@drumee/setup-infra 1.0.15 → 1.0.19
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bin/create-local-certs +38 -0
- package/bin/env +8 -5
- package/bin/init-acme +23 -4
- package/bin/init-named +1 -1
- package/bin/install +28 -4
- package/bin/prosody +21 -12
- package/index.js +316 -218
- package/package.json +2 -2
- package/templates/etc/bind/named.conf.local +39 -0
- package/templates/etc/bind/named.conf.options +13 -4
- package/templates/etc/dhcp/dhclient.conf +55 -0
- package/templates/etc/drumee/certs/jitsi.private.cnf +13 -0
- package/templates/etc/drumee/certs/private.cnf +13 -0
- package/templates/etc/drumee/conf.d/conference.private.json +9 -0
- package/templates/etc/drumee/conf.d/conference.public.json +9 -0
- package/templates/etc/drumee/conf.d/myDrumee.json.tpl +2 -1
- package/templates/etc/drumee/drumee.sh.tpl +33 -17
- package/templates/etc/drumee/infrastructure/internals/accel.private.conf.tpl +47 -0
- package/templates/etc/drumee/infrastructure/internals/{accel.conf.tpl → accel.public.conf.tpl} +1 -1
- package/templates/etc/drumee/infrastructure/{platform.json.tpl → mfs.private.conf.tpl} +5 -5
- package/templates/etc/drumee/infrastructure/{mfs.conf.tpl → mfs.public.conf.tpl} +1 -1
- package/templates/etc/drumee/infrastructure/routes/private.conf.tpl +143 -0
- package/templates/etc/drumee/infrastructure/routes/{main.conf.tpl → public.conf.tpl} +18 -28
- package/templates/etc/drumee/infrastructure/servers/tt.conf +9 -9
- package/templates/etc/drumee/ssl/private.conf.tpl +2 -1
- package/templates/etc/drumee/ssl/public.conf.tpl +1 -1
- package/templates/etc/jitsi/jicofo/jicofo.private.conf.tpl +46 -0
- package/templates/etc/jitsi/jicofo/{jicofo.conf.tpl → jicofo.public.conf.tpl} +7 -7
- package/templates/etc/jitsi/jicofo/sip-cmmunicator.private.properties +3 -0
- package/templates/etc/jitsi/jicofo/sip-cmmunicator.public.properties +3 -0
- package/templates/etc/jitsi/meet.private.conf.tpl +132 -0
- package/templates/etc/jitsi/{meet.conf.tpl → meet.public.conf.tpl} +5 -5
- package/templates/etc/jitsi/ssl.private.conf.tpl +25 -0
- package/templates/etc/jitsi/{ssl.conf.tpl → ssl.public.conf.tpl} +3 -3
- package/templates/etc/jitsi/videobridge/defaults/jvb.conf +1 -1
- package/templates/etc/jitsi/videobridge/jvb.private.conf +67 -0
- package/templates/etc/jitsi/videobridge/{jvb.conf → jvb.public.conf} +6 -6
- package/templates/etc/jitsi/web/config.private.js.tpl +208 -0
- package/templates/etc/jitsi/web/{config.js.tpl → config.public.js.tpl} +4 -4
- package/templates/etc/jitsi/web/defaults/default +2 -2
- package/templates/etc/jitsi/web/defaults/meet.conf +3 -3
- package/templates/etc/mysql/mariadb.conf.d/50-server.cnf +3 -3
- package/templates/etc/nginx/modules-enabled/{90-turn-relay.conf → 90-turn-relay.private.conf.tpl} +6 -6
- package/templates/etc/nginx/modules-enabled/{90-turn-relay.conf.tpl → 90-turn-relay.public.conf.tpl} +4 -4
- package/templates/etc/nginx/nginx.conf +3 -1
- package/templates/etc/nginx/sites-enabled/{public.conf.tpl → 01-public.conf.tpl} +7 -7
- package/templates/etc/nginx/sites-enabled/{private.conf.tpl → 02-private.conf.tpl} +6 -6
- package/templates/etc/nginx/sites-enabled/{jitsi.conf.tpl → 20-jitsi.private.conf.tpl} +9 -9
- package/templates/etc/nginx/sites-enabled/{pivate.jitsi.conf.tpl → 20-jitsi.public.conf.tpl} +9 -9
- package/templates/etc/nginx/sites-enabled/{localhost.conf → loopback.tpl} +10 -9
- package/templates/etc/nginx/sites-enabled/turnrelay.conf.tpl +4 -4
- package/templates/etc/prosody/conf.d/private.cfg.lua.tpl +51 -51
- package/templates/etc/prosody/conf.d/public.cfg.lua.tpl +47 -47
- package/templates/etc/prosody/defaults/conf.d/jitsi-meet.cfg.lua +3 -3
- package/templates/etc/turnserver.private.conf.tpl +46 -0
- package/templates/etc/{turnserver.conf.tpl → turnserver.public.conf.tpl} +3 -3
- package/templates/index.js +3 -2
- package/templates/utils.js +22 -147
- package/templates/var/lib/bind/domain.tpl +70 -0
- package/templates/var/lib/bind/private-reverse.tpl +1 -1
- package/templates/var/lib/bind/{prvate.tpl → private.tpl} +1 -10
- package/templates/var/lib/bind/public-reverse.tpl +7 -7
- package/templates/var/lib/bind/public.tpl +7 -7
- package/bin/init-private +0 -40
- package/bin/set-jitsi-conf +0 -14
- package/template.js +0 -453
- package/templates/etc/bind/named.conf.private +0 -21
- package/templates/etc/bind/named.conf.public +0 -21
- package/templates/etc/drumee/conf.d/conference.json.tpl +0 -9
- package/templates/etc/drumee/dnsapi.sh.tpl +0 -28
- package/templates/etc/drumee/env.json +0 -29
- package/templates/etc/jitsi/jicofo/sip-cmmunicator.properties +0 -3
- package/templates/etc/nginx/sites-enabled/public.jitsi.conf.tpl +0 -28
- package/templates/etc/prosody/conf.d/vhost.cfg.lua.tpl +0 -162
|
@@ -1,28 +1,28 @@
|
|
|
1
1
|
admins = {
|
|
2
|
-
"jigasi@auth.<%=
|
|
3
|
-
"jibri@auth.<%=
|
|
4
|
-
"focus@auth.<%=
|
|
5
|
-
"jvb@auth.<%=
|
|
2
|
+
"jigasi@auth.<%= jitsi_private_domain %>",
|
|
3
|
+
"jibri@auth.<%= jitsi_private_domain %>",
|
|
4
|
+
"focus@auth.<%= jitsi_private_domain %>",
|
|
5
|
+
"jvb@auth.<%= jitsi_private_domain %>"
|
|
6
6
|
}
|
|
7
7
|
|
|
8
8
|
unlimited_jids = {
|
|
9
|
-
"focus@auth.<%=
|
|
10
|
-
"jvb@auth.<%=
|
|
9
|
+
"focus@auth.<%= jitsi_private_domain %>",
|
|
10
|
+
"jvb@auth.<%= jitsi_private_domain %>"
|
|
11
11
|
}
|
|
12
12
|
|
|
13
|
-
plugin_paths = { "
|
|
13
|
+
plugin_paths = { "<%= jitsi_root_dir %>/prosody-plugins/", "/prosody-plugins-custom" }
|
|
14
14
|
|
|
15
|
-
muc_mapper_domain_base = "<%=
|
|
15
|
+
muc_mapper_domain_base = "<%= jitsi_private_domain %>";
|
|
16
16
|
muc_mapper_domain_prefix = "muc";
|
|
17
|
-
http_default_host = "<%=
|
|
17
|
+
http_default_host = "<%= jitsi_private_domain %>"
|
|
18
18
|
consider_bosh_secure = true;
|
|
19
19
|
consider_websocket_secure = true;
|
|
20
20
|
|
|
21
|
-
VirtualHost "<%=
|
|
21
|
+
VirtualHost "<%= jitsi_private_domain %>"
|
|
22
22
|
authentication = "internal_hashed"
|
|
23
23
|
ssl = {
|
|
24
|
-
key = "<%= certs_dir %>/<%=
|
|
25
|
-
certificate = "<%= certs_dir %>/<%=
|
|
24
|
+
key = "<%= certs_dir %>/<%= jitsi_private_domain %>_ecc/<%= jitsi_private_domain %>.key";
|
|
25
|
+
certificate = "<%= certs_dir %>/<%= jitsi_private_domain %>_ecc/<%= jitsi_private_domain %>.cer";
|
|
26
26
|
}
|
|
27
27
|
modules_enabled = {
|
|
28
28
|
"bosh";
|
|
@@ -39,22 +39,22 @@ VirtualHost "<%= prvate_jitsi %>"
|
|
|
39
39
|
"av_moderation";
|
|
40
40
|
"turncredentials";
|
|
41
41
|
}
|
|
42
|
-
main_muc = "muc.<%=
|
|
43
|
-
lobby_muc = "lobby.<%=
|
|
44
|
-
breakout_rooms_muc = "breakout.<%=
|
|
45
|
-
speakerstats_component = "speakerstats.<%=
|
|
46
|
-
conference_duration_component = "conferenceduration.<%=
|
|
47
|
-
end_conference_component = "endconference.<%=
|
|
48
|
-
av_moderation_component = "avmoderation.<%=
|
|
42
|
+
main_muc = "muc.<%= jitsi_private_domain %>"
|
|
43
|
+
lobby_muc = "lobby.<%= jitsi_private_domain %>"
|
|
44
|
+
breakout_rooms_muc = "breakout.<%= jitsi_private_domain %>"
|
|
45
|
+
speakerstats_component = "speakerstats.<%= jitsi_private_domain %>"
|
|
46
|
+
conference_duration_component = "conferenceduration.<%= jitsi_private_domain %>"
|
|
47
|
+
end_conference_component = "endconference.<%= jitsi_private_domain %>"
|
|
48
|
+
av_moderation_component = "avmoderation.<%= jitsi_private_domain %>"
|
|
49
49
|
turncredentials_secret = "<%= turn_sercret %>"
|
|
50
50
|
c2s_require_encryption = false
|
|
51
51
|
|
|
52
52
|
|
|
53
|
-
VirtualHost "guest.<%=
|
|
53
|
+
VirtualHost "guest.<%= jitsi_private_domain %>"
|
|
54
54
|
authentication = "anonymous"
|
|
55
55
|
ssl = {
|
|
56
|
-
key = "
|
|
57
|
-
certificate = "
|
|
56
|
+
key = "<%= certs_dir %>/<%= jitsi_private_domain %>_ecc/<%= jitsi_private_domain %>.key";
|
|
57
|
+
certificate = "<%= certs_dir %>/<%= jitsi_private_domain %>_ecc/<%= jitsi_private_domain %>.cer";
|
|
58
58
|
}
|
|
59
59
|
modules_enabled = {
|
|
60
60
|
"bosh";
|
|
@@ -71,21 +71,21 @@ VirtualHost "guest.<%= prvate_jitsi %>"
|
|
|
71
71
|
"av_moderation";
|
|
72
72
|
"turncredentials";
|
|
73
73
|
}
|
|
74
|
-
main_muc = "muc.<%=
|
|
75
|
-
lobby_muc = "lobby.<%=
|
|
76
|
-
breakout_rooms_muc = "breakout.<%=
|
|
77
|
-
speakerstats_component = "speakerstats.<%=
|
|
78
|
-
conference_duration_component = "conferenceduration.<%=
|
|
79
|
-
end_conference_component = "endconference.<%=
|
|
80
|
-
av_moderation_component = "avmoderation.<%=
|
|
74
|
+
main_muc = "muc.<%= jitsi_private_domain %>"
|
|
75
|
+
lobby_muc = "lobby.<%= jitsi_private_domain %>"
|
|
76
|
+
breakout_rooms_muc = "breakout.<%= jitsi_private_domain %>"
|
|
77
|
+
speakerstats_component = "speakerstats.<%= jitsi_private_domain %>"
|
|
78
|
+
conference_duration_component = "conferenceduration.<%= jitsi_private_domain %>"
|
|
79
|
+
end_conference_component = "endconference.<%= jitsi_private_domain %>"
|
|
80
|
+
av_moderation_component = "avmoderation.<%= jitsi_private_domain %>"
|
|
81
81
|
turncredentials_secret = "<%= turn_sercret %>"
|
|
82
82
|
c2s_require_encryption = false
|
|
83
83
|
|
|
84
84
|
|
|
85
|
-
VirtualHost "auth.<%=
|
|
85
|
+
VirtualHost "auth.<%= jitsi_private_domain %>"
|
|
86
86
|
ssl = {
|
|
87
|
-
key = "<%= certs_dir %>/<%=
|
|
88
|
-
certificate = "<%= certs_dir %>/<%=
|
|
87
|
+
key = "<%= certs_dir %>/<%= jitsi_private_domain %>_ecc/<%= jitsi_private_domain %>.key";
|
|
88
|
+
certificate = "<%= certs_dir %>/<%= jitsi_private_domain %>_ecc/fullchain.cer";
|
|
89
89
|
}
|
|
90
90
|
modules_enabled = {
|
|
91
91
|
"limits_exception";
|
|
@@ -94,16 +94,16 @@ VirtualHost "auth.<%= prvate_jitsi %>"
|
|
|
94
94
|
|
|
95
95
|
|
|
96
96
|
|
|
97
|
-
Component "internal-muc.<%=
|
|
97
|
+
Component "internal-muc.<%= jitsi_private_domain %>" "muc"
|
|
98
98
|
storage = "memory"
|
|
99
99
|
modules_enabled = {
|
|
100
100
|
"ping";
|
|
101
101
|
}
|
|
102
102
|
restrict_room_creation = true
|
|
103
103
|
muc_room_locking = false
|
|
104
|
-
|
|
104
|
+
muc_room_default_private_jids = true
|
|
105
105
|
|
|
106
|
-
Component "muc.<%=
|
|
106
|
+
Component "muc.<%= jitsi_private_domain %>" "muc"
|
|
107
107
|
restrict_room_creation = true
|
|
108
108
|
storage = "memory"
|
|
109
109
|
modules_enabled = {
|
|
@@ -117,39 +117,39 @@ Component "muc.<%= prvate_jitsi %>" "muc"
|
|
|
117
117
|
rate_limit_cache_size = 10000;
|
|
118
118
|
muc_room_cache_size = 1000
|
|
119
119
|
muc_room_locking = false
|
|
120
|
-
|
|
120
|
+
muc_room_default_private_jids = true
|
|
121
121
|
muc_password_whitelist = {
|
|
122
122
|
"focus@<no value>"
|
|
123
123
|
}
|
|
124
124
|
|
|
125
|
-
Component "focus.<%=
|
|
126
|
-
target_address = "focus@auth.<%=
|
|
125
|
+
Component "focus.<%= jitsi_private_domain %>" "client_proxy"
|
|
126
|
+
target_address = "focus@auth.<%= jitsi_private_domain %>"
|
|
127
127
|
|
|
128
|
-
Component "speakerstats.<%=
|
|
129
|
-
muc_component = "muc.<%=
|
|
128
|
+
Component "speakerstats.<%= jitsi_private_domain %>" "speakerstats_component"
|
|
129
|
+
muc_component = "muc.<%= jitsi_private_domain %>"
|
|
130
130
|
|
|
131
|
-
Component "conferenceduration.<%=
|
|
132
|
-
muc_component = "muc.<%=
|
|
131
|
+
Component "conferenceduration.<%= jitsi_private_domain %>" "conference_duration_component"
|
|
132
|
+
muc_component = "muc.<%= jitsi_private_domain %>"
|
|
133
133
|
|
|
134
134
|
|
|
135
|
-
Component "endconference.<%=
|
|
136
|
-
muc_component = "muc.<%=
|
|
135
|
+
Component "endconference.<%= jitsi_private_domain %>" "end_conference"
|
|
136
|
+
muc_component = "muc.<%= jitsi_private_domain %>"
|
|
137
137
|
|
|
138
138
|
|
|
139
|
-
Component "lobby.<%=
|
|
139
|
+
Component "lobby.<%= jitsi_private_domain %>" "muc"
|
|
140
140
|
storage = "memory"
|
|
141
141
|
restrict_room_creation = true
|
|
142
142
|
muc_room_locking = false
|
|
143
|
-
|
|
143
|
+
muc_room_default_private_jids = true
|
|
144
144
|
modules_enabled = {
|
|
145
145
|
}
|
|
146
146
|
|
|
147
147
|
|
|
148
|
-
Component "breakout.<%=
|
|
148
|
+
Component "breakout.<%= jitsi_private_domain %>" "muc"
|
|
149
149
|
storage = "memory"
|
|
150
150
|
restrict_room_creation = true
|
|
151
151
|
muc_room_locking = false
|
|
152
|
-
|
|
152
|
+
muc_room_default_private_jids = true
|
|
153
153
|
modules_enabled = {
|
|
154
154
|
"muc_meeting_id";
|
|
155
155
|
"muc_domain_mapper";
|
|
@@ -157,6 +157,6 @@ Component "breakout.<%= prvate_jitsi %>" "muc"
|
|
|
157
157
|
}
|
|
158
158
|
|
|
159
159
|
|
|
160
|
-
Component "metadata.<%=
|
|
161
|
-
muc_component = "muc.<%=
|
|
162
|
-
breakout_rooms_component = "breakout.<%=
|
|
160
|
+
Component "metadata.<%= jitsi_private_domain %>" "room_metadata_component"
|
|
161
|
+
muc_component = "muc.<%= jitsi_private_domain %>"
|
|
162
|
+
breakout_rooms_component = "breakout.<%= jitsi_private_domain %>"
|
|
@@ -1,28 +1,28 @@
|
|
|
1
1
|
admins = {
|
|
2
|
-
"jigasi@auth.<%=
|
|
3
|
-
"jibri@auth.<%=
|
|
4
|
-
"focus@auth.<%=
|
|
5
|
-
"jvb@auth.<%=
|
|
2
|
+
"jigasi@auth.<%= jitsi_public_domain %>",
|
|
3
|
+
"jibri@auth.<%= jitsi_public_domain %>",
|
|
4
|
+
"focus@auth.<%= jitsi_public_domain %>",
|
|
5
|
+
"jvb@auth.<%= jitsi_public_domain %>"
|
|
6
6
|
}
|
|
7
7
|
|
|
8
8
|
unlimited_jids = {
|
|
9
|
-
"focus@auth.<%=
|
|
10
|
-
"jvb@auth.<%=
|
|
9
|
+
"focus@auth.<%= jitsi_public_domain %>",
|
|
10
|
+
"jvb@auth.<%= jitsi_public_domain %>"
|
|
11
11
|
}
|
|
12
12
|
|
|
13
|
-
plugin_paths = { "
|
|
13
|
+
plugin_paths = { "<%= jitsi_root_dir %>/prosody-plugins/", "/prosody-plugins-custom" }
|
|
14
14
|
|
|
15
|
-
muc_mapper_domain_base = "<%=
|
|
15
|
+
muc_mapper_domain_base = "<%= jitsi_public_domain %>";
|
|
16
16
|
muc_mapper_domain_prefix = "muc";
|
|
17
|
-
http_default_host = "<%=
|
|
17
|
+
http_default_host = "<%= jitsi_public_domain %>"
|
|
18
18
|
consider_bosh_secure = true;
|
|
19
19
|
consider_websocket_secure = true;
|
|
20
20
|
|
|
21
|
-
VirtualHost "<%=
|
|
21
|
+
VirtualHost "<%= jitsi_public_domain %>"
|
|
22
22
|
authentication = "internal_hashed"
|
|
23
23
|
ssl = {
|
|
24
|
-
key = "<%= certs_dir %>/<%=
|
|
25
|
-
certificate = "<%= certs_dir %>/<%=
|
|
24
|
+
key = "<%= certs_dir %>/<%= jitsi_public_domain %>_ecc/<%= jitsi_public_domain %>.key";
|
|
25
|
+
certificate = "<%= certs_dir %>/<%= jitsi_public_domain %>_ecc/<%= jitsi_public_domain %>.cer";
|
|
26
26
|
}
|
|
27
27
|
modules_enabled = {
|
|
28
28
|
"bosh";
|
|
@@ -39,22 +39,22 @@ VirtualHost "<%= public_jitsi %>"
|
|
|
39
39
|
"av_moderation";
|
|
40
40
|
"turncredentials";
|
|
41
41
|
}
|
|
42
|
-
main_muc = "muc.<%=
|
|
43
|
-
lobby_muc = "lobby.<%=
|
|
44
|
-
breakout_rooms_muc = "breakout.<%=
|
|
45
|
-
speakerstats_component = "speakerstats.<%=
|
|
46
|
-
conference_duration_component = "conferenceduration.<%=
|
|
47
|
-
end_conference_component = "endconference.<%=
|
|
48
|
-
av_moderation_component = "avmoderation.<%=
|
|
42
|
+
main_muc = "muc.<%= jitsi_public_domain %>"
|
|
43
|
+
lobby_muc = "lobby.<%= jitsi_public_domain %>"
|
|
44
|
+
breakout_rooms_muc = "breakout.<%= jitsi_public_domain %>"
|
|
45
|
+
speakerstats_component = "speakerstats.<%= jitsi_public_domain %>"
|
|
46
|
+
conference_duration_component = "conferenceduration.<%= jitsi_public_domain %>"
|
|
47
|
+
end_conference_component = "endconference.<%= jitsi_public_domain %>"
|
|
48
|
+
av_moderation_component = "avmoderation.<%= jitsi_public_domain %>"
|
|
49
49
|
turncredentials_secret = "<%= turn_sercret %>"
|
|
50
50
|
c2s_require_encryption = false
|
|
51
51
|
|
|
52
52
|
|
|
53
|
-
VirtualHost "guest.<%=
|
|
53
|
+
VirtualHost "guest.<%= jitsi_public_domain %>"
|
|
54
54
|
authentication = "anonymous"
|
|
55
55
|
ssl = {
|
|
56
|
-
key = "
|
|
57
|
-
certificate = "
|
|
56
|
+
key = "<%= certs_dir %>/<%= jitsi_public_domain %>_ecc/<%= jitsi_public_domain %>.key";
|
|
57
|
+
certificate = "<%= certs_dir %>/<%= jitsi_public_domain %>_ecc/<%= jitsi_public_domain %>.cer";
|
|
58
58
|
}
|
|
59
59
|
modules_enabled = {
|
|
60
60
|
"bosh";
|
|
@@ -71,21 +71,21 @@ VirtualHost "guest.<%= public_jitsi %>"
|
|
|
71
71
|
"av_moderation";
|
|
72
72
|
"turncredentials";
|
|
73
73
|
}
|
|
74
|
-
main_muc = "muc.<%=
|
|
75
|
-
lobby_muc = "lobby.<%=
|
|
76
|
-
breakout_rooms_muc = "breakout.<%=
|
|
77
|
-
speakerstats_component = "speakerstats.<%=
|
|
78
|
-
conference_duration_component = "conferenceduration.<%=
|
|
79
|
-
end_conference_component = "endconference.<%=
|
|
80
|
-
av_moderation_component = "avmoderation.<%=
|
|
74
|
+
main_muc = "muc.<%= jitsi_public_domain %>"
|
|
75
|
+
lobby_muc = "lobby.<%= jitsi_public_domain %>"
|
|
76
|
+
breakout_rooms_muc = "breakout.<%= jitsi_public_domain %>"
|
|
77
|
+
speakerstats_component = "speakerstats.<%= jitsi_public_domain %>"
|
|
78
|
+
conference_duration_component = "conferenceduration.<%= jitsi_public_domain %>"
|
|
79
|
+
end_conference_component = "endconference.<%= jitsi_public_domain %>"
|
|
80
|
+
av_moderation_component = "avmoderation.<%= jitsi_public_domain %>"
|
|
81
81
|
turncredentials_secret = "<%= turn_sercret %>"
|
|
82
82
|
c2s_require_encryption = false
|
|
83
83
|
|
|
84
84
|
|
|
85
|
-
VirtualHost "auth.<%=
|
|
85
|
+
VirtualHost "auth.<%= jitsi_public_domain %>"
|
|
86
86
|
ssl = {
|
|
87
|
-
key = "<%= certs_dir %>/<%=
|
|
88
|
-
certificate = "<%= certs_dir %>/<%=
|
|
87
|
+
key = "<%= certs_dir %>/<%= jitsi_public_domain %>_ecc/<%= jitsi_public_domain %>.key";
|
|
88
|
+
certificate = "<%= certs_dir %>/<%= jitsi_public_domain %>_ecc/fullchain.cer";
|
|
89
89
|
}
|
|
90
90
|
modules_enabled = {
|
|
91
91
|
"limits_exception";
|
|
@@ -94,7 +94,7 @@ VirtualHost "auth.<%= public_jitsi %>"
|
|
|
94
94
|
|
|
95
95
|
|
|
96
96
|
|
|
97
|
-
Component "internal-muc.<%=
|
|
97
|
+
Component "internal-muc.<%= jitsi_public_domain %>" "muc"
|
|
98
98
|
storage = "memory"
|
|
99
99
|
modules_enabled = {
|
|
100
100
|
"ping";
|
|
@@ -103,7 +103,7 @@ Component "internal-muc.<%= public_jitsi %>" "muc"
|
|
|
103
103
|
muc_room_locking = false
|
|
104
104
|
muc_room_default_public_jids = true
|
|
105
105
|
|
|
106
|
-
Component "muc.<%=
|
|
106
|
+
Component "muc.<%= jitsi_public_domain %>" "muc"
|
|
107
107
|
restrict_room_creation = true
|
|
108
108
|
storage = "memory"
|
|
109
109
|
modules_enabled = {
|
|
@@ -122,21 +122,21 @@ Component "muc.<%= public_jitsi %>" "muc"
|
|
|
122
122
|
"focus@<no value>"
|
|
123
123
|
}
|
|
124
124
|
|
|
125
|
-
Component "focus.<%=
|
|
126
|
-
target_address = "focus@auth.<%=
|
|
125
|
+
Component "focus.<%= jitsi_public_domain %>" "client_proxy"
|
|
126
|
+
target_address = "focus@auth.<%= jitsi_public_domain %>"
|
|
127
127
|
|
|
128
|
-
Component "speakerstats.<%=
|
|
129
|
-
muc_component = "muc.<%=
|
|
128
|
+
Component "speakerstats.<%= jitsi_public_domain %>" "speakerstats_component"
|
|
129
|
+
muc_component = "muc.<%= jitsi_public_domain %>"
|
|
130
130
|
|
|
131
|
-
Component "conferenceduration.<%=
|
|
132
|
-
muc_component = "muc.<%=
|
|
131
|
+
Component "conferenceduration.<%= jitsi_public_domain %>" "conference_duration_component"
|
|
132
|
+
muc_component = "muc.<%= jitsi_public_domain %>"
|
|
133
133
|
|
|
134
134
|
|
|
135
|
-
Component "endconference.<%=
|
|
136
|
-
muc_component = "muc.<%=
|
|
135
|
+
Component "endconference.<%= jitsi_public_domain %>" "end_conference"
|
|
136
|
+
muc_component = "muc.<%= jitsi_public_domain %>"
|
|
137
137
|
|
|
138
138
|
|
|
139
|
-
Component "lobby.<%=
|
|
139
|
+
Component "lobby.<%= jitsi_public_domain %>" "muc"
|
|
140
140
|
storage = "memory"
|
|
141
141
|
restrict_room_creation = true
|
|
142
142
|
muc_room_locking = false
|
|
@@ -145,7 +145,7 @@ Component "lobby.<%= public_jitsi %>" "muc"
|
|
|
145
145
|
}
|
|
146
146
|
|
|
147
147
|
|
|
148
|
-
Component "breakout.<%=
|
|
148
|
+
Component "breakout.<%= jitsi_public_domain %>" "muc"
|
|
149
149
|
storage = "memory"
|
|
150
150
|
restrict_room_creation = true
|
|
151
151
|
muc_room_locking = false
|
|
@@ -157,6 +157,6 @@ Component "breakout.<%= public_jitsi %>" "muc"
|
|
|
157
157
|
}
|
|
158
158
|
|
|
159
159
|
|
|
160
|
-
Component "metadata.<%=
|
|
161
|
-
muc_component = "muc.<%=
|
|
162
|
-
breakout_rooms_component = "breakout.<%=
|
|
160
|
+
Component "metadata.<%= jitsi_public_domain %>" "room_metadata_component"
|
|
161
|
+
muc_component = "muc.<%= jitsi_public_domain %>"
|
|
162
|
+
breakout_rooms_component = "breakout.<%= jitsi_public_domain %>"
|
|
@@ -20,16 +20,16 @@
|
|
|
20
20
|
{{ $ENABLE_XMPP_WEBSOCKET := .Env.ENABLE_XMPP_WEBSOCKET | default "1" | toBool -}}
|
|
21
21
|
{{ $ENABLE_JAAS_COMPONENTS := .Env.ENABLE_JAAS_COMPONENTS | default "0" | toBool -}}
|
|
22
22
|
{{ $ENABLE_RATE_LIMITS := .Env.PROSODY_ENABLE_RATE_LIMITS | default "0" | toBool -}}
|
|
23
|
-
{{ $PUBLIC_URL := .Env.PUBLIC_URL | default "https://localhost
|
|
23
|
+
{{ $PUBLIC_URL := .Env.PUBLIC_URL | default "https://localhost:<%= local_port %>" -}}
|
|
24
24
|
{{ $PUBLIC_URL_DOMAIN := $PUBLIC_URL | trimPrefix "https://" | trimSuffix "/" -}}
|
|
25
25
|
{{ $TURN_HOST := .Env.TURN_HOST | default "" -}}
|
|
26
26
|
{{ $TURN_HOSTS := splitList "," $TURN_HOST -}}
|
|
27
|
-
{{ $TURN_PORT := .Env.TURN_PORT | default "
|
|
27
|
+
{{ $TURN_PORT := .Env.TURN_PORT | default "<%= public_https_port %>" -}}
|
|
28
28
|
{{ $TURN_TRANSPORT := .Env.TURN_TRANSPORT | default "tcp" -}}
|
|
29
29
|
{{ $TURN_TRANSPORTS := splitList "," $TURN_TRANSPORT -}}
|
|
30
30
|
{{ $TURNS_HOST := .Env.TURNS_HOST | default "" -}}
|
|
31
31
|
{{ $TURNS_HOSTS := splitList "," $TURNS_HOST -}}
|
|
32
|
-
{{ $TURNS_PORT := .Env.TURNS_PORT | default "
|
|
32
|
+
{{ $TURNS_PORT := .Env.TURNS_PORT | default "<%= public_https_port %>" -}}
|
|
33
33
|
{{ $XMPP_AUTH_DOMAIN := .Env.XMPP_AUTH_DOMAIN | default "auth.meet.jitsi" -}}
|
|
34
34
|
{{ $XMPP_DOMAIN := .Env.XMPP_DOMAIN | default "meet.jitsi" -}}
|
|
35
35
|
{{ $XMPP_GUEST_DOMAIN := .Env.XMPP_GUEST_DOMAIN | default "guest.meet.jitsi" -}}
|
|
@@ -0,0 +1,46 @@
|
|
|
1
|
+
# jitsi-meet coturn config. Do not modify this line
|
|
2
|
+
use-auth-secret
|
|
3
|
+
keep-address-family
|
|
4
|
+
static-auth-secret=<%= turn_sercret %>
|
|
5
|
+
realm=<%= jitsi_private_domain %>
|
|
6
|
+
cert=<%= certs_dir %>/<%= jitsi_private_domain %>_ecc/<%= jitsi_private_domain %>.cer
|
|
7
|
+
pkey=<%= certs_dir %>/<%= jitsi_private_domain %>_ecc/<%= jitsi_private_domain %>.key
|
|
8
|
+
external-ip=<%= private_ip4 %> / <%= private_ip6 %>
|
|
9
|
+
no-multicast-peers
|
|
10
|
+
no-cli
|
|
11
|
+
#no-loopback-peers
|
|
12
|
+
#no-tcp-relay
|
|
13
|
+
no-tcp
|
|
14
|
+
listening-port=3478
|
|
15
|
+
tls-listening-port=5349
|
|
16
|
+
no-tlsv1
|
|
17
|
+
no-tlsv1_1
|
|
18
|
+
# https://ssl-config.mozilla.org/#server=haproxy&version=2.1&config=intermediate&openssl=1.1.0g&guideline=5.4
|
|
19
|
+
cipher-list=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
|
|
20
|
+
# without it there are errors when running on Ubuntu 20.04
|
|
21
|
+
dh2066
|
|
22
|
+
# jitsi-meet coturn relay disable config. Do not modify this line
|
|
23
|
+
denied-peer-ip=0.0.0.0-0.255.255.255
|
|
24
|
+
denied-peer-ip=10.0.0.0-10.255.255.255
|
|
25
|
+
denied-peer-ip=100.64.0.0-100.127.255.255
|
|
26
|
+
denied-peer-ip=127.0.0.0-127.255.255.255
|
|
27
|
+
denied-peer-ip=169.254.0.0-169.254.255.255
|
|
28
|
+
denied-peer-ip=127.0.0.0-127.255.255.255
|
|
29
|
+
denied-peer-ip=172.16.0.0-172.31.255.255
|
|
30
|
+
denied-peer-ip=192.0.0.0-192.0.0.255
|
|
31
|
+
denied-peer-ip=192.0.2.0-192.0.2.255
|
|
32
|
+
denied-peer-ip=192.88.99.0-192.88.99.255
|
|
33
|
+
denied-peer-ip=192.168.0.0-192.168.255.255
|
|
34
|
+
denied-peer-ip=198.18.0.0-198.19.255.255
|
|
35
|
+
denied-peer-ip=198.51.100.0-198.51.100.255
|
|
36
|
+
denied-peer-ip=203.0.113.0-203.0.113.255
|
|
37
|
+
denied-peer-ip=240.0.0.0-255.255.255.255
|
|
38
|
+
denied-peer-ip=::1
|
|
39
|
+
denied-peer-ip=64:ff9b::-64:ff9b::ffff:ffff
|
|
40
|
+
denied-peer-ip=::ffff:0.0.0.0-::ffff:255.255.255.255
|
|
41
|
+
denied-peer-ip=100::-100::ffff:ffff:ffff:ffff
|
|
42
|
+
denied-peer-ip=2001::-2001:1ff:ffff:ffff:ffff:ffff:ffff:ffff
|
|
43
|
+
denied-peer-ip=2002::-2002:ffff:ffff:ffff:ffff:ffff:ffff:ffff
|
|
44
|
+
denied-peer-ip=fc00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
|
|
45
|
+
denied-peer-ip=fe80::-febf:ffff:ffff:ffff:ffff:ffff:ffff:ffff
|
|
46
|
+
syslog
|
|
@@ -2,9 +2,9 @@
|
|
|
2
2
|
use-auth-secret
|
|
3
3
|
keep-address-family
|
|
4
4
|
static-auth-secret=<%= turn_sercret %>
|
|
5
|
-
realm=<%=
|
|
6
|
-
cert=<%=
|
|
7
|
-
pkey=<%=
|
|
5
|
+
realm=<%= jitsi_public_domain %>
|
|
6
|
+
cert=<%= certs_dir %>/<%= jitsi_public_domain %>_ecc/<%= jitsi_public_domain %>.cer
|
|
7
|
+
pkey=<%= certs_dir %>/<%= jitsi_public_domain %>_ecc/<%= jitsi_public_domain %>.key
|
|
8
8
|
external-ip=<%= public_ip4 %> / <%= public_ip6 %>
|
|
9
9
|
no-multicast-peers
|
|
10
10
|
no-cli
|
package/templates/index.js
CHANGED
|
@@ -5,7 +5,8 @@ const { env } = process;
|
|
|
5
5
|
const { template, isEmpty } = require("lodash");
|
|
6
6
|
|
|
7
7
|
const { resolve, join, dirname } = require("path");
|
|
8
|
-
const { args} = require('./utils')
|
|
8
|
+
const { args } = require('./utils')
|
|
9
|
+
|
|
9
10
|
/**
|
|
10
11
|
*
|
|
11
12
|
* @param {*} p
|
|
@@ -104,5 +105,5 @@ module.exports = {
|
|
|
104
105
|
write,
|
|
105
106
|
chroot,
|
|
106
107
|
render,
|
|
107
|
-
makedir
|
|
108
|
+
makedir
|
|
108
109
|
};
|