Uncommented
All checks were successful
Deploy NixOS / deploy (push) Successful in 27s

This commit is contained in:
2026-02-13 10:21:31 -07:00
parent c49e5ce7c1
commit 410ab37a91
2 changed files with 77 additions and 77 deletions

View File

@@ -47,59 +47,59 @@ in
};
};
# services.livekit = {
# enable = true;
# openFirewall = true;
# settings = {
# port = 7880;
# rtc = {
# port_range_start = 50000;
# port_range_end = 60000;
# tcp_port = 7881;
# use_external_ip = true;
# allow_tcp_fallback = true;
# };
# room.auto_create = true;
# turn = {
# enabled = true;
# domain = matrixRtcDomain;
# tls_port = 5349;
# udp_port = 3478;
# relay_range_start = 50000;
# relay_range_end = 60000;
# cert_file = "/run/credentials/livekit.service/turn-cert";
# key_file = "/run/credentials/livekit.service/turn-key";
# };
# };
# keyFile = livekitKeyFile;
# };
services.livekit = {
enable = true;
openFirewall = true;
settings = {
port = 7880;
rtc = {
port_range_start = 50000;
port_range_end = 60000;
tcp_port = 7881;
use_external_ip = true;
allow_tcp_fallback = true;
};
room.auto_create = true;
turn = {
enabled = true;
domain = matrixRtcDomain;
tls_port = 5349;
udp_port = 3478;
relay_range_start = 50000;
relay_range_end = 60000;
cert_file = "/run/credentials/livekit.service/turn-cert";
key_file = "/run/credentials/livekit.service/turn-key";
};
};
keyFile = livekitKeyFile;
};
# services.lk-jwt-service = {
# enable = true;
# livekitUrl = "wss://${matrixRtcDomain}";
# keyFile = livekitKeyFile;
# };
services.lk-jwt-service = {
enable = true;
livekitUrl = "wss://${matrixRtcDomain}";
keyFile = livekitKeyFile;
};
# systemd.services.lk-jwt-service.environment.LIVEKIT_FULL_ACCESS_HOMESERVERS = serverName;
systemd.services.lk-jwt-service.environment.LIVEKIT_FULL_ACCESS_HOMESERVERS = serverName;
# systemd.services.livekit.serviceConfig.LoadCredential = [
# "turn-cert:/var/lib/acme/${matrixRtcDomain}/fullchain.pem"
# "turn-key:/var/lib/acme/${matrixRtcDomain}/key.pem"
# ];
# systemd.services.livekit.after = [ "acme-${matrixRtcDomain}.service" ];
# systemd.services.livekit.requires = [ "acme-${matrixRtcDomain}.service" ];
systemd.services.livekit.serviceConfig.LoadCredential = [
"turn-cert:/var/lib/acme/${matrixRtcDomain}/fullchain.pem"
"turn-key:/var/lib/acme/${matrixRtcDomain}/key.pem"
];
systemd.services.livekit.after = [ "acme-${matrixRtcDomain}.service" ];
systemd.services.livekit.requires = [ "acme-${matrixRtcDomain}.service" ];
# systemd.services.livekit-key = {
# before = [ "lk-jwt-service.service" "livekit.service" ];
# wantedBy = [ "multi-user.target" ];
# path = with pkgs; [ livekit coreutils gawk ];
# script = ''
# echo "Key missing, generating key"
# echo "lk-jwt-service: $(livekit-server generate-keys | tail -1 | awk '{print $3}')" > "${livekitKeyFile}"
# '';
# serviceConfig.Type = "oneshot";
# unitConfig.ConditionPathExists = "!${livekitKeyFile}";
# };
systemd.services.livekit-key = {
before = [ "lk-jwt-service.service" "livekit.service" ];
wantedBy = [ "multi-user.target" ];
path = with pkgs; [ livekit coreutils gawk ];
script = ''
echo "Key missing, generating key"
echo "lk-jwt-service: $(livekit-server generate-keys | tail -1 | awk '{print $3}')" > "${livekitKeyFile}"
'';
serviceConfig.Type = "oneshot";
unitConfig.ConditionPathExists = "!${livekitKeyFile}";
};
networking.firewall = {
allowedTCPPorts = [ 7880 7881 5349 ];