?WARNING_MSG("got unexpected cast: ~p", [Msg]),
State.
-reject_unauthenticated_packet(State, Pkt) ->
- Err = xmpp:err_not_authorized(),
- xmpp_stream_in:send_error(State, Pkt, Err).
+reject_unauthenticated_packet(State, _Pkt) ->
+ Err = xmpp:serr_not_authorized(),
+ send(State, Err).
process_closed(State, Reason) ->
stop(State#{stop_reason => Reason}).
?WARNING_MSG("got unexpected cast: ~p", [Msg]),
State.
-reject_unauthenticated_packet(State, Pkt) ->
- Err = xmpp:err_not_authorized(),
- xmpp_stream_in:send_error(State, Pkt, Err).
+reject_unauthenticated_packet(State, _Pkt) ->
+ Err = xmpp:serr_not_authorized(),
+ send(State, Err).
process_closed(State, _Reason) ->
stop(State).
true ->
ok;
false ->
- {error, xmpp:serr_improper_addressing()}
+ {error, xmpp:serr_host_unknown()}
end;
false ->
{error, xmpp:serr_invalid_from()}
Err = case Reason of
<<"XML stanza is too big">> ->
xmpp:serr_policy_violation(Reason, Lang);
- _ ->
- xmpp:serr_not_well_formed()
+ {_, Txt} ->
+ xmpp:serr_not_well_formed(Txt, Lang)
end,
send_pkt(State1, Err)
end);
send_pkt(State, #sasl_failure{reason = 'encryption-required'});
#sasl_auth{} when StateName == wait_for_sasl_request ->
process_sasl_request(Pkt, State);
+ #sasl_auth{} when StateName == wait_for_sasl_response ->
+ process_sasl_request(Pkt, maps:remove(sasl_state, State));
#sasl_auth{} ->
Txt = <<"SASL negotiation is not allowed in this state">>,
send_pkt(State, #sasl_failure{reason = 'not-authorized',
NewPkt = set_lang(Pkt, State),
try Mod:handle_unauthenticated_packet(NewPkt, State)
catch _:undef ->
- Err = xmpp:err_not_authorized(),
- send_error(State, Pkt, Err)
+ Err = xmpp:serr_not_authorized(),
+ send(State, Err)
end.
-spec process_authenticated_packet(xmpp_element(), state()) -> state().
To = xmpp:get_to(Pkt),
if From == undefined ->
Txt = <<"Missing 'from' attribute">>,
- {error, xmpp:serr_invalid_from(Txt, Lang)};
+ {error, xmpp:serr_improper_addressing(Txt, Lang)};
To == undefined ->
Txt = <<"Missing 'to' attribute">>,
{error, xmpp:serr_improper_addressing(Txt, Lang)};
stream_version := MyVersion,
stream_header_sent := false,
lang := MyLang,
- xmlns := NS,
- server := DefaultServer} = State,
+ xmlns := NS} = State,
#stream_start{to = HisTo, from = HisFrom,
lang = HisLang, version = HisVersion}) ->
Lang = select_lang(MyLang, HisLang),
NS_DB = if NS == ?NS_SERVER -> ?NS_SERVER_DIALBACK;
true -> <<"">>
end,
- From = case HisTo of
- #jid{} -> HisTo;
- undefined -> jid:make(DefaultServer)
- end,
Version = case HisVersion of
undefined -> undefined;
{0,_} -> HisVersion;
db_xmlns = NS_DB,
id = StreamID,
to = HisFrom,
- from = From},
+ from = HisTo},
State1 = State#{lang => Lang,
stream_version => Version,
stream_header_sent => true},
Err = case Reason of
<<"XML stanza is too big">> ->
xmpp:serr_policy_violation(Reason, Lang);
- _ ->
- xmpp:serr_not_well_formed()
+ {_, Txt} ->
+ xmpp:serr_not_well_formed(Txt, Lang)
end,
send_pkt(State1, Err)
end);
send_pkt(State1, xmpp:serr_policy_violation(Txt, Lang));
#starttls{required = true} when not TLSAvailable and not Encrypted ->
Txt = <<"Use of STARTTLS forbidden">>,
- send_pkt(State1, xmpp:serr_policy_violation(Txt, Lang));
+ send_pkt(State1, xmpp:serr_unsupported_feature(Txt, Lang));
#starttls{} when TLSAvailable and not Encrypted ->
State2 = State1#{stream_state => wait_for_starttls_response},
send_pkt(State2, #starttls{});