Home

The meta/jitsi port

jitsi-1.0p1 – meta package for all Jitsi Meet components (cvsweb github mirror)

Description

meta package for jitsi components along with a short tutorial for
setting up a simple server.
No homepage

Readme

+-------------------------------------------------------------------------------
| Running jitsi on OpenBSD
+-------------------------------------------------------------------------------

A basic configuration guide is provided here which will set up a single node
jitsi-meet instance where anyone can create a conference room and invite others
to join them.
We will assume that the domain of interest is 'example.com' and jitsi is being
hosted in the subdomain 'jitsi.example.com'.

OpenBSD daemons
===============

As jitsi has a lot of moving parts, a concise list of daemons and their
configuration files is presented here for clarity:

1) jvb - (daemon) jitsi videobridge
    * ${SYSCONFDIR}/jvb/jvb.in.sh - default command line parameters and
                                    their values
    * ${SYSCONFDIR}/jvb/jvb.conf - default config file
    * ${SYSCONFDIR}/jvb/sip-communicator.properties - config file for running
                                                      behind a NAT

2) jicofo - (daemon) jitsi conference focus
    * ${SYSCONFDIR}/jicofo/jicofo.in.sh - default command line parameters
                                          and their values
    * ${SYSCONFDIR}/jicofo/jicofo.conf - default config file

3) jitsi-meet - static files for jitsi web frontend
    * ${LOCALSTATEDIR}/www/jitsi-meet/ - default location of files
    * ${LOCALSTATEDIR}/www/jitsi-meet/config.js - default config file

4) nginx - (daemon) web server and reverse proxy
    * ${SYSCONFDIR}/nginx/ - default config files

5) prosody - (daemon) XMPP server used by jitsi
    * ${SYSCONFDIR}/prosody/prosody.cfg.lua - default config file
    * ${LOCALSTATEDIR}/prosody/ - default runtime files

Sample files
============

There is sample file provided for prosody to go along with the default files
provided for jvb and jicofo, located at:
    ${TRUEPREFIX}/share/jitsi/prosody.cfg.lua.sample.

Nginx can be used as a reverse proxy, with a configuration for the server
given as follows:

    server {
        listen 443 ssl http2;
        listen [::]:443 ssl http2;

        server_name jitsi.example.com;

        ssl_certificate /etc/ssl/jitsi.example.com.crt;
        ssl_certificate_key /etc/ssl/private/jitsi.example.com.key;

        root /jitsi-meet;

        # BOSH
        location = /http-bind {
            proxy_pass      http://127.0.0.1:5280/http-bind;
            proxy_set_header X-Forwarded-For $remote_addr;
            proxy_set_header Host $http_host;
        }

        ssi on;
        ssi_types application/x-javascript application/javascript;

        location ~ ^/(libs|css|static|images|fonts|lang|sounds|connection_optimization)/(.*)$ {
            add_header 'Access-Control-Allow-Origin' '*';
            alias /jitsi-meet/$1/$2;
        }

        # rooms
        location ~ ^/([a-zA-Z0-9=\?]+)$ {
            rewrite ^/(.*)$ / break;
        }

        # external_api.js must be accessible from the root of the
        # installation for the electron version of Jitsi Meet to work
        location /external_api.js {
            alias /jitsi-meet/libs/external_api.min.js;
        }
    }

Passwords
=========

Throughout the configuration, the following passwords should be generated as
they will be needed in the configuration files:

    ${JAVA_TS_PASS}
    ${JVB_COMP_PASS}
    ${FOCUS_COMP_PASS}

pf.conf
=======

The default configuration uses the following ports:

    * nginx: TCP 80, 443
    * prosody: TCP 5000, 5222, 5269, 5280, 5281, 5347, 5582
    * jicofo: TCP 8888
    * jvb: TCP 8080, UDP 10000

Only a few ports, TCP 80, 443 and UDP 10000, are to be exposed to the
network, the other ports are used for internal communication between jicofo,
jvb and prosody.
A possible set of pf.conf rules that can be used is:

    pass in on egress to (egress) tcp port { 80 443 }
    pass in on egress to (egress) udp port 10000

/etc/hosts configuration
========================

Jitsi needs two subdomains, 'auth.jitsi.example.com' and 'jitsi.example.com',
configured as part of the setup, of which only 'jitsi.example.com' is
exposed outside the local network.

They are accessed by the jicofo, jvb and prosody daemons as part of their
internal communication. The simplest way to make them resolvable to localhost
is to add them in the /etc/hosts file -

    127.0.0.1 localhost jitsi jitsi.example.com auth.jitsi auth.jitsi.example.com
    ::1       localhost jitsi jitsi.example.com auth.jitsi auth.jitsi.example.com

Nginx configuration
===================

Jitsi uses webrtc which mandates the use of https. The sample nginx config file
should be updated to use the proper TLS certificates, which can be obtained
by acme-client(1). These are also going to be used by prosody.

Prosody configuration
=====================

In the sample prosody configuration file, replace the domain and the password
placeholders with the passwords chosen above.

In the section for the domain 'jitsi.example.com' the certificates obtained in
the previous step should be used.

Prosody also hosts the internal domain 'auth.jitsi.example.com' and can use
self signed TLS certificates for this.
They should be generated using the following command:

    # prosodyctl cert generate auth.jitsi.example.com

The certificates will be stored in:
    ${LOCALSTATEDIR}/prosody/auth.jitsi.example.com.{crt,key}.

These certificates also need to be shared with jicofo and jvb by adding them
to a Java certificate truststore ${SYSCONFDIR}/ssl/jitsi.store.

    # $(javaPathHelper -h jicofo)/bin/keytool -import -alias prosody \
      -file ${LOCALSTATEDIR}/prosody/auth.jitsi.example.com \
      -keystore ${SYSCONFDIR}/ssl/jitsi.store -storepass ${JAVA_TS_PASS}

Prosody needs two plugins to be added to the setup which can be achieved by:

    # prosodyctl install --server=https://modules.prosody.im/rocks/ \
        mod_client_proxy
    # prosodyctl install --server=https://modules.prosody.im/rocks/ \
        mod_roster_command

The 'focus' user for prosody should also be registered via the command line:

    # prosodyctl register focus auth.jitsi.example.com ${FOCUS_COMP_PASS}
    # prosodyctl mod_roster_command subscribe focus.jitsi.example.com \
        focus@auth.jitsi.example.com

JVB and jicofo configuration
============================

The default configuration files for jvb and jicofo only need the domain and
password fields to be updated.
The jicofo daemon needs to be provided the host name:

    # rcctl set jicofo flags "--host=jitsi.example.com"

SIP configuration
=================

If the jitsi server is behind a NAT, such as when hosting from an internal
homeserver, the config file ${SYSCONFDIR}/jvb/sip-communicator.properties
should be updated to include the public and NAT local addresses of the setup.
The ${LOCAL_ADDRESS} should be the internal IP address assigned on the LAN
network and the ${PUBLIC_ADDRESS} should be the one used by peers outside
the LAN to reach the setup.

Jitsi-meet configuration
========================

The relevant parts of the web configuration file at
'${LOCALSTATEDIR}/www/jitsi-meet/config.js' that need to be updated, and
uncommented if needed, are provided here:

    var config = {
      hosts: {
        domain: 'jitsi.example.com',
        muc: 'conference.jitsi.example.com'
      },

      bosh: '//jitsi.example.com/http-bind',
      useTurnUdp: false,
      enableWelcomePage: true,
      prejoinConfig: {
        enabled: true,
        hideExtraJoinButtons: ['no-audio', 'by-phone']
      },
      p2p: {
        stunServers: [ { urls: 'stun:meet-jit-si-turnrelay.jitsi.net:443' } ]
      }
    }

Spinning up the daemons
=======================

The daemons needs to be started in the order given:

    # rcctl enable nginx prosody jicofo jvb
    # rcctl order nginx prosody jicofo jvb
    # rcctl start nginx prosody jicofo jvb

The setup can be tested by visiting the site at https://jitsi.example.com.

Additional upstream documentation
=================================

Further steps to configure the setup can be found in the upstream
documentation at https://jitsi.github.io/handbook/.

Maintainer

Philipp Buehler, Aisha Tammy

Categories

meta

Run dependencies

Files

Search