cdist-contrib/type
Evilham 87cc109bf1
[__jitsi_meet*] Make rooms on different domains not equivalent
This is a backwards-compatible change.

We switch the approach from "treat all domains as if they were the main domain"
to: "each domain has its own prosody settings".

This works perfectly fine, even with secured domains.

There is a caveat with secured domains, in that they use the main domain to log
in; this means that users are shared across all domains (as they were before
this commit).

This is due to jicofo refusing to start meetings from a domain that is not
configured, and it only accepting one domain.

Right now, this is acceptable, however we could want to authenticate against
e.g. different LDAP / IMAP servers in the future, so this would need addressing
at that stage.

Probably the best way to solve it is by patching jicofo, so it accepts starting
conferences from multiple domains and getting that patch upstream.

Sponsored by:   camilion.eu, eXO.cat
2022-04-21 13:20:30 +02:00
..
__bird_bgp
__bird_core
__bird_filter
__bird_function
__bird_kernel
__bird_ospf
__bird_radv
__bird_static
__borg_repo
__coturn
__dma
__dma_auth
__find_exec
__jitsi_meet [__jitsi_meet*] Make rooms on different domains not equivalent 2022-04-21 13:20:30 +02:00
__jitsi_meet_domain [__jitsi_meet*] Make rooms on different domains not equivalent 2022-04-21 13:20:30 +02:00
__jitsi_meet_user
__jool
__mail_alias
__matrix_element
__matrix_synapse
__matrix_synapse_worker
__matterbridge
__netbox
__netbox_gunicorn
__netbox_uwsgi
__networktime
__nextcloud
__nextcloud_app
__nextcloud_user
__nginx
__nginx_vhost
__opendkim
__opendkim_genkey
__pass
__pass_init
__runit
__runit_service
__systemd_network
__systemd_resolved
__uacme_account
__uacme_obtain
__unbound
__unbound_exporter
__wikijs
__wireguard
__wireguard_peer
.keep