Playwright: Make it possible to disable presence
parent
a57d0b72c3
commit
2c4d3d5084
|
@ -122,6 +122,7 @@ export interface Fixtures {
|
||||||
bot: Bot;
|
bot: Bot;
|
||||||
labsFlags: string[];
|
labsFlags: string[];
|
||||||
webserver: Webserver;
|
webserver: Webserver;
|
||||||
|
disablePresence: boolean;
|
||||||
}
|
}
|
||||||
|
|
||||||
export const test = base.extend<Fixtures>({
|
export const test = base.extend<Fixtures>({
|
||||||
|
@ -133,8 +134,9 @@ export const test = base.extend<Fixtures>({
|
||||||
);
|
);
|
||||||
await use(context);
|
await use(context);
|
||||||
},
|
},
|
||||||
|
disablePresence: false,
|
||||||
config: CONFIG_JSON,
|
config: CONFIG_JSON,
|
||||||
page: async ({ context, page, config, labsFlags }, use) => {
|
page: async ({ context, page, config, labsFlags, disablePresence, homeserver }, use) => {
|
||||||
await context.route(`http://localhost:8080/config.json*`, async (route) => {
|
await context.route(`http://localhost:8080/config.json*`, async (route) => {
|
||||||
const json = { ...CONFIG_JSON, ...config };
|
const json = { ...CONFIG_JSON, ...config };
|
||||||
json["features"] = {
|
json["features"] = {
|
||||||
|
@ -145,6 +147,11 @@ export const test = base.extend<Fixtures>({
|
||||||
return obj;
|
return obj;
|
||||||
}, {}),
|
}, {}),
|
||||||
};
|
};
|
||||||
|
if (disablePresence) {
|
||||||
|
json["enable_presence_by_hs_url"] = {
|
||||||
|
[homeserver.config.baseUrl]: false,
|
||||||
|
};
|
||||||
|
}
|
||||||
await route.fulfill({ json });
|
await route.fulfill({ json });
|
||||||
});
|
});
|
||||||
await use(page);
|
await use(page);
|
||||||
|
|
|
@ -0,0 +1 @@
|
||||||
|
A synapse configured with presence disabled
|
|
@ -0,0 +1,110 @@
|
||||||
|
server_name: "localhost"
|
||||||
|
pid_file: /data/homeserver.pid
|
||||||
|
public_baseurl: "{{PUBLIC_BASEURL}}"
|
||||||
|
listeners:
|
||||||
|
- port: 8008
|
||||||
|
tls: false
|
||||||
|
bind_addresses: ["::"]
|
||||||
|
type: http
|
||||||
|
x_forwarded: true
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- names: [client]
|
||||||
|
compress: false
|
||||||
|
|
||||||
|
database:
|
||||||
|
name: "sqlite3"
|
||||||
|
args:
|
||||||
|
database: ":memory:"
|
||||||
|
|
||||||
|
log_config: "/data/log.config"
|
||||||
|
|
||||||
|
rc_messages_per_second: 10000
|
||||||
|
rc_message_burst_count: 10000
|
||||||
|
rc_registration:
|
||||||
|
per_second: 10000
|
||||||
|
burst_count: 10000
|
||||||
|
rc_joins:
|
||||||
|
local:
|
||||||
|
per_second: 9999
|
||||||
|
burst_count: 9999
|
||||||
|
remote:
|
||||||
|
per_second: 9999
|
||||||
|
burst_count: 9999
|
||||||
|
rc_joins_per_room:
|
||||||
|
per_second: 9999
|
||||||
|
burst_count: 9999
|
||||||
|
rc_3pid_validation:
|
||||||
|
per_second: 1000
|
||||||
|
burst_count: 1000
|
||||||
|
|
||||||
|
rc_invites:
|
||||||
|
per_room:
|
||||||
|
per_second: 1000
|
||||||
|
burst_count: 1000
|
||||||
|
per_user:
|
||||||
|
per_second: 1000
|
||||||
|
burst_count: 1000
|
||||||
|
|
||||||
|
rc_login:
|
||||||
|
address:
|
||||||
|
per_second: 10000
|
||||||
|
burst_count: 10000
|
||||||
|
account:
|
||||||
|
per_second: 10000
|
||||||
|
burst_count: 10000
|
||||||
|
failed_attempts:
|
||||||
|
per_second: 10000
|
||||||
|
burst_count: 10000
|
||||||
|
|
||||||
|
media_store_path: "/data/media_store"
|
||||||
|
uploads_path: "/data/uploads"
|
||||||
|
enable_registration: true
|
||||||
|
enable_registration_without_verification: true
|
||||||
|
disable_msisdn_registration: false
|
||||||
|
registration_shared_secret: "{{REGISTRATION_SECRET}}"
|
||||||
|
report_stats: false
|
||||||
|
macaroon_secret_key: "{{MACAROON_SECRET_KEY}}"
|
||||||
|
form_secret: "{{FORM_SECRET}}"
|
||||||
|
signing_key_path: "/data/localhost.signing.key"
|
||||||
|
|
||||||
|
trusted_key_servers:
|
||||||
|
- server_name: "matrix.org"
|
||||||
|
suppress_key_server_warning: true
|
||||||
|
|
||||||
|
ui_auth:
|
||||||
|
session_timeout: "300s"
|
||||||
|
|
||||||
|
oidc_providers:
|
||||||
|
- idp_id: test
|
||||||
|
idp_name: "OAuth test"
|
||||||
|
issuer: "http://localhost:{{OAUTH_SERVER_PORT}}/oauth"
|
||||||
|
authorization_endpoint: "http://localhost:{{OAUTH_SERVER_PORT}}/oauth/auth.html"
|
||||||
|
# the token endpoint receives requests from synapse, rather than the webapp, so needs to escape the docker container.
|
||||||
|
token_endpoint: "http://host.containers.internal:{{OAUTH_SERVER_PORT}}/oauth/token"
|
||||||
|
userinfo_endpoint: "http://host.containers.internal:{{OAUTH_SERVER_PORT}}/oauth/userinfo"
|
||||||
|
client_id: "synapse"
|
||||||
|
discover: false
|
||||||
|
scopes: ["profile"]
|
||||||
|
skip_verification: true
|
||||||
|
client_auth_method: none
|
||||||
|
user_mapping_provider:
|
||||||
|
config:
|
||||||
|
display_name_template: "{{ user.name }}"
|
||||||
|
|
||||||
|
# Inhibit background updates as this Synapse isn't long-lived
|
||||||
|
background_updates:
|
||||||
|
min_batch_size: 100000
|
||||||
|
sleep_duration_ms: 100000
|
||||||
|
|
||||||
|
experimental_features:
|
||||||
|
# Needed for e2e/crypto/crypto.spec.ts > Cryptography > decryption failure
|
||||||
|
# messages > non-joined historical messages.
|
||||||
|
# Can be removed after Synapse enables it by default
|
||||||
|
msc4115_membership_on_events: true
|
||||||
|
|
||||||
|
enable_authenticated_media: true
|
||||||
|
|
||||||
|
presence:
|
||||||
|
enabled: false
|
||||||
|
include_offline_users_on_sync: false
|
|
@ -0,0 +1,50 @@
|
||||||
|
# Log configuration for Synapse.
|
||||||
|
#
|
||||||
|
# This is a YAML file containing a standard Python logging configuration
|
||||||
|
# dictionary. See [1] for details on the valid settings.
|
||||||
|
#
|
||||||
|
# Synapse also supports structured logging for machine readable logs which can
|
||||||
|
# be ingested by ELK stacks. See [2] for details.
|
||||||
|
#
|
||||||
|
# [1]: https://docs.python.org/3.7/library/logging.config.html#configuration-dictionary-schema
|
||||||
|
# [2]: https://matrix-org.github.io/synapse/latest/structured_logging.html
|
||||||
|
|
||||||
|
version: 1
|
||||||
|
|
||||||
|
formatters:
|
||||||
|
precise:
|
||||||
|
format: '%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s - %(message)s'
|
||||||
|
|
||||||
|
handlers:
|
||||||
|
# A handler that writes logs to stderr. Unused by default, but can be used
|
||||||
|
# instead of "buffer" and "file" in the logger handlers.
|
||||||
|
console:
|
||||||
|
class: logging.StreamHandler
|
||||||
|
formatter: precise
|
||||||
|
|
||||||
|
loggers:
|
||||||
|
synapse.storage.SQL:
|
||||||
|
# beware: increasing this to DEBUG will make synapse log sensitive
|
||||||
|
# information such as access tokens.
|
||||||
|
level: DEBUG
|
||||||
|
|
||||||
|
twisted:
|
||||||
|
# We send the twisted logging directly to the file handler,
|
||||||
|
# to work around https://github.com/matrix-org/synapse/issues/3471
|
||||||
|
# when using "buffer" logger. Use "console" to log to stderr instead.
|
||||||
|
handlers: [console]
|
||||||
|
propagate: false
|
||||||
|
|
||||||
|
root:
|
||||||
|
level: DEBUG
|
||||||
|
|
||||||
|
# Write logs to the `buffer` handler, which will buffer them together in memory,
|
||||||
|
# then write them to a file.
|
||||||
|
#
|
||||||
|
# Replace "buffer" with "console" to log to stderr instead. (Note that you'll
|
||||||
|
# also need to update the configuration for the `twisted` logger above, in
|
||||||
|
# this case.)
|
||||||
|
#
|
||||||
|
handlers: [console]
|
||||||
|
|
||||||
|
disable_existing_loggers: false
|
Loading…
Reference in New Issue