Mercurial > libervia-backend
view docker/prosody-e2e/prosody.cfg.lua @ 4044:3900626bc100
plugin XEP-0166: refactoring, and various improvments:
- add models for transport and applications handlers and linked data
- split models into separate file
- some type hints
- some documentation comments
- add actions to prepare confirmation, useful to do initial parsing of all contents
- application arg/kwargs and some transport data can be initialised during Jingle
`initiate` call, this is notably useful when a call is made with transport data (this is
the call for A/V calls where codecs and ICE candidate can be specified when starting a
call)
- session data can be specified during Jingle `initiate` call
- new `store_in_session` argument in `_parse_elements`, which can be used to avoid
race-condition when a context element (<decription> or <transport>) is being parsed for
an action while an other action happens (like `transport-info`)
- don't sed `sid` in `transport_elt` during a `transport-info` action anymore in
`build_action`: this is specific to Jingle File Transfer and has been moved there
rel 419
author | Goffi <goffi@goffi.org> |
---|---|
date | Mon, 15 May 2023 16:23:11 +0200 |
parents | b443821399a3 |
children | 22cd3094cd1e |
line wrap: on
line source
-- Prosody XMPP Server Configuration -- Adapted for SàT e2e tests local socket = require "socket" daemonize = false; admins = { } plugin_paths = { "/usr/local/share/prosody/modules" } modules_enabled = { "admin_adhoc"; "blocklist"; "carbons"; "csi"; "csi_simple"; "delegation"; "dialback"; "disco"; "mam"; "pep"; "ping"; "private"; "privilege"; "register"; "roster"; "saslauth"; "smacks"; "time"; "tls"; "uptime"; "vcard4"; "vcard_legacy"; "version"; "ipcheck"; } modules_disabled = { } allow_registration = true registration_whitelist = { socket.dns.toip("backend") } whitelist_registration_only = true c2s_require_encryption = true s2s_require_encryption = true s2s_secure_auth = false pidfile = "/var/run/prosody/prosody.pid" authentication = "internal_hashed" archive_expires_after = "1d" log = { {levels = {min = "info"}, to = "console"}; } certificates = "certs" ssl = { key = "/usr/share/libervia/certificates/server1.test-key.pem"; certificate = "/usr/share/libervia/certificates/server1.test.pem"; } component_interface = "*" VirtualHost "server1.test" privileged_entities = { ["pubsub.server1.test"] = { roster = "get"; message = "outgoing"; presence = "roster"; iq = { ["http://jabber.org/protocol/pubsub"] = "set"; }; }, } delegations = { ["urn:xmpp:mam:2"] = { filtering = {"node"}; jid = "pubsub.server1.test"; }, ["http://jabber.org/protocol/pubsub"] = { jid = "pubsub.server1.test"; }, ["http://jabber.org/protocol/pubsub#owner"] = { jid = "pubsub.server1.test"; }, ["https://salut-a-toi/protocol/schema:0"] = { jid = "pubsub.server1.test"; }, ["https://salut-a-toi.org/spec/pubsub_admin:0"] = { jid = "pubsub.server1.test"; }, ["urn:xmpp:pam:0"] = { jid = "pubsub.server1.test"; }, ["urn:xmpp:delegation:2:bare:disco#info:*"] = { jid = "pubsub.server1.test"; }, ["urn:xmpp:delegation:2:bare:disco#items:*"] = { jid = "pubsub.server1.test"; }, } VirtualHost "server2.test" VirtualHost "server3.test" -- Component "muc.server1.test" "muc" -- modules_enabled = { -- "muc_mam"; -- "vcard"; -- } Component "pubsub.server1.test" component_secret = "test_e2e" modules_enabled = {"privilege", "delegation"} Component "proxy.server1.test" "proxy65" Component "files.server1.test" component_secret = "test_e2e"