Tidy, add privkey password
parent
27e6cd8d64
commit
136a41a7e9
|
|
@ -36,14 +36,14 @@ module.exports =
|
||||||
},
|
},
|
||||||
*/
|
*/
|
||||||
// URI and key for requesting geoip-based TURN server closest to the client
|
// URI and key for requesting geoip-based TURN server closest to the client
|
||||||
turnAPIKey : 'examplekey',
|
turnAPIKey : 'examplekey',
|
||||||
turnAPIURI : 'https://example.com/api/turn',
|
turnAPIURI : 'https://example.com/api/turn',
|
||||||
turnAPIparams : {
|
turnAPIparams : {
|
||||||
'uri_schema' : 'turn',
|
'uri_schema' : 'turn',
|
||||||
'transport' : 'tcp',
|
'transport' : 'tcp',
|
||||||
'ip_ver' : 'ipv4',
|
'ip_ver' : 'ipv4',
|
||||||
'servercount' : '2'
|
'servercount' : '2'
|
||||||
},
|
},
|
||||||
|
|
||||||
// Backup turnservers if REST fails or is not configured
|
// Backup turnservers if REST fails or is not configured
|
||||||
backupTurnServers : [
|
backupTurnServers : [
|
||||||
|
|
@ -60,14 +60,16 @@ module.exports =
|
||||||
// session cookie secret
|
// session cookie secret
|
||||||
cookieSecret : 'T0P-S3cR3t_cook!e',
|
cookieSecret : 'T0P-S3cR3t_cook!e',
|
||||||
cookieName : 'multiparty-meeting.sid',
|
cookieName : 'multiparty-meeting.sid',
|
||||||
|
// if you use encrypted private key the set the passphrase
|
||||||
tls :
|
tls :
|
||||||
{
|
{
|
||||||
cert : `${__dirname}/../certs/mediasoup-demo.localhost.cert.pem`,
|
cert : `${__dirname}/../certs/mediasoup-demo.localhost.cert.pem`,
|
||||||
|
// passphrase: 'key_password'
|
||||||
key : `${__dirname}/../certs/mediasoup-demo.localhost.key.pem`
|
key : `${__dirname}/../certs/mediasoup-demo.localhost.key.pem`
|
||||||
},
|
},
|
||||||
// listening Host or IP
|
// listening Host or IP
|
||||||
// If omitted listens on every IP. ("0.0.0.0" and "::")
|
// If omitted listens on every IP. ("0.0.0.0" and "::")
|
||||||
//listeningHost: 'localhost',
|
// listeningHost: 'localhost',
|
||||||
// Listening port for https server.
|
// Listening port for https server.
|
||||||
listeningPort : 443,
|
listeningPort : 443,
|
||||||
// Any http request is redirected to https.
|
// Any http request is redirected to https.
|
||||||
|
|
@ -77,6 +79,12 @@ module.exports =
|
||||||
// listeningRedirectPort disabled
|
// listeningRedirectPort disabled
|
||||||
// use case: loadbalancer backend
|
// use case: loadbalancer backend
|
||||||
httpOnly : false,
|
httpOnly : false,
|
||||||
|
// WebServer/Express trust proxy config for httpOnly mode
|
||||||
|
// You can find more info:
|
||||||
|
// - https://expressjs.com/en/guide/behind-proxies.html
|
||||||
|
// - https://www.npmjs.com/package/proxy-addr
|
||||||
|
// use case: loadbalancer backend
|
||||||
|
trustProxy : '',
|
||||||
// This logger class will have the log function
|
// This logger class will have the log function
|
||||||
// called every time there is a room created or destroyed,
|
// called every time there is a room created or destroyed,
|
||||||
// or peer created or destroyed. This would then be able
|
// or peer created or destroyed. This would then be able
|
||||||
|
|
@ -109,12 +117,6 @@ module.exports =
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
}, */
|
}, */
|
||||||
// WebServer/Express trust proxy config for httpOnly mode
|
|
||||||
// You can find more info:
|
|
||||||
// - https://expressjs.com/en/guide/behind-proxies.html
|
|
||||||
// - https://www.npmjs.com/package/proxy-addr
|
|
||||||
// use case: loadbalancer backend
|
|
||||||
trustProxy : '',
|
|
||||||
// This function will be called on successful login through oidc.
|
// This function will be called on successful login through oidc.
|
||||||
// Use this function to map your oidc userinfo to the Peer object.
|
// Use this function to map your oidc userinfo to the Peer object.
|
||||||
// The roomId is equal to the room name.
|
// The roomId is equal to the room name.
|
||||||
|
|
@ -211,7 +213,7 @@ module.exports =
|
||||||
//
|
//
|
||||||
// Example:
|
// Example:
|
||||||
// [ userRoles.MODERATOR, userRoles.AUTHENTICATED ]
|
// [ userRoles.MODERATOR, userRoles.AUTHENTICATED ]
|
||||||
accessFromRoles : {
|
accessFromRoles : {
|
||||||
// The role(s) will gain access to the room
|
// The role(s) will gain access to the room
|
||||||
// even if it is locked (!)
|
// even if it is locked (!)
|
||||||
BYPASS_ROOM_LOCK : [ userRoles.ADMIN ],
|
BYPASS_ROOM_LOCK : [ userRoles.ADMIN ],
|
||||||
|
|
@ -222,7 +224,7 @@ module.exports =
|
||||||
// function, and change to BYPASS_LOBBY : [ userRoles.AUTHENTICATED ]
|
// function, and change to BYPASS_LOBBY : [ userRoles.AUTHENTICATED ]
|
||||||
BYPASS_LOBBY : [ userRoles.NORMAL ]
|
BYPASS_LOBBY : [ userRoles.NORMAL ]
|
||||||
},
|
},
|
||||||
permissionsFromRoles : {
|
permissionsFromRoles : {
|
||||||
// The role(s) have permission to lock/unlock a room
|
// The role(s) have permission to lock/unlock a room
|
||||||
CHANGE_ROOM_LOCK : [ userRoles.NORMAL ],
|
CHANGE_ROOM_LOCK : [ userRoles.NORMAL ],
|
||||||
// The role(s) have permission to promote a peer from the lobby
|
// The role(s) have permission to promote a peer from the lobby
|
||||||
|
|
@ -242,9 +244,9 @@ module.exports =
|
||||||
},
|
},
|
||||||
// When truthy, the room will be open to all users when as long as there
|
// When truthy, the room will be open to all users when as long as there
|
||||||
// are allready users in the room
|
// are allready users in the room
|
||||||
activateOnHostJoin : true,
|
activateOnHostJoin : true,
|
||||||
// Mediasoup settings
|
// Mediasoup settings
|
||||||
mediasoup :
|
mediasoup :
|
||||||
{
|
{
|
||||||
numWorkers : Object.keys(os.cpus()).length,
|
numWorkers : Object.keys(os.cpus()).length,
|
||||||
// mediasoup Worker settings.
|
// mediasoup Worker settings.
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue