localhost.key"; |
||||
certificate = "/etc/prosody/certs/localhost.crt"; |
||||
} |
||||
|
||||
-- Force clients to use encrypted connections? This option will |
||||
-- prevent clients from authenticating unless they are using encryption. |
||||
|
||||
--c2s_require_encryption = true |
||||
|
||||
-- Force certificate authentication for server-to-server connections? |
||||
-- This provides ideal security, but requires servers you communicate |
||||
-- with to support encryption AND present valid, trusted certificates. |
||||
-- NOTE: Your version of LuaSec must support certificate verification! |
||||
-- For more information see http://prosody.im/doc/s2s#security |
||||
|
||||
--s2s_secure_auth = false |
||||
|
||||
-- Many servers don't support encryption or have invalid or self-signed |
||||
-- certificates. You can list domains here that will not be required to |
||||
-- authenticate using certificates. They will be authenticated using DNS. |
||||
|
||||
--s2s_insecure_domains = { "gmail.com" } |
||||
|
||||
-- Even if you leave s2s_secure_auth disabled, you can still require valid |
||||
-- certificates for some domains by specifying a list here. |
||||
|
||||
--s2s_secure_domains = { "jabber.org" } |
||||
|
||||
-- Required for init scripts and prosodyctl |
||||
pidfile = "/var/run/prosody/prosody.pid" |
||||
|
||||
-- Select the authentication backend to use. The 'internal' providers |
||||
-- use Prosody's configured data storage to store the authentication data. |
||||
-- To allow Prosody to offer secure authentication mechanisms to clients, the |
||||
-- default provider stores passwords in plaintext. If you do not trust your |
||||
-- server please see http://prosody.im/doc/modules/mod_auth_internal_hashed |
||||
-- for information about using the hashed backend. |
||||
|
||||
authentication = "internal_hashed" |
||||
|
||||
-- Select the storage backend to use. By default Prosody uses flat files |
||||
-- in its configured data directory, but it also supports more backends |
||||
-- through modules. An "sql" backend is included by default, but requires |
||||
-- additional dependencies. See http://prosody.im/doc/storage for more info. |
||||
|
||||
--storage = "sql" -- Default is "internal" |
||||
|
||||
-- For the "sql" backend, you can uncomment *one* of the below to configure: |
||||
--sql = { driver = "SQLite3", database = "prosody.sqlite" } -- Default. 'database' is the filename. |
||||
--sql = { driver = "MySQL", database = "prosody", username = "prosody", password = "secret", host = "localhost" } |
||||
--sql = { driver = "PostgreSQL", database = "prosody", username = "prosody", password = "secret", host = "localhost" } |
||||
|
||||
-- Logging configuration |
||||
-- For advanced logging see http://prosody.im/doc/logging |
||||
log = { |
||||
info = "/var/log/prosody/prosody.log"; -- Change 'info' to 'debug' for verbose logging |
||||
error = "/var/log/prosody/prosody.err"; |
||||
"*syslog"; |
||||
} |
||||
|
||||
----------- Virtual hosts ----------- |
||||
-- You need to add a VirtualHost entry for each domain you wish Prosody to serve. |
||||
-- Settings under each VirtualHost entry apply *only* to that host. |
||||
|
||||
--VirtualHost "localhost" |
||||
|
||||
VirtualHost "jitsi.example.com" |
||||
-- enabled = false -- Remove this line to enable this host |
||||
authentication = "anonymous" |
||||
-- Assign this host a certificate for TLS, otherwise it would use the one |
||||
-- set in the global section (if any). |
||||
-- Note that old-style SSL on port 5223 only supports one certificate, and will always |
||||
-- use the global one. |
||||
ssl = { |
||||
key = "/var/lib/prosody/jitsi.example.com.key"; |
||||
certificate = "/var/lib/prosody/jitsi.example.com.crt"; |
||||
} |
||||
|
||||
c2s_require_encryption = false |
||||
|
||||
VirtualHost "auth.jitsi.example.com" |
||||
ssl = { |
||||
key = "/var/lib/prosody/auth.jitsi.example.com.key"; |
||||
certificate = "/var/lib/prosody/auth.jitsi.example.com.crt"; |
||||
} |
||||
authentication = "internal_hashed" |
||||
|
||||
------ Components ------ |
||||
-- You can specify components to add hosts that provide special services, |
||||
-- like multi-user conferences, and transports. |
||||
-- For more information on components, see http://prosody.im/doc/components |
||||
|
||||
---Set up a MUC (multi-user chat) room server on conference.example.com: |
||||
--Component "conference.example.com" "muc" |
||||
|
||||
-- Set up a SOCKS5 bytestream proxy for server-proxied file transfers: |
||||
--Component "proxy.example.com" "proxy65" |
||||
|
||||
---Set up an external component (default component port is 5347) |
||||
-- |
||||
-- External components allow adding various services, such as gateways/ |
||||
-- transports to other networks like ICQ, MSN and Yahoo. For more info |
||||
-- see: http://prosody.im/doc/components#adding_an_external_component |
||||
-- |
||||
--Component "gateway.example.com" |
||||
-- component_secret = "password" |
||||
|
||||
Component "conference.jitsi.example.com" "muc" |
||||
modules_enabled = { "muc_domain_mapper" } |
||||
|
||||
Component "jitsi-videobridge.jitsi.example.com" |
||||
component_secret = "IfGaish6" |
@ -1,54 +0,0 @@ |
||||
user www-data; |
||||
worker_processes 1; |
||||
|
||||
error_log /var/log/nginx/error.log; |
||||
pid /var/run/nginx.pid; |
||||
|
||||
events { |
||||
worker_connections 1024; |
||||
# multi_accept on; |
||||
} |
||||
|
||||
http { |
||||
include /etc/nginx/mime.types; |
||||
|
||||
access_log /var/log/nginx/access.log; |
||||
|
||||
sendfile on; |
||||
#tcp_nopush on; |
||||
|
||||
#keepalive_timeout 0; |
||||
keepalive_timeout 65; |
||||
tcp_nodelay on; |
||||
|
||||
tcp_nopush on; |
||||
types_hash_max_size 2048; |
||||
server_names_hash_bucket_size 64; |
||||
|
||||
gzip on; |
||||
gzip_disable "MSIE [1-6]\.(?!.*SV1)"; |
||||
|
||||
include /etc/nginx/conf.d/*.conf; |
||||
include /etc/nginx/sites-enabled/*; |
||||
} |
||||
|
||||
# mail { |
||||
# # See sample authentication script at: |
||||
# # http://wiki.nginx.org/NginxImapAuthenticateWithApachePhpScript |
||||
# |
||||
# # auth_http localhost/auth.php; |
||||
# # pop3_capabilities "TOP" "USER"; |
||||
# # imap_capabilities "IMAP4rev1" "UIDPLUS"; |
||||
# |
||||
# server { |
||||
# listen localhost:110; |
||||
# protocol pop3; |
||||
# proxy on; |
||||
# } |
||||
# |
||||
# server { |
||||
# listen localhost:143; |
||||
# protocol imap; |
||||
# proxy on; |
||||
# } |
||||
# } |
@ -1,214 +0,0 @@ |
||||
-- Prosody XMPP Server Configuration |
||||
-- |
||||
-- Information on configuring Prosody can be found on our |
||||
-- website at http://prosody.im/doc/configure |
||||
-- |
||||
-- Tip: You can check that the syntax of this file is correct |
||||
-- when you have finished by running: prosodyctl check config |
||||
-- If there are any errors, it will let you know what and where |
||||
-- they are, otherwise it will keep quiet. |
||||
-- |
||||
-- Good luck, and happy Jabbering! |
||||
|
||||
|
||||
---------- Server-wide settings ---------- |
||||
-- Settings in this section apply to the whole server and are the default settings |
||||
-- for any virtual hosts |
||||
|
||||
-- This is a (by default, empty) list of accounts that are admins |
||||
-- for the server. Note that you must create the accounts separately |
||||
-- (see http://prosody.im/doc/creating_accounts for info) |
||||
-- Example: admins = { "user1@example.com", "user2@example.net" } |
||||
admins = { } |
||||
daemonize = true |
||||
cross_domain_bosh = true; |
||||
component_ports = { 5347 } |
||||
--component_interface = "192.168.0.10" |
||||
|
||||
-- Enable use of libevent for better performance under high load |
||||
-- For more information see: http://prosody.im/doc/libevent |
||||
--use_libevent = true |
||||
|
||||
-- This is the list of modules Prosody will load on startup. |
||||
-- It looks for mod_modulename.lua in the plugins folder, so make sure that exists too. |
||||
-- Documentation on modules can be found at: http://prosody.im/doc/modules |
||||
modules_enabled = { |
||||
|
||||
-- Generally required |
||||
"roster"; -- Allow users to have a roster. Recommended ;) |
||||
"saslauth"; -- Authentication for clients and servers. Recommended if you want to log in. |
||||
"tls"; -- Add support for secure TLS on c2s/s2s connections |
||||
"dialback"; -- s2s dialback support |
||||
"disco"; -- Service discovery |
||||
"posix"; -- POSIX functionality, sends server to background, enables syslog, etc. |
||||
|
||||
-- Not essential, but recommended |
||||
"private"; -- Private XML storage (for room bookmarks, etc.) |
||||
"vcard"; -- Allow users to set vCards |
||||
|
||||
-- These are commented by default as they have a performance impact |
||||
--"privacy"; -- Support privacy lists |
||||
"compression"; -- Stream compression (requires the lua-zlib package installed) |
||||
|
||||
-- Nice to have |
||||
"version"; -- Replies to server version requests |
||||
"uptime"; -- Report how long server has been running |
||||
"time"; -- Let others know the time here on this server |
||||
"ping"; -- Replies to XMPP pings with pongs |
||||
"pep"; -- Enables users to publish their mood, activity, playing music and more |
||||
"register"; -- Allow users to register on this server using a client and change passwords |
||||
|
||||
-- Admin interfaces |
||||
"admin_adhoc"; -- Allows administration via an XMPP client that supports ad-hoc commands |
||||
--"admin_telnet"; -- Opens telnet console interface on localhost port 5582 |
||||
|
||||
-- HTTP modules |
||||
"bosh"; -- Enable BOSH clients, aka "Jabber over HTTP" |
||||
--"http_files"; -- Serve static files from a directory over HTTP |
||||
|
||||
-- Other specific functionality |
||||
--"groups"; -- Shared roster support |
||||
--"announce"; -- Send announcement to all online users |
||||
--"welcome"; -- Welcome users who register accounts |
||||
--"watchregistrations"; -- Alert admins of registrations |
||||
--"motd"; -- Send a message to users when they log in |
||||
--"legacyauth"; -- Legacy authentication. Only used by some old clients and bots. |
||||
|
||||
-- jitsi |
||||
"smacks"; |
||||
"carbons"; |
||||
"mam"; |
||||
"lastactivity"; |
||||
"offline"; |
||||
"pubsub"; |
||||
"adhoc"; |
||||
"websocket"; |
||||
"http_altconnect"; |
||||
} |
||||
|
||||
-- These modules are auto-loaded, but should you want |
||||
-- to disable them then uncomment them here: |
||||
modules_disabled = { |
||||
--"offline"; -- Store offline messages |
||||
--"c2s"; -- Handle client connections |
||||
--"s2s"; -- Handle server-to-server connections |
||||
} |
||||
|
||||
-- Disable account creation by default, for security |
||||
-- For more information see http://prosody.im/doc/creating_accounts |
||||
allow_registration = false |
||||
|
||||
-- These are the SSL/TLS-related settings. If you don't want |
||||
-- to use SSL/TLS, you may comment or remove this |
||||
ssl = { |
||||
key = "/etc/prosody/certs/localhost.key"; |
||||
certificate = "/etc/prosody/certs/localhost.crt"; |
||||
} |
||||
|
||||
-- Force clients to use encrypted connections? This option will |
||||
-- prevent clients from authenticating unless they are using encryption. |
||||
|
||||
--c2s_require_encryption = true |
||||
|
||||
-- Force certificate authentication for server-to-server connections? |
||||
-- This provides ideal security, but requires servers you communicate |
||||
-- with to support encryption AND present valid, trusted certificates. |
||||
-- NOTE: Your version of LuaSec must support certificate verification! |
||||
-- For more information see http://prosody.im/doc/s2s#security |
||||
|
||||
--s2s_secure_auth = false |
||||
|
||||
-- Many servers don't support encryption or have invalid or self-signed |
||||
-- certificates. You can list domains here that will not be required to |
||||
-- authenticate using certificates. They will be authenticated using DNS. |
||||
|
||||
--s2s_insecure_domains = { "gmail.com" } |
||||
|
||||
-- Even if you leave s2s_secure_auth disabled, you can still require valid |
||||
-- certificates for some domains by specifying a list here. |
||||
|
||||
--s2s_secure_domains = { "jabber.org" } |
||||
|
||||
-- Required for init scripts and prosodyctl |
||||
pidfile = "/var/run/prosody/prosody.pid" |
||||
|
||||
-- Select the authentication backend to use. The 'internal' providers |
||||
-- use Prosody's configured data storage to store the authentication data. |
||||
-- To allow Prosody to offer secure authentication mechanisms to clients, the |
||||
-- default provider stores passwords in plaintext. If you do not trust your |
||||
-- server please see http://prosody.im/doc/modules/mod_auth_internal_hashed |
||||
-- for information about using the hashed backend. |
||||
|
||||
authentication = "internal_hashed" |
||||
|
||||
-- Select the storage backend to use. By default Prosody uses flat files |
||||
-- in its configured data directory, but it also supports more backends |
||||
-- through modules. An "sql" backend is included by default, but requires |
||||
-- additional dependencies. See http://prosody.im/doc/storage for more info. |
||||
|
||||
--storage = "sql" -- Default is "internal" |
||||
|
||||
-- For the "sql" backend, you can uncomment *one* of the below to configure: |
||||
--sql = { driver = "SQLite3", database = "prosody.sqlite" } -- Default. 'database' is the filename. |
||||
--sql = { driver = "MySQL", database = "prosody", username = "prosody", password = "secret", host = "localhost" } |
||||
--sql = { driver = "PostgreSQL", database = "prosody", username = "prosody", password = "secret", host = "localhost" } |
||||
|
||||
-- Logging configuration |
||||
-- For advanced logging see http://prosody.im/doc/logging |
||||
log = { |
||||
info = "/var/log/prosody/prosody.log"; -- Change 'info' to 'debug' for verbose logging |
||||
error = "/var/log/prosody/prosody.err"; |
||||
"*syslog"; |
||||
} |
||||
|
||||
----------- Virtual hosts ----------- |
||||
-- You need to add a VirtualHost entry for each domain you wish Prosody to serve. |
||||
-- Settings under each VirtualHost entry apply *only* to that host. |
||||
|
||||
--VirtualHost "localhost" |
||||
|
||||
VirtualHost "jitsi.example.com" |
||||
-- enabled = false -- Remove this line to enable this host |
||||
authentication = "anonymous" |
||||
-- Assign this host a certificate for TLS, otherwise it would use the one |
||||
-- set in the global section (if any). |
||||
-- Note that old-style SSL on port 5223 only supports one certificate, and will always |
||||
-- use the global one. |
||||
ssl = { |
||||
key = "/var/lib/prosody/jitsi.example.com.key"; |
||||
certificate = "/var/lib/prosody/jitsi.example.com.crt"; |
||||
} |
||||
|
||||
c2s_require_encryption = false |
||||
|
||||
VirtualHost "auth.jitsi.example.com" |
||||
ssl = { |
||||
key = "/var/lib/prosody/auth.jitsi.example.com.key"; |
||||
certificate = "/var/lib/prosody/auth.jitsi.example.com.crt"; |
||||
} |
||||
authentication = "internal_hashed" |
||||
|
||||
------ Components ------ |
||||
-- You can specify components to add hosts that provide special services, |
||||
-- like multi-user conferences, and transports. |
||||
-- For more information on components, see http://prosody.im/doc/components |
||||
|
||||
---Set up a MUC (multi-user chat) room server on conference.example.com: |
||||
--Component "conference.example.com" "muc" |
||||
|
||||
-- Set up a SOCKS5 bytestream proxy for server-proxied file transfers: |
||||
--Component "proxy.example.com" "proxy65" |
||||
|
||||
---Set up an external component (default component port is 5347) |
||||
-- |
||||
-- External components allow adding various services, such as gateways/ |
||||
-- transports to other networks like ICQ, MSN and Yahoo. For more info |
||||
-- see: http://prosody.im/doc/components#adding_an_external_component |
||||
-- |
||||
--Component "gateway.example.com" |
||||
-- component_secret = "password" |
||||
|
||||
Component "conference.jitsi.example.com" "muc" |
||||
|
||||
Component "jitsi-videobridge.jitsi.example.com" |
||||
component_secret = "IfGaish6" |
@ -1,32 +0,0 @@ |
||||
# Jitsi Conference Focus settings |
||||
# sets the host name of the XMPP server |
||||
JICOFO_HOST=localhost |
||||
|
||||
# sets the XMPP domain (default: none) |
||||
JICOFO_HOSTNAME=meet.example.com |
||||
|
||||
# sets the secret used to authenticate as an XMPP component |
||||
JICOFO_SECRET=$JICOFO_SECRET |
||||
|
||||
# sets the port to use for the XMPP component connection |
||||
JICOFO_PORT=5347 |
||||
|
||||
# sets the XMPP domain name to use for XMPP user logins |
||||
JICOFO_AUTH_DOMAIN=auth.meet.example.com |
||||
|
||||
# sets the username to use for XMPP user logins |
||||
JICOFO_AUTH_USER=focus |
||||
|
||||
# sets the password to use for XMPP user logins |
||||
JICOFO_AUTH_PASSWORD=$JICOFO_PASSWORD |
||||
|
||||
# extra options to pass to the jicofo daemon |
||||
JICOFO_OPTS="" |
||||
|
||||
# adds java system props that are passed to jicofo (default are for home and logging config file) |
||||
JAVA_SYS_PROPS=" \ |
||||
-Dnet.java.sip.communicator.SC_HOME_DIR_LOCATION=/etc/jitsi \ |
||||
-Dnet.java.sip.communicator.SC_HOME_DIR_NAME=jicofo \ |
||||
-Dnet.java.sip.communicator.SC_LOG_DIR_LOCATION=/var/log/jitsi \ |
||||
-Djava.util.logging.config.file=/etc/jitsi/jicofo/logging.properties \ |
||||
" |
@ -1,6 +0,0 @@ |
||||
|
||||
org.jitsi.jicofo.BRIDGE_MUC=JvbBrewery@internal.auth.meet.example.com |
||||
org.jitsi.jicofo.ALWAYS_TRUST_MODE_ENABLED=true |
||||
|
||||
org.jitsi.jicofo.jibri.BREWERY=JibriBrewery@internal.auth.meet.example.com |
||||
org.jitsi.jicofo.jibri.PENDING_TIMEOUT=90 |
@ -1,87 +0,0 @@ |
||||
plugin_paths = { "/usr/share/jitsi-meet/prosody-plugins/" } |
||||
|
||||
-- domain mapper options, must at least have domain base set to use the mapper |
||||
muc_mapper_domain_base = "meet.example.com"; |
||||
|
||||
turncredentials_secret = "turncredentials_secret_test"; |
||||
|
||||
turncredentials = { |
||||
{ type = "stun", host = "meet.example.com", port = "443" }, |
||||
{ type = "turn", host = "meet.example.com", port = "443", transport = "udp" }, |
||||
{ type = "turns", host = "meet.example.com", port = "443", transport = "tcp" } |
||||
}; |
||||
|
||||
cross_domain_bosh = false; |
||||
consider_bosh_secure = true; |
||||
|
||||
VirtualHost "meet.example.com" |
||||
-- enabled = false -- Remove this line to enable this host |
||||
authentication = "anonymous" |
||||
-- Properties below are modified by jitsi-meet-tokens package config |
||||
-- and authentication above is switched to "token" |
||||
--app_id="example_app_id" |
||||
--app_secret="example_app_secret" |
||||
-- Assign this host a certificate for TLS, otherwise it would use the one |
||||
-- set in the global section (if any). |
||||
-- Note that old-style SSL on port 5223 only supports one certificate, and will always |
||||
-- use the global one. |
||||
ssl = { |
||||
key = "/etc/prosody/certs/meet.example.com.key"; |
||||
certificate = "/etc/prosody/certs/meet.example.com.crt"; |
||||
} |
||||
speakerstats_component = "speakerstats.meet.example.com" |
||||
conference_duration_component = "conferenceduration.meet.example.com" |
||||
-- we need bosh |
||||
modules_enabled = { |
||||
"bosh"; |
||||
"pubsub"; |
||||
"ping"; -- Enable mod_ping |
||||
"speakerstats"; |
||||
"turncredentials"; |
||||
"conference_duration"; |
||||
} |
||||
c2s_require_encryption = false |
||||
|
||||
Component "conference.meet.example.com" "muc" |
||||
storage = "memory" |
||||
modules_enabled = { |
||||
"muc_meeting_id"; |
||||
"muc_domain_mapper"; |
||||
--"token_verification"; |
||||
} |
||||
admins = { "focus@auth.meet.example.com" } |
||||
muc_room_locking = false |
||||
muc_room_default_public_jids = true |
||||
|
||||
-- internal muc component |
||||
-- Note: This is also used from jibris |
||||
Component "internal.auth.meet.example.com" "muc" |
||||
storage = "memory" |
||||
modules_enabled = { |
||||
"ping"; |
||||
} |
||||
admins = { "focus@auth.meet.example.com", "jvb@auth.meet.example.com" } |
||||
|
||||
VirtualHost "auth.meet.example.com" |
||||
ssl = { |
||||
key = "/etc/prosody/certs/auth.meet.example.com.key"; |
||||
certificate = "/etc/prosody/certs/auth.meet.example.com.crt"; |
||||
} |
||||
authentication = "internal_hashed" |
||||
|
||||
Component "focus.meet.example.com" |
||||
component_secret = "jicofo_secret_test" |
||||
|
||||
Component "speakerstats.meet.example.com" "speakerstats_component" |
||||
muc_component = "conference.meet.example.com" |
||||
|
||||
Component "conferenceduration.meet.example.com" "conference_duration_component" |
||||
muc_component = "conference.meet.example.com" |
||||
|
||||
-- for Jibri |
||||
VirtualHost "recorder.meet.example.com" |
||||
modules_enabled = { |
||||
"ping"; |
||||
} |
||||
authentication = "internal_hashed" |
||||
c2s_require_encryption = false |
@ -1,112 +0,0 @@ |
||||
-- Prosody XMPP Server Configuration |
||||
|
||||
---------- Server-wide settings ---------- |
||||
-- Settings in this section apply to the whole server and are the default settings |
||||
-- for any virtual hosts |
||||
|
||||
admins = { } |
||||
|
||||
network_backend = "epoll" |
||||
|
||||
-- This is the list of modules Prosody will load on startup. |
||||
-- It looks for mod_modulename.lua in the plugins folder, so make sure that exists too. |
||||
-- Documentation for bundled modules can be found at: https://prosody.im/doc/modules |
||||
modules_enabled = { |
||||
|
||||
-- Generally required |
||||
"roster"; -- Allow users to have a roster. Recommended ;) |
||||
"saslauth"; -- Authentication for clients and servers. Recommended if you want to log in. |
||||
"tls"; -- Add support for secure TLS on c2s/s2s connections |
||||
"dialback"; -- s2s dialback support |
||||
"disco"; -- Service discovery |
||||
|
||||
-- Not essential, but recommended |
||||
"carbons"; -- Keep multiple clients in sync |
||||
"pep"; -- Enables users to publish their avatar, mood, activity, playing music and more |
||||
"private"; -- Private XML storage (for room bookmarks, etc.) |
||||
"blocklist"; -- Allow users to block communications with other users |
||||
"vcard4"; -- User profiles (stored in PEP) |
||||
"vcard_legacy"; -- Conversion between legacy vCard and PEP Avatar, vcard |
||||
|
||||
-- Nice to have |
||||
"version"; -- Replies to server version requests |
||||
"uptime"; -- Report how long server has been running |
||||
"time"; -- Let others know the time here on this server |
||||
"ping"; -- Replies to XMPP pings with pongs |
||||
"register"; -- Allow users to register on this server using a client and change passwords |
||||
--"mam"; -- Store messages in an archive and allow users to access it |
||||
--"csi_simple"; -- Simple Mobile optimizations |
||||
|
||||
-- Admin interfaces |
||||
"admin_adhoc"; -- Allows administration via an XMPP client that supports ad-hoc commands |
||||
--"admin_telnet"; -- Opens telnet console interface on localhost port 5582 |
||||
|
||||
-- HTTP modules |
||||
--"bosh"; -- Enable BOSH clients, aka "Jabber over HTTP" |
||||
--"websocket"; -- XMPP over WebSockets |
||||
--"http_files"; -- Serve static files from a directory over HTTP |
||||
|
||||
-- Other specific functionality |
||||
--"limits"; -- Enable bandwidth limiting for XMPP connections |
||||
--"groups"; -- Shared roster support |
||||
--"server_contact_info"; -- Publish contact information for this service |
||||
--"announce"; -- Send announcement to all online users |
||||
--"welcome"; -- Welcome users who register accounts |
||||
--"watchregistrations"; -- Alert admins of registrations |
||||
--"motd"; -- Send a message to users when they log in |
||||
--"legacyauth"; -- Legacy authentication. Only used by some old clients and bots. |
||||
--"proxy65"; -- Enables a file transfer proxy service which clients behind NAT can use |
||||
} |
||||
|
||||
-- These modules are auto-loaded, but should you want |
||||
-- to disable them then uncomment them here: |
||||
modules_disabled = { |
||||
--"offline"; -- Store offline messages |
||||
--"c2s"; -- Handle client connections |
||||
--"s2s"; -- Handle server-to-server connections |
||||
--"posix"; -- POSIX functionality, sends server to background, enables syslog, etc. |
||||
} |
||||
|
||||
-- Disable account creation by default, for security |
||||
-- For more information see https://prosody.im/doc/creating_accounts |
||||
allow_registration = false |
||||
|
||||
-- Force clients to use encrypted connections? This option will |
||||
-- prevent clients from authenticating unless they are using encryption. |
||||
|
||||
c2s_require_encryption = true |
||||
|
||||
-- Force servers to use encrypted connections? This option will |
||||
-- prevent servers from authenticating unless they are using encryption. |
||||
|
||||
s2s_require_encryption = true |
||||
|
||||
-- Force certificate authentication for server-to-server connections? |
||||
|
||||
s2s_secure_auth = false |
||||
|
||||
-- Required for init scripts and prosodyctl |
||||
pidfile = "/var/run/prosody/prosody.pid" |
||||
|
||||
-- Select the authentication backend to use. The 'internal' providers |
||||
-- use Prosody's configured data storage to store the authentication data. |
||||
|
||||
authentication = "internal_hashed" |
||||
|
||||
archive_expires_after = "1w" -- Remove archived messages after 1 week |
||||
|
||||
-- Logging configuration |
||||
-- For advanced logging see https://prosody.im/doc/logging |
||||
log = { |
||||
info = "/var/log/prosody/prosody.log"; -- Change 'info' to 'debug' for verbose logging |
||||
error = "/var/log/prosody/prosody.err"; |
||||
--"*syslog"; -- Uncomment this for logging to syslog |
||||
--"*console"; -- Log to the console, useful for debugging with daemonize=false |
||||
} |
||||
|
||||
-- Location of directory to find certificates in (relative to main config file): |
||||
certificates = "certs" |
||||
|
||||
VirtualHost "localhost" |
||||
|
||||
Include "conf.d/*.cfg.lua" |
@ -1,24 +0,0 @@ |
||||
# Jitsi Videobridge settings |
||||
|
||||
# sets the XMPP domain (default: none) |
||||
JVB_HOSTNAME=meet.example.com |
||||
|
||||
# sets the hostname of the XMPP server (default: domain if set, localhost otherwise) |
||||
JVB_HOST= |
||||
|
||||
# sets the port of the XMPP server (default: 5275) |
||||
JVB_PORT=5347 |
||||
|
||||
# sets the shared secret used to authenticate to the XMPP server |
||||
JVB_SECRET=$VP_SECRET |
||||
|
||||
# extra options to pass to the JVB daemon |
||||
JVB_OPTS="--apis=rest," |
||||
|
||||
# adds java system props that are passed to jvb (default are for home and logging config file) |
||||
JAVA_SYS_PROPS=" \ |
||||
-Dnet.java.sip.communicator.SC_HOME_DIR_LOCATION=/etc/jitsi \ |
||||
-Dnet.java.sip.communicator.SC_HOME_DIR_NAME=videobridge \ |
||||
-Dnet.java.sip.communicator.SC_LOG_DIR_LOCATION=/var/log/jitsi \ |
||||
-Djava.util.logging.config.file=/etc/jitsi/videobridge/logging.properties \ |
||||
" |
@ -1,19 +0,0 @@ |
||||
org.ice4j.ice.harvest.DISABLE_AWS_HARVESTER=true |
||||
org.ice4j.ice.harvest.STUN_MAPPING_HARVESTER_ADDRESSES=meet-jit-si-turnrelay.jitsi.net:443 |
||||
|
||||
org.jitsi.jicofo.ALWAYS_TRUST_MODE_ENABLED=true |
||||
|
||||
org.jitsi.videobridge.ENABLE_REST_SHUTDOWN=true |
||||
|
||||
# Enable broadcasting stats/presence in a MUC |
||||
org.jitsi.videobridge.ENABLE_STATISTICS=true |
||||
org.jitsi.videobridge.STATISTICS_TRANSPORT=muc,colibri,rest |
||||
org.jitsi.videobridge.STATISTICS_INTERVAL=5000 |
||||
|
||||
org.jitsi.videobridge.xmpp.user.shard-1.HOSTNAME=meet.example.com |
||||
org.jitsi.videobridge.xmpp.user.shard-1.DOMAIN=auth.meet.example.com |
||||
org.jitsi.videobridge.xmpp.user.shard-1.USERNAME=jvb |
||||
org.jitsi.videobridge.xmpp.user.shard-1.PASSWORD=$VB_PASSWORD |
||||
org.jitsi.videobridge.xmpp.user.shard-1.MUC_JIDS=JvbBrewery@internal.auth.meet.example.com |
||||
org.jitsi.videobridge.xmpp.user.shard-1.MUC_NICKNAME=$NICKNAME_OF_VB |
||||
org.jitsi.videobridge.xmpp.user.shard-1.DISABLE_CERTIFICATE_VERIFICATION=true |
Loading…
Reference in new issue