2020-05-12 09:46:20 +02:00
|
|
|
[http]
|
|
|
|
# IP and port to listen on for HTTP requests.
|
|
|
|
# Comment line to disable the listener.
|
|
|
|
#listen = 127.0.0.1:8080
|
|
|
|
|
|
|
|
# HTTP socket read timeout in seconds.
|
|
|
|
#readtimeout = 15
|
|
|
|
|
|
|
|
# HTTP socket write timeout in seconds.
|
|
|
|
#writetimeout = 15
|
|
|
|
|
|
|
|
[https]
|
|
|
|
# IP and port to listen on for HTTPS requests.
|
|
|
|
# Comment line to disable the listener.
|
|
|
|
#listen = 127.0.0.1:8443
|
|
|
|
|
|
|
|
# HTTPS socket read timeout in seconds.
|
|
|
|
#readtimeout = 15
|
|
|
|
|
|
|
|
# HTTPS socket write timeout in seconds.
|
|
|
|
#writetimeout = 15
|
|
|
|
|
|
|
|
# Certificate / private key to use for the HTTPS server.
|
|
|
|
certificate = /etc/nginx/ssl/server.crt
|
|
|
|
key = /etc/nginx/ssl/server.key
|
|
|
|
|
|
|
|
[app]
|
|
|
|
# Set to "true" to install pprof debug handlers.
|
|
|
|
# See "https://golang.org/pkg/net/http/pprof/" for further information.
|
|
|
|
debug = false
|
|
|
|
|
|
|
|
[sessions]
|
|
|
|
# Secret value used to generate checksums of sessions. This should be a random
|
|
|
|
# string of 32 or 64 bytes.
|
|
|
|
hashkey = the-secret-for-session-checksums
|
|
|
|
|
|
|
|
# Optional key for encrypting data in the sessions. Must be either 16, 24 or
|
|
|
|
# 32 bytes.
|
|
|
|
# If no key is specified, data will not be encrypted (not recommended).
|
|
|
|
blockkey = -encryption-key-
|
|
|
|
|
|
|
|
[clients]
|
|
|
|
# Shared secret for connections from internal clients. This must be the same
|
|
|
|
# value as configured in the respective internal services.
|
|
|
|
internalsecret = the-shared-secret-for-internal-clients
|
|
|
|
|
|
|
|
[backend]
|
2020-07-07 09:44:02 +02:00
|
|
|
# Comma-separated list of backend ids from which clients are allowed to connect
|
|
|
|
# from. Each backend will have isolated rooms, i.e. clients connecting to room
|
|
|
|
# "abc12345" on backend 1 will be in a different room than clients connected to
|
|
|
|
# a room with the same name on backend 2. Also sessions connected from different
|
|
|
|
# backends will not be able to communicate with each other.
|
|
|
|
#backends = backend-id, another-backend
|
2020-05-12 09:46:20 +02:00
|
|
|
|
|
|
|
# Allow any hostname as backend endpoint. This is extremely insecure and should
|
|
|
|
# only be used while running the benchmark client against the server.
|
|
|
|
allowall = false
|
|
|
|
|
2020-07-07 09:44:02 +02:00
|
|
|
# Common shared secret for requests from and to the backend servers if
|
|
|
|
# "allowall" is enabled. This must be the same value as configured in the
|
|
|
|
# Nextcloud admin ui.
|
|
|
|
# secret = the-shared-secret
|
2020-05-12 09:46:20 +02:00
|
|
|
|
|
|
|
# Timeout in seconds for requests to the backend.
|
|
|
|
timeout = 10
|
|
|
|
|
|
|
|
# Maximum number of concurrent backend connections per host.
|
|
|
|
connectionsperhost = 8
|
|
|
|
|
|
|
|
# If set to "true", certificate validation of backend endpoints will be skipped.
|
|
|
|
# This should only be enabled during development, e.g. to work with self-signed
|
|
|
|
# certificates.
|
|
|
|
#skipverify = false
|
|
|
|
|
2020-07-07 09:44:02 +02:00
|
|
|
# Backend configurations as defined in the "[backend]" section above. The
|
|
|
|
# section names must match the ids used in "backends" above.
|
|
|
|
#[backend-id]
|
|
|
|
# URL of the Nextcloud instance
|
|
|
|
#url = https://cloud.domain.invalid
|
|
|
|
|
|
|
|
# Shared secret for requests from and to the backend servers. This must be the
|
|
|
|
# same value as configured in the Nextcloud admin ui.
|
|
|
|
#secret = the-shared-secret
|
|
|
|
|
|
|
|
#[another-backend]
|
|
|
|
# URL of the Nextcloud instance
|
|
|
|
#url = https://cloud.otherdomain.invalid
|
|
|
|
|
|
|
|
# Shared secret for requests from and to the backend servers. This must be the
|
|
|
|
# same value as configured in the Nextcloud admin ui.
|
|
|
|
#secret = the-shared-secret
|
|
|
|
|
2020-05-12 09:46:20 +02:00
|
|
|
[nats]
|
|
|
|
# Url of NATS backend to use. This can also be a list of URLs to connect to
|
|
|
|
# multiple backends. For local development, this can be set to ":loopback:"
|
|
|
|
# to process NATS messages internally instead of sending them through an
|
|
|
|
# external NATS backend.
|
|
|
|
#url = nats://localhost:4222
|
|
|
|
|
|
|
|
[mcu]
|
2020-08-07 10:27:28 +02:00
|
|
|
# The type of the MCU to use. Currently only "janus" and "proxy" are supported.
|
2020-05-12 09:46:20 +02:00
|
|
|
type = janus
|
|
|
|
|
2020-08-07 10:27:28 +02:00
|
|
|
# For type "janus": the URL to the websocket endpoint of the MCU server.
|
|
|
|
# For type "proxy": a space-separated list of proxy URLs to connect to.
|
|
|
|
# Leave empty to disable MCU functionality.
|
2020-05-12 09:46:20 +02:00
|
|
|
url =
|
|
|
|
|
2020-08-07 10:27:28 +02:00
|
|
|
# For type "janus": the maximum bitrate per publishing stream (in bits per
|
|
|
|
# second).
|
2020-05-12 09:46:20 +02:00
|
|
|
# Defaults to 1 mbit/sec.
|
|
|
|
#maxstreambitrate = 1048576
|
|
|
|
|
2020-08-07 10:27:28 +02:00
|
|
|
# For type "janus": the maximum bitrate per screensharing stream (in bits per
|
|
|
|
# second).
|
2020-05-12 09:46:20 +02:00
|
|
|
# Default is 2 mbit/sec.
|
|
|
|
#maxscreenbitrate = 2097152
|
|
|
|
|
2020-08-07 10:27:28 +02:00
|
|
|
# For type "proxy": the id of the token to use when connecting to proxy servers.
|
|
|
|
#token_id = server1
|
|
|
|
|
|
|
|
# For type "proxy": the private key for the configured token id to use when
|
|
|
|
# connecting to proxy servers.
|
|
|
|
#token_key = privkey.pem
|
|
|
|
|
2020-05-12 09:46:20 +02:00
|
|
|
[turn]
|
|
|
|
# API key that the MCU will need to send when requesting TURN credentials.
|
|
|
|
#apikey = the-api-key-for-the-rest-service
|
|
|
|
|
|
|
|
# The shared secret to use for generating TURN credentials. This must be the
|
|
|
|
# same as on the TURN server.
|
|
|
|
#secret = 6d1c17a7-c736-4e22-b02c-e2955b7ecc64
|
|
|
|
|
|
|
|
# A comma-separated list of TURN servers to use. Leave empty to disable the
|
|
|
|
# TURN REST API.
|
|
|
|
#servers = turn:1.2.3.4:9991?transport=udp,turn:1.2.3.4:9991?transport=tcp
|
|
|
|
|
|
|
|
[geoip]
|
|
|
|
# License key to use when downloading the MaxMind GeoIP database. You can
|
|
|
|
# register an account at "https://www.maxmind.com/en/geolite2/signup" for
|
2020-08-13 14:07:26 +02:00
|
|
|
# free. See "https://dev.maxmind.com/geoip/geoip2/geolite2/" for further
|
2020-05-12 09:46:20 +02:00
|
|
|
# information.
|
|
|
|
# Leave empty to disable GeoIP lookups.
|
|
|
|
#license =
|
2020-05-28 16:02:04 +02:00
|
|
|
|
2020-08-13 14:07:26 +02:00
|
|
|
# Optional URL to download a MaxMind GeoIP database from. Will be generated if
|
|
|
|
# "license" is provided above. Can be a "file://" url if a local file should
|
|
|
|
# be used. Please note that the database must provide a country field when
|
|
|
|
# looking up IP addresses.
|
|
|
|
#url =
|
|
|
|
|
2020-05-28 16:02:04 +02:00
|
|
|
[stats]
|
|
|
|
# Comma-separated list of IP addresses that are allowed to access the stats
|
|
|
|
# endpoint. Leave empty (or commented) to only allow access from "127.0.0.1".
|
|
|
|
#allowed_ips =
|