view docker/prosody-e2e/prosody.cfg.lua @ 3528:849374e59178

component file sharing: quotas implementation: quotas can now be specified using the `quotas_json` option of `component file_sharing` section in settings. This must be a dict where: - `users` key contains default quotas for all users - `admins` key contains quotas for administrators (not implemented yet) - `jids` contain bare JID to quota mapping, to have user-specific quota The value can be either a int for quota in bytes, or a case insensitive string with an optional multiplier symbol (e.g. "500 Mio"). `None` can be used for explicit unlimited quota (which is the default is `users` is not set). When a file size is too big for quota, upload is refused with an error message indicating allowed quota, used space, and the size of the file that user wants to upload.
author Goffi <goffi@goffi.org>
date Wed, 05 May 2021 15:37:33 +0200
parents 73e04040d577
children b443821399a3
line wrap: on
line source

-- Prosody XMPP Server Configuration
-- Adapted for SàT e2e tests

local socket = require "socket"

daemonize = false;
admins = { }

plugin_paths = { "/usr/local/share/prosody/modules" }

modules_enabled = {
	"admin_adhoc";
	"blocklist";
	"carbons";
	"csi";
	"csi_simple";
	"delegation";
	"dialback";
	"disco";
	"mam";
	"pep";
	"ping";
	"private";
	"privilege";
	"register";
	"roster";
	"saslauth";
	"smacks";
	"time";
	"tls";
	"uptime";
	"vcard4";
	"vcard_legacy";
	"version";
	"ipcheck";
}

modules_disabled = {
}

allow_registration = true
registration_whitelist = { socket.dns.toip("backend") }
whitelist_registration_only = true

c2s_require_encryption = true
s2s_require_encryption = true
s2s_secure_auth = false

pidfile = "/var/run/prosody/prosody.pid"

authentication = "internal_hashed"

archive_expires_after = "1d"

log = {
    {levels = {min = "info"}, to = "console"};
}

certificates = "certs"

ssl = {
	key = "/usr/share/libervia/certificates/server1.test-key.pem";
	certificate = "/usr/share/libervia/certificates/server1.test.pem";
}

component_interface = "*"

VirtualHost "server1.test"
	privileged_entities = {
		["pubsub.server1.test"] = {
			roster = "get";
            message = "outgoing";
			presence = "roster";
		},
	}

	delegations = {
		["urn:xmpp:mam:2"] = {
			filtering = {"node"};
			jid = "pubsub.server1.test";
		},
		["http://jabber.org/protocol/pubsub"] = {
			jid = "pubsub.server1.test";
		},
		["http://jabber.org/protocol/pubsub#owner"] = {
			jid = "pubsub.server1.test";
		},
		["https://salut-a-toi/protocol/schema:0"] = {
			jid = "pubsub.server1.test";
		},
		["http://jabber.org/protocol/disco#items:*"] = {
			jid = "pubsub.server1.test";
		},
		["https://salut-a-toi.org/spec/pubsub_admin:0"] = {
			jid = "pubsub.server1.test";
		},
	}

VirtualHost "server2.test"

VirtualHost "server3.test"

-- Component "muc.server1.test" "muc"
-- 	modules_enabled = {
-- 		"muc_mam";
-- 		"vcard";
-- 	}

Component "pubsub.server1.test"
	component_secret = "test_e2e"
	modules_enabled = {"privilege", "delegation"}

Component "proxy.server1.test" "proxy65"

Component "files.server1.test"
	component_secret = "test_e2e"