livekit部署并结合nginx
官方介绍文档地址 Intro to LiveKit | LiveKit Docs
server部署官方地址https://docs.livekit.io/home/self-hosting/vm/
Git hub 仓库 https://github.com/livekit
部署到服务器
先决条件
在开始之前,您需要:
- 一个您拥有的域名
- 能够为您的 LiveKit 服务器添加子域名的 DNS 记录
- 服务器上已经有docker和docker-compose
这里使用到了两个域名,均指向了同一个服务器的ip地址
生成配置
使用下面的命令拉取docker镜像和生成配置文件
docker pull livekit/generate
docker run --rm -it -v$PWD:/output livekit/generate
- caddy.yaml
- docker-compose.yaml
- livekit.yaml
- redis.conf
- init_script.sh 或 cloud_init.xxxx.yaml
执行命令后会出现一些选择,然后选择如下
(base) root@hcss-ecs-44fd:~# docker run --rm -it -v$PWD:/output livekit/generate
Generating config for production LiveKit deployment
This deployment will utilize docker-compose and Caddy. It'll set up a secure LiveKit installation with built-in TURN/TLS
SSL Certificates for HTTPS and TURN/TLS will be generated automatically via LetsEncrypt or ZeroSSL.
✔ LiveKit Server only
Primary domain name (i.e. livekit.myhost.com): weightless460.cn
TURN domain name (i.e. livekit-turn.myhost.com): turn.weightless460.cn
✔ Let's Encrypt (no account required)
✔ latest
✔ no - (we'll bundle Redis)
✔ Startup Shell Script
Your production config files are generated in directory: weightless460.com
然后我们需要修改一些配置使得livekit来适用nginx的代理转发
修改配置文件
修改配置文件docker-compose.yaml
把caddy相关部分全部注释掉
# This docker-compose requires host networking, which is only available on Linux
# This compose will not function correctly on Mac or Windows
services:
# caddy:
# image: livekit/caddyl4
# command: run --config /etc/caddy.yaml --adapter yaml
# restart: unless-stopped
# network_mode: "host"
# volumes:
# - ./caddy.yaml:/etc/caddy.yaml
# - ./caddy_data:/data
livekit:
image: livekit/livekit-server:latest
command: --config /etc/livekit.yaml
restart: unless-stopped
#network_mode: "host"
volumes:
- ./livekit.yaml:/etc/livekit.yaml
redis:
image: redis:7-alpine
command: redis-server /etc/redis.conf
restart: unless-stopped
network_mode: "host"
volumes:
- ./redis.conf:/etc/redis.conf
修改livekit.yaml
找到turn相关部分,这里会和nginx代理转发产生端口冲突,导致循环代理
turn:
enabled: true
domain: turn.weightless460.cn
tls_port: 5350 #把原来的5349修改成5350
udp_port: 3478
external_tls: true
接下来我们去nginx创建两个网址配置文件
turn.weightless460.cn的配置文件
server {
listen 5349 ssl;
server_name turn.weightless460.cn;
# 代理 TURN 请求
location / {
proxy_pass http://127.0.0.1:5350;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
}
# 日志配置
access_log /www/wwwlogs/turn.weightless460.cn.log;
error_log /www/wwwlogs/turn.weightless460.cn.error.log;
}
server {
listen 80;
server_name turn.weightless460.cn;
return 301 https://$host$request_uri;
}
weightless460.cn的配置文件
server
{
listen 80;
listen 443 ssl;
listen 443 quic;
http2 on;
server_name weightless460.cn;
index index.php index.html index.htm default.php default.htm default.html;
root /www/wwwroot/weightless460.cn;
#CERT-APPLY-CHECK--START
# 用于SSL证书申请时的文件验证相关配置 -- 请勿删除
include /www/server/panel/vhost/nginx/well-known/weightless460.cn.conf;
#CERT-APPLY-CHECK--END
#SSL-START SSL相关配置,请勿删除或修改下一行带注释的404规则
#error_page 404/404.html;
ssl_certificate /www/server/panel/vhost/cert/weightless460.cn/fullchain.pem;
ssl_certificate_key /www/server/panel/vhost/cert/weightless460.cn/privkey.pem;
ssl_protocols TLSv1.1 TLSv1.2 TLSv1.3;
ssl_ciphers EECDH+CHACHA20:EECDH+CHACHA20-draft:EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5;
ssl_prefer_server_ciphers on;
ssl_session_tickets on;
ssl_session_cache shared:SSL:10m;
ssl_session_timeout 10m;
add_header Strict-Transport-Security "max-age=31536000";
add_header Alt-Svc 'quic=":443"; h3=":443"; h3-29=":443"; h3-27=":443";h3-25=":443"; h3-T050=":443"; h3-Q050=":443";h3-Q049=":443";h3-Q048=":443"; h3-Q046=":443"; h3-Q043=":443"';
error_page 497 https://$host$request_uri;
#SSL-END
#ERROR-PAGE-START 错误页配置,可以注释、删除或修改
error_page 404 /404.html;
#error_page 502 /502.html;
#ERROR-PAGE-END
#PHP-INFO-START PHP引用配置,可以注释或修改
include enable-php-00.conf;
#PHP-INFO-END
#REWRITE-START URL重写规则引用,修改后将导致面板设置的伪静态规则失效
include /www/server/panel/vhost/rewrite/weightless460.cn.conf;
#REWRITE-END
#禁止访问的文件或目录
location ~ ^/(\.user.ini|\.htaccess|\.git|\.env|\.svn|\.project|LICENSE|README.md)
{
return 404;
}
#一键申请SSL证书验证目录相关设置
location ~ \.well-known{
allow all;
}
#禁止在证书验证目录放入敏感文件
if ( $uri ~ "^/\.well-known/.*\.(php|jsp|py|js|css|lua|ts|go|zip|tar\.gz|rar|7z|sql|bak)$" ) {
return 403;
}
location ~ .*\.(gif|jpg|jpeg|png|bmp|swf)$
{
expires 30d;
error_log /dev/null;
access_log /dev/null;
}
location ~ .*\.(js|css)?$
{
expires 12h;
error_log /dev/null;
access_log /dev/null;
}
# LiveKit 代理配置
location /rtc {
proxy_pass http://127.0.0.1:7880;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
}
access_log /www/wwwlogs/weightless460.cn.log;
error_log /www/wwwlogs/weightless460.cn.error.log;
}
获取ssl证书
方法一
1.安装 certbot
certbot 是 Let’s Encrypt 的官方客户端,用于获取 SSL 证书。安装步骤如下:
对于 Ubuntu/Debian 系统:
sudo apt update
sudo apt install certbot python3-certbot-nginx
对于 CentOS/RHEL 系统:
sudo yum install epel-release
sudo yum install certbot python3-certbot-nginx
安装完成后,验证 certbot 是否安装成功:
certbot --version
2. 获取 SSL 证书
使用 certbot 为 turn.weightless460.cn 获取 SSL 证书:
sudo certbot --nginx -d turn.weightless460.cn
证书生成后,nginx 会自动配置 SSL。如果需要手动配置,证书文件通常位于以下路径:
- 证书文件:/etc/letsencrypt/live/turn.weightless460.cn/fullchain.pem
- 私钥文件:/etc/letsencrypt/live/turn.weightless460.cn/privkey.pem
方法二
通过宝塔面板,如果你使用了宝塔面板,那么这里可以直接通过页面来获取证书,并自动部署
启动我们的livekit-server
在刚刚生成的配置文件的目录下执行命令
docker-compose up -d
获取我们的访问服务器token
官网文档https://docs.livekit.io/home/cli/cli-setup/
curl -sSL https://get.livekit.io/cli | bash
再执行下面的命令,这里的api-key和api-secret在livekit.yaml中有,如下图
lk create-token \
--api-key="***" \
--api-secret="***" \
--room="my-room" \
--identity="test-user5"
执行的时候出现选项,这里空格选择,选择所有
测试网址
LiveKit Agents Playground
显示如下图则部署成功了,如果报错了,先查看防火墙和安全组等问题
防火墙
确保以下端口在您的防火墙上开放并在实例上可访问:
- 443 - 主要 HTTPS 和 TURN/TLS
- 80 - TLS 颁发
- 7881 - WebRTC over TCP
- 3478/UDP - TURN/UDP
- 50000-60000/UDP - WebRTC over UDP
如果需要 Ingress,还需开放: - 1935 - RTMP Ingress
- 7885/UDP - WebRTC for WHIP Ingress