
This reverts commit f64b935778074191337672c739978975ee4eda68. There must be more required to make this work. Change-Id: I21e1d45fabca10ee93e7c87449fc15f3fd691b8b
311 lines
8.7 KiB
Django/Jinja
311 lines
8.7 KiB
Django/Jinja
# Based on https://github.com/jitsi/docker-jitsi-meet/blob/df404476160526d8512fb23b606965b98f7f25f3/env.example
|
|
# Licensed under the ASL v2.
|
|
|
|
# Customized for OpenDev:
|
|
|
|
# Directory where all configuration will be stored.
|
|
CONFIG=/var/jitsi-meet
|
|
|
|
# Directory where templates to generate configs are stored.
|
|
DEFAULTS=/var/jitsi-meet/defaults
|
|
|
|
# System time zone.
|
|
TZ=Etc/UTC
|
|
|
|
# Public URL for the web service.
|
|
PUBLIC_URL=https://meetpad.opendev.org
|
|
|
|
# Set etherpad-lite URL (uncomment to enable).
|
|
ETHERPAD_URL_BASE=https://etherpad.opendev.org
|
|
|
|
#
|
|
# Basic configuration options
|
|
#
|
|
|
|
# IP address of the Docker host. See the "Running on a LAN environment" section
|
|
# in the README.
|
|
#DOCKER_HOST_ADDRESS=192.168.1.1
|
|
|
|
#
|
|
# Let's Encrypt configuration
|
|
#
|
|
|
|
# Enable Let's Encrypt certificate generation.
|
|
#ENABLE_LETSENCRYPT=1
|
|
|
|
# Domain for which to generate the certificate.
|
|
#LETSENCRYPT_DOMAIN=meet.example.com
|
|
|
|
# E-Mail for receiving important account notifications (mandatory).
|
|
#LETSENCRYPT_EMAIL=alice@atlanta.net
|
|
|
|
|
|
#
|
|
# Basic Jigasi configuration options (needed for SIP gateway support)
|
|
#
|
|
|
|
# SIP URI for incoming / outgoing calls.
|
|
#JIGASI_SIP_URI=test@sip2sip.info
|
|
|
|
# Password for the specified SIP account as a clear text
|
|
#JIGASI_SIP_PASSWORD=passw0rd
|
|
|
|
# SIP server (use the SIP account domain if in doubt).
|
|
#JIGASI_SIP_SERVER=sip2sip.info
|
|
|
|
# SIP server port
|
|
#JIGASI_SIP_PORT=5060
|
|
|
|
# SIP server transport
|
|
#JIGASI_SIP_TRANSPORT=UDP
|
|
|
|
#
|
|
# Authentication configuration (see README for details)
|
|
#
|
|
|
|
# Enable authentication.
|
|
#ENABLE_AUTH=1
|
|
|
|
# Enable guest access.
|
|
#ENABLE_GUESTS=1
|
|
|
|
# Select authentication type: internal, jwt or ldap
|
|
#AUTH_TYPE=internal
|
|
|
|
# JWT auuthentication
|
|
#
|
|
|
|
# Application identifier.
|
|
#JWT_APP_ID=my_jitsi_app_id
|
|
|
|
# Application secret known only to your token.
|
|
#JWT_APP_SECRET=my_jitsi_app_secret
|
|
|
|
# (Optional) Set asap_accepted_issuers as a comma separated list.
|
|
#JWT_ACCEPTED_ISSUERS=my_web_client,my_app_client
|
|
|
|
# (Optional) Set asap_accepted_audiences as a comma separated list.
|
|
#JWT_ACCEPTED_AUDIENCES=my_server1,my_server2
|
|
|
|
|
|
# LDAP authentication (for more information see the Cyrus SASL saslauthd.conf man page)
|
|
#
|
|
|
|
# LDAP url for connection.
|
|
#LDAP_URL=ldaps://ldap.domain.com/
|
|
|
|
# LDAP base DN. Can be empty
|
|
#LDAP_BASE=DC=example,DC=domain,DC=com
|
|
|
|
# LDAP user DN. Do not specify this parameter for the anonymous bind.
|
|
#LDAP_BINDDN=CN=binduser,OU=users,DC=example,DC=domain,DC=com
|
|
|
|
# LDAP user password. Do not specify this parameter for the anonymous bind.
|
|
#LDAP_BINDPW=LdapUserPassw0rd
|
|
|
|
# LDAP filter. Tokens example:
|
|
# %1-9 - if the input key is user@mail.domain.com, then %1 is com, %2 is domain and %3 is mail.
|
|
# %s - %s is replaced by the complete service string.
|
|
# %r - %r is replaced by the complete realm string.
|
|
#LDAP_FILTER=(sAMAccountName=%u)
|
|
|
|
# LDAP authentication method
|
|
#LDAP_AUTH_METHOD=bind
|
|
|
|
# LDAP version
|
|
#LDAP_VERSION=3
|
|
|
|
# LDAP TLS using
|
|
#LDAP_USE_TLS=1
|
|
|
|
# List of SSL/TLS ciphers to allow.
|
|
#LDAP_TLS_CIPHERS=SECURE256:SECURE128:!AES-128-CBC:!ARCFOUR-128:!CAMELLIA-128-CBC:!3DES-CBC:!CAMELLIA-128-CBC
|
|
|
|
# Require and verify server certificate
|
|
#LDAP_TLS_CHECK_PEER=1
|
|
|
|
# Path to CA cert file. Used when server sertificate verify is enabled.
|
|
#LDAP_TLS_CACERT_FILE=/etc/ssl/certs/ca-certificates.crt
|
|
|
|
# Path to CA certs directory. Used when server sertificate verify is enabled.
|
|
#LDAP_TLS_CACERT_DIR=/etc/ssl/certs
|
|
|
|
# Wether to use starttls, implies LDAPv3 and requires ldap:// instead of ldaps://
|
|
# LDAP_START_TLS=1
|
|
|
|
|
|
#
|
|
# Advanced configuration options (you generally don't need to change these)
|
|
#
|
|
|
|
# Needed to make newer jitsi meet happy. Testing with this set to 1 results
|
|
# in "You have been disconnected" client errors. Need to do more investigating
|
|
# into how this is meant to work.
|
|
ENABLE_XMPP_WEBSOCKET=0
|
|
|
|
# Internal XMPP domain.
|
|
XMPP_DOMAIN=localhost
|
|
|
|
# Internal XMPP server
|
|
XMPP_SERVER=localhost
|
|
|
|
# Internal XMPP server URL
|
|
XMPP_BOSH_URL_BASE=http://localhost:5280
|
|
|
|
# Internal XMPP domain for authenticated services.
|
|
XMPP_AUTH_DOMAIN=auth.localhost
|
|
|
|
# XMPP domain for the MUC.
|
|
XMPP_MUC_DOMAIN=muc.localhost
|
|
|
|
# XMPP domain for the internal MUC used for jibri, jigasi and jvb pools.
|
|
XMPP_INTERNAL_MUC_DOMAIN=internal-muc.localhost
|
|
|
|
# XMPP domain for unauthenticated users.
|
|
XMPP_GUEST_DOMAIN=guest.localhost
|
|
|
|
# Custom Prosody modules for XMPP_DOMAIN (comma separated)
|
|
XMPP_MODULES=
|
|
|
|
# Custom Prosody modules for MUC component (comma separated)
|
|
XMPP_MUC_MODULES=
|
|
|
|
# Custom Prosody modules for internal MUC component (comma separated)
|
|
XMPP_INTERNAL_MUC_MODULES=
|
|
|
|
# MUC for the JVB pool.
|
|
JVB_BREWERY_MUC=jvbbrewery
|
|
|
|
# XMPP user for JVB client connections.
|
|
JVB_AUTH_USER=jvb
|
|
|
|
# XMPP password for JVB client connections.
|
|
JVB_AUTH_PASSWORD={{ meetpad_jvb_auth_password }}
|
|
|
|
# STUN servers used to discover the server's public IP.
|
|
JVB_STUN_SERVERS=stun.l.google.com:19302,stun1.l.google.com:19302,stun2.l.google.com:19302
|
|
|
|
# Media port for the Jitsi Videobridge
|
|
JVB_PORT=10000
|
|
|
|
# TCP Fallback for Jitsi Videobridge for when UDP isn't available
|
|
JVB_TCP_HARVESTER_DISABLED=true
|
|
JVB_TCP_PORT=4443
|
|
|
|
# A comma separated list of APIs to enable when the JVB is started. The default is none.
|
|
# See https://github.com/jitsi/jitsi-videobridge/blob/master/doc/rest.md for more information
|
|
#JVB_ENABLE_APIS=rest,colibri
|
|
|
|
# XMPP component password for Jicofo.
|
|
JICOFO_COMPONENT_SECRET={{ meetpad_jicofo_component_secret }}
|
|
|
|
# XMPP user for Jicofo client connections. NOTE: this option doesn't currently work due to a bug.
|
|
JICOFO_AUTH_USER=focus
|
|
|
|
# XMPP password for Jicofo client connections.
|
|
JICOFO_AUTH_PASSWORD={{ meetpad_jicofo_auth_password }}
|
|
|
|
# Base URL of Jicofo's reservation REST API
|
|
#JICOFO_RESERVATION_REST_BASE_URL=http://reservation.example.com
|
|
|
|
# XMPP user for Jigasi MUC client connections.
|
|
JIGASI_XMPP_USER=jigasi
|
|
|
|
# XMPP password for Jigasi MUC client connections.
|
|
JIGASI_XMPP_PASSWORD={{ meetpad_jigasi_xmpp_password }}
|
|
|
|
# MUC name for the Jigasi pool.
|
|
JIGASI_BREWERY_MUC=jigasibrewery
|
|
|
|
# Minimum port for media used by Jigasi.
|
|
JIGASI_PORT_MIN=20000
|
|
|
|
# Maximum port for media used by Jigasi.
|
|
JIGASI_PORT_MAX=20050
|
|
|
|
# Enable SDES srtp
|
|
#JIGASI_ENABLE_SDES_SRTP=1
|
|
|
|
# Keepalive method
|
|
#JIGASI_SIP_KEEP_ALIVE_METHOD=OPTIONS
|
|
|
|
# Health-check extension
|
|
#JIGASI_HEALTH_CHECK_SIP_URI=keepalive
|
|
|
|
# Health-check interval
|
|
#JIGASI_HEALTH_CHECK_INTERVAL=300000
|
|
#
|
|
# Enable Jigasi transcription.
|
|
#ENABLE_TRANSCRIPTIONS=1
|
|
|
|
# Jigasi will recordord an audio when transcriber is on. Default false.
|
|
#JIGASI_TRANSCRIBER_RECORD_AUDIO=true
|
|
|
|
# Jigasi will send transcribed text to the chat when transcriber is on. Default false.
|
|
#JIGASI_TRANSCRIBER_SEND_TXT=true
|
|
|
|
# Jigasi post to the chat an url with transcription file. Default false.
|
|
#JIGASI_TRANSCRIBER_ADVERTISE_URL=true
|
|
|
|
# Credentials for connect to Cloud Google API from Jigasi. Path located inside the container.
|
|
# Please read https://cloud.google.com/text-to-speech/docs/quickstart-protocol
|
|
# section "Before you begin" from 1 to 5 paragraph. Copy the key on
|
|
# the docker host to ${CONFIG}/jigasi/key.json and to enable this setting:
|
|
#GOOGLE_APPLICATION_CREDENTIALS=/config/key.json
|
|
|
|
# Enable recording
|
|
#ENABLE_RECORDING=1
|
|
|
|
# XMPP domain for the jibri recorder
|
|
XMPP_RECORDER_DOMAIN=recorder.localhost
|
|
|
|
# XMPP recorder user for Jibri client connections.
|
|
JIBRI_RECORDER_USER=recorder
|
|
|
|
# XMPP recorder password for Jibri client connections.
|
|
JIBRI_RECORDER_PASSWORD={{ meetpad_jibri_recorder_password }}
|
|
|
|
# Directory for recordings inside Jibri container.
|
|
JIBRI_RECORDING_DIR=/config/recordings
|
|
|
|
# The finalizing script. Will run after recording is complete.
|
|
JIBRI_FINALIZE_RECORDING_SCRIPT_PATH=/config/finalize.sh
|
|
|
|
# XMPP user for Jibri client connections.
|
|
JIBRI_XMPP_USER=jibri
|
|
|
|
# XMPP password for Jibri client connections.
|
|
JIBRI_XMPP_PASSWORD={{ meetpad_jibri_xmpp_password }}
|
|
|
|
# MUC name for the Jibri pool.
|
|
JIBRI_BREWERY_MUC=jibribrewery
|
|
|
|
# MUC connection timeout
|
|
JIBRI_PENDING_TIMEOUT=90
|
|
|
|
# When jibri gets a request to start a service for a room, the room
|
|
# jid will look like: roomName@optional.prefixes.subdomain.xmpp_domain
|
|
# We'll build the url for the call by transforming that into:
|
|
# https://xmpp_domain/subdomain/roomName
|
|
# So if there are any prefixes in the jid (like jitsi meet, which
|
|
# has its participants join a muc at conference.xmpp_domain) then
|
|
# list that prefix here so it can be stripped out to generate
|
|
# the call url correctly.
|
|
JIBRI_STRIP_DOMAIN_JID=muc
|
|
|
|
# Directory for logs inside Jibri container.
|
|
JIBRI_LOGS_DIR=/config/logs
|
|
|
|
# Disable HTTPS. This can be useful if TLS connections are going to be handled outside of this setup.
|
|
#DISABLE_HTTPS=1
|
|
|
|
# Redirects HTTP traffic to HTTPS. Only works with the standard HTTPS port (443).
|
|
ENABLE_HTTP_REDIRECT=1
|
|
|
|
# Participants after the Nth (value below) joining will have their video muted.
|
|
# This should mute video for all participants who join.
|
|
START_VIDEO_MUTED=0
|
|
|
|
# Disable P2P connections for meetings between two participants.
|
|
ENABLE_P2P=false
|