element call

This commit is contained in:
Henry Hiles 2025-04-14 22:47:51 -04:00
parent 0a9d28abdb
commit e322553c02
Signed by: Henry-Hiles
SSH key fingerprint: SHA256:VKQUdS31Q90KvX7EkKMHMBpUspcmItAh86a+v7PGiIs
5 changed files with 134 additions and 22 deletions

View file

@ -1,6 +1,40 @@
{pkgs, ...}: {
services.caddy.virtualHosts."call.henryhiles.com". extraConfig = ''
root * ${pkgs.element-call}
file_server
'';
{
pkgs,
config,
...
}: {
services = {
lk-jwt-service = {
enable = true;
livekit = {
keyFile = config.age.secrets."livekitKeys.age".path;
};
};
livekit = {
enable = true;
keyFile = config.age.secrets."livekitKeys.age".path;
};
caddy.virtualHosts."call.henryhiles.com".extraConfig = ''
root * ${pkgs.element-call}
route {
respond /config.json `${builtins.toJSON {
default_server_config = {
"m.homeserver" = {
"base_url" = "https://matrix.henryhiles.com";
"server_name" = "henryhiles.com";
};
};
livekit.livekit_service_url = "https://call.henryhiles.com";
}}` 200
reverse_proxy /livekit/sfu 127.0.0.1:7880
reverse_proxy /livekit/jwt 127.0.0.1:8080
try_files {path} {path}/ /index.html
file_server
}
'';
};
}

View file

@ -1,6 +0,0 @@
{config, ...}: {
services.livekit = {
enable = true;
keyFile = config.age.secrets."livekitKeys.age".path;
};
}

View file

@ -6,7 +6,7 @@
}: let
cfg = config.services.livekit;
in {
meta.maintainers = with lib.maintainers; [quadradical];
meta.maintainers = [lib.maintainers.quadradical];
options.services.livekit = {
enable = lib.mkEnableOption "Livekit SFU";
package = lib.mkPackageOption pkgs "livekit" {};

View file

@ -1 +1,85 @@
{}
{
config,
lib,
pkgs,
...
}: let
cfg = config.services.lk-jwt-service;
in {
meta.maintainers = [lib.maintainers.quadradical];
options.services.lk-jwt-service = {
enable = lib.mkEnableOption "Enable lk-jwt-service";
package = lib.mkPackageOption pkgs "lk-jwt-service" {};
livekit = {
url = lib.mkOption {
type = lib.types.str;
default = "127.0.0.1";
description = "The URL that livekit runs on, prefixed with `ws://`.";
};
keyFile = lib.mkOption {
type = lib.types.path;
description = ''
Path to a file showing LiveKit keys, where you must declare some of: `LIVEKIT_KEY`, `LIVEKIT_SECRET`, `LIVEKIT_KEY_FROM_FILE`, `LIVEKIT_SECRET_FROM_FILE`, and/or `LIVEKIT_KEY_FILE`.
For more information see <https://github.com/element-hq/lk-jwt-service>.
'';
};
};
port = lib.mkOption {
type = lib.types.port;
default = 8080;
description = "Port that lk-jwt-service should run on";
};
};
config = lib.mkIf cfg.enable {
systemd.services.lk-jwt-service = {
description = "Minimal service to issue LiveKit JWTs for MatrixRTC";
documentation = ["https://github.com/element-hq/lk-jwt-service"];
wantedBy = ["multi-user.target"];
wants = ["network-online.target"];
after = ["network-online.target"];
environment.LIVEKIT_URL = cfg.livekit.url;
serviceConfig = {
EnvironmentFile = cfg.livekit.keyFile;
DynamicUser = true;
User = "lk-jwt-service";
LockPersonality = true;
MemoryDenyWriteExecute = true;
ProtectClock = true;
ProtectControlGroups = true;
ProtectHostname = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
PrivateDevices = true;
PrivateMounts = true;
PrivateUsers = true;
RestrictAddressFamilies = [
"AF_INET"
"AF_INET6"
];
RestrictNamespaces = true;
RestrictRealtime = true;
ProtectHome = true;
SystemCallArchitectures = "native";
SystemCallFilter = [
"@system-service"
"~@privileged"
"~@resources"
];
CapabilityBoundingSet = [
"CAP_NET_BIND_SERVICE"
"CAP_NET_RAW"
];
ExecStart = "${cfg.package}/bin/lk-jwt-service";
Restart = "on-failure";
RestartSec = 5;
UMask = "077";
};
};
};
}

View file

@ -1,11 +1,11 @@
-----BEGIN AGE ENCRYPTED FILE-----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YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFZLUVVkUSB0QU8r
VGtZaWU4cjBOaG8ya2ZoalFrb053MjQxS2ttajgwRDdVay8vVDM0CnpaenVhNVJh
dEU0V3RuQmxLTEV0RzBWWGFlOXJJaEROblRoV2RpMHlTZDgKLT4gUVBTLWdyZWFz
ZSBMN2piZn4rIGZ1ZWZaIGwKa1VQYVZWTjRHeWZwWHBQamEwdlFhb2NBOGswdDAr
WjRHRWszcHZ6TEpNdFJVRnRMa3dBCi0tLSB3SW53ZnZadHcySDZ6Szh5aGJ4eTlp
SklsTEN0dytUTTVDTTczbHFjRUtVCngKorWJWsl4T5Ko0IEh52VOUMPvvFXCFea1
MsE2dWUwfYug3r6s/C+xVRbqTfyYj5+sZNRJGGaCxkL7E0f6tahCOOuBymJHAgiK
lyxnNSFBTman1WZQSYwiBwxPBVLBD28iVzmoPqwPhX50gMXMFfQtSJOsjnQ5xp52
eperXjPRidTlQlApidQ5jCKMuXQJ/O0nuUHO7Gxob8QMSWMFbIyXSL0=
-----END AGE ENCRYPTED FILE-----