{{ $ENABLE_AUTH := .Env.ENABLE_AUTH | default "0" | toBool -}} {{ $ENABLE_GUEST_DOMAIN := and $ENABLE_AUTH (.Env.ENABLE_GUESTS | default "0" | toBool) -}} {{ $ENABLE_RATE_LIMITS := .Env.PROSODY_ENABLE_RATE_LIMITS | default "0" | toBool -}} {{ $ENABLE_RECORDING := .Env.ENABLE_RECORDING | default "0" | toBool -}} {{ $ENABLE_SUBDOMAINS := .Env.ENABLE_SUBDOMAINS | default "true" | toBool -}} {{ $ENABLE_TRANSCRIPTIONS := .Env.ENABLE_TRANSCRIPTIONS | default "0" | toBool -}} {{ $ENABLE_XMPP_WEBSOCKET := .Env.ENABLE_XMPP_WEBSOCKET | default "1" | toBool -}} {{ $JIBRI_RECORDER_USER := .Env.JIBRI_RECORDER_USER | default "recorder" -}} {{ $JIGASI_TRANSCRIBER_USER := .Env.JIGASI_TRANSCRIBER_USER | default "transcriber" -}} {{ $LIMIT_MESSAGES_CHECK_TOKEN := .Env.PROSODY_LIMIT_MESSAGES_CHECK_TOKEN | default "0" | toBool -}} {{ $RATE_LIMIT_LOGIN_RATE := .Env.PROSODY_RATE_LIMIT_LOGIN_RATE | default "3" -}} {{ $RATE_LIMIT_SESSION_RATE := .Env.PROSODY_RATE_LIMIT_SESSION_RATE | default "200" -}} {{ $RATE_LIMIT_TIMEOUT := .Env.PROSODY_RATE_LIMIT_TIMEOUT | default "60" -}} {{ $RATE_LIMIT_ALLOW_RANGES := .Env.PROSODY_RATE_LIMIT_ALLOW_RANGES | default "10.0.0.0/8" -}} {{ $RATE_LIMIT_CACHE_SIZE := .Env.PROSODY_RATE_LIMIT_CACHE_SIZE | default "10000" -}} {{ $REGION_NAME := .Env.PROSODY_REGION_NAME | default "default" -}} {{ $RELEASE_NUMBER := .Env.RELEASE_NUMBER | default "" -}} {{ $SHARD_NAME := .Env.SHARD | default "default" -}} {{ $S2S_PORT := .Env.PROSODY_S2S_PORT | default "5269" -}} {{ $VISITOR_INDEX := .Env.PROSODY_VISITOR_INDEX | default "0" -}} {{ $VISITORS_MUC_PREFIX := .Env.PROSODY_VISITORS_MUC_PREFIX | default "muc" -}} {{ $VISITORS_MAX_VISITORS_PER_NODE := .Env.VISITORS_MAX_VISITORS_PER_NODE | default "250" }} {{ $VISITORS_XMPP_DOMAIN := .Env.VISITORS_XMPP_DOMAIN | default "meet.jitsi" -}} {{ $XMPP_AUTH_DOMAIN := .Env.XMPP_AUTH_DOMAIN | default "auth.meet.jitsi" -}} {{ $XMPP_DOMAIN := .Env.XMPP_DOMAIN | default "meet.jitsi" -}} {{ $XMPP_GUEST_DOMAIN := .Env.XMPP_GUEST_DOMAIN | default "guest.meet.jitsi" -}} {{ $XMPP_MUC_DOMAIN := .Env.XMPP_MUC_DOMAIN | default "muc.meet.jitsi" -}} {{ $XMPP_MUC_DOMAIN_PREFIX := (split "." $XMPP_MUC_DOMAIN)._0 -}} {{ $XMPP_SERVER := .Env.XMPP_SERVER | default "xmpp.meet.jitsi" -}} {{ $XMPP_SERVER_S2S_PORT := .Env.XMPP_SERVER_S2S_PORT | default $S2S_PORT -}} {{ $XMPP_HIDDEN_DOMAIN := .Env.XMPP_HIDDEN_DOMAIN | default "hidden.meet.jitsi" -}} plugin_paths = { "/prosody-plugins/", "/prosody-plugins-custom", "/prosody-plugins-contrib" } muc_mapper_domain_base = "v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}"; muc_mapper_domain_prefix = "{{ $XMPP_MUC_DOMAIN_PREFIX }}"; http_default_host = "v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}" main_domain = '{{ $XMPP_DOMAIN }}'; -- https://prosody.im/doc/modules/mod_smacks smacks_max_unacked_stanzas = 5; smacks_hibernation_time = 60; -- this is dropped in 0.12 smacks_max_hibernated_sessions = 1; smacks_max_old_sessions = 1; unlimited_jids = { "focus@{{ $XMPP_AUTH_DOMAIN }}" } limits = { c2s = { rate = "512kb/s"; }; } authentication = 'internal_hashed' storage = 'internal' consider_websocket_secure = true; consider_bosh_secure = true; bosh_max_inactivity = 60; -- this is added to make certs_s2soutinjection work s2sout_override = { ["{{ $XMPP_MUC_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}"; -- needed for visitors to send messages to main room ["{{ $XMPP_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}"; ["visitors.{{ $XMPP_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}"; {{ if $ENABLE_GUEST_DOMAIN -}} ["{{ $XMPP_GUEST_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}"; {{ end -}} {{ if or $ENABLE_RECORDING $ENABLE_TRANSCRIPTIONS -}} ["{{ $XMPP_HIDDEN_DOMAIN }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}"; {{ end -}} {{ if .Env.PROSODY_VISITORS_S2S_VHOSTS -}} {{- range $index, $vhost := (splitList "," .Env.PROSODY_VISITORS_S2S_VHOSTS | compact) }} ["{{ $vhost }}"] = "tcp://{{ $XMPP_SERVER }}:{{ $XMPP_SERVER_S2S_PORT }}"; {{ end -}} {{ end -}} } muc_limit_messages_count = 10; muc_limit_messages_check_token = {{ $LIMIT_MESSAGES_CHECK_TOKEN }}; ----------- Virtual hosts ----------- VirtualHost 'v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}' authentication = 'jitsi-anonymous' ssl = { key = "/config/certs/v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}.key"; certificate = "/config/certs/v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}.crt"; } modules_enabled = { 'bosh'; "external_services"; {{ if $ENABLE_XMPP_WEBSOCKET -}} "websocket"; "smacks"; -- XEP-0198: Stream Management {{ end -}} {{ if .Env.XMPP_MODULES }} "{{ join "\";\n\"" (splitList "," .Env.XMPP_MODULES | compact) }}"; {{ end }} } main_muc = '{{ $VISITORS_MUC_PREFIX }}.v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}'; shard_name = "{{ $SHARD_NAME }}" region_name = "{{ $REGION_NAME }}" release_number = "{{ $RELEASE_NUMBER }}" {{ if .Env.XMPP_CONFIGURATION -}} {{ join "\n " (splitList "," .Env.XMPP_CONFIGURATION | compact) }} {{- end }} VirtualHost '{{ $XMPP_AUTH_DOMAIN }}' modules_enabled = { 'limits_exception'; 'smacks'; } authentication = 'internal_hashed' smacks_hibernation_time = 15; Component '{{ $VISITORS_MUC_PREFIX }}.v{{ $VISITOR_INDEX }}.{{ $VISITORS_XMPP_DOMAIN }}' 'muc' storage = 'memory' muc_room_cache_size = 10000 restrict_room_creation = true modules_enabled = { "muc_hide_all"; "muc_meeting_id"; 'fmuc'; 's2s_bidi'; 's2s_whitelist'; 's2sout_override'; 'muc_max_occupants'; {{ if $ENABLE_SUBDOMAINS -}} "muc_domain_mapper"; {{ end -}} {{ if $ENABLE_RATE_LIMITS -}} "muc_rate_limit"; "rate_limit"; {{ end -}} {{ if .Env.XMPP_MUC_MODULES -}} "{{ join "\";\n\"" (splitList "," .Env.XMPP_MUC_MODULES | compact) }}"; {{ end -}} } muc_room_default_presence_broadcast = { visitor = false; participant = true; moderator = true; }; muc_room_locking = false muc_room_default_public_jids = true muc_max_occupants = {{ $VISITORS_MAX_VISITORS_PER_NODE}} muc_access_whitelist = { "{{ $XMPP_DOMAIN }}"; } muc_tombstones = false muc_room_allow_persistent = false {{ if $ENABLE_RATE_LIMITS -}} -- Max allowed join/login rate in events per second. rate_limit_login_rate = {{ $RATE_LIMIT_LOGIN_RATE }}; -- The rate to which sessions from IPs exceeding the join rate will be limited, in bytes per second. rate_limit_session_rate = {{ $RATE_LIMIT_SESSION_RATE }}; -- The time in seconds, after which the limit for an IP address is lifted. rate_limit_timeout = {{ $RATE_LIMIT_TIMEOUT }}; -- List of regular expressions for IP addresses that are not limited by this module. rate_limit_whitelist = { "127.0.0.1"; {{ range $index, $cidr := (splitList "," $RATE_LIMIT_ALLOW_RANGES) -}} "{{ $cidr }}"; {{ end -}} }; rate_limit_whitelist_jids = { "{{ $JIBRI_RECORDER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}", "{{ $JIGASI_TRANSCRIBER_USER }}@{{ $XMPP_HIDDEN_DOMAIN }}" } {{ end -}} -- The size of the cache that saves state for IP addresses rate_limit_cache_size = {{ $RATE_LIMIT_CACHE_SIZE }}; muc_rate_joins = 30; {{ if .Env.XMPP_MUC_CONFIGURATION -}} {{ join "\n" (splitList "," .Env.XMPP_MUC_CONFIGURATION | compact) }} {{ end -}}