Files
sp-config/sp-modules/jitsi-meet/module.nix

89 lines
2.2 KiB
Nix
Raw Normal View History

2023-12-04 15:43:06 +04:00
{ config, lib, ... }:
let
domain = config.selfprivacy.domain;
2024-02-15 13:56:12 +04:00
cfg = config.selfprivacy.modules.jitsi-meet;
in
2023-12-04 15:43:06 +04:00
{
options.selfprivacy.modules.jitsi-meet = {
2024-12-18 15:40:15 +03:00
enable = (lib.mkOption {
2023-12-04 15:43:06 +04:00
default = false;
2023-12-28 12:54:59 +04:00
type = lib.types.bool;
2024-12-18 15:40:15 +03:00
description = "Enable JitsiMeet";
}) // {
meta = {
type = "enable";
};
2023-12-04 15:43:06 +04:00
};
2024-12-18 15:40:15 +03:00
subdomain = (lib.mkOption {
2024-02-15 13:56:12 +04:00
default = "meet";
type = lib.types.strMatching "[A-Za-z0-9][A-Za-z0-9\-]{0,61}[A-Za-z0-9]";
2024-12-18 15:40:15 +03:00
description = "Subdomain";
}) // {
meta = {
widget = "subdomain";
type = "string";
regex = "[A-Za-z0-9][A-Za-z0-9\-]{0,61}[A-Za-z0-9]";
weight = 0;
};
2024-02-15 13:56:12 +04:00
};
2024-12-18 15:40:15 +03:00
appName = (lib.mkOption {
default = "Jitsi Meet";
type = lib.types.str;
2024-12-18 15:40:15 +03:00
description = "The name displayed in the web interface";
}) // {
meta = {
type = "string";
weight = 1;
};
};
2023-12-04 15:43:06 +04:00
};
2024-02-15 13:56:12 +04:00
config = lib.mkIf cfg.enable {
2025-05-16 12:25:12 +03:00
nixpkgs.overlays = [
(_: prev: {
# We disable E2E for clients below
jitsi-meet = prev.jitsi-meet.overrideAttrs (old: {
meta = old.meta // { knownVulnerabilities = [ ]; };
});
})
2024-10-02 16:36:42 +03:00
];
2025-05-16 12:25:12 +03:00
2023-12-04 15:43:06 +04:00
services.jitsi-meet = {
enable = true;
2024-02-15 13:56:12 +04:00
hostName = "${cfg.subdomain}.${domain}";
2023-12-04 15:43:06 +04:00
nginx.enable = true;
interfaceConfig = {
SHOW_JITSI_WATERMARK = false;
SHOW_WATERMARK_FOR_GUESTS = false;
APP_NAME = cfg.appName;
};
config = {
prejoinConfig = {
enabled = true;
};
2025-05-16 12:25:12 +03:00
e2ee.disabled = true; # libolm is vulnerable and E2E is generally broken.
2023-12-04 15:43:06 +04:00
};
};
services.prosody.extraConfig = ''
log = {
info = "*syslog";
}
'';
2024-02-15 13:56:12 +04:00
services.nginx.virtualHosts."${cfg.subdomain}.${domain}" = {
forceSSL = true;
useACMEHost = domain;
enableACME = false;
};
systemd = {
services = {
jicofo.serviceConfig.Slice = "jitsi_meet.slice";
jitsi-videobridge2.serviceConfig.Slice = "jitsi_meet.slice";
prosody.serviceConfig.Slice = "jitsi_meet.slice";
};
slices.jitsi_meet = {
description = "Jitsi Meet service slice";
};
};
2023-12-04 15:43:06 +04:00
};
}