# rust-zoom
**Repository Path**: mirrors_trending/rust-zoom
## Basic Information
- **Project Name**: rust-zoom
- **Description**: teleconferencing system written in rust
- **Primary Language**: Unknown
- **License**: MIT
- **Default Branch**: main
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2022-10-27
- **Last Updated**: 2026-03-21
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# videocall.rs
An open-source, ultra-low-latency video conferencing platform and API built with Rust. Designed for software professionals, robotics, and embedded systems, it supports WebTransport with WebSocket fallback for high-performance real-time communication.
**[Website](https://videocall.rs)** | **[Discord Community](https://discord.gg/JP38NRe4CJ)**
## β‘ Quick Links
- **[Documentation](https://docs.videocall.rs)** - Comprehensive guides and API reference.
- **[Crates.io](https://crates.io/crates/videocall-cli)** - Download the CLI tool.
- **[Report a Bug](https://github.com/security-union/videocall-rs/issues)** - Help us improve.
## π Star History
[](https://star-history.com/#security-union/videocall-rs&Date)
## Who is this for?
- **Software Professionals:** Build custom video applications with a modern, type-safe Rust API.
- **Robotics & IoT Engineers:** Stream ultra-low-latency video from drones, robots, and embedded devices (Raspberry Pi, Jetson Nano) using our lightweight CLI and SDKs.
- **Privacy Advocates:** Self-host your own video conferencing infrastructure with secure JWT authentication and SSO support.
## Table of Contents
- [Overview](#overview)
- [Features](#features)
- [Compatibility](#compatibility)
- [Why WebTransport Instead of WebRTC?](#why-webtransport-instead-of-webrtc)
- [System Architecture](#system-architecture)
- [Getting Started](#getting-started)
- [Prerequisites](#prerequisites)
- [Docker Setup](#docker-setup)
- [Nix Build System (WIP)](#nix-build-system-wip)
- [Manual Setup](#manual-setup)
- [Runtime Configuration](#runtime-configuration-frontend-configjs)
- [Local (no Docker)](#local-no-docker-create-yew-uiscriptsconfigjs)
- [Local/Docker](#localdocker-start-yewsh)
- [Kubernetes/Helm](#kuberneteshelm-configmap-configjsyaml)
- [Usage](#usage)
- [Meeting Management](#meeting-management)
- [Performance](#performance)
- [Security](#security)
- [Feature Flags](#feature-flags)
- [Testing](#testing)
- [UI Testing (yew-ui)](#ui-testing-yew-ui)
- [Backend Testing (actix-api)](#backend-testing-actix-api)
- [E2E Testing (Playwright)](#e2e-testing-playwright)
- [Roadmap](#roadmap)
- [Contributing](#contributing)
- [Project Structure](#project-structure)
- [Demos and Media](#demos-and-media)
- [Contributors](#contributors)
- [License](#license)
## Overview
videocall.rs is a modern, open-source video conferencing system written entirely in Rust. It is designed for software professionals and robotics engineers who need reliable, scalable, and secure real-time communication capabilities. It provides a robust foundation for building custom video communication solutions, from web apps to autonomous vehicle feeds, with support for both browser-based and native clients.
**Project Status:** Beta - Actively developed and suitable for non-critical production use
## Features
- **Ultra-Low Latency:** Built with Rust for sub-100ms latency, ideal for robotics and real-time control.
- **Multiple Transport Protocols:** WebTransport with automatic WebSocket fallback for maximum compatibility.
- **Secure Authentication:** JWT-based access control with SSO/OAuth support.
- **Scalable Architecture:** Designed with a pub/sub model using NATS for horizontal scaling (Mesh/SFU hybrid).
- **Cross-Platform Support:** Chromium-based browsers and Safari supported.
- **Robotics & Embedded:** High-performance CLI and SDK for headless streaming from Raspberry Pi, Jetson Nano, and other embedded Linux devices.
- **Open Source:** MIT licensed for maximum flexibility.
## Compatibility
| Browser | Support |
|----------------------|---------|
| Chrome | β
|
| Brave | β
|
| Edge | β
|
| Safari (macOS, iOS) | β
|
| Firefox | β |
## Why WebTransport Instead of WebRTC?
WebTransport is a core technology that differentiates videocall.rs from traditional video conferencing solutions. As a developer, here's why our WebTransport approach is technically superior:
### Technical Advantages
- **No SFUs, No NAT Traversal:** WebTransport eliminates the need for complex Selective Forwarding Units and NAT traversal mechanisms that plague WebRTC implementations and cause countless developer headaches.
- **Simplified Architecture**: No more complex STUN/TURN servers, ICE candidates negotiation, or complicated signaling dances required by WebRTC. Just direct, straightforward connections.
- **Protocol Efficiency**: Built on HTTP/3 and QUIC, WebTransport provides multiplexed, bidirectional streams with better congestion control and packet loss recovery than WebRTC's dated SCTP data channels.
- **Lower Latency**: QUIC's 0-RTT connection establishment reduces initial connection times compared to WebRTC's multiple roundtrips.
- **Clean Development Experience**: WebTransport offers a more intuitive developer API with a promise-based design and cleaner stream management.
- **Future-Proof**: As part of the modern web platform developed by the IETF and W3C, WebTransport has strong browser vendor support and an actively evolving specification.
### Developer Implications
For developers integrating videocall.rs, this means:
- β
Drastically simpler deployment architecture
- β
No complex network configuration or firewall issues
- β
Better performance in challenging network conditions
- β
More predictable behavior across implementations
- β
Less time spent debugging connectivity issues
- β
A forward-looking technology investment
Read our [Architecture Document](ARCHITECTURE.md) for a deep dive into how we implement WebTransport and the technical benefits it provides.
## System Architecture
videocall.rs follows a microservices architecture with these primary components:
```mermaid
graph TD
Clients[Clients
Browsers, Mobile, CLI] -->|WebSocket| ActixAPI[Actix API
WebSocket]
Clients -->|WebTransport| WebTransportServer[WebTransport
Server]
ActixAPI --> NATS[NATS
Messaging]
WebTransportServer --> NATS
```
1. **actix-api:** Rust-based backend server using Actix Web framework
2. **yew-ui:** Web frontend built with the Yew framework and compiled to WebAssembly
3. **videocall-types:** Shared data types and protocol definitions
4. **videocall-client:** Client library for native integration
5. **videocall-cli:** Command-line interface for headless video streaming
For a more detailed explanation of the system architecture, please see our [Architecture Document](ARCHITECTURE.md).
## Getting Started
**β RECOMMENDED: Docker is the only fully supported development method β**
We strongly recommend using the Docker-based setup for development, as it's well-maintained and provides consistent behavior across platforms. The manual setup described below is not as well maintained and may require additional troubleshooting.
### Prerequisites
- Modern Linux distribution, macOS, or Windows 10/11
- [Docker](https://docs.docker.com/engine/install/) and Docker Compose (for containerized setup)
- [Rust toolchain](https://rustup.rs/) 1.89+ (for manual setup)
- Chromium-based browser (Chrome, Edge, Brave) for frontend access - Firefox is not supported
- Safari both in iOS and macOS are supported for frontend access
### Docker Setup
The quickest way to get started is with our Docker-based setup:
1. Clone the repository:
```
git clone https://github.com/security-union/videocall-rs.git
cd videocall-rs
```
2. Create a `.env` file from the sample and fill in your OAuth credentials:
```
cp docker/.env-sample .env
```
Edit `.env` and set `OAUTH_CLIENT_ID` and `OAUTH_CLIENT_SECRET`.
**Getting Google OAuth credentials:**
- Go to [Google Cloud Console β APIs & Credentials](https://console.cloud.google.com/apis/credentials)
- Create an OAuth 2.0 Client ID (Web application type)
- Add `http://localhost:8081/login/callback` as an Authorized redirect URI
- Copy the Client ID and Secret into your `.env`
> **Note:** `make up` will auto-create `.env` from the sample if it does not exist, but you must still edit it to add your credentials before the app will work.
3. Start the stack:
```
make up
```
The first run compiles Rust/WASM inside the containers β this takes several minutes. Watch the `yew-ui` logs; it's ready when Trunk prints `server listening on http://0.0.0.0:`.
4. Access the application at:
```
http://localhost
```
Then navigate to a meeting: `http://localhost/meeting//`
**Platform notes:**
- **Rancher Desktop (Windows/WSL2) with Traefik Ingress on port 80:** Rancher Desktop runs Traefik on port 80 by default, which conflicts with the yew-ui frontend. Override the port in your local `.env` (not `.env-sample`):
```
TRUNK_SERVE_PORT=8088
AFTER_LOGIN_URL=http://localhost:8088
ALLOWED_REDIRECT_URLS=http://localhost:8088,http://localhost:3001
```
Then access the app at `http://localhost:8088`.
- **Shell environment variables:** If you have `API_BASE_URL`, `OAUTH_REDIRECT_URL`, or similar variables exported in your shell profile (`~/.bashrc`, `~/.zshrc`), they will override `.env` values. Remove them from your profile before running `make up`.
- **Slow first run:** WASM compilation inside Docker can take 5β15 minutes on a cold cache. Subsequent runs reuse the build cache and start in seconds.
### Nix Build System (WIP)
We are migrating the build infrastructure to [Nix](https://nixos.org/) for reproducible, fast builds. Currently the `leptos-website` is the first component being nixified.
**Status:** Work in progress β see the `nixify-docker-build` branch.
**What Nix replaces:** Previously, Docker builds spent 15-20 minutes compiling tools like `cargo-leptos` and `wasm-bindgen-cli` from source on every build. Nix provides these as pre-built binaries from the binary cache, reducing tool setup from minutes to seconds.
**What's done so far:**
- `flake.nix` at the repo root provides dev shells with pinned versions of the Rust nightly toolchain, `cargo-leptos`, `wasm-bindgen-cli`, `binaryen`, Node.js, and system dependencies
- `docker/Dockerfile.website` and `docker/Dockerfile.website.dev` use `nixos/nix` as a builder image
- `.github/workflows/leptos-website-build.yaml` uses `DeterminateSystems/nix-installer-action` with `magic-nix-cache-action` for cached CI builds
**Quick start (requires [Nix](https://install.determinate.systems/nix)):**
The integration is transparent to the user, and the development experience is the same as with Docker.
**What's next:** Nixifying additional components (actix-api, yew-ui) and evaluating [crane](https://github.com/ipetkov/crane) for full Nix-managed Rust dependency caching.
### Manual Setup (Experimental)
β οΈ **Warning**: This setup method is experimental and not as well maintained as the Docker approach. You may encounter issues that require manual debugging.
For advanced users who prefer to run services directly on their machine:
1. Create a PostgreSQL database:
```
createdb actix-api-db
```
2. Install required tools:
```
# Install NATS server
curl -L https://github.com/nats-io/nats-server/releases/download/v2.9.8/nats-server-v2.9.8-linux-amd64.tar.gz | tar xz
sudo mv nats-server-v2.9.8-linux-amd64/nats-server /usr/local/bin
# Install trurl
cargo install trurl
```
3. Start the development environment:
```
./start_dev.sh
```
4. Connect to:
```
http://localhost:8081/meeting/
```
For detailed configuration options, see our [setup documentation](https://docs.videocall.rs/setup).
## Runtime Configuration (Frontend config.js)
The Yew UI is configured at runtime via a `window.__APP_CONFIG` object provided by a `config.js` file. The file is copied by Trunk and loaded at `/config.js` by `yew-ui/index.html`.
### Local (no Docker): create yew-ui/scripts/config.js
- Start services with `./start_dev.sh`.
- Create `yew-ui/scripts/config.js` that assigns `window.__APP_CONFIG = Object.freeze({...})`.
- Keep the keys in sync with the authoritative sources below. Trunk will copy the file and the app will pick it up on refresh.
- Tip: `mkdir -p yew-ui/scripts` to ensure the directory exists.
Authoritative keys and defaults: see `docker/start-yew.sh` and the Helm template referenced below.
### Voice Activity Detection (VAD) Threshold
The `vadThreshold` config parameter controls how sensitive the speaking detection is. It sets the minimum RMS audio level that counts as "speaking" β used for tile border glow, peer list mic glow, and self-video glow indicators.
```javascript
window.__APP_CONFIG = Object.freeze({
// ... other config ...
vadThreshold: 0.02 // default
});
```
| Value | Sensitivity | Use case |
|-------|-------------|----------|
| `0.01` | High β picks up quiet speech and background noise | Quiet environments, soft speakers |
| `0.02` | Medium (default) β good balance for most setups | General use |
| `0.05` | Low β only triggers on louder speech | Noisy environments, reduces false positives |
| `0.10` | Very low β requires loud/close speech | Very noisy environments |
The threshold can also be set via the `VAD_THRESHOLD` environment variable when running in Docker (see `docker/start-yew.sh` and `docker/start-dioxus.sh`), or via `runtimeConfig.vadThreshold` in Helm values.
### Local/Docker: start-yew.sh
`docker/start-yew.sh` generates `/app/yew-ui/scripts/config.js` from environment variables at container startup. For the current list of supported variables and defaults, refer directly to `docker/start-yew.sh`. Restart the container to apply changes.
### Kubernetes/Helm: configmap-configjs.yaml
`helm/rustlemania-ui/templates/configmap-configjs.yaml` renders `config.js` from `.Values.runtimeConfig`. Define `runtimeConfig` in your values file and deploy/upgrade. For the exact structure and latest behavior, refer to the template itself.
## Usage
### Browser-Based Clients
1. Navigate to your deployed instance or localhost setup:
```
http:///meeting//
```
2. Grant camera and microphone permissions when prompted
3. Click "Connect" to join the meeting
### CLI-Based Streaming
For headless devices like Raspberry Pi:
```bash
# Install the CLI tool
cargo install videocall-cli
# Stream from a camera
videocall-cli stream \
--user-id \
--video-device-index 0 \
--meeting-id \
--resolution 1280x720 \
--fps 30 \
--frame-format NV12 \
--bitrate-kbps 500
```
For detailed information about the CLI tool and all available options, see the [videocall-cli README](videocall-cli/README.md).
## Meeting Management
videocall.rs includes a comprehensive meeting management system with ownership, waiting rooms, and host controls.
### Key Features
- **Meeting Ownership**: Each meeting has an owner (the creator) identified by their email
- **My Meetings**: Users can view and manage all meetings they own from the home page
- **Waiting Room**: Non-owners enter a waiting room and must be admitted by an existing participant
- **Host Identification**: The meeting owner is visually identified with "(Host)" in the UI
- **Soft Delete**: Owners can delete their meetings; deleted meeting IDs can be reused
### Meeting Workflow
1. **Create/Join**: Navigate to `/meeting/{meeting-id}` - if the meeting doesn't exist, you become the owner
2. **Start/Join Button**: Owners see "Start Meeting", others see "Join Meeting"
3. **Waiting Room**: Non-owners wait for admission; admitted participants can manage the waiting room
4. **Auto-Join**: When admitted from the waiting room, participants automatically enter the meeting
### Documentation
For detailed information about the meeting system:
- **[Meeting Ownership & Workflow](docs/MEETING_OWNERSHIP.md)** - Ownership model, lifecycle, and user workflows
- **[Meeting API Reference](docs/MEETING_API.md)** - Complete API endpoint documentation
### Enabling Meeting Management
Meeting management requires the `FEATURE_MEETING_MANAGEMENT` flag:
```bash
export FEATURE_MEETING_MANAGEMENT=true
```
Or in Docker:
```bash
docker run -e FEATURE_MEETING_MANAGEMENT=true ...
```
## Performance
videocall.rs has been benchmarked and optimized for the following scenarios:
- **1-on-1 Calls:** Minimal resource utilization with <100ms latency on typical connections
- **Small Groups (3-10):** Efficient mesh topology with adaptive quality based on network conditions
- **Large Conferences:** Tested with up to 1000 participants using selective forwarding architecture
### Technical Optimizations
- **Zero-Copy Design:** Minimizes data copying between network stack and application code
- **Asynchronous Core:** Built on Rust's async/await ecosystem with Tokio runtime
- **SIMD-Accelerated Processing:** Uses CPU vectorization for media operations where available
- **Lock-Free Data Structures:** Minimizes contention in high-throughput scenarios
- **Protocol-Level Optimizations:** Custom-tuned congestion control and packet scheduling
### Resource Utilization
Our server-side architecture is designed for efficiency at scale:
- **Horizontal Scaling:** Linear performance scaling with additional server instances
- **Load Distribution:** Automatic connection balancing across server pool
- **Resource Governance:** Configurable limits for bandwidth, connections, and CPU utilization
- **Container-Optimized:** Designed for efficient deployment in Kubernetes environments
Performance metrics and tuning guidelines will be available in our [performance documentation](PERFORMANCE.md). (WIP)
## Security
Security is a core focus of videocall.rs:
- **Transport Security:** All communications use TLS/HTTPS.
- **Authentication:** Flexible integration with identity providers (SSO/OAuth).
- **Access Controls:** Fine-grained permission system for meeting rooms.
For details on our security model and best practices, see our [security documentation](https://docs.videocall.rs/security).
## Feature Flags
videocall.rs uses environment-based feature flags to enable or disable experimental or optional functionality at runtime. Flags are loaded lazily on first access and can be overridden for testing purposes.
### Configuration
Feature flags are set via environment variables with the `FEATURE_` prefix:
```bash
# Enable a feature flag
export FEATURE_MEETING_MANAGEMENT=true
# Or when running with Docker
docker run -e FEATURE_MEETING_MANAGEMENT=true ...
```
### Available Flags
| Flag | Environment Variable | Description | Default |
|------|---------------------|-------------|---------|
| Meeting Management | `FEATURE_MEETING_MANAGEMENT` | Enable meeting lifecycle management including creation, tracking, and host controls | `false` |
### Truthy Values
The following values are recognized as enabling a flag (case-insensitive):
- `true`
- `1`
- `yes`
Any other value (or unset variable) is treated as `false`.
## Testing
### UI Testing (yew-ui)
The Yew frontend uses a three-layer testing pyramid, all running in a real
browser via `wasm-bindgen-test`:
| Layer | What it covers | Example |
|-------|---------------|---------|
| **Unit** | `MediaDeviceList` logic β hot-plug, fallback, device switching | `videocall-client/src/media_devices/media_device_list.rs` |
| **Component** | Isolated Yew components with mock `MediaDeviceInfo` objects | `yew-ui/tests/device_selector.rs`, `yew-ui/tests/video_control_buttons.rs` |
| **Integration** | Real Chrome fake devices β component rendering end-to-end | `yew-ui/tests/device_integration.rs` |
```bash
# Run UI component tests natively (requires Chrome + chromedriver)
make yew-tests
# Run in headed mode to watch the browser
make yew-tests HEADED=1
# Run UI component tests in Docker (no local deps needed)
make yew-tests-docker
```
CI runs these tests automatically via `.github/workflows/wasm-test.yaml`.
For the full testing guide β including how to write new tests, the test harness
API, and the mock device vs real fake device strategy β see
**[yew-ui/TESTING.md](yew-ui/TESTING.md)**.
### Backend Testing (actix-api)
The `actix-api` crate contains unit and integration tests that run against real
PostgreSQL and NATS instances, spun up via Docker Compose. Tests cover:
- **Session management** β meeting creation, multi-user join/leave, host
controls, system email rejection
- **WebSocket transport** β full meeting lifecycle over WebSocket connections
- **WebTransport** β meeting lifecycle over QUIC/HTTP3
- **Packet handling** β classification of empty, garbage, and RTT packets
- **Metrics server** β session tracking, health metrics export, stale session
cleanup, concurrent access
- **Feature flags** β behavior with `FEATURE_MEETING_MANAGEMENT` on and off
Tests use `#[serial_test::serial]` because they share a database, and each test
cleans up its own data. The infrastructure is defined in
`docker/docker-compose.integration.yaml`, which provides:
| Service | Purpose |
|---------|---------|
| `postgres:12` | Database for meetings and sessions |
| `nats:2.10-alpine` | Message broker with JetStream |
| `rust-tests` | Test runner (runs `dbmate` migrations, then `cargo test`) |
```bash
# Build + run all backend tests (PostgreSQL + NATS in Docker)
make tests_run
# Tear down test containers
make tests_down
```
CI runs these tests automatically via `.github/workflows/cargo-test.yaml`,
triggered on PRs that touch `actix-api/`, `videocall-types/`, or `protobuf/`.
For the full backend testing guide β including test patterns, database cleanup,
and how to write new tests β see **[actix-api/TESTING.md](actix-api/TESTING.md)**.
### E2E Testing (Playwright)
Full browser-based end-to-end tests using [Playwright](https://playwright.dev/).
Tests run against both the **Dioxus UI** and **Yew UI** simultaneously, verifying
meeting flows with real browsers. Authentication is bypassed via JWT cookie
injection β no OAuth setup needed.
The E2E stack is defined in `docker/docker-compose.e2e.yaml` and uses the same
Nix-based dev Dockerfiles as CI. Tests run automatically on pushes to `main` and
can be triggered manually from the GitHub Actions page.
See the `e2e-*` targets in the `Makefile` for available commands.
## Roadmap
| Version | Target Date | Key Features |
|---------|------------|--------------|
| 0.6.0 | Q3 2023 | β
Safari Browser Support |
| 0.7.0 | Q4 2023 | β
Native Mobile SDKs |
| 0.5.0 | Q2 2023 | β
JWT Authentication & SSO |
| 0.8.0 | Q1 2024 | π Screen Sharing Improvements |
| 1.0.0 | Q2 2024 | π Production Release with Full API Stability |
## Contributing
We welcome contributions from the community! Here's how to get involved:
1. **Issues:** Report bugs or suggest features via [GitHub Issues](https://github.com/security-union/videocall-rs/issues)
2. **Pull Requests:** Submit PRs for bug fixes or enhancements
3. **RFC Process:** For significant changes, participate in our [RFC process](/rfc)
4. **Community:** Join our [Discord server](https://discord.gg/JP38NRe4CJ) to discuss development
See our [Contributing Guidelines](CONTRIBUTING.md) for more detailed information.
### Technology Stack
- **Backend**: Rust + Actix Web + PostgreSQL + NATS
- **Frontend**: Rust + Yew + WebAssembly + Tailwind CSS
- **Transport**: WebTransport (QUIC/HTTP3) + WebSockets (fallback)
- **Build System**: Cargo + Trunk + Nix (WIP) + Docker + Helm
- **Testing**: `cargo test` + `wasm-bindgen-test` (browser-based UI tests) + Docker Compose (backend integration)
### Key Technical Features
- **Bidirectional Streaming**: Fully asynchronous message passing using QUIC streams
- **Error Handling**: Comprehensive Result-based error propagation throughout the codebase
- **Modularity**: Clean separation of concerns with well-defined interfaces between components
- **Type Safety**: Extensive use of Rust's type system to prevent runtime errors
- **Binary Protocol**: Efficient Protocol Buffer serialization for all messages
For a more comprehensive technical overview, see the [Architecture Document](ARCHITECTURE.md).
### Git Hooks
This repository includes Git hooks to ensure code quality:
1. **Pre-commit Hook**: Automatically runs `cargo fmt` before each commit to ensure consistent code formatting.
2. **Post-commit Hook**: Runs `cargo clippy` after each commit to check for potential code improvements.
To install these hooks, run the following commands from the project root:
```bash
# Create the hooks directory if it doesn't exist
mkdir -p .git/hooks
# Create the pre-commit hook
cat > .git/hooks/pre-commit << 'EOF'
#!/bin/sh
# Run cargo fmt and check if there are changes
echo "Running cargo fmt..."
cargo fmt --all -- --check
# Check the exit code of cargo fmt
if [ $? -ne 0 ]; then
echo "cargo fmt found formatting issues. Please fix them before committing."
exit 1
fi
exit 0
EOF
# Create the post-commit hook
cat > .git/hooks/post-commit << 'EOF'
#!/bin/sh
# Run cargo clippy after the commit
echo "Running cargo clippy..."
ACTIX_UI_BACKEND_URL="" WEBTRANSPORT_HOST="" LOGIN_URL="" WEBTRANSPORT_URL="" ACTIX_API_URL="" cargo clippy -- -D warnings
# Check the exit code of cargo clippy
if [ $? -ne 0 ]; then
echo "Cargo clippy found issues in your code. Please fix them."
# We can't abort the commit since it's already done, but we can inform the user
echo "The commit was successful, but please consider fixing the clippy issues before pushing."
fi
exit 0
EOF
# Make the hooks executable
chmod +x .git/hooks/pre-commit .git/hooks/post-commit
```
These hooks help maintain code quality by ensuring proper formatting and checking for common issues.
## Demos and Media
### Technical Presentations
- [Scaling to 1000 Users Per Call](https://youtu.be/LWwOSZJwEJI)
- [Initial Proof of Concept (2022)](https://www.youtube.com/watch?v=kZ9isFw1TQ8)
### Channels
- [YouTube Channel](https://www.youtube.com/@dario.lencina)
## Contributors
## Ready to Build?
Start your journey with videocall.rs today. Whether you're building a robot, a drone, or a next-gen video app, we have the tools you need.
[**Get Started with Docker**](#docker-setup) or [**Download the CLI**](https://crates.io/crates/videocall-cli)
## License
This project is dual licensed under the MIT License and the Apache License 2.0. See the [LICENSE-APACHE](LICENSE-APACHE) and [LICENSE-MIT](LICENSE-MIT) files for details.