1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798 |
- plugin_paths = { "/usr/share/jitsi-meet/prosody-plugins/" }
-
- -- domain mapper options, must at least have domain base set to use the mapper
- muc_mapper_domain_base = "jitmeet.example.com";
-
- external_service_secret = "__turnSecret__";
- external_services = {
- { type = "stun", host = "jitmeet.example.com", port = 3478 },
- { type = "turn", host = "jitmeet.example.com", port = 3478, transport = "udp", secret = true, ttl = 86400, algorithm = "turn" },
- { type = "turns", host = "jitmeet.example.com", port = 5349, transport = "tcp", secret = true, ttl = 86400, algorithm = "turn" }
- };
-
- cross_domain_bosh = false;
- consider_bosh_secure = true;
- -- https_ports = { }; -- Remove this line to prevent listening on port 5284
-
- -- https://ssl-config.mozilla.org/#server=haproxy&version=2.1&config=intermediate&openssl=1.1.0g&guideline=5.4
- ssl = {
- protocol = "tlsv1_2+";
- ciphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"
- }
-
- VirtualHost "jitmeet.example.com"
- -- enabled = false -- Remove this line to enable this host
- authentication = "anonymous"
- -- Properties below are modified by jitsi-meet-tokens package config
- -- and authentication above is switched to "token"
- --app_id="example_app_id"
- --app_secret="example_app_secret"
- -- Assign this host a certificate for TLS, otherwise it would use the one
- -- set in the global section (if any).
- -- Note that old-style SSL on port 5223 only supports one certificate, and will always
- -- use the global one.
- ssl = {
- key = "/etc/prosody/certs/jitmeet.example.com.key";
- certificate = "/etc/prosody/certs/jitmeet.example.com.crt";
- }
- av_moderation_component = "avmoderation.jitmeet.example.com"
- speakerstats_component = "speakerstats.jitmeet.example.com"
- conference_duration_component = "conferenceduration.jitmeet.example.com"
- -- we need bosh
- modules_enabled = {
- "bosh";
- "pubsub";
- "ping"; -- Enable mod_ping
- "speakerstats";
- "external_services";
- "conference_duration";
- "muc_lobby_rooms";
- "av_moderation";
- }
- c2s_require_encryption = false
- lobby_muc = "lobby.jitmeet.example.com"
- main_muc = "conference.jitmeet.example.com"
- -- muc_lobby_whitelist = { "recorder.jitmeet.example.com" } -- Here we can whitelist jibri to enter lobby enabled rooms
-
- Component "conference.jitmeet.example.com" "muc"
- storage = "memory"
- modules_enabled = {
- "muc_meeting_id";
- "muc_domain_mapper";
- --"token_verification";
- }
- admins = { "focusUser@auth.jitmeet.example.com" }
- muc_room_locking = false
- muc_room_default_public_jids = true
-
- -- internal muc component
- Component "internal.auth.jitmeet.example.com" "muc"
- storage = "memory"
- modules_enabled = {
- "ping";
- }
- admins = { "focusUser@auth.jitmeet.example.com", "jvb@auth.jitmeet.example.com" }
- muc_room_locking = false
- muc_room_default_public_jids = true
-
- VirtualHost "auth.jitmeet.example.com"
- authentication = "internal_hashed"
-
- -- Proxy to jicofo's user JID, so that it doesn't have to register as a component.
- Component "focus.jitmeet.example.com" "client_proxy"
- target_address = "focusUser@auth.jitmeet.example.com"
-
- Component "speakerstats.jitmeet.example.com" "speakerstats_component"
- muc_component = "conference.jitmeet.example.com"
-
- Component "conferenceduration.jitmeet.example.com" "conference_duration_component"
- muc_component = "conference.jitmeet.example.com"
-
- Component "avmoderation.jitmeet.example.com" "av_moderation_component"
- muc_component = "conference.jitmeet.example.com"
-
- Component "lobby.jitmeet.example.com" "muc"
- storage = "memory"
- restrict_room_creation = true
- muc_room_locking = false
- muc_room_default_public_jids = true
|