Compare commits
16 commits
Author | SHA1 | Date | |
---|---|---|---|
e9bc2dee53 | |||
dd2ea976ff | |||
d067386c89 | |||
e809a505fb | |||
a8c93c3ce1 | |||
588b583cc0 | |||
43c8116106 | |||
2f48a556d2 | |||
19e1b136d9 | |||
dcfbb984f4 | |||
|
635a4d8110 | ||
|
9961ace4cc | ||
72c46fe32a | |||
b74b4bee03 | |||
7181f3387a | |||
20af7cd602 |
15 changed files with 52 additions and 34 deletions
README.md
doc
infrastructure/excalidraw
package.jsonproject.cljsrc
main
cljc/dda/c4k_jitsi
resources/jitsi
test/cljc/dda/c4k_jitsi
14
README.md
14
README.md
|
@ -5,11 +5,19 @@
|
|||
|
||||
## Purpose
|
||||
|
||||
c4k-jitsi provides a k8s deployment for jitsi containing:
|
||||
* jitsi
|
||||
c4k-jitsi provides a k8s deployment for jitsi containing [see also Jitsi Architecture](https://jitsi.github.io/handbook/docs/architecture/)
|
||||
* jitsi-web
|
||||
* jvb
|
||||
* jicofo
|
||||
* prosody
|
||||
* etherpad for shared documents
|
||||
* excalidraw for shared whiteboards
|
||||
* coturn as stun server
|
||||
* moderator-election as tool for electing the next moderator
|
||||
* ingress having a letsencrypt managed certificate
|
||||
* monitoring connected to grafana cloud
|
||||
|
||||
The package aims to a low load sceanrio.
|
||||
The package is intended for a low-load scenario.
|
||||
|
||||
## Status
|
||||
|
||||
|
|
|
@ -17,10 +17,10 @@ resource "aws_s3_bucket" "backup" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "hcloud_server" "jitsi_09_2021" {
|
||||
resource "hcloud_server" "jitsi_2025_02" {
|
||||
name = "the name"
|
||||
image = "ubuntu-20.04"
|
||||
server_type = "cx31"
|
||||
image = "ubuntu-24.04"
|
||||
server_type = "cx32"
|
||||
location = "fsn1"
|
||||
ssh_keys = ...
|
||||
|
||||
|
@ -29,31 +29,30 @@ resource "hcloud_server" "jitsi_09_2021" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "aws_route53_record" "v4_neu" {
|
||||
resource "aws_route53_record" "v4" {
|
||||
for_each ["jitsi", "stun.jitsi", "excalidraw.jitsi", "etherpad.jitsi"]
|
||||
zone_id = the_dns_zone
|
||||
name = "jitsi-neu"
|
||||
name = each.key
|
||||
type = "A"
|
||||
ttl = "300"
|
||||
records = [hcloud_server.jitsi_09_2021.ipv4_address]
|
||||
records = [hcloud_server.jitsi_2025_01.ipv4_address]
|
||||
}
|
||||
|
||||
output "ipv4" {
|
||||
value = hcloud_server.jitsi_09_2021.ipv4_address
|
||||
value = hcloud_server.jitsi_2025_01.ipv4_address
|
||||
}
|
||||
|
||||
```
|
||||
|
||||
## k8s minicluster
|
||||
|
||||
For k8s installation we use our [provs](https://repo.prod.meissa.de/meissa/provs) with the following configuation:
|
||||
For k8s installation we use our [provs](https://repo.prod.meissa.de/meissa/provs) with the following configuration:
|
||||
|
||||
|
||||
```
|
||||
{:user :k8s
|
||||
:k8s {:external-ip "ip-from-above"}
|
||||
:cert-manager :letsencrypt-prod-issuer
|
||||
:persistent-dirs ["postgres"]
|
||||
}
|
||||
{:fqdn "fqdn-from-above"
|
||||
:node {:ipv4 "ip-from-above"}
|
||||
:certmanager {:email "admin-email" :letsencryptEndpoint "prod"}}
|
||||
```
|
||||
|
||||
## kubectl apply c4k-jitsi
|
||||
|
@ -67,7 +66,6 @@ c4k-jitsi config.edn auth.edn | kubectl apply -f -
|
|||
with the following config.edn:
|
||||
|
||||
```
|
||||
{:fqdn "the-fqdn-from aws_route53_record.v4_neu"
|
||||
:postgres-data-volume-path "/var/postgres" ;; Volume was configured at dda-k8s-crate, results in a PersistentVolume definition.
|
||||
{:fqdn "fqdn-from-above"
|
||||
:issuer "prod" }
|
||||
```
|
||||
|
|
BIN
doc/tryItOut.png
BIN
doc/tryItOut.png
Binary file not shown.
Before ![]() (image error) Size: 83 KiB After ![]() (image error) Size: 84 KiB ![]() ![]() |
|
@ -6,7 +6,7 @@ from ddadevops import *
|
|||
name = "c4k-jitsi"
|
||||
MODULE = "excalidraw"
|
||||
PROJECT_ROOT_PATH = "../.."
|
||||
version = "3.0.1"
|
||||
version = "3.0.3-dev"
|
||||
|
||||
|
||||
@init
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
"name": "c4k-jitsi",
|
||||
"description": "Generate c4k yaml for a jitsi deployment.",
|
||||
"author": "meissa GmbH",
|
||||
"version": "3.0.1",
|
||||
"version": "3.0.3-SNAPSHOT",
|
||||
"homepage": "https://gitlab.com/domaindrivenarchitecture/c4k-jitsi#readme",
|
||||
"repository": "https://www.npmjs.com/package/c4k-jitsi",
|
||||
"license": "APACHE2",
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
(defproject org.domaindrivenarchitecture/c4k-jitsi "3.0.1"
|
||||
(defproject org.domaindrivenarchitecture/c4k-jitsi "3.0.3-SNAPSHOT"
|
||||
:description "jitsi c4k-installation package"
|
||||
:url "https://domaindrivenarchitecture.org"
|
||||
:license {:name "Apache License, Version 2.0"
|
||||
:url "https://www.apache.org/licenses/LICENSE-2.0.html"}
|
||||
:dependencies [[org.clojure/clojure "1.12.0"]
|
||||
[org.clojure/tools.reader "1.5.0"]
|
||||
[org.clojure/tools.reader "1.5.1"]
|
||||
[org.domaindrivenarchitecture/c4k-common-clj "9.0.1"]
|
||||
[hickory "0.7.1" :exclusions [viebel/codox-klipse-theme]]]
|
||||
:target-path "target/%s/"
|
||||
|
@ -24,9 +24,9 @@
|
|||
:main dda.c4k-jitsi.uberjar
|
||||
:uberjar-name "c4k-jitsi-standalone.jar"
|
||||
:dependencies [[org.clojure/tools.cli "1.1.230"]
|
||||
[ch.qos.logback/logback-classic "1.5.16"
|
||||
[ch.qos.logback/logback-classic "1.5.17"
|
||||
:exclusions [com.sun.mail/javax.mail]]
|
||||
[org.slf4j/jcl-over-slf4j "2.0.16"]
|
||||
[org.slf4j/jcl-over-slf4j "2.0.17"]
|
||||
[com.github.clj-easy/graal-build-time "1.0.5"]]}}
|
||||
:release-tasks [["test"]
|
||||
["vcs" "assert-committed"]
|
||||
|
|
|
@ -39,6 +39,7 @@
|
|||
(jitsi/jicofo-config resolved-config)
|
||||
(jitsi/web-config resolved-config)
|
||||
(jitsi/jvb-config resolved-config)
|
||||
;not yet working, needs fix
|
||||
;(jitsi/jibri-config resolved-config)
|
||||
(jitsi/restart-config resolved-config)
|
||||
(jitsi/etherpad-config resolved-config)
|
||||
|
@ -65,6 +66,11 @@
|
|||
:service-port 80
|
||||
:fqdns [(str "moderator-elector." (:fqdn resolved-config))]}
|
||||
resolved-config))
|
||||
(ing/generate-ingress-and-cert (merge
|
||||
{:service-name "coturn-turn-tcp"
|
||||
:service-port 3478
|
||||
:fqdns [(str "stun." (:fqdn resolved-config))]}
|
||||
resolved-config))
|
||||
(when (:contains? resolved-config :mon-cfg)
|
||||
(mon/generate-config)))))))
|
||||
|
||||
|
|
|
@ -40,7 +40,8 @@
|
|||
[(load-and-adjust-namespace "jitsi/prosody-config-serviceaccount.yaml" namespace)
|
||||
(->
|
||||
(load-and-adjust-namespace "jitsi/prosody-config-common-cm.yaml" namespace)
|
||||
(cm/replace-all-matching "JITSI_FQDN" fqdn))
|
||||
(cm/replace-all-matching "JITSI_FQDN" fqdn)
|
||||
(cm/replace-key-value :STUN_HOST (str "stun." fqdn)))
|
||||
(load-and-adjust-namespace "jitsi/prosody-config-default-cm.yaml" namespace)
|
||||
(load-and-adjust-namespace "jitsi/prosody-config-envs-cm.yaml" namespace)
|
||||
(load-and-adjust-namespace "jitsi/prosody-config-init-cm.yaml" namespace)
|
||||
|
@ -87,6 +88,7 @@
|
|||
(->
|
||||
(load-and-adjust-namespace "jitsi/web-config-envs-cm.yaml" namespace)
|
||||
(cm/replace-key-value :XMPP_BOSH_URL_BASE (str "http://prosody." namespace ".svc.cluster.local:5280"))
|
||||
(cm/replace-key-value :P2P_STUN_SERVERS (str "stun." fqdn ":443"))
|
||||
(cm/replace-key-value :ETHERPAD_PUBLIC_URL (str "https://etherpad." fqdn "/p/"))
|
||||
(cm/replace-key-value :WHITEBOARD_COLLAB_SERVER_PUBLIC_URL (str "https://excalidraw." fqdn))
|
||||
)
|
||||
|
|
|
@ -9,7 +9,6 @@ metadata:
|
|||
metallb.universe.tf/allow-shared-ip: "shared-ip-service-group"
|
||||
metallb.universe.tf/address-pool: public
|
||||
spec:
|
||||
type: LoadBalancer
|
||||
ports:
|
||||
- name: turn-tcp
|
||||
port: 3478
|
||||
|
|
|
@ -9,7 +9,6 @@ metadata:
|
|||
metallb.universe.tf/allow-shared-ip: "shared-ip-service-group"
|
||||
metallb.universe.tf/address-pool: public
|
||||
spec:
|
||||
type: LoadBalancer
|
||||
ports:
|
||||
- name: turn-udp
|
||||
port: 3478
|
||||
|
|
|
@ -21,6 +21,11 @@ spec:
|
|||
serviceAccountName: jitsi-meet
|
||||
securityContext:
|
||||
{}
|
||||
initContainers:
|
||||
- name: wait-for-prosody
|
||||
image: curlimages/curl:latest
|
||||
command: ["/bin/sh","-c"]
|
||||
args: ["while [ $(curl -sw '%{http_code}' http://prosody:5280 -o /dev/null) -ne 200 ]; do sleep 5; echo 'Waiting for the prosody...'; done"]
|
||||
containers:
|
||||
- name: jitsi-meet
|
||||
securityContext:
|
||||
|
|
|
@ -22,4 +22,6 @@ data:
|
|||
ENABLE_XMPP_WEBSOCKET: 'true'
|
||||
ENABLE_RECORDING: "true"
|
||||
ENABLE_FILE_RECORDING_SERVICE_SHARING: "true"
|
||||
TZ: 'Europe/Berlin'
|
||||
TZ: 'Europe/Berlin'
|
||||
STUN_HOST: STUN_FQDN
|
||||
STUN_PORT: "443"
|
||||
|
|
|
@ -12,9 +12,6 @@ data:
|
|||
JICOFO_AUTH_USER: focus
|
||||
XMPP_BOSH_URL_BASE: REPLACE_ME
|
||||
DEFAULT_LANGUAGE: de
|
||||
RESOLUTION: "480"
|
||||
RESOLUTION_MIN: "240"
|
||||
RESOLUTION_WIDTH: "853"
|
||||
RESOLUTION_WIDTH_MIN: "427"
|
||||
P2P_STUN_SERVERS: REPLACE_ME
|
||||
ETHERPAD_PUBLIC_URL: REPLACE_ME
|
||||
WHITEBOARD_COLLAB_SERVER_PUBLIC_URL: REPLACE_ME
|
|
@ -17,7 +17,7 @@
|
|||
(is (s/valid? cut/auth? (yaml/load-as-edn "jitsi-test/valid-auth.yaml"))))
|
||||
|
||||
(deftest test-whole-generation
|
||||
(is (= 63
|
||||
(is (= 65
|
||||
(count
|
||||
(cut/config-objects
|
||||
(yaml/load-as-edn "jitsi-test/valid-config.yaml")))))
|
||||
|
|
|
@ -47,7 +47,9 @@
|
|||
:ENABLE_XMPP_WEBSOCKET "true",
|
||||
:ENABLE_RECORDING "true",
|
||||
:ENABLE_FILE_RECORDING_SERVICE_SHARING "true",
|
||||
:TZ "Europe/Berlin"}}
|
||||
:TZ "Europe/Berlin"
|
||||
:STUN_HOST "stun.xy.xy.xy",
|
||||
:STUN_PORT "443"}}
|
||||
(second (cut/prosody-config
|
||||
{:fqdn "xy.xy.xy"
|
||||
:namespace "jitsi"}))))
|
||||
|
|
Loading…
Add table
Reference in a new issue