Added jitsi, gitea, caddy, to support installapp and uninstallapp
This commit is contained in:
parent
a5f1034cb1
commit
6d18d4916d
93
lib/caddy.sh
93
lib/caddy.sh
@ -3,6 +3,7 @@
|
|||||||
# Caddy Service
|
# Caddy Service
|
||||||
|
|
||||||
PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
||||||
|
get_appvars
|
||||||
|
|
||||||
config_caddy() {
|
config_caddy() {
|
||||||
echo -ne "\n* Configuring /federated/apps/caddy container.."
|
echo -ne "\n* Configuring /federated/apps/caddy container.."
|
||||||
@ -107,6 +108,98 @@ EOF
|
|||||||
kill -9 $SPINPID &> /dev/null
|
kill -9 $SPINPID &> /dev/null
|
||||||
echo -ne "done."
|
echo -ne "done."
|
||||||
}
|
}
|
||||||
|
email_caddy() {
|
||||||
|
echo -ne "* Sending email to customer.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
cat > /federated/apps/mail/data/root/certs/mailfile <<EOF
|
||||||
|
<html>
|
||||||
|
<img src="https://www.federated.computer/wp-content/uploads/2023/11/logo.png" alt="" /><br>
|
||||||
|
<p>
|
||||||
|
<h4>Caddy is now installed on $DOMAIN</h4>
|
||||||
|
<p>
|
||||||
|
Here is your applications chart with on how to access this service:<br>
|
||||||
|
<p>
|
||||||
|
<h4>Applications</h4>
|
||||||
|
<style type="text/css">
|
||||||
|
.tg {border-collapse:collapse;border-spacing:0;}
|
||||||
|
.tg td{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px;
|
||||||
|
overflow:hidden;padding:10px 5px;word-break:normal;}
|
||||||
|
.tg th{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px;
|
||||||
|
font-weight:normal;overflow:hidden;padding:10px 5px;word-break:normal;}
|
||||||
|
.tg .tg-cul6{border-color:inherit;color:#340096;text-align:left;text-decoration:underline;vertical-align:top}
|
||||||
|
.tg .tg-acii{background-color:#FFF;border-color:inherit;color:#333;text-align:left;vertical-align:top}
|
||||||
|
.tg .tg-0hty{background-color:#000000;border-color:inherit;color:#ffffff;font-weight:bold;text-align:left;vertical-align:top}
|
||||||
|
.tg .tg-kwiq{border-color:inherit;color:#000000;text-align:left;vertical-align:top;word-wrap:break-word}
|
||||||
|
.tg .tg-0pky{border-color:inherit;text-align:left;vertical-align:top}
|
||||||
|
</style>
|
||||||
|
<table class="tg" style="undefined;table-layout: fixed; width: 996px">
|
||||||
|
<colgroup>
|
||||||
|
<col style="width: 101.333333px">
|
||||||
|
<col style="width: 203.333333px">
|
||||||
|
<col style="width: 282.333333px">
|
||||||
|
<col style="width: 185.33333px">
|
||||||
|
<col style="width: 78.333333px">
|
||||||
|
<col style="width: 220.333333px">
|
||||||
|
</colgroup>
|
||||||
|
<thead>
|
||||||
|
<tr>
|
||||||
|
<th class="tg-0hty">Service</th>
|
||||||
|
<th class="tg-0hty">Link</th>
|
||||||
|
<th class="tg-0hty">User / Pass</th>
|
||||||
|
<th class="tg-0hty">Access</th>
|
||||||
|
<th class="tg-0hty">Docs</th>
|
||||||
|
<th class="tg-0hty">Description</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="tg-kwiq">Caddy</td>
|
||||||
|
<td class="tg-kwiq"><a href="https://caddy.$DOMAIN" target="_blank" rel="noopener noreferrer"><span style="color:#340096">caddy.$DOMAIN</span></a></td>
|
||||||
|
<td class="tg-kwiq">No login/td>
|
||||||
|
<td class="tg-kwiq">No login</td>
|
||||||
|
<td class="tg-kwiq"><a href="https://documentation.federated.computer/docs/getting_started/welcome/" target="_blank" rel="noopener noreferrer"><span style="color:#340096">Click here</span></a></td>
|
||||||
|
<td class="tg-kwiq">Caddy is a powerful, enterprise-ready, open source web server</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
<h4>Thanks for your support!</h4>
|
||||||
|
<p>
|
||||||
|
Thank you for your support of Federated Computer. We really appreciate it and hope you have a very successful
|
||||||
|
time with Federated Core.
|
||||||
|
<p>
|
||||||
|
Again, if we can be of any assistance, please don't hesitate to get in touch.
|
||||||
|
<p>
|
||||||
|
Support: https://support.federated.computer<br>
|
||||||
|
Phone: (970) 722-8715<br>
|
||||||
|
Email: support@federated.computer<br>
|
||||||
|
<p>
|
||||||
|
It's <b>your</b> computer. Let's make it work for you!
|
||||||
|
</html>
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Send out e-mail from mail container with details
|
||||||
|
docker exec mail bash -c "mail -r admin@$DOMAIN -a \"Content-type: text/html\" -s \"Application installed on $DOMAIN\" $EMAIL < /root/certs/mailfile"
|
||||||
|
rm /federated/apps/mail/data/root/certs/mailfile
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done.\n"
|
||||||
|
}
|
||||||
|
uninstall_caddy() {
|
||||||
|
echo -ne "* Uninstalling caddy container.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
# First stop the service
|
||||||
|
cd /federated/apps/caddy && docker-compose -f docker-compose.yml -p caddy down &> /dev/null
|
||||||
|
|
||||||
|
# Delete the app directory
|
||||||
|
rm -rf /federated/apps/caddy
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done.\n"
|
||||||
|
}
|
||||||
start_caddy() {
|
start_caddy() {
|
||||||
# Start service with command and retry amount to make sure it's up before proceeding
|
# Start service with command and retry amount to make sure it's up before proceeding
|
||||||
start_service "caddy" "nc -z 172.99.0.31 80 &> /dev/null" "7"
|
start_service "caddy" "nc -z 172.99.0.31 80 &> /dev/null" "7"
|
||||||
|
116
lib/caddy.sh.old
Normal file
116
lib/caddy.sh.old
Normal file
@ -0,0 +1,116 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Caddy Service
|
||||||
|
|
||||||
|
PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
||||||
|
|
||||||
|
config_caddy() {
|
||||||
|
echo -ne "\n* Configuring /federated/apps/caddy container.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
if [ ! -d "/federated/apps/caddy" ]; then
|
||||||
|
mkdir -p /federated/apps/caddy/data/data
|
||||||
|
mkdir -p /federated/apps/caddy/data/srv
|
||||||
|
mkdir -p /federated/apps/caddy/data/etc/caddy
|
||||||
|
fi
|
||||||
|
|
||||||
|
cat > /federated/apps/caddy/docker-compose.yml <<EOF
|
||||||
|
version: "3.7"
|
||||||
|
|
||||||
|
services:
|
||||||
|
caddy:
|
||||||
|
image: federatedcomputer/caddy:\${IMAGE_VERSION}
|
||||||
|
container_name: caddy
|
||||||
|
hostname: caddy.$DOMAIN
|
||||||
|
domainname: $DOMAIN
|
||||||
|
restart: always
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
ipv4_address: 172.99.0.31
|
||||||
|
extra_hosts:
|
||||||
|
- "gitea.$DOMAIN:$EXTERNALIP"
|
||||||
|
env_file:
|
||||||
|
- ./.env
|
||||||
|
volumes:
|
||||||
|
- ./data/srv:/srv
|
||||||
|
- ./data/etc/caddy/Caddyfile:/etc/caddy/Caddyfile
|
||||||
|
- ./data/data:/data
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.caddy.rule=Host(\`caddy.$DOMAIN\`,\`blog.$DOMAIN\`)"
|
||||||
|
- "traefik.http.routers.caddy.entrypoints=websecure"
|
||||||
|
- "traefik.http.routers.caddy.tls.certresolver=letsencrypt"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
external: true
|
||||||
|
EOF
|
||||||
|
|
||||||
|
cat > /federated/apps/caddy/.env <<EOF
|
||||||
|
IMAGE_VERSION="latest"
|
||||||
|
EOF
|
||||||
|
chmod 600 /federated/apps/caddy/.env
|
||||||
|
|
||||||
|
cat > /federated/apps/caddy/data/etc/caddy/Caddyfile <<EOF
|
||||||
|
$DOMAIN:80 {
|
||||||
|
root * /srv/www/public
|
||||||
|
file_server
|
||||||
|
}
|
||||||
|
caddy.$DOMAIN:80 {
|
||||||
|
root * /srv/www/public
|
||||||
|
file_server
|
||||||
|
route /webhook {
|
||||||
|
webhook {
|
||||||
|
repo https://gitea.$DOMAIN/gitea/www
|
||||||
|
type github
|
||||||
|
secret $WEBHOOK_SECRET
|
||||||
|
submodule
|
||||||
|
token $GITEA_TOKEN_1
|
||||||
|
path www
|
||||||
|
branch master
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
blog.$DOMAIN:80 {
|
||||||
|
root * /srv/blog/public
|
||||||
|
file_server
|
||||||
|
route /webhook {
|
||||||
|
webhook {
|
||||||
|
repo https://gitea.$DOMAIN/gitea/blog
|
||||||
|
type github
|
||||||
|
secret $WEBHOOK_SECRET
|
||||||
|
submodule
|
||||||
|
token $GITEA_TOKEN_1
|
||||||
|
path blog
|
||||||
|
branch master
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
documentation.$DOMAIN:80 {
|
||||||
|
root * /srv/documentation/public
|
||||||
|
file_server
|
||||||
|
route /webhook {
|
||||||
|
webhook {
|
||||||
|
repo https://gitea.$DOMAIN/gitea/documentation
|
||||||
|
type github
|
||||||
|
secret $WEBHOOK_SECRET
|
||||||
|
submodule
|
||||||
|
token $GITEA_TOKEN_1
|
||||||
|
path documentation
|
||||||
|
branch master
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
EOF
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done."
|
||||||
|
}
|
||||||
|
start_caddy() {
|
||||||
|
# Start service with command and retry amount to make sure it's up before proceeding
|
||||||
|
start_service "caddy" "nc -z 172.99.0.31 80 &> /dev/null" "7"
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done."
|
||||||
|
}
|
107
lib/gitea.sh
107
lib/gitea.sh
@ -15,6 +15,7 @@ config_gitea() {
|
|||||||
touch /federated/apps/gitea/data/data/git/.ssh/authorized_keys
|
touch /federated/apps/gitea/data/data/git/.ssh/authorized_keys
|
||||||
chmod 600 /federated/apps/gitea/data/data/git/.ssh/authorized_keys
|
chmod 600 /federated/apps/gitea/data/data/git/.ssh/authorized_keys
|
||||||
fi
|
fi
|
||||||
|
get_appvars
|
||||||
|
|
||||||
cat > /federated/apps/gitea/docker-compose.yml <<EOF
|
cat > /federated/apps/gitea/docker-compose.yml <<EOF
|
||||||
version: "3.7"
|
version: "3.7"
|
||||||
@ -54,6 +55,8 @@ networks:
|
|||||||
external: true
|
external: true
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
|
GITEA_SECRET=$(create_password);
|
||||||
|
|
||||||
cat > /federated/apps/gitea/.env <<EOF
|
cat > /federated/apps/gitea/.env <<EOF
|
||||||
IMAGE_VERSION="1.19.0"
|
IMAGE_VERSION="1.19.0"
|
||||||
USER_UID=1000
|
USER_UID=1000
|
||||||
@ -82,8 +85,6 @@ GITEA__service__DISABLE_REGISTRATION=true
|
|||||||
EOF
|
EOF
|
||||||
chmod 600 /federated/apps/gitea/.env
|
chmod 600 /federated/apps/gitea/.env
|
||||||
|
|
||||||
WEBHOOK_SECRET=$(create_password);
|
|
||||||
|
|
||||||
cat > /federated/apps/gitea/data/creategitea.sh <<EOF
|
cat > /federated/apps/gitea/data/creategitea.sh <<EOF
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
@ -154,10 +155,111 @@ curl -X 'POST' \
|
|||||||
EOF
|
EOF
|
||||||
|
|
||||||
chmod +x /federated/apps/gitea/data/creategitea.sh
|
chmod +x /federated/apps/gitea/data/creategitea.sh
|
||||||
|
|
||||||
|
# Create database and user in postgresql
|
||||||
|
docker exec postgresql psql -U postgres -c "CREATE USER gitea WITH PASSWORD '$GITEA_SECRET'" &> /dev/null
|
||||||
|
docker exec postgresql psql -U postgres -c "CREATE DATABASE gitea" &> /dev/null
|
||||||
|
docker exec postgresql psql -U postgres -c "GRANT ALL PRIVILEGES ON DATABASE gitea TO gitea" &> /dev/null
|
||||||
|
|
||||||
kill -9 $SPINPID &> /dev/null
|
kill -9 $SPINPID &> /dev/null
|
||||||
echo -ne "done."
|
echo -ne "done."
|
||||||
}
|
}
|
||||||
|
email_gitea() {
|
||||||
|
echo -ne "* Sending email to customer.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
cat > /federated/apps/mail/data/root/certs/mailfile <<EOF
|
||||||
|
<html>
|
||||||
|
<img src="https://www.federated.computer/wp-content/uploads/2023/11/logo.png" alt="" /><br>
|
||||||
|
<p>
|
||||||
|
<h4>Gitea is now installed on $DOMAIN</h4>
|
||||||
|
<p>
|
||||||
|
Here is your applications chart with on how to access this service:<br>
|
||||||
|
<p>
|
||||||
|
<h4>Applications</h4>
|
||||||
|
<style type="text/css">
|
||||||
|
.tg {border-collapse:collapse;border-spacing:0;}
|
||||||
|
.tg td{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px;
|
||||||
|
overflow:hidden;padding:10px 5px;word-break:normal;}
|
||||||
|
.tg th{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px;
|
||||||
|
font-weight:normal;overflow:hidden;padding:10px 5px;word-break:normal;}
|
||||||
|
.tg .tg-cul6{border-color:inherit;color:#340096;text-align:left;text-decoration:underline;vertical-align:top}
|
||||||
|
.tg .tg-acii{background-color:#FFF;border-color:inherit;color:#333;text-align:left;vertical-align:top}
|
||||||
|
.tg .tg-0hty{background-color:#000000;border-color:inherit;color:#ffffff;font-weight:bold;text-align:left;vertical-align:top}
|
||||||
|
.tg .tg-kwiq{border-color:inherit;color:#000000;text-align:left;vertical-align:top;word-wrap:break-word}
|
||||||
|
.tg .tg-0pky{border-color:inherit;text-align:left;vertical-align:top}
|
||||||
|
</style>
|
||||||
|
<table class="tg" style="undefined;table-layout: fixed; width: 996px">
|
||||||
|
<colgroup>
|
||||||
|
<col style="width: 101.333333px">
|
||||||
|
<col style="width: 203.333333px">
|
||||||
|
<col style="width: 282.333333px">
|
||||||
|
<col style="width: 185.33333px">
|
||||||
|
<col style="width: 78.333333px">
|
||||||
|
<col style="width: 220.333333px">
|
||||||
|
</colgroup>
|
||||||
|
<thead>
|
||||||
|
<tr>
|
||||||
|
<th class="tg-0hty">Service</th>
|
||||||
|
<th class="tg-0hty">Link</th>
|
||||||
|
<th class="tg-0hty">User / Pass</th>
|
||||||
|
<th class="tg-0hty">Access</th>
|
||||||
|
<th class="tg-0hty">Docs</th>
|
||||||
|
<th class="tg-0hty">Description</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="tg-kwiq">Gitea</td>
|
||||||
|
<td class="tg-kwiq"><a href="https://gitea.$DOMAIN" target="_blank" rel="noopener noreferrer"><span style="color:#340096">gitea.$DOMAIN</span></a></td>
|
||||||
|
<td class="tg-kwiq">admin@$DOMAIN<br>admin password above</td>
|
||||||
|
<td class="tg-kwiq">User access is separate from panel</td>
|
||||||
|
<td class="tg-kwiq"><a href="https://documentation.federated.computer/docs/getting_started/welcome/" target="_blank" rel="noopener noreferrer"><span style="color:#340096">Click here</span></a></td>
|
||||||
|
<td class="tg-kwiq">Gitea is a code repository system similar to GitHub</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
<h4>Thanks for your support!</h4>
|
||||||
|
<p>
|
||||||
|
Thank you for your support of Federated Computer. We really appreciate it and hope you have a very successful
|
||||||
|
time with Federated Core.
|
||||||
|
<p>
|
||||||
|
Again, if we can be of any assistance, please don't hesitate to get in touch.
|
||||||
|
<p>
|
||||||
|
Support: https://support.federated.computer<br>
|
||||||
|
Phone: (970) 722-8715<br>
|
||||||
|
Email: support@federated.computer<br>
|
||||||
|
<p>
|
||||||
|
It's <b>your</b> computer. Let's make it work for you!
|
||||||
|
</html>
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Send out e-mail from mail container with details
|
||||||
|
docker exec mail bash -c "mail -r admin@$DOMAIN -a \"Content-type: text/html\" -s \"Application installed on $DOMAIN\" $EMAIL < /root/certs/mailfile"
|
||||||
|
rm /federated/apps/mail/data/root/certs/mailfile
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done.\n"
|
||||||
|
}
|
||||||
|
uninstall_gitea() {
|
||||||
|
echo -ne "* Uninstalling gitea container.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
# First stop the service
|
||||||
|
cd /federated/apps/gitea && docker-compose -f docker-compose.yml -p gitea down &> /dev/null
|
||||||
|
|
||||||
|
# Delete database and user in postgresql
|
||||||
|
docker exec postgresql psql -U postgres -c "DROP DATABASE gitea" &> /dev/null
|
||||||
|
docker exec postgresql psql -U postgres -c "DROP USER gitea" &> /dev/null
|
||||||
|
|
||||||
|
# Delete the app directory
|
||||||
|
rm -rf /federated/apps/gitea
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done.\n"
|
||||||
|
}
|
||||||
start_gitea() {
|
start_gitea() {
|
||||||
# Start service with command to make sure it's up before proceeding
|
# Start service with command to make sure it's up before proceeding
|
||||||
start_service "gitea" "nc -z 172.99.0.30 3000 &> /dev/null" "7"
|
start_service "gitea" "nc -z 172.99.0.30 3000 &> /dev/null" "7"
|
||||||
@ -177,6 +279,7 @@ start_gitea() {
|
|||||||
# Create token to use for Caddy starting up next
|
# Create token to use for Caddy starting up next
|
||||||
GITEA_TOKEN_1=`docker exec gitea curl -H "Content-Type: application/json" -d '{"name":"gitea1","scopes":["all"]}' -u gitea:$ADMINPASS http://gitea.$DOMAIN:3000/api/v1/users/gitea/tokens 2>/dev/null | awk -F: '{ print $4 }' | awk -F\" '{ print $2 }'` &> /dev/null
|
GITEA_TOKEN_1=`docker exec gitea curl -H "Content-Type: application/json" -d '{"name":"gitea1","scopes":["all"]}' -u gitea:$ADMINPASS http://gitea.$DOMAIN:3000/api/v1/users/gitea/tokens 2>/dev/null | awk -F: '{ print $4 }' | awk -F\" '{ print $2 }'` &> /dev/null
|
||||||
[ $? -ne 0 ] && fail "Couldn't run gitea curl to get token inside /federated/apps/gitea container"
|
[ $? -ne 0 ] && fail "Couldn't run gitea curl to get token inside /federated/apps/gitea container"
|
||||||
|
echo "$GITEA_TOKEN_1" > /federated/apps/gitea/.gitea.token.1
|
||||||
|
|
||||||
# Remove creategitea.sh
|
# Remove creategitea.sh
|
||||||
rm /federated/apps/gitea/data/data/creategitea.sh
|
rm /federated/apps/gitea/data/data/creategitea.sh
|
||||||
|
186
lib/gitea.sh.old
Normal file
186
lib/gitea.sh.old
Normal file
@ -0,0 +1,186 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Gitea Service
|
||||||
|
|
||||||
|
PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
||||||
|
|
||||||
|
config_gitea() {
|
||||||
|
echo -ne "\n* Configuring /federated/apps/gitea container.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
if [ ! -d "/federated/apps/gitea" ]; then
|
||||||
|
mkdir -p /federated/apps/gitea/data/data
|
||||||
|
mkdir -p /federated/apps/gitea/data/data/git/.ssh
|
||||||
|
touch /federated/apps/gitea/data/data/git/.ssh/authorized_keys
|
||||||
|
chmod 600 /federated/apps/gitea/data/data/git/.ssh/authorized_keys
|
||||||
|
fi
|
||||||
|
|
||||||
|
cat > /federated/apps/gitea/docker-compose.yml <<EOF
|
||||||
|
version: "3.7"
|
||||||
|
|
||||||
|
services:
|
||||||
|
gitea:
|
||||||
|
image: gitea/gitea:\${IMAGE_VERSION}
|
||||||
|
container_name: gitea
|
||||||
|
hostname: gitea.$DOMAIN
|
||||||
|
domainname: $DOMAIN
|
||||||
|
restart: always
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
ipv4_address: 172.99.0.30
|
||||||
|
extra_hosts:
|
||||||
|
- "caddy.$DOMAIN:$EXTERNALIP"
|
||||||
|
- "blog.$DOMAIN:$EXTERNALIP"
|
||||||
|
- "documentation.$DOMAIN:$EXTERNALIP"
|
||||||
|
ports:
|
||||||
|
- "2222:22"
|
||||||
|
env_file:
|
||||||
|
- ./.env
|
||||||
|
volumes:
|
||||||
|
- ./data/data:/data
|
||||||
|
- ./data/data/git/.ssh:/data/git/.ssh
|
||||||
|
- /etc/timezone:/etc/timezone:ro
|
||||||
|
- /etc/localtime:/etc/localtime:ro
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.gitea.rule=Host(\`gitea.$DOMAIN\`)"
|
||||||
|
- "traefik.http.routers.gitea.entrypoints=websecure"
|
||||||
|
- "traefik.http.routers.gitea.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.services.gitea.loadbalancer.server.port=3000"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
external: true
|
||||||
|
EOF
|
||||||
|
|
||||||
|
cat > /federated/apps/gitea/.env <<EOF
|
||||||
|
IMAGE_VERSION="1.19.0"
|
||||||
|
USER_UID=1000
|
||||||
|
USER_GID=1000
|
||||||
|
GITEA__database__DB_TYPE=postgres
|
||||||
|
GITEA__database__HOST=postgresql.$DOMAIN:5432
|
||||||
|
GITEA__database__NAME=gitea
|
||||||
|
GITEA__database__USER=gitea
|
||||||
|
GITEA__database__PASSWD=$GITEA_SECRET
|
||||||
|
GITEA__database__SSL_MODE=verify-full
|
||||||
|
GITEA__mailer__ENABLED=true
|
||||||
|
GITEA__mailer__FROM=gitea@gitea.$DOMAIN
|
||||||
|
GITEA__mailer__MAILER_TYPE=smtp
|
||||||
|
GITEA__mailer__SMTP_PORT=587
|
||||||
|
GITEA__mailer__HOST=mail.$DOMAIN
|
||||||
|
GITEA__mailer__IS_TLS_ENABLED=true
|
||||||
|
GITEA__mailer__USER=fcore
|
||||||
|
GITEA__mailer__PASSWD=$ADMINPASS
|
||||||
|
GITEA__security__INSTALL_LOCK=true
|
||||||
|
GITEA__server__ROOT_URL=https://gitea.$DOMAIN
|
||||||
|
GITEA__server__DOMAIN=$DOMAIN
|
||||||
|
GITEA__server__SSH_DOMAIN=$DOMAIN
|
||||||
|
GITEA__server__SSH_PORT=2222
|
||||||
|
GITEA__server__SSH_LISTEN_PORT=2222
|
||||||
|
GITEA__service__DISABLE_REGISTRATION=true
|
||||||
|
EOF
|
||||||
|
chmod 600 /federated/apps/gitea/.env
|
||||||
|
|
||||||
|
WEBHOOK_SECRET=$(create_password);
|
||||||
|
|
||||||
|
cat > /federated/apps/gitea/data/creategitea.sh <<EOF
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# Get the Gitea API token
|
||||||
|
GITEA_TOKEN_2=\`curl -H "Content-Type: application/json" -d '{"name":"gitea2","scopes":["all"]}' -u gitea:$ADMINPASS http://gitea.$DOMAIN:3000/api/v1/users/gitea/tokens 2>/dev/null | awk -F: '{ print \$4 }' | awk -F\" '{ print \$2 }'\`
|
||||||
|
|
||||||
|
# Create the repository website, blog, and documentation
|
||||||
|
curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"www","auto_init":true,"default_branch":"master","private":true}'
|
||||||
|
curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"blog","auto_init":true,"default_branch":"master","private":true}'
|
||||||
|
curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"documentation","auto_init":true,"default_branch":"master","private":true}'
|
||||||
|
|
||||||
|
# Create the webhook inside the www repository
|
||||||
|
curl -X 'POST' \
|
||||||
|
'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/www/hooks' \
|
||||||
|
-H 'accept: application/json' \
|
||||||
|
-H 'Content-Type: application/json' \
|
||||||
|
-H "Authorization: token \$GITEA_TOKEN_2" \
|
||||||
|
-d '{
|
||||||
|
"active": true,
|
||||||
|
"config": {
|
||||||
|
"content_type": "json",
|
||||||
|
"url": "https://caddy.$DOMAIN/webhook",
|
||||||
|
"secret": "$WEBHOOK_SECRET"
|
||||||
|
},
|
||||||
|
"events": [
|
||||||
|
"push"
|
||||||
|
],
|
||||||
|
"type": "gitea"
|
||||||
|
}'
|
||||||
|
|
||||||
|
# Create the webhook inside the blog repository
|
||||||
|
curl -X 'POST' \
|
||||||
|
'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/blog/hooks' \
|
||||||
|
-H 'accept: application/json' \
|
||||||
|
-H 'Content-Type: application/json' \
|
||||||
|
-H "Authorization: token \$GITEA_TOKEN_2" \
|
||||||
|
-d '{
|
||||||
|
"active": true,
|
||||||
|
"config": {
|
||||||
|
"content_type": "json",
|
||||||
|
"url": "https://blog.$DOMAIN/webhook",
|
||||||
|
"secret": "$WEBHOOK_SECRET"
|
||||||
|
},
|
||||||
|
"events": [
|
||||||
|
"push"
|
||||||
|
],
|
||||||
|
"type": "gitea"
|
||||||
|
}'
|
||||||
|
|
||||||
|
# Create the webhook inside the documentation repository
|
||||||
|
curl -X 'POST' \
|
||||||
|
'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/documentation/hooks' \
|
||||||
|
-H 'accept: application/json' \
|
||||||
|
-H 'Content-Type: application/json' \
|
||||||
|
-H "Authorization: token \$GITEA_TOKEN_2" \
|
||||||
|
-d '{
|
||||||
|
"active": true,
|
||||||
|
"config": {
|
||||||
|
"content_type": "json",
|
||||||
|
"url": "https://documentation.$DOMAIN/webhook",
|
||||||
|
"secret": "$WEBHOOK_SECRET"
|
||||||
|
},
|
||||||
|
"events": [
|
||||||
|
"push"
|
||||||
|
],
|
||||||
|
"type": "gitea"
|
||||||
|
}'
|
||||||
|
EOF
|
||||||
|
|
||||||
|
chmod +x /federated/apps/gitea/data/creategitea.sh
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done."
|
||||||
|
}
|
||||||
|
start_gitea() {
|
||||||
|
# Start service with command to make sure it's up before proceeding
|
||||||
|
start_service "gitea" "nc -z 172.99.0.30 3000 &> /dev/null" "7"
|
||||||
|
|
||||||
|
# Copy creategitea.sh inside gitea container
|
||||||
|
mv /federated/apps/gitea/data/creategitea.sh /federated/apps/gitea/data/data/creategitea.sh
|
||||||
|
[ $? -ne 0 ] && fail "Couldn't mv creategitea.sh inside /federated/apps/gitea container"
|
||||||
|
|
||||||
|
# Create admin user gitea
|
||||||
|
docker exec --user 1000 gitea gitea admin user create --admin --username gitea --password $ADMINPASS --email admin@$DOMAIN &> /dev/null
|
||||||
|
[ $? -ne 0 ] && fail "Couldn't run gitea user create inside /federated/apps/gitea container"
|
||||||
|
|
||||||
|
# Run creategitea.sh inside gitea container
|
||||||
|
docker exec gitea /data/creategitea.sh &> /dev/null
|
||||||
|
[ $? -ne 0 ] && fail "Couldn't run creategitea.sh inside /federated/apps/gitea container"
|
||||||
|
|
||||||
|
# Create token to use for Caddy starting up next
|
||||||
|
GITEA_TOKEN_1=`docker exec gitea curl -H "Content-Type: application/json" -d '{"name":"gitea1","scopes":["all"]}' -u gitea:$ADMINPASS http://gitea.$DOMAIN:3000/api/v1/users/gitea/tokens 2>/dev/null | awk -F: '{ print $4 }' | awk -F\" '{ print $2 }'` &> /dev/null
|
||||||
|
[ $? -ne 0 ] && fail "Couldn't run gitea curl to get token inside /federated/apps/gitea container"
|
||||||
|
|
||||||
|
# Remove creategitea.sh
|
||||||
|
rm /federated/apps/gitea/data/data/creategitea.sh
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done."
|
||||||
|
}
|
98
lib/jitsi.sh
98
lib/jitsi.sh
@ -3,6 +3,7 @@
|
|||||||
# Jitsi Service
|
# Jitsi Service
|
||||||
|
|
||||||
PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
||||||
|
get_appvars
|
||||||
|
|
||||||
config_jitsi() {
|
config_jitsi() {
|
||||||
echo -ne "\n* Configuring /federated/apps/jitsi container.."
|
echo -ne "\n* Configuring /federated/apps/jitsi container.."
|
||||||
@ -379,8 +380,6 @@ networks:
|
|||||||
external: true
|
external: true
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
LDAP_SECRET=`cat /federated/apps/ldap/.ldap.secret`
|
|
||||||
|
|
||||||
# Create Jitsi .env file
|
# Create Jitsi .env file
|
||||||
cat > /federated/apps/jitsi/.env <<EOF
|
cat > /federated/apps/jitsi/.env <<EOF
|
||||||
# shellcheck disable=SC2034
|
# shellcheck disable=SC2034
|
||||||
@ -525,10 +524,10 @@ AUTH_TYPE=ldap
|
|||||||
LDAP_URL=ldap://ldap.$DOMAIN/
|
LDAP_URL=ldap://ldap.$DOMAIN/
|
||||||
|
|
||||||
# LDAP base DN. Can be empty
|
# LDAP base DN. Can be empty
|
||||||
LDAP_BASE=DC=federatedcomputer,DC=cloud
|
LDAP_BASE=DC=$LDAP_DOMAIN_FIRST,DC=$LDAP_DOMAIN_LAST
|
||||||
|
|
||||||
# LDAP user DN. Do not specify this parameter for the anonymous bind
|
# LDAP user DN. Do not specify this parameter for the anonymous bind
|
||||||
LDAP_BINDDN=CN=admin,DC=federatedcomputer,DC=cloud
|
LDAP_BINDDN=CN=admin,DC=$LDAP_DOMAIN_FIRST,DC=$LDAP_DOMAIN_LAST
|
||||||
|
|
||||||
# LDAP user password. Do not specify this parameter for the anonymous bind
|
# LDAP user password. Do not specify this parameter for the anonymous bind
|
||||||
LDAP_BINDPW=$LDAP_SECRET
|
LDAP_BINDPW=$LDAP_SECRET
|
||||||
@ -612,7 +611,98 @@ mkdir -p ~/.jitsi-meet-cfg/{web,transcripts,prosody/config,prosody/prosody-plugi
|
|||||||
kill -9 $SPINPID &> /dev/null
|
kill -9 $SPINPID &> /dev/null
|
||||||
echo -ne "done."
|
echo -ne "done."
|
||||||
}
|
}
|
||||||
|
email_jitsi() {
|
||||||
|
echo -ne "* Sending email to customer.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
cat > /federated/apps/mail/data/root/certs/mailfile <<EOF
|
||||||
|
<html>
|
||||||
|
<img src="https://www.federated.computer/wp-content/uploads/2023/11/logo.png" alt="" /><br>
|
||||||
|
<p>
|
||||||
|
<h4>Jitsi is now installed on $DOMAIN</h4>
|
||||||
|
<p>
|
||||||
|
Here is your applications chart with on how to access this service:<br>
|
||||||
|
<p>
|
||||||
|
<h4>Applications</h4>
|
||||||
|
<style type="text/css">
|
||||||
|
.tg {border-collapse:collapse;border-spacing:0;}
|
||||||
|
.tg td{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px;
|
||||||
|
overflow:hidden;padding:10px 5px;word-break:normal;}
|
||||||
|
.tg th{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px;
|
||||||
|
font-weight:normal;overflow:hidden;padding:10px 5px;word-break:normal;}
|
||||||
|
.tg .tg-cul6{border-color:inherit;color:#340096;text-align:left;text-decoration:underline;vertical-align:top}
|
||||||
|
.tg .tg-acii{background-color:#FFF;border-color:inherit;color:#333;text-align:left;vertical-align:top}
|
||||||
|
.tg .tg-0hty{background-color:#000000;border-color:inherit;color:#ffffff;font-weight:bold;text-align:left;vertical-align:top}
|
||||||
|
.tg .tg-kwiq{border-color:inherit;color:#000000;text-align:left;vertical-align:top;word-wrap:break-word}
|
||||||
|
.tg .tg-0pky{border-color:inherit;text-align:left;vertical-align:top}
|
||||||
|
</style>
|
||||||
|
<table class="tg" style="undefined;table-layout: fixed; width: 996px">
|
||||||
|
<colgroup>
|
||||||
|
<col style="width: 101.333333px">
|
||||||
|
<col style="width: 203.333333px">
|
||||||
|
<col style="width: 282.333333px">
|
||||||
|
<col style="width: 185.33333px">
|
||||||
|
<col style="width: 78.333333px">
|
||||||
|
<col style="width: 220.333333px">
|
||||||
|
</colgroup>
|
||||||
|
<thead>
|
||||||
|
<tr>
|
||||||
|
<th class="tg-0hty">Service</th>
|
||||||
|
<th class="tg-0hty">Link</th>
|
||||||
|
<th class="tg-0hty">User / Pass</th>
|
||||||
|
<th class="tg-0hty">Access</th>
|
||||||
|
<th class="tg-0hty">Docs</th>
|
||||||
|
<th class="tg-0hty">Description</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="tg-kwiq">Jitsi</td>
|
||||||
|
<td class="tg-kwiq"><a href="https://jitsi.$DOMAIN" target="_blank" rel="noopener noreferrer"><span style="color:#340096">jitsi.$DOMAIN</span></a></td>
|
||||||
|
<td class="tg-kwiq">admin<br>admin password above</td>
|
||||||
|
<td class="tg-kwiq">All users in panel have access using 'username'</td>
|
||||||
|
<td class="tg-kwiq"><a href="https://documentation.federated.computer/docs/getting_started/welcome/" target="_blank" rel="noopener noreferrer"><span style="color:#340096">Click here</span></a></td>
|
||||||
|
<td class="tg-kwiq">Jitsi is a zoom replacement video conferencing solution</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
<h4>Thanks for your support!</h4>
|
||||||
|
<p>
|
||||||
|
Thank you for your support of Federated Computer. We really appreciate it and hope you have a very successful
|
||||||
|
time with Federated Core.
|
||||||
|
<p>
|
||||||
|
Again, if we can be of any assistance, please don't hesitate to get in touch.
|
||||||
|
<p>
|
||||||
|
Support: https://support.federated.computer<br>
|
||||||
|
Phone: (970) 722-8715<br>
|
||||||
|
Email: support@federated.computer<br>
|
||||||
|
<p>
|
||||||
|
It's <b>your</b> computer. Let's make it work for you!
|
||||||
|
</html>
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Send out e-mail from mail container with details
|
||||||
|
docker exec mail bash -c "mail -r admin@$DOMAIN -a \"Content-type: text/html\" -s \"Application installed on $DOMAIN\" $EMAIL < /root/certs/mailfile"
|
||||||
|
rm /federated/apps/mail/data/root/certs/mailfile
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done.\n"
|
||||||
|
}
|
||||||
|
uninstall_jitsi() {
|
||||||
|
echo -ne "* Uninstalling jitsi container.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
# First stop the service
|
||||||
|
cd /federated/apps/jitsi && docker-compose -f docker-compose.yml -p jitsi down &> /dev/null
|
||||||
|
|
||||||
|
# Delete the app directory
|
||||||
|
rm -rf /federated/apps/jitsi
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done.\n"
|
||||||
|
}
|
||||||
start_jitsi() {
|
start_jitsi() {
|
||||||
# Start service with command to make sure it's up before proceeding
|
# Start service with command to make sure it's up before proceeding
|
||||||
start_service "jitsi" "nc -z 172.99.0.25 443 &> /dev/null" "8"
|
start_service "jitsi" "nc -z 172.99.0.25 443 &> /dev/null" "8"
|
||||||
|
622
lib/jitsi.sh.old
Normal file
622
lib/jitsi.sh.old
Normal file
@ -0,0 +1,622 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Jitsi Service
|
||||||
|
|
||||||
|
PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
||||||
|
|
||||||
|
config_jitsi() {
|
||||||
|
echo -ne "\n* Configuring /federated/apps/jitsi container.."
|
||||||
|
spin &
|
||||||
|
SPINPID=$!
|
||||||
|
|
||||||
|
if [ ! -d "/federated/apps/jitsi" ]; then
|
||||||
|
mkdir -p /federated/apps/jitsi
|
||||||
|
# mkdir -p /federated/apps/jitsi/data/config/keys &> /dev/null
|
||||||
|
# cp -rf /federated/apps/dns/data/etc/letsencrypt/archive/$DOMAIN/*.pem apps/jitsi/data/config/keys
|
||||||
|
# mv /federated/apps/jitsi/data/config/keys/fullchain1.pem apps/jitsi/data/config/keys/cert.crt
|
||||||
|
# mv /federated/apps/jitsi/data/config/keys/privkey1.pem apps/jitsi/data/config/keys/cert.key
|
||||||
|
# chmod 644 /federated/apps/jitsi/data/config/keys/*.pem
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Extract Jitsi into /federated/apps/jitsi
|
||||||
|
tar zxvf /federated/lib/files/jitsi/stable-* --strip-components 1 -C /federated/apps/jitsi &> /dev/null
|
||||||
|
[ $? -ne 0 ] && fail "Couldn't extract files/jitsi/stable* into /federated/apps/jitsi"
|
||||||
|
|
||||||
|
# Create docker compose file
|
||||||
|
cat > /federated/apps/jitsi/docker-compose.yml <<EOF
|
||||||
|
version: '3.7'
|
||||||
|
|
||||||
|
services:
|
||||||
|
# Frontend
|
||||||
|
web:
|
||||||
|
image: jitsi/web:\${JITSI_IMAGE_VERSION:-stable-7882}
|
||||||
|
restart: \${RESTART_POLICY:-unless-stopped}
|
||||||
|
ports:
|
||||||
|
- '\${HTTP_PORT}:80'
|
||||||
|
- '\${HTTPS_PORT}:443'
|
||||||
|
volumes:
|
||||||
|
- \${CONFIG}/web:/config:Z
|
||||||
|
- \${CONFIG}/web/crontabs:/var/spool/cron/crontabs:Z
|
||||||
|
- \${CONFIG}/transcripts:/usr/share/jitsi-meet/transcripts:Z
|
||||||
|
- ./data/config/keys:/config/keys:Z
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.jitsi.rule=Host(\`jitsi.$DOMAIN\`)"
|
||||||
|
- "traefik.http.routers.jitsi.entrypoints=websecure"
|
||||||
|
- "traefik.http.routers.jitsi.tls.certresolver=letsencrypt"
|
||||||
|
environment:
|
||||||
|
- AMPLITUDE_ID
|
||||||
|
- ANALYTICS_SCRIPT_URLS
|
||||||
|
- ANALYTICS_WHITELISTED_EVENTS
|
||||||
|
- AUDIO_QUALITY_OPUS_BITRATE
|
||||||
|
- BRANDING_DATA_URL
|
||||||
|
- CALLSTATS_CUSTOM_SCRIPT_URL
|
||||||
|
- CALLSTATS_ID
|
||||||
|
- CALLSTATS_SECRET
|
||||||
|
- CHROME_EXTENSION_BANNER_JSON
|
||||||
|
- CONFCODE_URL
|
||||||
|
- CONFIG_EXTERNAL_CONNECT
|
||||||
|
- DEFAULT_LANGUAGE
|
||||||
|
- DEPLOYMENTINFO_ENVIRONMENT
|
||||||
|
- DEPLOYMENTINFO_ENVIRONMENT_TYPE
|
||||||
|
- DEPLOYMENTINFO_REGION
|
||||||
|
- DEPLOYMENTINFO_SHARD
|
||||||
|
- DEPLOYMENTINFO_USERREGION
|
||||||
|
- DESKTOP_SHARING_FRAMERATE_MIN
|
||||||
|
- DESKTOP_SHARING_FRAMERATE_MAX
|
||||||
|
- DIALIN_NUMBERS_URL
|
||||||
|
- DIALOUT_AUTH_URL
|
||||||
|
- DIALOUT_CODES_URL
|
||||||
|
- DISABLE_AUDIO_LEVELS
|
||||||
|
- DISABLE_DEEP_LINKING
|
||||||
|
- DISABLE_GRANT_MODERATOR
|
||||||
|
- DISABLE_HTTPS
|
||||||
|
- DISABLE_KICKOUT
|
||||||
|
- DISABLE_LOCAL_RECORDING
|
||||||
|
- DISABLE_POLLS
|
||||||
|
- DISABLE_PRIVATE_CHAT
|
||||||
|
- DISABLE_PROFILE
|
||||||
|
- DISABLE_REACTIONS
|
||||||
|
- DISABLE_REMOTE_VIDEO_MENU
|
||||||
|
- DROPBOX_APPKEY
|
||||||
|
- DROPBOX_REDIRECT_URI
|
||||||
|
- DYNAMIC_BRANDING_URL
|
||||||
|
- ENABLE_AUDIO_PROCESSING
|
||||||
|
- ENABLE_AUTH
|
||||||
|
- ENABLE_BREAKOUT_ROOMS
|
||||||
|
- ENABLE_CALENDAR
|
||||||
|
- ENABLE_COLIBRI_WEBSOCKET
|
||||||
|
- ENABLE_E2EPING
|
||||||
|
- ENABLE_FILE_RECORDING_SHARING
|
||||||
|
- ENABLE_GUESTS
|
||||||
|
- ENABLE_HSTS
|
||||||
|
- ENABLE_HTTP_REDIRECT
|
||||||
|
- ENABLE_IPV6
|
||||||
|
- ENABLE_LETSENCRYPT
|
||||||
|
- ENABLE_LIPSYNC
|
||||||
|
- ENABLE_NO_AUDIO_DETECTION
|
||||||
|
- ENABLE_NOISY_MIC_DETECTION
|
||||||
|
- ENABLE_OCTO
|
||||||
|
- ENABLE_OPUS_RED
|
||||||
|
- ENABLE_PREJOIN_PAGE
|
||||||
|
- ENABLE_P2P
|
||||||
|
- ENABLE_WELCOME_PAGE
|
||||||
|
- ENABLE_CLOSE_PAGE
|
||||||
|
- ENABLE_LIVESTREAMING
|
||||||
|
- ENABLE_LOCAL_RECORDING_NOTIFY_ALL_PARTICIPANT
|
||||||
|
- ENABLE_LOCAL_RECORDING_SELF_START
|
||||||
|
- ENABLE_RECORDING
|
||||||
|
- ENABLE_REMB
|
||||||
|
- ENABLE_REQUIRE_DISPLAY_NAME
|
||||||
|
- ENABLE_SERVICE_RECORDING
|
||||||
|
- ENABLE_SIMULCAST
|
||||||
|
- ENABLE_STATS_ID
|
||||||
|
- ENABLE_STEREO
|
||||||
|
- ENABLE_SUBDOMAINS
|
||||||
|
- ENABLE_TALK_WHILE_MUTED
|
||||||
|
- ENABLE_TCC
|
||||||
|
- ENABLE_TRANSCRIPTIONS
|
||||||
|
- ENABLE_XMPP_WEBSOCKET
|
||||||
|
- ENABLE_JAAS_COMPONENTS
|
||||||
|
- ENABLE_MULTI_STREAM
|
||||||
|
- ETHERPAD_PUBLIC_URL
|
||||||
|
- ETHERPAD_URL_BASE
|
||||||
|
- E2EPING_NUM_REQUESTS
|
||||||
|
- E2EPING_MAX_CONFERENCE_SIZE
|
||||||
|
- E2EPING_MAX_MESSAGE_PER_SECOND
|
||||||
|
- GOOGLE_ANALYTICS_ID
|
||||||
|
- GOOGLE_API_APP_CLIENT_ID
|
||||||
|
- HIDE_PREMEETING_BUTTONS
|
||||||
|
- HIDE_PREJOIN_DISPLAY_NAME
|
||||||
|
- HIDE_PREJOIN_EXTRA_BUTTONS
|
||||||
|
- INVITE_SERVICE_URL
|
||||||
|
- JICOFO_AUTH_USER
|
||||||
|
- LETSENCRYPT_DOMAIN
|
||||||
|
- LETSENCRYPT_EMAIL
|
||||||
|
- LETSENCRYPT_USE_STAGING
|
||||||
|
- MATOMO_ENDPOINT
|
||||||
|
- MATOMO_SITE_ID
|
||||||
|
- MICROSOFT_API_APP_CLIENT_ID
|
||||||
|
- NGINX_RESOLVER
|
||||||
|
- NGINX_WORKER_PROCESSES
|
||||||
|
- NGINX_WORKER_CONNECTIONS
|
||||||
|
- PEOPLE_SEARCH_URL
|
||||||
|
- PUBLIC_URL
|
||||||
|
- P2P_PREFERRED_CODEC
|
||||||
|
- RESOLUTION
|
||||||
|
- RESOLUTION_MIN
|
||||||
|
- RESOLUTION_WIDTH
|
||||||
|
- RESOLUTION_WIDTH_MIN
|
||||||
|
- START_AUDIO_MUTED
|
||||||
|
- START_AUDIO_ONLY
|
||||||
|
- START_BITRATE
|
||||||
|
- START_SILENT
|
||||||
|
- START_WITH_AUDIO_MUTED
|
||||||
|
- START_VIDEO_MUTED
|
||||||
|
- START_WITH_VIDEO_MUTED
|
||||||
|
- TESTING_CAP_SCREENSHARE_BITRATE
|
||||||
|
- TESTING_OCTO_PROBABILITY
|
||||||
|
- TOKEN_AUTH_URL
|
||||||
|
- TOOLBAR_BUTTONS
|
||||||
|
- TZ
|
||||||
|
- VIDEOQUALITY_BITRATE_H264_LOW
|
||||||
|
- VIDEOQUALITY_BITRATE_H264_STANDARD
|
||||||
|
- VIDEOQUALITY_BITRATE_H264_HIGH
|
||||||
|
- VIDEOQUALITY_BITRATE_VP8_LOW
|
||||||
|
- VIDEOQUALITY_BITRATE_VP8_STANDARD
|
||||||
|
- VIDEOQUALITY_BITRATE_VP8_HIGH
|
||||||
|
- VIDEOQUALITY_BITRATE_VP9_LOW
|
||||||
|
- VIDEOQUALITY_BITRATE_VP9_STANDARD
|
||||||
|
- VIDEOQUALITY_BITRATE_VP9_HIGH
|
||||||
|
- VIDEOQUALITY_ENFORCE_PREFERRED_CODEC
|
||||||
|
- VIDEOQUALITY_PREFERRED_CODEC
|
||||||
|
- XMPP_AUTH_DOMAIN
|
||||||
|
- XMPP_BOSH_URL_BASE
|
||||||
|
- XMPP_DOMAIN
|
||||||
|
- XMPP_GUEST_DOMAIN
|
||||||
|
- XMPP_MUC_DOMAIN
|
||||||
|
- XMPP_RECORDER_DOMAIN
|
||||||
|
- XMPP_PORT
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
ipv4_address: 172.99.0.25
|
||||||
|
|
||||||
|
# XMPP server
|
||||||
|
prosody:
|
||||||
|
image: jitsi/prosody:\${JITSI_IMAGE_VERSION:-stable-7882}
|
||||||
|
restart: \${RESTART_POLICY:-unless-stopped}
|
||||||
|
expose:
|
||||||
|
- '\${XMPP_PORT:-5222}'
|
||||||
|
- '5347'
|
||||||
|
- '5280'
|
||||||
|
volumes:
|
||||||
|
- \${CONFIG}/prosody/config:/config:Z
|
||||||
|
- \${CONFIG}/prosody/prosody-plugins-custom:/prosody-plugins-custom:Z
|
||||||
|
environment:
|
||||||
|
- AUTH_TYPE
|
||||||
|
- DISABLE_POLLS
|
||||||
|
- ENABLE_AUTH
|
||||||
|
- ENABLE_AV_MODERATION
|
||||||
|
- ENABLE_BREAKOUT_ROOMS
|
||||||
|
- ENABLE_END_CONFERENCE
|
||||||
|
- ENABLE_GUESTS
|
||||||
|
- ENABLE_IPV6
|
||||||
|
- ENABLE_LOBBY
|
||||||
|
- ENABLE_RECORDING
|
||||||
|
- ENABLE_XMPP_WEBSOCKET
|
||||||
|
- ENABLE_JAAS_COMPONENTS
|
||||||
|
- GC_TYPE
|
||||||
|
- GC_INC_TH
|
||||||
|
- GC_INC_SPEED
|
||||||
|
- GC_INC_STEP_SIZE
|
||||||
|
- GC_GEN_MIN_TH
|
||||||
|
- GC_GEN_MAX_TH
|
||||||
|
- GLOBAL_CONFIG
|
||||||
|
- GLOBAL_MODULES
|
||||||
|
- JIBRI_RECORDER_USER
|
||||||
|
- JIBRI_RECORDER_PASSWORD
|
||||||
|
- JIBRI_XMPP_USER
|
||||||
|
- JIBRI_XMPP_PASSWORD
|
||||||
|
- JICOFO_AUTH_USER
|
||||||
|
- JICOFO_AUTH_PASSWORD
|
||||||
|
- JICOFO_COMPONENT_SECRET
|
||||||
|
- JIGASI_XMPP_USER
|
||||||
|
- JIGASI_XMPP_PASSWORD
|
||||||
|
- JVB_AUTH_USER
|
||||||
|
- JVB_AUTH_PASSWORD
|
||||||
|
- JWT_APP_ID
|
||||||
|
- JWT_APP_SECRET
|
||||||
|
- JWT_ACCEPTED_ISSUERS
|
||||||
|
- JWT_ACCEPTED_AUDIENCES
|
||||||
|
- JWT_ASAP_KEYSERVER
|
||||||
|
- JWT_ALLOW_EMPTY
|
||||||
|
- JWT_AUTH_TYPE
|
||||||
|
- JWT_ENABLE_DOMAIN_VERIFICATION
|
||||||
|
- JWT_TOKEN_AUTH_MODULE
|
||||||
|
- MATRIX_UVS_URL
|
||||||
|
- MATRIX_UVS_ISSUER
|
||||||
|
- MATRIX_UVS_AUTH_TOKEN
|
||||||
|
- MATRIX_UVS_SYNC_POWER_LEVELS
|
||||||
|
- LOG_LEVEL
|
||||||
|
- LDAP_AUTH_METHOD
|
||||||
|
- LDAP_BASE
|
||||||
|
- LDAP_BINDDN
|
||||||
|
- LDAP_BINDPW
|
||||||
|
- LDAP_FILTER
|
||||||
|
- LDAP_VERSION
|
||||||
|
- LDAP_TLS_CIPHERS
|
||||||
|
- LDAP_TLS_CHECK_PEER
|
||||||
|
- LDAP_TLS_CACERT_FILE
|
||||||
|
- LDAP_TLS_CACERT_DIR
|
||||||
|
- LDAP_START_TLS
|
||||||
|
- LDAP_URL
|
||||||
|
- LDAP_USE_TLS
|
||||||
|
- MAX_PARTICIPANTS
|
||||||
|
- PROSODY_RESERVATION_ENABLED
|
||||||
|
- PROSODY_RESERVATION_REST_BASE_URL
|
||||||
|
- PUBLIC_URL
|
||||||
|
- TURN_CREDENTIALS
|
||||||
|
- TURN_HOST
|
||||||
|
- TURNS_HOST
|
||||||
|
- TURN_PORT
|
||||||
|
- TURNS_PORT
|
||||||
|
- TZ
|
||||||
|
- XMPP_DOMAIN
|
||||||
|
- XMPP_AUTH_DOMAIN
|
||||||
|
- XMPP_GUEST_DOMAIN
|
||||||
|
- XMPP_MUC_DOMAIN
|
||||||
|
- XMPP_INTERNAL_MUC_DOMAIN
|
||||||
|
- XMPP_MODULES
|
||||||
|
- XMPP_MUC_MODULES
|
||||||
|
- XMPP_MUC_CONFIGURATION
|
||||||
|
- XMPP_INTERNAL_MUC_MODULES
|
||||||
|
- XMPP_RECORDER_DOMAIN
|
||||||
|
- XMPP_PORT
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
ipv4_address: 172.99.0.26
|
||||||
|
aliases:
|
||||||
|
- xmpp.meet.jitsi
|
||||||
|
|
||||||
|
# Focus component
|
||||||
|
jicofo:
|
||||||
|
image: jitsi/jicofo:\${JITSI_IMAGE_VERSION:-stable-7882}
|
||||||
|
restart: \${RESTART_POLICY:-unless-stopped}
|
||||||
|
volumes:
|
||||||
|
- \${CONFIG}/jicofo:/config:Z
|
||||||
|
environment:
|
||||||
|
- AUTH_TYPE
|
||||||
|
- BRIDGE_AVG_PARTICIPANT_STRESS
|
||||||
|
- BRIDGE_STRESS_THRESHOLD
|
||||||
|
- ENABLE_AUTH
|
||||||
|
- ENABLE_AUTO_OWNER
|
||||||
|
- ENABLE_CODEC_VP8
|
||||||
|
- ENABLE_CODEC_VP9
|
||||||
|
- ENABLE_CODEC_H264
|
||||||
|
- ENABLE_OCTO
|
||||||
|
- ENABLE_RECORDING
|
||||||
|
- ENABLE_SCTP
|
||||||
|
- ENABLE_AUTO_LOGIN
|
||||||
|
- JICOFO_AUTH_USER
|
||||||
|
- JICOFO_AUTH_PASSWORD
|
||||||
|
- JICOFO_ENABLE_BRIDGE_HEALTH_CHECKS
|
||||||
|
- JICOFO_CONF_INITIAL_PARTICIPANT_WAIT_TIMEOUT
|
||||||
|
- JICOFO_CONF_SINGLE_PARTICIPANT_TIMEOUT
|
||||||
|
- JICOFO_ENABLE_HEALTH_CHECKS
|
||||||
|
- JICOFO_SHORT_ID
|
||||||
|
- JIBRI_BREWERY_MUC
|
||||||
|
- JIBRI_REQUEST_RETRIES
|
||||||
|
- JIBRI_PENDING_TIMEOUT
|
||||||
|
- JIGASI_BREWERY_MUC
|
||||||
|
- JIGASI_SIP_URI
|
||||||
|
- JVB_BREWERY_MUC
|
||||||
|
- MAX_BRIDGE_PARTICIPANTS
|
||||||
|
- OCTO_BRIDGE_SELECTION_STRATEGY
|
||||||
|
- SENTRY_DSN="\${JICOFO_SENTRY_DSN:-0}"
|
||||||
|
- SENTRY_ENVIRONMENT
|
||||||
|
- SENTRY_RELEASE
|
||||||
|
- TZ
|
||||||
|
- XMPP_DOMAIN
|
||||||
|
- XMPP_AUTH_DOMAIN
|
||||||
|
- XMPP_INTERNAL_MUC_DOMAIN
|
||||||
|
- XMPP_MUC_DOMAIN
|
||||||
|
- XMPP_RECORDER_DOMAIN
|
||||||
|
- XMPP_SERVER
|
||||||
|
- XMPP_PORT
|
||||||
|
depends_on:
|
||||||
|
- prosody
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
ipv4_address: 172.99.0.27
|
||||||
|
|
||||||
|
# Video bridge
|
||||||
|
jvb:
|
||||||
|
image: jitsi/jvb:\${JITSI_IMAGE_VERSION:-stable-7882}
|
||||||
|
restart: \${RESTART_POLICY:-unless-stopped}
|
||||||
|
ports:
|
||||||
|
- '\${JVB_PORT:-10000}:\${JVB_PORT:-10000}/udp'
|
||||||
|
- '127.0.0.1:\${JVB_COLIBRI_PORT:-9090}:9090'
|
||||||
|
volumes:
|
||||||
|
- \${CONFIG}/jvb:/config:Z
|
||||||
|
environment:
|
||||||
|
- DOCKER_HOST_ADDRESS
|
||||||
|
- ENABLE_COLIBRI_WEBSOCKET
|
||||||
|
- ENABLE_OCTO
|
||||||
|
- ENABLE_MULTI_STREAM
|
||||||
|
- JVB_ADVERTISE_IPS
|
||||||
|
- JVB_ADVERTISE_PRIVATE_CANDIDATES
|
||||||
|
- JVB_AUTH_USER
|
||||||
|
- JVB_AUTH_PASSWORD
|
||||||
|
- JVB_BREWERY_MUC
|
||||||
|
- JVB_DISABLE_STUN
|
||||||
|
- JVB_PORT
|
||||||
|
- JVB_MUC_NICKNAME
|
||||||
|
- JVB_STUN_SERVERS
|
||||||
|
- JVB_OCTO_BIND_ADDRESS
|
||||||
|
- JVB_OCTO_REGION
|
||||||
|
- JVB_OCTO_RELAY_ID
|
||||||
|
- JVB_WS_DOMAIN
|
||||||
|
- JVB_WS_SERVER_ID
|
||||||
|
- PUBLIC_URL
|
||||||
|
- SENTRY_DSN="\${JVB_SENTRY_DSN:-0}"
|
||||||
|
- SENTRY_ENVIRONMENT
|
||||||
|
- SENTRY_RELEASE
|
||||||
|
- COLIBRI_REST_ENABLED
|
||||||
|
- SHUTDOWN_REST_ENABLED
|
||||||
|
- TZ
|
||||||
|
- XMPP_AUTH_DOMAIN
|
||||||
|
- XMPP_INTERNAL_MUC_DOMAIN
|
||||||
|
- XMPP_SERVER
|
||||||
|
- XMPP_PORT
|
||||||
|
depends_on:
|
||||||
|
- prosody
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
ipv4_address: 172.99.0.28
|
||||||
|
|
||||||
|
networks:
|
||||||
|
federated:
|
||||||
|
external: true
|
||||||
|
EOF
|
||||||
|
|
||||||
|
LDAP_SECRET=`cat /federated/apps/ldap/.ldap.secret`
|
||||||
|
|
||||||
|
# Create Jitsi .env file
|
||||||
|
cat > /federated/apps/jitsi/.env <<EOF
|
||||||
|
# shellcheck disable=SC2034
|
||||||
|
################################################################################
|
||||||
|
################################################################################
|
||||||
|
# Welcome to the Jitsi Meet Docker setup!
|
||||||
|
#
|
||||||
|
# This sample .env file contains some basic options to get you started.
|
||||||
|
# The full options reference can be found here:
|
||||||
|
# https://jitsi.github.io/handbook/docs/devops-guide/devops-guide-docker
|
||||||
|
################################################################################
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Basic configuration options
|
||||||
|
#
|
||||||
|
|
||||||
|
# Directory where all configuration will be stored
|
||||||
|
CONFIG=~/.jitsi-meet-cfg
|
||||||
|
|
||||||
|
# Exposed HTTP port
|
||||||
|
HTTP_PORT=9000
|
||||||
|
|
||||||
|
# Exposed HTTPS port
|
||||||
|
HTTPS_PORT=9443
|
||||||
|
|
||||||
|
# System time zone
|
||||||
|
TZ=UTC
|
||||||
|
|
||||||
|
# Public URL for the web service (required)
|
||||||
|
PUBLIC_URL=https://jitsi.$DOMAIN
|
||||||
|
#XMPP_DOMAIN=$DOMAIN
|
||||||
|
|
||||||
|
# Media IP addresses to advertise by the JVB
|
||||||
|
# This setting deprecates DOCKER_HOST_ADDRESS, and supports a comma separated list of IPs
|
||||||
|
# See the "Running behind NAT or on a LAN environment" section in the Handbook:
|
||||||
|
# https://jitsi.github.io/handbook/docs/devops-guide/devops-guide-docker#running-behind-nat-or-on-a-lan-environment
|
||||||
|
#JVB_ADVERTISE_IPS=192.168.1.1,1.2.3.4
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# JaaS Components (beta)
|
||||||
|
# https://jaas.8x8.vc
|
||||||
|
#
|
||||||
|
|
||||||
|
# Enable JaaS Components (hosted Jigasi)
|
||||||
|
#ENABLE_JAAS_COMPONENTS=0
|
||||||
|
|
||||||
|
#
|
||||||
|
# Let's Encrypt configuration
|
||||||
|
#
|
||||||
|
|
||||||
|
# Enable Let's Encrypt certificate generation
|
||||||
|
#ENABLE_LETSENCRYPT=1
|
||||||
|
|
||||||
|
# Domain for which to generate the certificate
|
||||||
|
#LETSENCRYPT_DOMAIN=meet.example.com
|
||||||
|
|
||||||
|
# E-Mail for receiving important account notifications (mandatory)
|
||||||
|
#LETSENCRYPT_EMAIL=alice@atlanta.net
|
||||||
|
|
||||||
|
# Use the staging server (for avoiding rate limits while testing)
|
||||||
|
#LETSENCRYPT_USE_STAGING=1
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Etherpad integration (for document sharing)
|
||||||
|
#
|
||||||
|
|
||||||
|
# Set etherpad-lite URL in docker local network (uncomment to enable)
|
||||||
|
#ETHERPAD_URL_BASE=http://etherpad.meet.jitsi:9001
|
||||||
|
|
||||||
|
# Set etherpad-lite public URL, including /p/ pad path fragment (uncomment to enable)
|
||||||
|
#ETHERPAD_PUBLIC_URL=https://etherpad.my.domain/p/
|
||||||
|
|
||||||
|
# Name your etherpad instance!
|
||||||
|
ETHERPAD_TITLE=Video Chat
|
||||||
|
|
||||||
|
# The default text of a pad
|
||||||
|
ETHERPAD_DEFAULT_PAD_TEXT="Welcome to Web Chat!\n\n"
|
||||||
|
|
||||||
|
# Name of the skin for etherpad
|
||||||
|
ETHERPAD_SKIN_NAME=colibris
|
||||||
|
|
||||||
|
# Skin variants for etherpad
|
||||||
|
ETHERPAD_SKIN_VARIANTS="super-light-toolbar super-light-editor light-background full-width-editor"
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Basic Jigasi configuration options (needed for SIP gateway support)
|
||||||
|
#
|
||||||
|
|
||||||
|
# SIP URI for incoming / outgoing calls
|
||||||
|
#JIGASI_SIP_URI=test@sip2sip.info
|
||||||
|
|
||||||
|
# Password for the specified SIP account as a clear text
|
||||||
|
#JIGASI_SIP_PASSWORD=passw0rd
|
||||||
|
|
||||||
|
# SIP server (use the SIP account domain if in doubt)
|
||||||
|
#JIGASI_SIP_SERVER=sip2sip.info
|
||||||
|
|
||||||
|
# SIP server port
|
||||||
|
#JIGASI_SIP_PORT=5060
|
||||||
|
|
||||||
|
# SIP server transport
|
||||||
|
#JIGASI_SIP_TRANSPORT=UDP
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Authentication configuration (see handbook for details)
|
||||||
|
#
|
||||||
|
|
||||||
|
# Enable authentication
|
||||||
|
ENABLE_AUTH=1
|
||||||
|
|
||||||
|
# Enable guest access
|
||||||
|
ENABLE_GUESTS=1
|
||||||
|
|
||||||
|
# Select authentication type: internal, jwt, ldap or matrix
|
||||||
|
AUTH_TYPE=ldap
|
||||||
|
|
||||||
|
# JWT authentication
|
||||||
|
#
|
||||||
|
|
||||||
|
# Application identifier
|
||||||
|
#JWT_APP_ID=my_jitsi_app_id
|
||||||
|
|
||||||
|
# Application secret known only to your token generator
|
||||||
|
#JWT_APP_SECRET=my_jitsi_app_secret
|
||||||
|
|
||||||
|
# (Optional) Set asap_accepted_issuers as a comma separated list
|
||||||
|
#JWT_ACCEPTED_ISSUERS=my_web_client,my_app_client
|
||||||
|
|
||||||
|
# (Optional) Set asap_accepted_audiences as a comma separated list
|
||||||
|
#JWT_ACCEPTED_AUDIENCES=my_server1,my_server2
|
||||||
|
|
||||||
|
# LDAP authentication (for more information see the Cyrus SASL saslauthd.conf man page)
|
||||||
|
#
|
||||||
|
|
||||||
|
# LDAP url for connection
|
||||||
|
LDAP_URL=ldap://ldap.$DOMAIN/
|
||||||
|
|
||||||
|
# LDAP base DN. Can be empty
|
||||||
|
LDAP_BASE=DC=federatedcomputer,DC=cloud
|
||||||
|
|
||||||
|
# LDAP user DN. Do not specify this parameter for the anonymous bind
|
||||||
|
LDAP_BINDDN=CN=admin,DC=federatedcomputer,DC=cloud
|
||||||
|
|
||||||
|
# LDAP user password. Do not specify this parameter for the anonymous bind
|
||||||
|
LDAP_BINDPW=$LDAP_SECRET
|
||||||
|
|
||||||
|
# LDAP filter. Tokens example:
|
||||||
|
|
||||||
|
# %1-9 - if the input key is user@mail.domain.com, then %1 is com, %2 is domain and %3 is mail
|
||||||
|
# %s - %s is replaced by the complete service string
|
||||||
|
# %r - %r is replaced by the complete realm string
|
||||||
|
#LDAP_FILTER=(sAMAccountName=%u)
|
||||||
|
#LDAP_FILTER=(mail=%u@$DOMAIN)
|
||||||
|
|
||||||
|
# LDAP authentication method
|
||||||
|
LDAP_AUTH_METHOD=bind
|
||||||
|
|
||||||
|
# LDAP version
|
||||||
|
#LDAP_VERSION=3
|
||||||
|
|
||||||
|
# LDAP TLS using
|
||||||
|
#LDAP_USE_TLS=1
|
||||||
|
|
||||||
|
# List of SSL/TLS ciphers to allow
|
||||||
|
#LDAP_TLS_CIPHERS=SECURE256:SECURE128:!AES-128-CBC:!ARCFOUR-128:!CAMELLIA-128-CBC:!3DES-CBC:!CAMELLIA-128-CBC
|
||||||
|
|
||||||
|
# Require and verify server certificate
|
||||||
|
#LDAP_TLS_CHECK_PEER=1
|
||||||
|
|
||||||
|
# Path to CA cert file. Used when server certificate verify is enabled
|
||||||
|
#LDAP_TLS_CACERT_FILE=/etc/ssl/certs/ca-certificates.crt
|
||||||
|
|
||||||
|
# Path to CA certs directory. Used when server certificate verify is enabled
|
||||||
|
#LDAP_TLS_CACERT_DIR=/etc/ssl/certs
|
||||||
|
|
||||||
|
# Wether to use starttls, implies LDAPv3 and requires ldap:// instead of ldaps://
|
||||||
|
#LDAP_START_TLS=1
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Security
|
||||||
|
#
|
||||||
|
# Set these to strong passwords to avoid intruders from impersonating a service account
|
||||||
|
# The service(s) won't start unless these are specified
|
||||||
|
# Running ./gen-passwords.sh will update .env with strong passwords
|
||||||
|
# You may skip the Jigasi and Jibri passwords if you are not using those
|
||||||
|
# DO NOT reuse passwords
|
||||||
|
#
|
||||||
|
|
||||||
|
# XMPP password for Jicofo client connections
|
||||||
|
JICOFO_AUTH_PASSWORD=
|
||||||
|
|
||||||
|
# XMPP password for JVB client connections
|
||||||
|
JVB_AUTH_PASSWORD=
|
||||||
|
|
||||||
|
# XMPP password for Jigasi MUC client connections
|
||||||
|
JIGASI_XMPP_PASSWORD=
|
||||||
|
|
||||||
|
# XMPP recorder password for Jibri client connections
|
||||||
|
JIBRI_RECORDER_PASSWORD=
|
||||||
|
|
||||||
|
# XMPP password for Jibri client connections
|
||||||
|
JIBRI_XMPP_PASSWORD=
|
||||||
|
|
||||||
|
#
|
||||||
|
# Docker Compose options
|
||||||
|
#
|
||||||
|
|
||||||
|
# Container restart policy
|
||||||
|
#RESTART_POLICY=unless-stopped
|
||||||
|
|
||||||
|
# Jitsi image version (useful for local development)
|
||||||
|
#JITSI_IMAGE_VERSION=latest
|
||||||
|
ENABLE_SIMULCAST=false
|
||||||
|
EOF
|
||||||
|
|
||||||
|
mkdir -p ~/.jitsi-meet-cfg/{web,transcripts,prosody/config,prosody/prosody-plugins-custom,jicofo,jvb,jigasi,jibri}
|
||||||
|
[ $? -ne 0 ] && fail "Couldn't run mkdir for jitsi configurations"
|
||||||
|
|
||||||
|
/federated/apps/jitsi/gen-passwords.sh
|
||||||
|
[ $? -ne 0 ] && fail "Couldn't run /federated/apps/jitsi/gen-passwords.sh"
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done."
|
||||||
|
}
|
||||||
|
|
||||||
|
start_jitsi() {
|
||||||
|
# Start service with command to make sure it's up before proceeding
|
||||||
|
start_service "jitsi" "nc -z 172.99.0.25 443 &> /dev/null" "8"
|
||||||
|
|
||||||
|
kill -9 $SPINPID &> /dev/null
|
||||||
|
echo -ne "done."
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user