diff --git a/modules/matrix.nix b/modules/matrix.nix index 78bab92..ebd220f 100644 --- a/modules/matrix.nix +++ b/modules/matrix.nix @@ -47,38 +47,38 @@ in }; }; - services.livekit = { - enable = true; - openFirewall = true; - settings = { - port = 7880; - rtc = { - port_range_start = 50000; - port_range_end = 60000; - tcp_port = 7881; - use_external_ip = true; - allow_tcp_fallback = true; - }; - room.auto_create = true; - turn = { - enabled = true; - domain = matrixRtcDomain; - tls_port = 5349; - udp_port = 3478; - relay_range_start = 50000; - relay_range_end = 60000; - cert_file = "/run/credentials/livekit.service/turn-cert"; - key_file = "/run/credentials/livekit.service/turn-key"; - }; - }; - keyFile = livekitKeyFile; - }; + # services.livekit = { + # enable = true; + # openFirewall = true; + # settings = { + # port = 7880; + # rtc = { + # port_range_start = 50000; + # port_range_end = 60000; + # tcp_port = 7881; + # use_external_ip = true; + # allow_tcp_fallback = true; + # }; + # room.auto_create = true; + # turn = { + # enabled = true; + # domain = matrixRtcDomain; + # tls_port = 5349; + # udp_port = 3478; + # relay_range_start = 50000; + # relay_range_end = 60000; + # cert_file = "/run/credentials/livekit.service/turn-cert"; + # key_file = "/run/credentials/livekit.service/turn-key"; + # }; + # }; + # keyFile = livekitKeyFile; + # }; - services.lk-jwt-service = { - enable = true; - livekitUrl = "wss://${matrixRtcDomain}"; - keyFile = livekitKeyFile; - }; + # services.lk-jwt-service = { + # enable = true; + # livekitUrl = "wss://${matrixRtcDomain}"; + # keyFile = livekitKeyFile; + # }; systemd.services.lk-jwt-service.environment.LIVEKIT_FULL_ACCESS_HOMESERVERS = serverName;