This commit is contained in:
@@ -47,59 +47,59 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# services.livekit = {
|
services.livekit = {
|
||||||
# enable = true;
|
enable = true;
|
||||||
# openFirewall = true;
|
openFirewall = true;
|
||||||
# settings = {
|
settings = {
|
||||||
# port = 7880;
|
port = 7880;
|
||||||
# rtc = {
|
rtc = {
|
||||||
# port_range_start = 50000;
|
port_range_start = 50000;
|
||||||
# port_range_end = 60000;
|
port_range_end = 60000;
|
||||||
# tcp_port = 7881;
|
tcp_port = 7881;
|
||||||
# use_external_ip = true;
|
use_external_ip = true;
|
||||||
# allow_tcp_fallback = true;
|
allow_tcp_fallback = true;
|
||||||
# };
|
};
|
||||||
# room.auto_create = true;
|
room.auto_create = true;
|
||||||
# turn = {
|
turn = {
|
||||||
# enabled = true;
|
enabled = true;
|
||||||
# domain = matrixRtcDomain;
|
domain = matrixRtcDomain;
|
||||||
# tls_port = 5349;
|
tls_port = 5349;
|
||||||
# udp_port = 3478;
|
udp_port = 3478;
|
||||||
# relay_range_start = 50000;
|
relay_range_start = 50000;
|
||||||
# relay_range_end = 60000;
|
relay_range_end = 60000;
|
||||||
# cert_file = "/run/credentials/livekit.service/turn-cert";
|
cert_file = "/run/credentials/livekit.service/turn-cert";
|
||||||
# key_file = "/run/credentials/livekit.service/turn-key";
|
key_file = "/run/credentials/livekit.service/turn-key";
|
||||||
# };
|
};
|
||||||
# };
|
};
|
||||||
# keyFile = livekitKeyFile;
|
keyFile = livekitKeyFile;
|
||||||
# };
|
};
|
||||||
|
|
||||||
# services.lk-jwt-service = {
|
services.lk-jwt-service = {
|
||||||
# enable = true;
|
enable = true;
|
||||||
# livekitUrl = "wss://${matrixRtcDomain}";
|
livekitUrl = "wss://${matrixRtcDomain}";
|
||||||
# keyFile = livekitKeyFile;
|
keyFile = livekitKeyFile;
|
||||||
# };
|
};
|
||||||
|
|
||||||
# systemd.services.lk-jwt-service.environment.LIVEKIT_FULL_ACCESS_HOMESERVERS = serverName;
|
systemd.services.lk-jwt-service.environment.LIVEKIT_FULL_ACCESS_HOMESERVERS = serverName;
|
||||||
|
|
||||||
# systemd.services.livekit.serviceConfig.LoadCredential = [
|
systemd.services.livekit.serviceConfig.LoadCredential = [
|
||||||
# "turn-cert:/var/lib/acme/${matrixRtcDomain}/fullchain.pem"
|
"turn-cert:/var/lib/acme/${matrixRtcDomain}/fullchain.pem"
|
||||||
# "turn-key:/var/lib/acme/${matrixRtcDomain}/key.pem"
|
"turn-key:/var/lib/acme/${matrixRtcDomain}/key.pem"
|
||||||
# ];
|
];
|
||||||
# systemd.services.livekit.after = [ "acme-${matrixRtcDomain}.service" ];
|
systemd.services.livekit.after = [ "acme-${matrixRtcDomain}.service" ];
|
||||||
# systemd.services.livekit.requires = [ "acme-${matrixRtcDomain}.service" ];
|
systemd.services.livekit.requires = [ "acme-${matrixRtcDomain}.service" ];
|
||||||
|
|
||||||
# systemd.services.livekit-key = {
|
systemd.services.livekit-key = {
|
||||||
# before = [ "lk-jwt-service.service" "livekit.service" ];
|
before = [ "lk-jwt-service.service" "livekit.service" ];
|
||||||
# wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
# path = with pkgs; [ livekit coreutils gawk ];
|
path = with pkgs; [ livekit coreutils gawk ];
|
||||||
# script = ''
|
script = ''
|
||||||
# echo "Key missing, generating key"
|
echo "Key missing, generating key"
|
||||||
# echo "lk-jwt-service: $(livekit-server generate-keys | tail -1 | awk '{print $3}')" > "${livekitKeyFile}"
|
echo "lk-jwt-service: $(livekit-server generate-keys | tail -1 | awk '{print $3}')" > "${livekitKeyFile}"
|
||||||
# '';
|
'';
|
||||||
# serviceConfig.Type = "oneshot";
|
serviceConfig.Type = "oneshot";
|
||||||
# unitConfig.ConditionPathExists = "!${livekitKeyFile}";
|
unitConfig.ConditionPathExists = "!${livekitKeyFile}";
|
||||||
# };
|
};
|
||||||
|
|
||||||
networking.firewall = {
|
networking.firewall = {
|
||||||
allowedTCPPorts = [ 7880 7881 5349 ];
|
allowedTCPPorts = [ 7880 7881 5349 ];
|
||||||
|
|||||||
@@ -391,36 +391,36 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# "matrixrtc.atri.dad" = {
|
"matrixrtc.atri.dad" = {
|
||||||
# enableACME = true;
|
enableACME = true;
|
||||||
# forceSSL = true;
|
forceSSL = true;
|
||||||
|
|
||||||
# # lk-jwt-service (handles its own CORS)
|
# lk-jwt-service (handles its own CORS)
|
||||||
# locations."~ ^(/sfu/get|/healthz)" = {
|
locations."~ ^(/sfu/get|/healthz)" = {
|
||||||
# priority = 400;
|
priority = 400;
|
||||||
# proxyPass = "http://[::1]:${toString config.services.lk-jwt-service.port}";
|
proxyPass = "http://[::1]:${toString config.services.lk-jwt-service.port}";
|
||||||
# extraConfig = ''
|
extraConfig = ''
|
||||||
# proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
# proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
# proxy_set_header X-Forwarded-Proto $scheme;
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
# '';
|
'';
|
||||||
# };
|
};
|
||||||
|
|
||||||
# # livekit
|
# livekit
|
||||||
# locations."/" = {
|
locations."/" = {
|
||||||
# proxyPass = "http://[::1]:${toString config.services.livekit.settings.port}";
|
proxyPass = "http://[::1]:${toString config.services.livekit.settings.port}";
|
||||||
# proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
# extraConfig = ''
|
extraConfig = ''
|
||||||
# proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
# proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
# proxy_set_header X-Forwarded-Proto $scheme;
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
# proxy_read_timeout 300;
|
proxy_read_timeout 300;
|
||||||
# proxy_send_timeout 300;
|
proxy_send_timeout 300;
|
||||||
# '';
|
'';
|
||||||
# };
|
};
|
||||||
# };
|
};
|
||||||
|
|
||||||
"atash.dev" = {
|
"atash.dev" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
|||||||
Reference in New Issue
Block a user