This repository has been archived on 2023-03-15. You can view files and clone it, but cannot push or open issues or pull requests.
infrastructure/app/jitsi/integration/prosody/prosody.cfg.lua

138 lines
4.6 KiB
Lua
Raw Permalink Normal View History

2021-01-29 16:17:28 +00:00
modules_enabled = {
"roster"; -- Allow users to have a roster. Recommended ;)
"saslauth"; -- Authentication for clients and servers. Recommended if you want to log in.
"tls"; -- Add support for secure TLS on c2s/s2s connections
"dialback"; -- s2s dialback support
"disco"; -- Service discovery
"posix"; -- POSIX functionality, sends server to background, enables syslog, etc.
"version"; -- Replies to server version requests
"uptime"; -- Report how long server has been running
"time"; -- Let others know the time here on this server
"ping"; -- Replies to XMPP pings with pongs
"pep"; -- Enables users to publish their mood, activity, playing music and more
-- jitsi
--"smacks"; -- not shipped with prosody
"carbons";
"mam";
"lastactivity";
"offline";
"pubsub";
"adhoc";
"websocket";
--"http_altconnect"; -- not shipped with prosody
}
2021-02-01 07:40:59 +00:00
modules_disabled = { "s2s" }
2021-01-29 16:17:28 +00:00
2021-01-28 20:05:10 +00:00
plugin_paths = { "/usr/share/jitsi-meet/prosody-plugins/" }
2021-01-28 22:02:37 +00:00
log = {
--log less on console with warn="*console"; or err="*console" or more with debug="*console"
2021-02-01 07:40:59 +00:00
info="*console";
2021-01-28 22:02:37 +00:00
}
2021-01-28 17:55:56 +00:00
daemonize = false
use_libevent = true
2021-01-28 20:05:10 +00:00
-- domain mapper options, must at least have domain base set to use the mapper
muc_mapper_domain_base = "jitsi.deuxfleurs.fr";
--@FIXME would be great to configure it
--turncredentials_secret = "__turnSecret__";
--turncredentials = {
-- { type = "stun", host = "jitmeet.example.com", port = "3478" },
-- { type = "turn", host = "jitmeet.example.com", port = "3478", transport = "udp" },
-- { type = "turns", host = "jitmeet.example.com", port = "5349", transport = "tcp" }
--};
cross_domain_bosh = false;
consider_bosh_secure = true;
2021-02-01 07:40:59 +00:00
--component_ports = { 5347 }
component_ports = { } -- it seems we don't need external components for now...
https_ports = { } -- we don't need http
2021-01-28 17:55:56 +00:00
http_ports = { 5280 }
2021-02-01 07:40:59 +00:00
c2s_ports = { 5222 }
s2s_ports = { }
2021-01-28 17:55:56 +00:00
2021-01-28 20:05:10 +00:00
-- https://ssl-config.mozilla.org/#server=haproxy&version=2.1&config=intermediate&openssl=1.1.0g&guideline=5.4
ssl = {
protocol = "tlsv1_2+";
ciphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"
2021-01-28 16:52:41 +00:00
}
2021-01-28 17:55:56 +00:00
VirtualHost "jitsi"
2021-01-28 22:02:37 +00:00
enabled = true -- Remove this line to enable this host
2021-01-28 20:05:10 +00:00
authentication = "anonymous"
-- Properties below are modified by jitsi-meet-tokens package config
-- and authentication above is switched to "token"
--app_id="example_app_id"
--app_secret="example_app_secret"
-- Assign this host a certificate for TLS, otherwise it would use the one
-- set in the global section (if any).
-- Note that old-style SSL on port 5223 only supports one certificate, and will always
-- use the global one.
ssl = {
key = "/var/lib/prosody/jitsi.key";
certificate = "/var/lib/prosody/jitsi.crt";
}
speakerstats_component = "speakerstats.jitsi"
conference_duration_component = "conferenceduration.jitsi"
-- we need bosh
modules_enabled = {
"bosh";
"pubsub";
"ping"; -- Enable mod_ping
"speakerstats";
--"turncredentials"; not supported yet
"conference_duration";
"muc_lobby_rooms";
}
c2s_require_encryption = false
lobby_muc = "lobby.jitsi"
main_muc = "conference.jitsi"
-- muc_lobby_whitelist = { "recorder.jitmeet.example.com" } -- Here we can whitelist jibri to enter lobby enabled rooms
2021-01-28 16:52:41 +00:00
2021-01-28 17:55:56 +00:00
Component "conference.jitsi" "muc"
2021-01-28 20:05:10 +00:00
storage = "memory"
modules_enabled = {
"muc_meeting_id";
"muc_domain_mapper";
--"token_verification";
}
2021-01-28 22:02:37 +00:00
admins = { "focus@auth.jitsi" }
2021-01-28 20:05:10 +00:00
muc_room_locking = false
muc_room_default_public_jids = true
-- internal muc component
2021-01-28 17:55:56 +00:00
Component "internal.auth.jitsi" "muc"
2021-01-28 20:05:10 +00:00
storage = "memory"
modules_enabled = {
"ping";
}
2021-01-28 22:02:37 +00:00
admins = { "focus@auth.jitsi", "jvb@auth.jitsi" }
2021-01-28 20:05:10 +00:00
muc_room_locking = false
muc_room_default_public_jids = true
VirtualHost "auth.jitsi"
2021-02-01 07:40:59 +00:00
ssl = {
key = "/var/lib/prosody/auth.jitsi.key";
certificate = "/var/lib/prosody/auth.jitsi.crt";
}
2021-01-28 20:05:10 +00:00
authentication = "internal_plain"
2021-01-30 11:06:14 +00:00
Component "focus.jitsi" "client_proxy"
target_address = "focus@auth.jitsi"
2021-01-28 20:05:10 +00:00
Component "speakerstats.jitsi" "speakerstats_component"
muc_component = "conference.jitsi"
Component "conferenceduration.jitsi" "conference_duration_component"
muc_component = "conference.jitsi"
Component "lobby.jitsi" "muc"
storage = "memory"
restrict_room_creation = true
muc_room_locking = false
muc_room_default_public_jids = true
2021-01-28 16:52:41 +00:00