more updates march
This commit is contained in:
36
jitsi/prosody/rootfs/defaults/conf.d/brewery.cfg.lua
Normal file
36
jitsi/prosody/rootfs/defaults/conf.d/brewery.cfg.lua
Normal file
@@ -0,0 +1,36 @@
|
||||
{{ $REGION_NAME := .Env.PROSODY_REGION_NAME | default "default" -}}
|
||||
{{ $RELEASE_NUMBER := .Env.RELEASE_NUMBER | default "" -}}
|
||||
{{ $SHARD_NAME := .Env.SHARD | default "default" -}}
|
||||
{{ $JVB_XMPP_AUTH_DOMAIN := .Env.JVB_XMPP_AUTH_DOMAIN | default "auth.jvb.meet.jitsi" -}}
|
||||
{{ $JVB_XMPP_INTERNAL_MUC_DOMAIN := .Env.JVB_XMPP_INTERNAL_MUC_DOMAIN | default "muc.jvb.meet.jitsi" -}}
|
||||
{{ $JVB_AUTH_USER := .Env.JVB_AUTH_USER | default "jvb" -}}
|
||||
|
||||
admins = {
|
||||
"focus@{{ $JVB_XMPP_AUTH_DOMAIN }}",
|
||||
"{{ $JVB_AUTH_USER }}@{{ $JVB_XMPP_AUTH_DOMAIN }}"
|
||||
}
|
||||
|
||||
plugin_paths = { "/prosody-plugins/", "/prosody-plugins-custom", "/prosody-plugins-contrib" }
|
||||
|
||||
VirtualHost "{{ $JVB_XMPP_AUTH_DOMAIN }}"
|
||||
modules_enabled = {
|
||||
"smacks";
|
||||
}
|
||||
authentication = "internal_hashed"
|
||||
ssl = {
|
||||
key = "/config/certs/{{ $JVB_XMPP_AUTH_DOMAIN }}.key";
|
||||
certificate = "/config/certs/{{ $JVB_XMPP_AUTH_DOMAIN }}.crt";
|
||||
}
|
||||
smacks_hibernation_time = 15;
|
||||
|
||||
Component "{{ $JVB_XMPP_INTERNAL_MUC_DOMAIN }}" "muc"
|
||||
modules_enabled = {
|
||||
"muc_hide_all";
|
||||
"muc_filter_access";
|
||||
}
|
||||
storage = "memory"
|
||||
muc_room_cache_size = 10000
|
||||
muc_filter_whitelist="{{ $JVB_XMPP_AUTH_DOMAIN }}"
|
||||
muc_room_locking = false
|
||||
muc_room_default_public_jids = true
|
||||
|
||||
477
jitsi/prosody/rootfs/defaults/conf.d/jitsi-meet.cfg.lua
Normal file
477
jitsi/prosody/rootfs/defaults/conf.d/jitsi-meet.cfg.lua
Normal file
@@ -0,0 +1,477 @@
|
||||
{{ $AUTH_TYPE := .Env.AUTH_TYPE | default "internal" -}}
|
||||
{{ $C2S_REQUIRE_ENCRYPTION := .Env.PROSODY_C2S_REQUIRE_ENCRYPTION | default "1" | toBool -}}
|
||||
{{ $DISABLE_POLLS := .Env.DISABLE_POLLS | default "false" | toBool -}}
|
||||
{{ $ENABLE_APP_SECRET := .Env.JWT_APP_SECRET | default "false" | toBool -}}
|
||||
{{ $ENABLE_AUTH := .Env.ENABLE_AUTH | default "0" | toBool -}}
|
||||
{{ $ENABLE_AV_MODERATION := .Env.ENABLE_AV_MODERATION | default "true" | toBool -}}
|
||||
{{ $ENABLE_BREAKOUT_ROOMS := .Env.ENABLE_BREAKOUT_ROOMS | default "true" | toBool -}}
|
||||
{{ $ENABLE_END_CONFERENCE := .Env.ENABLE_END_CONFERENCE | default "true" | toBool -}}
|
||||
{{ $ENABLE_FILTER_MESSAGES := .Env.PROSODY_ENABLE_FILTER_MESSAGES | default "false" | toBool -}}
|
||||
{{ $ENABLE_GUEST_DOMAIN := and $ENABLE_AUTH (.Env.ENABLE_GUESTS | default "0" | toBool) -}}
|
||||
{{ $ENABLE_JAAS_COMPONENTS := .Env.ENABLE_JAAS_COMPONENTS | default "0" | toBool -}}
|
||||
{{ $ENABLE_LOBBY := .Env.ENABLE_LOBBY | default "true" | toBool -}}
|
||||
{{ $ENABLE_RATE_LIMITS := .Env.PROSODY_ENABLE_RATE_LIMITS | default "0" | toBool -}}
|
||||
{{ $ENABLE_RECORDING := .Env.ENABLE_RECORDING | default "0" | toBool -}}
|
||||
{{ $ENABLE_RECORDING_METADATA := .Env.PROSODY_ENABLE_RECORDING_METADATA | default "1" | toBool -}}
|
||||
{{ $ENABLE_SUBDOMAINS := .Env.ENABLE_SUBDOMAINS | default "true" | toBool -}}
|
||||
{{ $ENABLE_TRANSCRIPTIONS := .Env.ENABLE_TRANSCRIPTIONS | default "0" | toBool -}}
|
||||
{{ $ENABLE_VISITORS := .Env.ENABLE_VISITORS | default "0" | toBool -}}
|
||||
{{ $ENABLE_XMPP_WEBSOCKET := .Env.ENABLE_XMPP_WEBSOCKET | default "1" | toBool -}}
|
||||
{{ $ENV := .Env -}}
|
||||
{{ $GUEST_AUTH_TYPE := .Env.PROSODY_GUEST_AUTH_TYPE | default "jitsi-anonymous" -}}
|
||||
{{ $JIBRI_RECORDER_USER := .Env.JIBRI_RECORDER_USER | default "recorder" -}}
|
||||
{{ $JIBRI_XMPP_USER := .Env.JIBRI_XMPP_USER | default "jibri" -}}
|
||||
{{ $JIGASI_TRANSCRIBER_USER := .Env.JIGASI_TRANSCRIBER_USER | default "transcriber" -}}
|
||||
{{ $JIGASI_XMPP_USER := .Env.JIGASI_XMPP_USER | default "jigasi" -}}
|
||||
{{ $JVB_AUTH_USER := .Env.JVB_AUTH_USER | default "jvb" -}}
|
||||
{{ $JWT_ALLOW_EMPTY := .Env.JWT_ALLOW_EMPTY | default "0" | toBool -}}
|
||||
{{ $JWT_ASAP_KEYSERVER := .Env.JWT_ASAP_KEYSERVER | default "" -}}
|
||||
{{ $JWT_AUTH_TYPE := .Env.JWT_AUTH_TYPE | default "token" -}}
|
||||
{{ $JWT_ENABLE_DOMAIN_VERIFICATION := .Env.JWT_ENABLE_DOMAIN_VERIFICATION | default "false" | toBool -}}
|
||||
{{ $JWT_TOKEN_AUTH_MODULE := .Env.JWT_TOKEN_AUTH_MODULE | default "token_verification" -}}
|
||||
{{ $MATRIX_LOBBY_BYPASS := .Env.MATRIX_LOBBY_BYPASS | default "0" | toBool -}}
|
||||
{{ $MATRIX_UVS_ISSUER := .Env.MATRIX_UVS_ISSUER | default "issuer" -}}
|
||||
{{ $MATRIX_UVS_SYNC_POWER_LEVELS := .Env.MATRIX_UVS_SYNC_POWER_LEVELS | default "0" | toBool -}}
|
||||
{{ $PROSODY_AUTH_TYPE := .Env.PROSODY_AUTH_TYPE | default $AUTH_TYPE -}}
|
||||
{{ $PROSODY_RESERVATION_ENABLED := .Env.PROSODY_RESERVATION_ENABLED | default "false" | toBool -}}
|
||||
{{ $PROSODY_RESERVATION_REST_BASE_URL := .Env.PROSODY_RESERVATION_REST_BASE_URL | default "" -}}
|
||||
{{ $PUBLIC_URL := .Env.PUBLIC_URL | default "https://localhost:8443" -}}
|
||||
{{ $PUBLIC_URL_DOMAIN := $PUBLIC_URL | trimPrefix "https://" | trimSuffix "/" -}}
|
||||
{{ $RATE_LIMIT_ALLOW_RANGES := .Env.PROSODY_RATE_LIMIT_ALLOW_RANGES | default "10.0.0.0/8" -}}
|
||||
{{ $RATE_LIMIT_CACHE_SIZE := .Env.PROSODY_RATE_LIMIT_CACHE_SIZE | default "10000" -}}
|
||||
{{ $RATE_LIMIT_LOGIN_RATE := .Env.PROSODY_RATE_LIMIT_LOGIN_RATE | default "3" -}}
|
||||
{{ $RATE_LIMIT_SESSION_RATE := .Env.PROSODY_RATE_LIMIT_SESSION_RATE | default "200" -}}
|
||||
{{ $RATE_LIMIT_TIMEOUT := .Env.PROSODY_RATE_LIMIT_TIMEOUT | default "60" -}}
|
||||
{{ $WAIT_FOR_HOST_DISABLE_AUTO_OWNERS := .Env.WAIT_FOR_HOST_DISABLE_AUTO_OWNERS | default "false" | toBool -}}
|
||||
{{ $XMPP_AUTH_DOMAIN := .Env.XMPP_AUTH_DOMAIN | default "auth.meet.jitsi" -}}
|
||||
{{ $XMPP_DOMAIN := .Env.XMPP_DOMAIN | default "meet.jitsi" -}}
|
||||
{{ $XMPP_GUEST_DOMAIN := .Env.XMPP_GUEST_DOMAIN | default "guest.meet.jitsi" -}}
|
||||
{{ $XMPP_INTERNAL_MUC_DOMAIN := .Env.XMPP_INTERNAL_MUC_DOMAIN | default "internal-muc.meet.jitsi" -}}
|
||||
{{ $XMPP_MUC_DOMAIN := .Env.XMPP_MUC_DOMAIN | default "muc.meet.jitsi" -}}
|
||||
{{ $XMPP_MUC_DOMAIN_PREFIX := (split "." $XMPP_MUC_DOMAIN)._0 -}}
|
||||
{{ $XMPP_HIDDEN_DOMAIN := .Env.XMPP_HIDDEN_DOMAIN | default "hidden.meet.jitsi" -}}
|
||||
|
||||
admins = {
|
||||
{{ if .Env.JIGASI_XMPP_PASSWORD }}
|
||||
"{{ $JIGASI_XMPP_USER }}@{{ $XMPP_AUTH_DOMAIN }}",
|
||||
{{ end }}
|
||||
|
||||
{{ if .Env.JIBRI_XMPP_PASSWORD }}
|
||||
"{{ $JIBRI_XMPP_USER }}@{{ $XMPP_AUTH_DOMAIN }}",
|
||||
{{ end }}
|
||||
|
||||
"focus@{{ $XMPP_AUTH_DOMAIN }}",
|
||||
"{{ $JVB_AUTH_USER }}@{{ $XMPP_AUTH_DOMAIN }}"
|
||||
}
|
||||
|
||||
unlimited_jids = {
|
||||
"focus@{{ $XMPP_AUTH_DOMAIN }}",
|
||||
"{{ $JVB_AUTH_USER }}@{{ $XMPP_AUTH_DOMAIN }}"
|
||||
}
|
||||
|
||||
plugin_paths = { "/prosody-plugins-custom", "/prosody-plugins/", "/prosody-plugins-contrib" }
|
||||
|
||||
muc_mapper_domain_base = "{{ $XMPP_DOMAIN }}";
|
||||
muc_mapper_domain_prefix = "{{ $XMPP_MUC_DOMAIN_PREFIX }}";
|
||||
|
||||
recorder_prefixes = { "{{ $JIBRI_RECORDER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}" };
|
||||
|
||||
transcriber_prefixes = { "{{ $JIGASI_TRANSCRIBER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}" };
|
||||
|
||||
http_default_host = "{{ $XMPP_DOMAIN }}"
|
||||
|
||||
{{ if and $ENABLE_AUTH (or (eq $PROSODY_AUTH_TYPE "jwt") (eq $PROSODY_AUTH_TYPE "hybrid_matrix_token")) .Env.JWT_ACCEPTED_ISSUERS }}
|
||||
asap_accepted_issuers = { "{{ join "\",\"" (splitList "," .Env.JWT_ACCEPTED_ISSUERS | compact) }}" }
|
||||
{{ end }}
|
||||
|
||||
{{ if and $ENABLE_AUTH (or (eq $PROSODY_AUTH_TYPE "jwt") (eq $PROSODY_AUTH_TYPE "hybrid_matrix_token")) .Env.JWT_ACCEPTED_AUDIENCES }}
|
||||
asap_accepted_audiences = { "{{ join "\",\"" (splitList "," .Env.JWT_ACCEPTED_AUDIENCES | compact) }}" }
|
||||
{{ end }}
|
||||
|
||||
{{ if and $ENABLE_AUTH (or (eq $PROSODY_AUTH_TYPE "jwt") (eq $PROSODY_AUTH_TYPE "hybrid_matrix_token")) .Env.JWT_ACCEPTED_ALLOWNER_ISSUERS }}
|
||||
allowner_issuers = { "{{ join "\",\"" (splitList "," .Env.JWT_ACCEPTED_ALLOWNER_ISSUERS | compact) }}" }
|
||||
{{ end }}
|
||||
|
||||
consider_bosh_secure = true;
|
||||
consider_websocket_secure = true;
|
||||
|
||||
{{ if $ENABLE_XMPP_WEBSOCKET }}
|
||||
smacks_max_unacked_stanzas = 5;
|
||||
smacks_hibernation_time = 60;
|
||||
smacks_max_old_sessions = 1;
|
||||
{{ end }}
|
||||
|
||||
{{ if $ENABLE_JAAS_COMPONENTS }}
|
||||
VirtualHost "jigasi.meet.jitsi"
|
||||
modules_enabled = {
|
||||
"bosh";
|
||||
"muc_password_check";
|
||||
}
|
||||
authentication = "token"
|
||||
app_id = "jitsi";
|
||||
asap_key_server = "https://jaas-public-keys.jitsi.net/jitsi-components/prod-8x8"
|
||||
asap_accepted_issuers = { "jaas-components" }
|
||||
asap_accepted_audiences = { "jigasi.{{ $PUBLIC_URL_DOMAIN }}" }
|
||||
{{ end }}
|
||||
|
||||
VirtualHost "{{ $XMPP_DOMAIN }}"
|
||||
{{ if $ENABLE_AUTH }}
|
||||
{{ if eq $PROSODY_AUTH_TYPE "jwt" }}
|
||||
{{ if .Env.JWT_SIGN_TYPE }}
|
||||
signature_algorithm = "{{ .Env.JWT_SIGN_TYPE }}"
|
||||
{{ end -}}
|
||||
authentication = "{{ $JWT_AUTH_TYPE }}"
|
||||
app_id = "{{ .Env.JWT_APP_ID }}"
|
||||
{{ if $ENABLE_APP_SECRET }}
|
||||
app_secret = "{{ .Env.JWT_APP_SECRET }}"
|
||||
{{ end }}
|
||||
allow_empty_token = {{ $JWT_ALLOW_EMPTY }}
|
||||
{{ if $JWT_ASAP_KEYSERVER }}
|
||||
asap_key_server = "{{ .Env.JWT_ASAP_KEYSERVER }}"
|
||||
{{ end }}
|
||||
enable_domain_verification = {{ $JWT_ENABLE_DOMAIN_VERIFICATION }}
|
||||
{{ else if eq $PROSODY_AUTH_TYPE "ldap" }}
|
||||
authentication = "cyrus"
|
||||
cyrus_application_name = "xmpp"
|
||||
allow_unencrypted_plain_auth = true
|
||||
{{ else if eq $PROSODY_AUTH_TYPE "matrix" }}
|
||||
authentication = "matrix_user_verification"
|
||||
app_id = "{{ $MATRIX_UVS_ISSUER }}"
|
||||
uvs_base_url = "{{ .Env.MATRIX_UVS_URL }}"
|
||||
{{ if .Env.MATRIX_UVS_AUTH_TOKEN }}
|
||||
uvs_auth_token = "{{ .Env.MATRIX_UVS_AUTH_TOKEN }}"
|
||||
{{ end }}
|
||||
{{ if $MATRIX_UVS_SYNC_POWER_LEVELS }}
|
||||
uvs_sync_power_levels = true
|
||||
{{ end }}
|
||||
{{ else if eq $PROSODY_AUTH_TYPE "hybrid_matrix_token" }}
|
||||
authentication = "hybrid_matrix_token"
|
||||
app_id = "{{ .Env.JWT_APP_ID }}"
|
||||
{{ if $ENABLE_APP_SECRET }}
|
||||
app_secret = "{{ .Env.JWT_APP_SECRET }}"
|
||||
{{ end }}
|
||||
allow_empty_token = {{ $JWT_ALLOW_EMPTY }}
|
||||
enable_domain_verification = {{ $JWT_ENABLE_DOMAIN_VERIFICATION }}
|
||||
|
||||
uvs_base_url = "{{ .Env.MATRIX_UVS_URL }}"
|
||||
{{ if .Env.MATRIX_UVS_ISSUER }}
|
||||
uvs_issuer = "{{ .Env.MATRIX_UVS_ISSUER }}"
|
||||
{{ end }}
|
||||
{{ if .Env.MATRIX_UVS_AUTH_TOKEN }}
|
||||
uvs_auth_token = "{{ .Env.MATRIX_UVS_AUTH_TOKEN }}"
|
||||
{{ end }}
|
||||
{{ else if eq $PROSODY_AUTH_TYPE "internal" }}
|
||||
authentication = "internal_hashed"
|
||||
disable_sasl_mechanisms={ "DIGEST-MD5", "OAUTHBEARER" }
|
||||
{{ end }}
|
||||
{{ else }}
|
||||
authentication = "jitsi-anonymous"
|
||||
{{ end }}
|
||||
ssl = {
|
||||
key = "/config/certs/{{ $XMPP_DOMAIN }}.key";
|
||||
certificate = "/config/certs/{{ $XMPP_DOMAIN }}.crt";
|
||||
}
|
||||
modules_enabled = {
|
||||
"bosh";
|
||||
"features_identity";
|
||||
{{ if $ENABLE_XMPP_WEBSOCKET }}
|
||||
"websocket";
|
||||
"smacks"; -- XEP-0198: Stream Management
|
||||
{{ end }}
|
||||
"conference_duration";
|
||||
{{ if $ENABLE_LOBBY }}
|
||||
"muc_lobby_rooms";
|
||||
{{ end }}
|
||||
{{ if $ENABLE_BREAKOUT_ROOMS }}
|
||||
"muc_breakout_rooms";
|
||||
{{ end }}
|
||||
{{ if .Env.XMPP_MODULES }}
|
||||
"{{ join "\";\n \"" (splitList "," .Env.XMPP_MODULES | compact) }}";
|
||||
{{ end }}
|
||||
{{ if and $ENABLE_AUTH (eq $PROSODY_AUTH_TYPE "ldap") }}
|
||||
"auth_cyrus";
|
||||
{{end}}
|
||||
{{ if $PROSODY_RESERVATION_ENABLED }}
|
||||
"reservations";
|
||||
{{ end }}
|
||||
{{ if $ENABLE_VISITORS }}
|
||||
"visitors";
|
||||
{{ end }}
|
||||
{{- if and $ENABLE_RECORDING_METADATA $ENABLE_AUTH (eq $PROSODY_AUTH_TYPE "jwt") $ENABLE_RECORDING }}
|
||||
"jibri_session";
|
||||
{{- end }}
|
||||
|
||||
}
|
||||
|
||||
main_muc = "{{ $XMPP_MUC_DOMAIN }}"
|
||||
{{ if $ENABLE_LOBBY }}
|
||||
lobby_muc = "lobby.{{ $XMPP_DOMAIN }}"
|
||||
{{ if or $ENABLE_RECORDING $ENABLE_TRANSCRIPTIONS }}
|
||||
muc_lobby_whitelist = { "{{ $XMPP_HIDDEN_DOMAIN }}" }
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
|
||||
{{ if $PROSODY_RESERVATION_ENABLED }}
|
||||
reservations_api_prefix = "{{ $PROSODY_RESERVATION_REST_BASE_URL }}"
|
||||
{{ end }}
|
||||
|
||||
{{ if $ENABLE_BREAKOUT_ROOMS }}
|
||||
breakout_rooms_muc = "breakout.{{ $XMPP_DOMAIN }}"
|
||||
{{ end }}
|
||||
|
||||
c2s_require_encryption = {{ $C2S_REQUIRE_ENCRYPTION }}
|
||||
|
||||
{{ if $ENABLE_VISITORS -}}
|
||||
visitors_ignore_list = { "{{ $XMPP_HIDDEN_DOMAIN }}" }
|
||||
{{ end }}
|
||||
|
||||
{{ if .Env.XMPP_CONFIGURATION -}}
|
||||
{{ join "\n " (splitList "," .Env.XMPP_CONFIGURATION | compact) }}
|
||||
{{ end -}}
|
||||
|
||||
{{ if $ENABLE_GUEST_DOMAIN }}
|
||||
VirtualHost "{{ $XMPP_GUEST_DOMAIN }}"
|
||||
authentication = "{{ $GUEST_AUTH_TYPE }}"
|
||||
modules_enabled = {
|
||||
{{ if $ENABLE_XMPP_WEBSOCKET }}
|
||||
"smacks"; -- XEP-0198: Stream Management
|
||||
{{ end }}
|
||||
{{ if .Env.XMPP_MODULES }}
|
||||
"{{ join "\";\n \"" (splitList "," .Env.XMPP_MODULES | compact) }}";
|
||||
{{ end }}
|
||||
}
|
||||
main_muc = "{{ $XMPP_MUC_DOMAIN }}"
|
||||
c2s_require_encryption = {{ $C2S_REQUIRE_ENCRYPTION }}
|
||||
{{ if $ENABLE_VISITORS }}
|
||||
allow_anonymous_s2s = true
|
||||
{{ end }}
|
||||
{{ if $ENABLE_LOBBY }}
|
||||
lobby_muc = "lobby.{{ $XMPP_DOMAIN }}"
|
||||
{{ end }}
|
||||
{{ if $ENABLE_BREAKOUT_ROOMS }}
|
||||
breakout_rooms_muc = "breakout.{{ $XMPP_DOMAIN }}"
|
||||
{{ end }}
|
||||
|
||||
{{ if .Env.XMPP_CONFIGURATION -}}
|
||||
{{ join "\n " (splitList "," .Env.XMPP_CONFIGURATION | compact) }}
|
||||
{{ end -}}
|
||||
|
||||
{{ end }}
|
||||
|
||||
VirtualHost "{{ $XMPP_AUTH_DOMAIN }}"
|
||||
ssl = {
|
||||
key = "/config/certs/{{ $XMPP_AUTH_DOMAIN }}.key";
|
||||
certificate = "/config/certs/{{ $XMPP_AUTH_DOMAIN }}.crt";
|
||||
}
|
||||
modules_enabled = {
|
||||
"limits_exception";
|
||||
{{- if and $ENABLE_RECORDING_METADATA $ENABLE_AUTH (eq $PROSODY_AUTH_TYPE "jwt") $ENABLE_RECORDING }}
|
||||
"jibri_session";
|
||||
{{- end }}
|
||||
"smacks";
|
||||
}
|
||||
authentication = "internal_hashed"
|
||||
smacks_hibernation_time = 15;
|
||||
|
||||
{{ if or $ENABLE_RECORDING $ENABLE_TRANSCRIPTIONS }}
|
||||
VirtualHost "{{ $XMPP_HIDDEN_DOMAIN }}"
|
||||
modules_enabled = {
|
||||
"smacks";
|
||||
}
|
||||
authentication = "internal_hashed"
|
||||
{{ end }}
|
||||
|
||||
Component "{{ $XMPP_INTERNAL_MUC_DOMAIN }}" "muc"
|
||||
storage = "memory"
|
||||
modules_enabled = {
|
||||
"muc_hide_all";
|
||||
"muc_filter_access";
|
||||
{{ if .Env.XMPP_INTERNAL_MUC_MODULES -}}
|
||||
"{{ join "\";\n\"" (splitList "," .Env.XMPP_INTERNAL_MUC_MODULES | compact) }}";
|
||||
{{ end -}}
|
||||
}
|
||||
restrict_room_creation = true
|
||||
muc_filter_whitelist="{{ $XMPP_AUTH_DOMAIN }}"
|
||||
muc_room_locking = false
|
||||
muc_room_default_public_jids = true
|
||||
muc_room_cache_size = 1000
|
||||
muc_tombstones = false
|
||||
muc_room_allow_persistent = false
|
||||
|
||||
Component "{{ $XMPP_MUC_DOMAIN }}" "muc"
|
||||
restrict_room_creation = true
|
||||
storage = "memory"
|
||||
modules_enabled = {
|
||||
"muc_hide_all";
|
||||
"muc_meeting_id";
|
||||
{{ if .Env.XMPP_MUC_MODULES -}}
|
||||
"{{ join "\";\n \"" (splitList "," .Env.XMPP_MUC_MODULES | compact) }}";
|
||||
{{ end -}}
|
||||
{{ if and $ENABLE_AUTH (or (eq $PROSODY_AUTH_TYPE "jwt") (eq $PROSODY_AUTH_TYPE "hybrid_matrix_token")) -}}
|
||||
"{{ $JWT_TOKEN_AUTH_MODULE }}";
|
||||
{{ end }}
|
||||
{{ if and $ENABLE_AUTH (eq $PROSODY_AUTH_TYPE "matrix") $MATRIX_UVS_SYNC_POWER_LEVELS -}}
|
||||
"matrix_power_sync";
|
||||
{{ end -}}
|
||||
{{ if and $ENABLE_AUTH (eq $PROSODY_AUTH_TYPE "hybrid_matrix_token") $MATRIX_UVS_SYNC_POWER_LEVELS -}}
|
||||
"matrix_affiliation";
|
||||
{{ end -}}
|
||||
{{ if and $ENABLE_AUTH (eq $PROSODY_AUTH_TYPE "hybrid_matrix_token") $MATRIX_LOBBY_BYPASS -}}
|
||||
"matrix_lobby_bypass";
|
||||
{{ end -}}
|
||||
{{ if $ENABLE_SUBDOMAINS -}}
|
||||
"muc_domain_mapper";
|
||||
{{ end -}}
|
||||
{{ if $ENABLE_RATE_LIMITS -}}
|
||||
"muc_rate_limit";
|
||||
"rate_limit";
|
||||
{{ end -}}
|
||||
{{ if .Env.MAX_PARTICIPANTS }}
|
||||
"muc_max_occupants";
|
||||
{{ end }}
|
||||
"muc_password_whitelist";
|
||||
{{ if $ENABLE_FILTER_MESSAGES }}
|
||||
"filter_messages";
|
||||
{{ end }}
|
||||
}
|
||||
|
||||
{{ if $ENABLE_RATE_LIMITS -}}
|
||||
-- Max allowed join/login rate in events per second.
|
||||
rate_limit_login_rate = {{ $RATE_LIMIT_LOGIN_RATE }};
|
||||
-- The rate to which sessions from IPs exceeding the join rate will be limited, in bytes per second.
|
||||
rate_limit_session_rate = {{ $RATE_LIMIT_SESSION_RATE }};
|
||||
-- The time in seconds, after which the limit for an IP address is lifted.
|
||||
rate_limit_timeout = {{ $RATE_LIMIT_TIMEOUT }};
|
||||
-- List of regular expressions for IP addresses that are not limited by this module.
|
||||
rate_limit_whitelist = {
|
||||
"127.0.0.1";
|
||||
{{ range $index, $cidr := (splitList "," $RATE_LIMIT_ALLOW_RANGES | compact) }}
|
||||
"{{ $cidr }}";
|
||||
{{ end }}
|
||||
};
|
||||
|
||||
rate_limit_whitelist_hosts = {
|
||||
"{{ $XMPP_HIDDEN_DOMAIN }}";
|
||||
}
|
||||
{{ end -}}
|
||||
|
||||
-- The size of the cache that saves state for IP addresses
|
||||
rate_limit_cache_size = {{ $RATE_LIMIT_CACHE_SIZE }};
|
||||
|
||||
muc_room_cache_size = 10000
|
||||
muc_room_locking = false
|
||||
muc_room_default_public_jids = true
|
||||
{{ if .Env.XMPP_MUC_CONFIGURATION -}}
|
||||
{{ join "\n " (splitList "," .Env.XMPP_MUC_CONFIGURATION | compact) }}
|
||||
{{ end -}}
|
||||
{{ if .Env.MAX_PARTICIPANTS }}
|
||||
muc_access_whitelist = {
|
||||
"focus@{{ $XMPP_AUTH_DOMAIN }}";
|
||||
{{- if $ENABLE_RECORDING }}
|
||||
"{{ $JIBRI_RECORDER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}";
|
||||
{{- end }}
|
||||
{{- if $ENABLE_TRANSCRIPTIONS }}
|
||||
"{{ $JIGASI_TRANSCRIBER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}";
|
||||
{{- end }}
|
||||
}
|
||||
muc_max_occupants = "{{ .Env.MAX_PARTICIPANTS }}"
|
||||
{{ end }}
|
||||
muc_password_whitelist = {
|
||||
"focus@{{ $XMPP_AUTH_DOMAIN }}";
|
||||
{{- if $ENABLE_RECORDING }}
|
||||
"{{ $JIBRI_RECORDER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}";
|
||||
{{- end }}
|
||||
{{- if $ENABLE_TRANSCRIPTIONS }}
|
||||
"{{ $JIGASI_TRANSCRIBER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}";
|
||||
{{- end }}
|
||||
}
|
||||
muc_tombstones = false
|
||||
muc_room_allow_persistent = false
|
||||
|
||||
{{- if $WAIT_FOR_HOST_DISABLE_AUTO_OWNERS }}
|
||||
wait_for_host_disable_auto_owners = true
|
||||
{{- end }}
|
||||
|
||||
Component "focus.{{ $XMPP_DOMAIN }}" "client_proxy"
|
||||
target_address = "focus@{{ $XMPP_AUTH_DOMAIN }}"
|
||||
|
||||
Component "speakerstats.{{ $XMPP_DOMAIN }}" "speakerstats_component"
|
||||
muc_component = "{{ $XMPP_MUC_DOMAIN }}"
|
||||
{{- if .Env.XMPP_SPEAKERSTATS_MODULES }}
|
||||
modules_enabled = {
|
||||
"{{ join "\";\n \"" (splitList "," .Env.XMPP_SPEAKERSTATS_MODULES | compact) }}";
|
||||
}
|
||||
{{- end }}
|
||||
|
||||
{{ if $ENABLE_END_CONFERENCE }}
|
||||
Component "endconference.{{ $XMPP_DOMAIN }}" "end_conference"
|
||||
muc_component = "{{ $XMPP_MUC_DOMAIN }}"
|
||||
{{ end }}
|
||||
|
||||
{{ if $ENABLE_AV_MODERATION }}
|
||||
Component "avmoderation.{{ $XMPP_DOMAIN }}" "av_moderation_component"
|
||||
muc_component = "{{ $XMPP_MUC_DOMAIN }}"
|
||||
{{ end }}
|
||||
|
||||
{{ if $ENABLE_LOBBY }}
|
||||
Component "lobby.{{ $XMPP_DOMAIN }}" "muc"
|
||||
storage = "memory"
|
||||
restrict_room_creation = true
|
||||
muc_tombstones = false
|
||||
muc_room_allow_persistent = false
|
||||
muc_room_cache_size = 10000
|
||||
muc_room_locking = false
|
||||
muc_room_default_public_jids = true
|
||||
{{- if .Env.MAX_PARTICIPANTS }}
|
||||
muc_max_occupants = "{{ .Env.MAX_PARTICIPANTS }}"
|
||||
{{- end }}
|
||||
modules_enabled = {
|
||||
"muc_hide_all";
|
||||
{{- if $ENABLE_RATE_LIMITS }}
|
||||
"muc_rate_limit";
|
||||
{{- end }}
|
||||
{{- if .Env.MAX_PARTICIPANTS }}
|
||||
"muc_max_occupants";
|
||||
{{- end }}
|
||||
{{- if .Env.XMPP_LOBBY_MUC_MODULES }}
|
||||
"{{ join "\";\n \"" (splitList "," .Env.XMPP_LOBBY_MUC_MODULES | compact) }}";
|
||||
{{- end }}
|
||||
}
|
||||
|
||||
{{ end }}
|
||||
|
||||
{{ if $ENABLE_BREAKOUT_ROOMS }}
|
||||
Component "breakout.{{ $XMPP_DOMAIN }}" "muc"
|
||||
storage = "memory"
|
||||
restrict_room_creation = true
|
||||
muc_room_cache_size = 10000
|
||||
muc_room_locking = false
|
||||
muc_room_default_public_jids = true
|
||||
muc_tombstones = false
|
||||
muc_room_allow_persistent = false
|
||||
modules_enabled = {
|
||||
"muc_hide_all";
|
||||
"muc_meeting_id";
|
||||
{{ if $ENABLE_RATE_LIMITS -}}
|
||||
"muc_rate_limit";
|
||||
{{ end -}}
|
||||
{{ if .Env.XMPP_BREAKOUT_MUC_MODULES -}}
|
||||
"{{ join "\";\n \"" (splitList "," .Env.XMPP_BREAKOUT_MUC_MODULES | compact) }}";
|
||||
{{ end -}}
|
||||
}
|
||||
{{ end }}
|
||||
|
||||
Component "metadata.{{ $XMPP_DOMAIN }}" "room_metadata_component"
|
||||
muc_component = "{{ $XMPP_MUC_DOMAIN }}"
|
||||
breakout_rooms_component = "breakout.{{ $XMPP_DOMAIN }}"
|
||||
|
||||
|
||||
{{ if $ENABLE_VISITORS }}
|
||||
Component "visitors.{{ $XMPP_DOMAIN }}" "visitors_component"
|
||||
auto_allow_visitor_promotion = true
|
||||
always_visitors_enabled = true
|
||||
{{ end }}
|
||||
|
||||
{{ if not $DISABLE_POLLS -}}
|
||||
Component "polls.{{ $XMPP_DOMAIN }}" "polls_component"
|
||||
{{ end -}}
|
||||
197
jitsi/prosody/rootfs/defaults/conf.d/visitors.cfg.lua
Normal file
197
jitsi/prosody/rootfs/defaults/conf.d/visitors.cfg.lua
Normal file
@@ -0,0 +1,197 @@
|
||||
{{ $DISABLE_POLLS := .Env.DISABLE_POLLS | default "false" | toBool -}}
|
||||
{{ $ENABLE_AUTH := .Env.ENABLE_AUTH | default "0" | toBool -}}
|
||||
{{ $ENABLE_GUEST_DOMAIN := and $ENABLE_AUTH (.Env.ENABLE_GUESTS | default "0" | toBool) -}}
|
||||
{{ $ENABLE_RATE_LIMITS := .Env.PROSODY_ENABLE_RATE_LIMITS | default "0" | toBool -}}
|
||||
{{ $ENABLE_RECORDING := .Env.ENABLE_RECORDING | default "0" | toBool -}}
|
||||
{{ $ENABLE_SUBDOMAINS := .Env.ENABLE_SUBDOMAINS | default "true" | toBool -}}
|
||||
{{ $ENABLE_TRANSCRIPTIONS := .Env.ENABLE_TRANSCRIPTIONS | default "0" | toBool -}}
|
||||
{{ $ENABLE_XMPP_WEBSOCKET := .Env.ENABLE_XMPP_WEBSOCKET | default "1" | toBool -}}
|
||||
{{ $JIBRI_RECORDER_USER := .Env.JIBRI_RECORDER_USER | default "recorder" -}}
|
||||
{{ $JIGASI_TRANSCRIBER_USER := .Env.JIGASI_TRANSCRIBER_USER | default "transcriber" -}}
|
||||
{{ $LIMIT_MESSAGES_CHECK_TOKEN := .Env.PROSODY_LIMIT_MESSAGES_CHECK_TOKEN | default "0" | toBool -}}
|
||||
{{ $RATE_LIMIT_LOGIN_RATE := .Env.PROSODY_RATE_LIMIT_LOGIN_RATE | default "3" -}}
|
||||
{{ $RATE_LIMIT_SESSION_RATE := .Env.PROSODY_RATE_LIMIT_SESSION_RATE | default "200" -}}
|
||||
{{ $RATE_LIMIT_TIMEOUT := .Env.PROSODY_RATE_LIMIT_TIMEOUT | default "60" -}}
|
||||
{{ $RATE_LIMIT_ALLOW_RANGES := .Env.PROSODY_RATE_LIMIT_ALLOW_RANGES | default "10.0.0.0/8" -}}
|
||||
{{ $RATE_LIMIT_CACHE_SIZE := .Env.PROSODY_RATE_LIMIT_CACHE_SIZE | default "10000" -}}
|
||||
{{ $REGION_NAME := .Env.PROSODY_REGION_NAME | default "default" -}}
|
||||
{{ $RELEASE_NUMBER := .Env.RELEASE_NUMBER | default "" -}}
|
||||
{{ $SHARD_NAME := .Env.SHARD | default "default" -}}
|
||||
{{ $S2S_PORT := .Env.PROSODY_S2S_PORT | default "5269" -}}
|
||||
{{ $VISITOR_INDEX := .Env.PROSODY_VISITOR_INDEX | default "0" -}}
|
||||
{{ $VISITORS_MUC_PREFIX := .Env.PROSODY_VISITORS_MUC_PREFIX | default "muc" -}}
|
||||
{{ $VISITORS_MAX_VISITORS_PER_NODE := .Env.VISITORS_MAX_VISITORS_PER_NODE | default "250" }}
|
||||
{{ $VISITORS_XMPP_DOMAIN := .Env.VISITORS_XMPP_DOMAIN | default "meet.jitsi" -}}
|
||||
{{ $XMPP_AUTH_DOMAIN := .Env.XMPP_AUTH_DOMAIN | default "auth.meet.jitsi" -}}
|
||||
{{ $XMPP_DOMAIN := .Env.XMPP_DOMAIN | default "meet.jitsi" -}}
|
||||
{{ $XMPP_GUEST_DOMAIN := .Env.XMPP_GUEST_DOMAIN | default "guest.meet.jitsi" -}}
|
||||
{{ $XMPP_MUC_DOMAIN := .Env.XMPP_MUC_DOMAIN | default "muc.meet.jitsi" -}}
|
||||
{{ $XMPP_MUC_DOMAIN_PREFIX := (split "." $XMPP_MUC_DOMAIN)._0 -}}
|
||||
{{ $XMPP_SERVER := .Env.XMPP_SERVER | default "xmpp.meet.jitsi" -}}
|
||||
{{ $XMPP_SERVER_S2S_PORT := .Env.XMPP_SERVER_S2S_PORT | default $S2S_PORT -}}
|
||||
{{ $XMPP_HIDDEN_DOMAIN := .Env.XMPP_HIDDEN_DOMAIN | default "hidden.meet.jitsi" -}}
|
||||
|
||||
plugin_paths = { "/prosody-plugins/", "/prosody-plugins-custom", "/prosody-plugins-contrib" }
|
||||
|
||||
muc_mapper_domain_base = "v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}";
|
||||
muc_mapper_domain_prefix = "{{ $XMPP_MUC_DOMAIN_PREFIX }}";
|
||||
|
||||
http_default_host = "v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}"
|
||||
|
||||
main_domain = '{{ $XMPP_DOMAIN }}';
|
||||
|
||||
-- https://prosody.im/doc/modules/mod_smacks
|
||||
smacks_max_unacked_stanzas = 5;
|
||||
smacks_hibernation_time = 60;
|
||||
-- this is dropped in 0.12
|
||||
smacks_max_hibernated_sessions = 1;
|
||||
smacks_max_old_sessions = 1;
|
||||
|
||||
unlimited_jids = { "focus@{{ $XMPP_AUTH_DOMAIN }}" }
|
||||
limits = {
|
||||
c2s = {
|
||||
rate = "512kb/s";
|
||||
};
|
||||
s2sin = {
|
||||
rate = "512kb/s";
|
||||
};
|
||||
}
|
||||
|
||||
authentication = 'internal_hashed'
|
||||
storage = 'internal'
|
||||
|
||||
consider_websocket_secure = true;
|
||||
consider_bosh_secure = true;
|
||||
bosh_max_inactivity = 60;
|
||||
|
||||
-- this is added to make certs_s2soutinjection work
|
||||
s2sout_override = {
|
||||
["{{ $XMPP_MUC_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}"; -- needed for visitors to send messages to main room
|
||||
["{{ $XMPP_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
|
||||
["visitors.{{ $XMPP_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
|
||||
{{ if $ENABLE_GUEST_DOMAIN -}}
|
||||
["{{ $XMPP_GUEST_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
|
||||
{{ end -}}
|
||||
{{ if or $ENABLE_RECORDING $ENABLE_TRANSCRIPTIONS -}}
|
||||
["{{ $XMPP_HIDDEN_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
|
||||
{{ end -}}
|
||||
{{ if .Env.PROSODY_VISITORS_S2S_VHOSTS -}}
|
||||
{{- range $index, $vhost := (splitList "," .Env.PROSODY_VISITORS_S2S_VHOSTS | compact) }}
|
||||
["{{ $vhost }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
|
||||
{{ end -}}
|
||||
{{ end -}}
|
||||
{{ if not $DISABLE_POLLS -}}
|
||||
['polls.{{ $XMPP_DOMAIN }}'] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}";
|
||||
{{ end -}}
|
||||
|
||||
}
|
||||
|
||||
muc_limit_messages_count = 10;
|
||||
muc_limit_messages_check_token = {{ $LIMIT_MESSAGES_CHECK_TOKEN }};
|
||||
|
||||
----------- Virtual hosts -----------
|
||||
VirtualHost 'v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}'
|
||||
authentication = 'jitsi-anonymous'
|
||||
ssl = {
|
||||
key = "/config/certs/v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}.key";
|
||||
certificate = "/config/certs/v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}.crt";
|
||||
}
|
||||
modules_enabled = {
|
||||
'bosh';
|
||||
"external_services";
|
||||
{{ if $ENABLE_XMPP_WEBSOCKET -}}
|
||||
"websocket";
|
||||
"smacks"; -- XEP-0198: Stream Management
|
||||
{{ end -}}
|
||||
{{ if .Env.XMPP_MODULES }}
|
||||
"{{ join "\";\n\"" (splitList "," .Env.XMPP_MODULES | compact) }}";
|
||||
{{ end }}
|
||||
'features_identity';
|
||||
}
|
||||
main_muc = '{{ $VISITORS_MUC_PREFIX }}.v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}';
|
||||
shard_name = "{{ $SHARD_NAME }}"
|
||||
region_name = "{{ $REGION_NAME }}"
|
||||
release_number = "{{ $RELEASE_NUMBER }}"
|
||||
|
||||
{{ if .Env.XMPP_CONFIGURATION -}}
|
||||
{{ join "\n " (splitList "," .Env.XMPP_CONFIGURATION | compact) }}
|
||||
{{- end }}
|
||||
|
||||
VirtualHost '{{ $XMPP_AUTH_DOMAIN }}'
|
||||
modules_enabled = {
|
||||
'limits_exception';
|
||||
'smacks';
|
||||
}
|
||||
authentication = 'internal_hashed'
|
||||
smacks_hibernation_time = 15;
|
||||
|
||||
Component '{{ $VISITORS_MUC_PREFIX }}.v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}' 'muc'
|
||||
storage = 'memory'
|
||||
muc_room_cache_size = 10000
|
||||
restrict_room_creation = true
|
||||
modules_enabled = {
|
||||
"muc_hide_all";
|
||||
"muc_meeting_id";
|
||||
'fmuc';
|
||||
's2s_bidi';
|
||||
's2s_whitelist';
|
||||
's2sout_override';
|
||||
'muc_max_occupants';
|
||||
{{ if $ENABLE_SUBDOMAINS -}}
|
||||
"muc_domain_mapper";
|
||||
{{ end -}}
|
||||
{{ if $ENABLE_RATE_LIMITS -}}
|
||||
"muc_rate_limit";
|
||||
"rate_limit";
|
||||
{{ end -}}
|
||||
{{ if .Env.XMPP_MUC_MODULES -}}
|
||||
"{{ join "\";\n\"" (splitList "," .Env.XMPP_MUC_MODULES | compact) }}";
|
||||
{{ end -}}
|
||||
}
|
||||
muc_room_default_presence_broadcast = {
|
||||
visitor = false;
|
||||
participant = true;
|
||||
moderator = true;
|
||||
};
|
||||
muc_room_locking = false
|
||||
muc_room_default_public_jids = true
|
||||
muc_max_occupants = {{ $VISITORS_MAX_VISITORS_PER_NODE}}
|
||||
muc_access_whitelist = {
|
||||
"{{ $XMPP_DOMAIN }}";
|
||||
}
|
||||
muc_tombstones = false
|
||||
muc_room_allow_persistent = false
|
||||
|
||||
{{ if $ENABLE_RATE_LIMITS -}}
|
||||
-- Max allowed join/login rate in events per second.
|
||||
rate_limit_login_rate = {{ $RATE_LIMIT_LOGIN_RATE }};
|
||||
-- The rate to which sessions from IPs exceeding the join rate will be limited, in bytes per second.
|
||||
rate_limit_session_rate = {{ $RATE_LIMIT_SESSION_RATE }};
|
||||
-- The time in seconds, after which the limit for an IP address is lifted.
|
||||
rate_limit_timeout = {{ $RATE_LIMIT_TIMEOUT }};
|
||||
-- List of regular expressions for IP addresses that are not limited by this module.
|
||||
rate_limit_whitelist = {
|
||||
"127.0.0.1";
|
||||
{{ range $index, $cidr := (splitList "," $RATE_LIMIT_ALLOW_RANGES) -}}
|
||||
"{{ $cidr }}";
|
||||
{{ end -}}
|
||||
};
|
||||
|
||||
rate_limit_whitelist_jids = {
|
||||
"{{ $JIBRI_RECORDER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}",
|
||||
"{{ $JIGASI_TRANSCRIBER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}"
|
||||
}
|
||||
|
||||
{{ end -}}
|
||||
|
||||
-- The size of the cache that saves state for IP addresses
|
||||
rate_limit_cache_size = {{ $RATE_LIMIT_CACHE_SIZE }};
|
||||
|
||||
muc_rate_joins = 30;
|
||||
{{ if .Env.XMPP_MUC_CONFIGURATION -}}
|
||||
{{ join "\n" (splitList "," .Env.XMPP_MUC_CONFIGURATION | compact) }}
|
||||
{{ end -}}
|
||||
|
||||
{{ if not $DISABLE_POLLS -}}
|
||||
Component 'polls.v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}' 'polls_component'
|
||||
{{ end -}}
|
||||
439
jitsi/prosody/rootfs/defaults/prosody.cfg.lua
Normal file
439
jitsi/prosody/rootfs/defaults/prosody.cfg.lua
Normal file
@@ -0,0 +1,439 @@
|
||||
{{ $C2S_REQUIRE_ENCRYPTION := .Env.PROSODY_C2S_REQUIRE_ENCRYPTION | default "1" | toBool -}}
|
||||
{{ $DISABLE_C2S_LIMIT := .Env.PROSODY_DISABLE_C2S_LIMIT | default "0" | toBool -}}
|
||||
{{ $DISABLE_POLLS := .Env.DISABLE_POLLS | default "false" | toBool -}}
|
||||
{{ $DISABLE_S2S_LIMIT := .Env.PROSODY_DISABLE_S2S_LIMIT | default "0" | toBool -}}
|
||||
{{ $ENABLE_AUTH := .Env.ENABLE_AUTH | default "0" | toBool -}}
|
||||
{{ $ENABLE_GUEST_DOMAIN := and $ENABLE_AUTH (.Env.ENABLE_GUESTS | default "0" | toBool) -}}
|
||||
{{ $ENABLE_IPV6 := .Env.ENABLE_IPV6 | default "true" | toBool -}}
|
||||
{{ $ENABLE_RECORDING := .Env.ENABLE_RECORDING | default "0" | toBool -}}
|
||||
{{ $ENABLE_TRANSCRIPTIONS := .Env.ENABLE_TRANSCRIPTIONS | default "0" | toBool -}}
|
||||
{{ $ENABLE_VISITORS := .Env.ENABLE_VISITORS | default "0" | toBool -}}
|
||||
{{ $ENABLE_S2S := or $ENABLE_VISITORS ( .Env.PROSODY_ENABLE_S2S | default "0" | toBool ) }}
|
||||
{{ $GC_TYPE := .Env.GC_TYPE | default "incremental" -}}
|
||||
{{ $GC_INC_TH := .Env.GC_INC_TH | default 400 -}}
|
||||
{{ $GC_INC_SPEED := .Env.GC_INC_SPEED | default 250 -}}
|
||||
{{ $GC_INC_STEP_SIZE := .Env.GC_INC_STEP_SIZE | default 13 -}}
|
||||
{{ $GC_GEN_MIN_TH := .Env.GC_GEN_MIN_TH | default 20 -}}
|
||||
{{ $GC_GEN_MAX_TH := .Env.GC_GEN_MAX_TH | default 100 -}}
|
||||
{{ $LOG_LEVEL := .Env.LOG_LEVEL | default "info" }}
|
||||
{{ $PROSODY_C2S_LIMIT := .Env.PROSODY_C2S_LIMIT | default "10kb/s" -}}
|
||||
{{ $PROSODY_METRICS_ALLOWED_CIDR := .Env.PROSODY_METRICS_ALLOWED_CIDR | default "172.16.0.0/12" -}}
|
||||
{{ $PROSODY_HTTP_PORT := .Env.PROSODY_HTTP_PORT | default "5280" -}}
|
||||
{{ $PROSODY_ENABLE_METRICS := .Env.PROSODY_ENABLE_METRICS | default "false" | toBool -}}
|
||||
{{ $PROSODY_ENABLE_STANZA_COUNTS := .Env.PROSODY_ENABLE_STANZA_COUNTS | default "false" | toBool -}}
|
||||
{{ $PROSODY_ADMINS := .Env.PROSODY_ADMINS | default "" -}}
|
||||
{{ $PROSODY_ADMIN_LIST := splitList "," $PROSODY_ADMINS | compact -}}
|
||||
{{ $PROSODY_MODE := .Env.PROSODY_MODE | default "client" -}}
|
||||
{{ $TRUSTED_PROXIES := .Env.PROSODY_TRUSTED_PROXIES | default "127.0.0.1,::1" -}}
|
||||
{{ $TRUSTED_PROXY_LIST := splitList "," $TRUSTED_PROXIES | compact -}}
|
||||
{{ $PROSODY_S2S_LIMIT := .Env.PROSODY_S2S_LIMIT | default "30kb/s" -}}
|
||||
{{ $S2S_PORT := .Env.PROSODY_S2S_PORT | default "5269" }}
|
||||
{{ $STUN_HOST := .Env.STUN_HOST | default "" -}}
|
||||
{{ $STUN_PORT := .Env.STUN_PORT | default "443" -}}
|
||||
{{ $TURNS_HOST := .Env.TURNS_HOST | default "" -}}
|
||||
{{ $TURNS_HOSTS := splitList "," $TURNS_HOST | compact -}}
|
||||
{{ $TURNS_PORT := .Env.TURNS_PORT | default "443" -}}
|
||||
{{ $TURN_HOST := .Env.TURN_HOST | default "" -}}
|
||||
{{ $TURN_HOSTS := splitList "," $TURN_HOST | compact -}}
|
||||
{{ $TURN_PORT := .Env.TURN_PORT | default "443" -}}
|
||||
{{ $TURN_TRANSPORT := .Env.TURN_TRANSPORT | default "tcp" -}}
|
||||
{{ $TURN_TRANSPORTS := splitList "," $TURN_TRANSPORT | compact -}}
|
||||
{{ $TURN_TTL := .Env.TURN_TTL | default "86400" -}}
|
||||
{{ $VISITORS_MUC_PREFIX := .Env.PROSODY_VISITORS_MUC_PREFIX | default "muc" -}}
|
||||
{{ $VISITORS_XMPP_DOMAIN := .Env.VISITORS_XMPP_DOMAIN | default "meet.jitsi" -}}
|
||||
{{ $VISITORS_XMPP_SERVER := .Env.VISITORS_XMPP_SERVER | default "" -}}
|
||||
{{ $VISITORS_XMPP_SERVERS := splitList "," $VISITORS_XMPP_SERVER | compact -}}
|
||||
{{ $VISITORS_XMPP_PORT := .Env.VISITORS_XMPP_PORT | default 52220 }}
|
||||
{{ $XMPP_DOMAIN := .Env.XMPP_DOMAIN | default "meet.jitsi" -}}
|
||||
{{ $XMPP_GUEST_DOMAIN := .Env.XMPP_GUEST_DOMAIN | default "guest.meet.jitsi" -}}
|
||||
{{ $XMPP_MUC_DOMAIN := .Env.XMPP_MUC_DOMAIN | default "muc.meet.jitsi" -}}
|
||||
{{ $XMPP_PORT := .Env.XMPP_PORT | default "5222" -}}
|
||||
{{ $XMPP_HIDDEN_DOMAIN := .Env.XMPP_HIDDEN_DOMAIN | default "hidden.meet.jitsi" -}}
|
||||
|
||||
-- Prosody Example Configuration File
|
||||
--
|
||||
-- Information on configuring Prosody can be found on our
|
||||
-- website at http://prosody.im/doc/configure
|
||||
--
|
||||
-- Tip: You can check that the syntax of this file is correct
|
||||
-- when you have finished by running: luac -p prosody.cfg.lua
|
||||
-- If there are any errors, it will let you know what and where
|
||||
-- they are, otherwise it will keep quiet.
|
||||
--
|
||||
-- The only thing left to do is rename this file to remove the .dist ending, and fill in the
|
||||
-- blanks. Good luck, and happy Jabbering!
|
||||
|
||||
|
||||
---------- Server-wide settings ----------
|
||||
-- Settings in this section apply to the whole server and are the default settings
|
||||
-- for any virtual hosts
|
||||
|
||||
-- This is a (by default, empty) list of accounts that are admins
|
||||
-- for the server. Note that you must create the accounts separately
|
||||
-- (see http://prosody.im/doc/creating_accounts for info)
|
||||
-- Example: admins = { "user1@example.com", "user2@example.net" }
|
||||
admins = { {{ if .Env.PROSODY_ADMINS }}{{ range $index, $element := $PROSODY_ADMIN_LIST -}}{{ if $index }}, {{ end }}"{{ $element }}"{{ end }}{{ end }} }
|
||||
|
||||
component_admins_as_room_owners = true
|
||||
|
||||
-- Enable use of libevent for better performance under high load
|
||||
-- For more information see: http://prosody.im/doc/libevent
|
||||
--use_libevent = true;
|
||||
|
||||
-- This is the list of modules Prosody will load on startup.
|
||||
-- It looks for mod_modulename.lua in the plugins folder, so make sure that exists too.
|
||||
-- Documentation on modules can be found at: http://prosody.im/doc/modules
|
||||
modules_enabled = {
|
||||
|
||||
-- Generally required
|
||||
"roster"; -- Allow users to have a roster. Recommended ;)
|
||||
"saslauth"; -- Authentication for clients and servers. Recommended if you want to log in.
|
||||
"tls"; -- Add support for secure TLS on c2s/s2s connections
|
||||
"disco"; -- Service discovery
|
||||
{{- if eq $PROSODY_MODE "client" }}
|
||||
-- Not essential, but recommended
|
||||
"private"; -- Private XML storage (for room bookmarks, etc.)
|
||||
"limits"; -- Enable bandwidth limiting for XMPP connections
|
||||
|
||||
-- These are commented by default as they have a performance impact
|
||||
--"privacy"; -- Support privacy lists
|
||||
--"compression"; -- Stream compression (Debian: requires lua-zlib module to work)
|
||||
|
||||
-- Admin interfaces
|
||||
-- "admin_adhoc"; -- Allows administration via an XMPP client that supports ad-hoc commands
|
||||
--"admin_telnet"; -- Opens telnet console interface on localhost port 5582
|
||||
|
||||
-- Nice to have
|
||||
"version"; -- Replies to server version requests
|
||||
{{- end }}
|
||||
"ping"; -- Replies to XMPP pings with pongs
|
||||
{{- if eq $PROSODY_MODE "visitors" }}
|
||||
"limits"; -- Enable bandwidth limiting for XMPP connections
|
||||
{{- end }}
|
||||
-- HTTP modules
|
||||
--"bosh"; -- Enable BOSH clients, aka "Jabber over HTTP"
|
||||
--"http_files"; -- Serve static files from a directory over HTTP
|
||||
|
||||
-- Other specific functionality
|
||||
"posix"; -- POSIX functionality, sends server to background, enables syslog, etc.
|
||||
--"groups"; -- Shared roster support
|
||||
--"announce"; -- Send announcement to all online users
|
||||
--"welcome"; -- Welcome users who register accounts
|
||||
--"watchregistrations"; -- Alert admins of registrations
|
||||
--"motd"; -- Send a message to users when they log in
|
||||
--"legacyauth"; -- Legacy authentication. Only used by some old clients and bots.
|
||||
"http_health";
|
||||
{{ if eq $PROSODY_MODE "brewery" -}}
|
||||
"firewall"; -- Enable firewalling
|
||||
"secure_interfaces";
|
||||
{{ end -}}
|
||||
{{ if $ENABLE_S2S -}}
|
||||
"s2s_bidi";
|
||||
"certs_s2soutinjection";
|
||||
"s2sout_override";
|
||||
"s2s_whitelist";
|
||||
{{ end -}}
|
||||
{{- if or .Env.TURN_HOST .Env.TURNS_HOST }}
|
||||
"external_services";
|
||||
{{- end }}
|
||||
|
||||
{{ if $PROSODY_ENABLE_METRICS }}
|
||||
-- metrics collection functionality
|
||||
"http_openmetrics";
|
||||
{{ end -}}
|
||||
|
||||
{{ if $PROSODY_ENABLE_STANZA_COUNTS }}
|
||||
-- Stanza count metrics for monitoring
|
||||
"measure_stanza_counts";
|
||||
{{ end -}}
|
||||
|
||||
{{ if .Env.GLOBAL_MODULES }}
|
||||
"{{ join "\";\n\"" (splitList "," .Env.GLOBAL_MODULES | compact) }}";
|
||||
{{ end }}
|
||||
};
|
||||
|
||||
component_ports = { }
|
||||
https_ports = { }
|
||||
|
||||
trusted_proxies = {
|
||||
{{ range $index, $proxy := $TRUSTED_PROXY_LIST }}
|
||||
"{{ $proxy }}";
|
||||
{{ end }}
|
||||
}
|
||||
|
||||
{{ if eq $PROSODY_MODE "brewery" -}}
|
||||
firewall_scripts = {
|
||||
"/config/rules.d/jvb_muc_presence_filter.pfw";
|
||||
};
|
||||
{{ end -}}
|
||||
|
||||
-- These modules are auto-loaded, but should you want
|
||||
-- to disable them then uncomment them here:
|
||||
modules_disabled = {
|
||||
"offline"; -- Store offline messages
|
||||
"register";
|
||||
-- "c2s"; -- Handle client connections
|
||||
|
||||
{{ if not $ENABLE_S2S -}}
|
||||
"s2s"; -- Handle server-to-server connections
|
||||
{{ end -}}
|
||||
};
|
||||
|
||||
-- Disable account creation by default, for security
|
||||
-- For more information see http://prosody.im/doc/creating_accounts
|
||||
allow_registration = false;
|
||||
|
||||
{{ if and (ne $PROSODY_MODE "brewery") (or (not $DISABLE_C2S_LIMIT) (not $DISABLE_S2S_LIMIT)) -}}
|
||||
-- Enable rate limits for incoming connections
|
||||
limits = {
|
||||
{{ if not $DISABLE_C2S_LIMIT }}
|
||||
-- Limit incoming client connections
|
||||
c2s = {
|
||||
rate = "{{ $PROSODY_C2S_LIMIT }}";
|
||||
};
|
||||
{{ end }}
|
||||
{{ if not $DISABLE_S2S_LIMIT }}
|
||||
-- Limit incoming server connections
|
||||
s2sin = {
|
||||
rate = "{{ $PROSODY_S2S_LIMIT }}";
|
||||
};
|
||||
{{ end }}
|
||||
}
|
||||
{{ end -}}
|
||||
|
||||
--Prosody garbage collector settings
|
||||
--For more information see https://prosody.im/doc/advanced_gc
|
||||
{{ if eq $GC_TYPE "generational" }}
|
||||
gc = {
|
||||
mode = "generational";
|
||||
minor_threshold = {{ $GC_GEN_MIN_TH }};
|
||||
major_threshold = {{ $GC_GEN_MAX_TH }};
|
||||
}
|
||||
{{ else }}
|
||||
gc = {
|
||||
mode = "incremental";
|
||||
threshold = {{ $GC_INC_TH }};
|
||||
speed = {{ $GC_INC_SPEED }};
|
||||
step_size = {{ $GC_INC_STEP_SIZE }};
|
||||
}
|
||||
{{ end }}
|
||||
|
||||
pidfile = "/config/data/prosody.pid";
|
||||
|
||||
-- Force clients to use encrypted connections? This option will
|
||||
-- prevent clients from authenticating unless they are using encryption.
|
||||
|
||||
c2s_require_encryption = {{ $C2S_REQUIRE_ENCRYPTION }};
|
||||
|
||||
-- set c2s port
|
||||
c2s_ports = { {{ $XMPP_PORT }} } -- Listen on specific c2s port
|
||||
{{ if $ENABLE_IPV6 }}
|
||||
c2s_interfaces = { "*", "::" }
|
||||
{{ else }}
|
||||
c2s_interfaces = { "*" }
|
||||
{{ end }}
|
||||
|
||||
{{ if $ENABLE_S2S -}}
|
||||
-- set s2s port
|
||||
s2s_ports = { {{ $S2S_PORT }} } -- Listen on specific s2s port
|
||||
|
||||
{{ if eq $PROSODY_MODE "visitors" -}}
|
||||
s2s_whitelist = {
|
||||
{{- if $ENABLE_VISITORS }}
|
||||
'{{ $XMPP_MUC_DOMAIN }}'; -- needed for visitors to send messages to main room
|
||||
'visitors.{{ $XMPP_DOMAIN }}'; -- needed for sending promotion request to visitors.{{ $XMPP_DOMAIN }} component
|
||||
'{{ $XMPP_DOMAIN }}'; -- unavailable presences back to main room
|
||||
{{- if not $DISABLE_POLLS }}
|
||||
'polls.{{ $XMPP_DOMAIN }}';
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- if $ENABLE_GUEST_DOMAIN }}
|
||||
'{{ $XMPP_GUEST_DOMAIN }}';
|
||||
{{- end }}
|
||||
{{ if or $ENABLE_RECORDING $ENABLE_TRANSCRIPTIONS -}}
|
||||
'{{ $XMPP_HIDDEN_DOMAIN }}';
|
||||
{{- end }}
|
||||
|
||||
{{- if .Env.PROSODY_VISITORS_S2S_VHOSTS }}
|
||||
'{{ join "';\n '" (splitList "," .Env.PROSODY_VISITORS_S2S_VHOSTS | compact) }}';
|
||||
{{- end }}
|
||||
}
|
||||
{{ end -}}
|
||||
|
||||
{{ end -}}
|
||||
|
||||
{{ if $ENABLE_VISITORS -}}
|
||||
{{ if $.Env.VISITORS_XMPP_SERVER -}}
|
||||
s2sout_override = {
|
||||
{{ range $index, $element := $VISITORS_XMPP_SERVERS -}}
|
||||
{{ $SERVER := splitn ":" 2 $element }}
|
||||
{{ $DEFAULT_PORT := add $VISITORS_XMPP_PORT $index }}
|
||||
["{{ $VISITORS_MUC_PREFIX }}.v{{ $index }}.{{ $VISITORS_XMPP_DOMAIN }}"] = "tcp://{{ $SERVER._0 }}:{{ $SERVER._1 | default $DEFAULT_PORT }}";
|
||||
["v{{ $index }}.{{ $VISITORS_XMPP_DOMAIN }}"] = "tcp://{{ $SERVER._0 }}:{{ $SERVER._1 | default $DEFAULT_PORT }}";
|
||||
["polls.v{{ $index }}.{{ $VISITORS_XMPP_DOMAIN }}"] = "tcp://{{ $SERVER._0 }}:{{ $SERVER._1 | default $DEFAULT_PORT }}";
|
||||
{{ end -}}
|
||||
};
|
||||
{{ if ne $PROSODY_MODE "visitors" -}}
|
||||
s2s_whitelist = {
|
||||
{{ range $index, $element := $VISITORS_XMPP_SERVERS -}}
|
||||
"{{ $VISITORS_MUC_PREFIX }}.v{{ $index }}.{{ $VISITORS_XMPP_DOMAIN }}";
|
||||
"polls.v{{ $index }}.{{ $VISITORS_XMPP_DOMAIN }}";
|
||||
{{ end -}}
|
||||
};
|
||||
{{ end -}}
|
||||
{{ end -}}
|
||||
{{ end -}}
|
||||
|
||||
|
||||
-- Force certificate authentication for server-to-server connections?
|
||||
-- This provides ideal security, but requires servers you communicate
|
||||
-- with to support encryption AND present valid, trusted certificates.
|
||||
-- NOTE: Your version of LuaSec must support certificate verification!
|
||||
-- For more information see http://prosody.im/doc/s2s#security
|
||||
|
||||
s2s_secure_auth = false
|
||||
|
||||
-- Many servers don't support encryption or have invalid or self-signed
|
||||
-- certificates. You can list domains here that will not be required to
|
||||
-- authenticate using certificates. They will be authenticated using DNS.
|
||||
|
||||
--s2s_insecure_domains = { "gmail.com" }
|
||||
|
||||
-- Even if you leave s2s_secure_auth disabled, you can still require valid
|
||||
-- certificates for some domains by specifying a list here.
|
||||
|
||||
--s2s_secure_domains = { "jabber.org" }
|
||||
|
||||
-- Select the authentication backend to use. The 'internal' providers
|
||||
-- use Prosody's configured data storage to store the authentication data.
|
||||
-- To allow Prosody to offer secure authentication mechanisms to clients, the
|
||||
-- default provider stores passwords in plaintext. If you do not trust your
|
||||
-- server please see http://prosody.im/doc/modules/mod_auth_internal_hashed
|
||||
-- for information about using the hashed backend.
|
||||
|
||||
authentication = "internal_hashed"
|
||||
|
||||
-- Select the storage backend to use. By default Prosody uses flat files
|
||||
-- in its configured data directory, but it also supports more backends
|
||||
-- through modules. An "sql" backend is included by default, but requires
|
||||
-- additional dependencies. See http://prosody.im/doc/storage for more info.
|
||||
|
||||
--storage = "sql" -- Default is "internal" (Debian: "sql" requires one of the
|
||||
-- lua-dbi-sqlite3, lua-dbi-mysql or lua-dbi-postgresql packages to work)
|
||||
|
||||
-- For the "sql" backend, you can uncomment *one* of the below to configure:
|
||||
--sql = { driver = "SQLite3", database = "prosody.sqlite" } -- Default. 'database' is the filename.
|
||||
--sql = { driver = "MySQL", database = "prosody", username = "prosody", password = "secret", host = "localhost" }
|
||||
--sql = { driver = "PostgreSQL", database = "prosody", username = "prosody", password = "secret", host = "localhost" }
|
||||
|
||||
-- Logging configuration
|
||||
-- For advanced logging see http://prosody.im/doc/logging
|
||||
--
|
||||
-- Debian:
|
||||
-- Logs info and higher to /var/log
|
||||
-- Logs errors to syslog also
|
||||
log = {
|
||||
{ levels = {min = "{{ $LOG_LEVEL }}"}, timestamps = "%Y-%m-%d %X", to = "console"};
|
||||
{{ if .Env.PROSODY_LOG_CONFIG }}
|
||||
{{ join "\n" (splitList "\\n" .Env.PROSODY_LOG_CONFIG | compact) }}
|
||||
{{ end }}
|
||||
}
|
||||
|
||||
{{ if $PROSODY_ENABLE_METRICS }}
|
||||
-- Statistics Provider configuration
|
||||
statistics = "internal"
|
||||
statistics_interval = "manual"
|
||||
openmetrics_allow_cidr = "{{ $PROSODY_METRICS_ALLOWED_CIDR }}"
|
||||
{{ end }}
|
||||
|
||||
{{ if .Env.TURN_CREDENTIALS -}}
|
||||
external_service_secret = "{{.Env.TURN_CREDENTIALS}}";
|
||||
{{- end }}
|
||||
|
||||
{{ if or .Env.STUN_HOST .Env.TURN_HOST .Env.TURNS_HOST -}}
|
||||
external_services = {
|
||||
{{- if $STUN_HOST }}
|
||||
{ type = "stun", host = "{{ $STUN_HOST }}", port = {{ $STUN_PORT }}, transport = "udp" }
|
||||
{{- end }}
|
||||
{{- if $TURN_HOST -}}
|
||||
{{- range $idx1, $host := $TURN_HOSTS -}}
|
||||
{{- range $idx2, $transport := $TURN_TRANSPORTS -}}
|
||||
{{- if or $STUN_HOST $idx1 $idx2 -}},{{- end }}
|
||||
{
|
||||
type = "turn",
|
||||
host = "{{ $host }}",
|
||||
port = {{ $TURN_PORT }},
|
||||
transport = "{{ $transport }}",
|
||||
ttl = {{ $TURN_TTL }},
|
||||
|
||||
{{ if $.Env.TURN_CREDENTIALS -}}
|
||||
secret = true,
|
||||
algorithm = "turn",
|
||||
{{- end }}
|
||||
|
||||
{{ if $.Env.TURN_USERNAME -}}
|
||||
username = "{{$.Env.TURN_USERNAME}}",
|
||||
{{- end }}
|
||||
|
||||
{{ if $.Env.TURN_PASSWORD -}}
|
||||
password = "{{$.Env.TURN_PASSWORD}}",
|
||||
{{- end }}
|
||||
}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- if $TURNS_HOST -}}
|
||||
{{- range $idx, $host := $TURNS_HOSTS -}}
|
||||
{{- if or $STUN_HOST $TURN_HOST $idx -}},{{- end }}
|
||||
{
|
||||
type = "turns",
|
||||
host = "{{ $host }}",
|
||||
port = {{ $TURNS_PORT }},
|
||||
transport = "tcp",
|
||||
ttl = {{ $TURN_TTL }},
|
||||
|
||||
{{ if $.Env.TURN_CREDENTIALS -}}
|
||||
secret = true,
|
||||
algorithm = "turn",
|
||||
{{- end }}
|
||||
|
||||
{{ if $.Env.TURN_USERNAME -}}
|
||||
username = "{{$.Env.TURN_USERNAME}}",
|
||||
{{- end }}
|
||||
|
||||
{{ if $.Env.TURN_PASSWORD -}}
|
||||
password = "{{$.Env.TURN_PASSWORD}}",
|
||||
{{- end }}
|
||||
}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
};
|
||||
{{- end }}
|
||||
|
||||
|
||||
{{ if .Env.GLOBAL_CONFIG }}
|
||||
{{ join "\n" (splitList "\\n" .Env.GLOBAL_CONFIG | compact) }}
|
||||
{{ end }}
|
||||
|
||||
-- Enable use of native prosody 0.11 support for epoll over select
|
||||
network_backend = "epoll";
|
||||
-- Set the TCP backlog to 511 since the kernel rounds it up to the next power of 2: 512.
|
||||
network_settings = {
|
||||
tcp_backlog = 511;
|
||||
}
|
||||
unbound = {
|
||||
resolvconf = true
|
||||
}
|
||||
|
||||
http_ports = { {{ $PROSODY_HTTP_PORT }} }
|
||||
{{ if $ENABLE_IPV6 }}
|
||||
http_interfaces = { "*", "::" }
|
||||
{{ else }}
|
||||
http_interfaces = { "*" }
|
||||
{{ end }}
|
||||
|
||||
data_path = "/config/data"
|
||||
|
||||
Include "conf.d/*.cfg.lua"
|
||||
@@ -0,0 +1,13 @@
|
||||
{{ $JVB_XMPP_AUTH_DOMAIN := .Env.JVB_XMPP_AUTH_DOMAIN | default "auth.jvb.meet.jitsi" -}}
|
||||
{{ $JVB_XMPP_INTERNAL_MUC_DOMAIN := .Env.JVB_XMPP_INTERNAL_MUC_DOMAIN | default "muc.jvb.meet.jitsi" -}}
|
||||
{{ $JVB_AUTH_USER := .Env.JVB_AUTH_USER | default "jvb" -}}
|
||||
{{ $JVB_BREWERY_MUC := .Env.JVB_BREWERY_MUC | default "jvbbrewery" -}}
|
||||
# Drop all presence from a jvb in a MUC to a jvb
|
||||
FROM: {{ $JVB_BREWERY_MUC }}@{{ $JVB_XMPP_INTERNAL_MUC_DOMAIN }}
|
||||
TO: {{ $JVB_AUTH_USER }}@{{ $JVB_XMPP_AUTH_DOMAIN }}
|
||||
KIND: presence
|
||||
# Seems safer to allow all "unavailable" to pass
|
||||
TYPE: available
|
||||
# Allow self-presence (code=110)
|
||||
NOT INSPECT: {http://jabber.org/protocol/muc#user}x/status@code=110
|
||||
DROP.
|
||||
30
jitsi/prosody/rootfs/defaults/saslauthd.conf
Normal file
30
jitsi/prosody/rootfs/defaults/saslauthd.conf
Normal file
@@ -0,0 +1,30 @@
|
||||
{{ $AUTH_TYPE := .Env.AUTH_TYPE | default "internal" -}}
|
||||
{{ $PROSODY_AUTH_TYPE := .Env.PROSODY_AUTH_TYPE | default $AUTH_TYPE }}
|
||||
{{ $XMPP_DOMAIN := .Env.XMPP_DOMAIN | default "meet.jitsi" -}}
|
||||
|
||||
{{ if eq $PROSODY_AUTH_TYPE "ldap" }}
|
||||
ldap_servers: {{ .Env.LDAP_URL }}
|
||||
ldap_search_base: {{ .Env.LDAP_BASE }}
|
||||
{{ if .Env.LDAP_BINDDN | default "" }}
|
||||
ldap_bind_dn: {{ .Env.LDAP_BINDDN }}
|
||||
ldap_bind_pw: {{ .Env.LDAP_BINDPW }}
|
||||
{{ end }}
|
||||
ldap_filter: {{ .Env.LDAP_FILTER | default "uid=%u" }}
|
||||
ldap_version: {{ .Env.LDAP_VERSION | default "3" }}
|
||||
ldap_auth_method: {{ .Env.LDAP_AUTH_METHOD | default "bind" }}
|
||||
{{ if .Env.LDAP_USE_TLS | default "0" | toBool }}
|
||||
ldap_tls_key: /config/certs/{{ $XMPP_DOMAIN }}.key
|
||||
ldap_tls_cert: /config/certs/{{ $XMPP_DOMAIN }}.crt
|
||||
{{ if .Env.LDAP_TLS_CHECK_PEER | default "0" | toBool }}
|
||||
ldap_tls_check_peer: yes
|
||||
ldap_tls_cacert_file: {{ .Env.LDAP_TLS_CACERT_FILE | default "/etc/ssl/certs/ca-certificates.crt" }}
|
||||
ldap_tls_cacert_dir: {{ .Env.LDAP_TLS_CACERT_DIR | default "/etc/ssl/certs" }}
|
||||
{{ end }}
|
||||
{{ if .Env.LDAP_TLS_CIPHERS }}
|
||||
ldap_tls_ciphers: {{ .Env.LDAP_TLS_CIPHERS }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
{{ if .Env.LDAP_START_TLS | default "0" | toBool }}
|
||||
ldap_start_tls: yes
|
||||
{{ end }}
|
||||
Reference in New Issue
Block a user