livekit部署并结合nginx
官方介绍文档地址 Intro to LiveKit | LiveKit Docs
server部署官方地址https://docs.livekit.io/home/self-hosting/vm/
Git hub 仓库 https://github.com/livekit
部署到服务器
先决条件
在开始之前,您需要:
- 一个您拥有的域名
- 能够为您的 LiveKit 服务器添加子域名的 DNS 记录
- 服务器上已经有docker和docker-compose
这里使用到了两个域名,均指向了同一个服务器的ip地址
生成配置
使用下面的命令拉取docker镜像和生成配置文件
docker pull livekit/generate docker run --rm -it -v$PWD:/output livekit/generate
- caddy.yaml
- docker-compose.yaml
- livekit.yaml
- redis.conf
- init_script.sh 或 cloud_init.xxxx.yaml
执行命令后会出现一些选择,然后选择如下
(base) root@hcss-ecs-44fd:~# docker run --rm -it -v$PWD:/output livekit/generate Generating config for production LiveKit deployment This deployment will utilize docker-compose and Caddy. It'll set up a secure LiveKit installation with built-in TURN/TLS SSL Certificates for HTTPS and TURN/TLS will be generated automatically via LetsEncrypt or ZeroSSL. ✔ LiveKit Server only Primary domain name (i.e. livekit.myhost.com): weightless460.cn TURN domain name (i.e. livekit-turn.myhost.com): turn.weightless460.cn ✔ Let's Encrypt (no account required) ✔ latest ✔ no - (we'll bundle Redis) ✔ Startup Shell Script Your production config files are generated in directory: weightless460.com
然后我们需要修改一些配置使得livekit来适用nginx的代理转发
修改配置文件
修改配置文件docker-compose.yaml
把caddy相关部分全部注释掉
# This docker-compose requires host networking, which is only available on Linux # This compose will not function correctly on Mac or Windows services: # caddy: # image: livekit/caddyl4 # command: run --config /etc/caddy.yaml --adapter yaml # restart: unless-stopped # network_mode: "host" # volumes: # - ./caddy.yaml:/etc/caddy.yaml # - ./caddy_data:/data livekit: image: livekit/livekit-server:latest command: --config /etc/livekit.yaml restart: unless-stopped #network_mode: "host" volumes: - ./livekit.yaml:/etc/livekit.yaml redis: image: redis:7-alpine command: redis-server /etc/redis.conf restart: unless-stopped network_mode: "host" volumes: - ./redis.conf:/etc/redis.conf
修改livekit.yaml
找到turn相关部分,这里会和nginx代理转发产生端口冲突,导致循环代理
turn: enabled: true domain: turn.weightless460.cn tls_port: 5350 #把原来的5349修改成5350 udp_port: 3478 external_tls: true
接下来我们去nginx创建两个网址配置文件
turn.weightless460.cn的配置文件
server { listen 5349 ssl; server_name turn.weightless460.cn; # 代理 TURN 请求 location / { proxy_pass http://127.0.0.1:5350; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; } # 日志配置 access_log /www/wwwlogs/turn.weightless460.cn.log; error_log /www/wwwlogs/turn.weightless460.cn.error.log; } server { listen 80; server_name turn.weightless460.cn; return 301 https://$host$request_uri; }
weightless460.cn的配置文件
server { listen 80; listen 443 ssl; listen 443 quic; http2 on; server_name weightless460.cn; index index.php index.html index.htm default.php default.htm default.html; root /www/wwwroot/weightless460.cn; #CERT-APPLY-CHECK--START # 用于SSL证书申请时的文件验证相关配置 -- 请勿删除 include /www/server/panel/vhost/nginx/well-known/weightless460.cn.conf; #CERT-APPLY-CHECK--END #SSL-START SSL相关配置,请勿删除或修改下一行带注释的404规则 #error_page 404/404.html; ssl_certificate /www/server/panel/vhost/cert/weightless460.cn/fullchain.pem; ssl_certificate_key /www/server/panel/vhost/cert/weightless460.cn/privkey.pem; ssl_protocols TLSv1.1 TLSv1.2 TLSv1.3; ssl_ciphers EECDH+CHACHA20:EECDH+CHACHA20-draft:EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5; ssl_prefer_server_ciphers on; ssl_session_tickets on; ssl_session_cache shared:SSL:10m; ssl_session_timeout 10m; add_header Strict-Transport-Security "max-age=31536000"; add_header Alt-Svc 'quic=":443"; h3=":443"; h3-29=":443"; h3-27=":443";h3-25=":443"; h3-T050=":443"; h3-Q050=":443";h3-Q049=":443";h3-Q048=":443"; h3-Q046=":443"; h3-Q043=":443"'; error_page 497 https://$host$request_uri; #SSL-END #ERROR-PAGE-START 错误页配置,可以注释、删除或修改 error_page 404 /404.html; #error_page 502 /502.html; #ERROR-PAGE-END #PHP-INFO-START PHP引用配置,可以注释或修改 include enable-php-00.conf; #PHP-INFO-END #REWRITE-START URL重写规则引用,修改后将导致面板设置的伪静态规则失效 include /www/server/panel/vhost/rewrite/weightless460.cn.conf; #REWRITE-END #禁止访问的文件或目录 location ~ ^/(\.user.ini|\.htaccess|\.git|\.env|\.svn|\.project|LICENSE|README.md) { return 404; } #一键申请SSL证书验证目录相关设置 location ~ \.well-known{ allow all; } #禁止在证书验证目录放入敏感文件 if ( $uri ~ "^/\.well-known/.*\.(php|jsp|py|js|css|lua|ts|go|zip|tar\.gz|rar|7z|sql|bak)$" ) { return 403; } location ~ .*\.(gif|jpg|jpeg|png|bmp|swf)$ { expires 30d; error_log /dev/null; access_log /dev/null; } location ~ .*\.(js|css)?$ { expires 12h; error_log /dev/null; access_log /dev/null; } # LiveKit 代理配置 location /rtc { proxy_pass http://127.0.0.1:7880; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; } access_log /www/wwwlogs/weightless460.cn.log; error_log /www/wwwlogs/weightless460.cn.error.log; }
获取ssl证书
方法一
1.安装 certbot
certbot 是 Let’s Encrypt 的官方客户端,用于获取 SSL 证书。安装步骤如下:
对于 Ubuntu/Debian 系统:
sudo apt update sudo apt install certbot python3-certbot-nginx
对于 CentOS/RHEL 系统:
sudo yum install epel-release sudo yum install certbot python3-certbot-nginx
安装完成后,验证 certbot 是否安装成功: certbot --version
2. 获取 SSL 证书
使用 certbot 为 turn.weightless460.cn 获取 SSL 证书:
sudo certbot --nginx -d turn.weightless460.cn
证书生成后,nginx 会自动配置 SSL。如果需要手动配置,证书文件通常位于以下路径:
- 证书文件:/etc/letsencrypt/live/turn.weightless460.cn/fullchain.pem
- 私钥文件:/etc/letsencrypt/live/turn.weightless460.cn/privkey.pem
方法二
通过宝塔面板,如果你使用了宝塔面板,那么这里可以直接通过页面来获取证书,并自动部署
启动我们的livekit-server
在刚刚生成的配置文件的目录下执行命令
docker-compose up -d
获取我们的访问服务器token
官网文档https://docs.livekit.io/home/cli/cli-setup/
curl -sSL https://get.livekit.io/cli | bash
再执行下面的命令,这里的api-key和api-secret在livekit.yaml中有,如下图
lk create-token \ --api-key="***" \ --api-secret="***" \ --room="my-room" \ --identity="test-user5"
执行的时候出现选项,这里空格选择,选择所有
测试网址
LiveKit Agents Playground
显示如下图则部署成功了,如果报错了,先查看防火墙和安全组等问题
防火墙
确保以下端口在您的防火墙上开放并在实例上可访问:
- 443 - 主要 HTTPS 和 TURN/TLS
- 80 - TLS 颁发
- 7881 - WebRTC over TCP
- 3478/UDP - TURN/UDP
- 50000-60000/UDP - WebRTC over UDP
如果需要 Ingress,还需开放:
- 1935 - RTMP Ingress
- 7885/UDP - WebRTC for WHIP Ingress