aboutsummaryrefslogtreecommitdiffstats
path: root/plugins/mod_pep.lua
diff options
context:
space:
mode:
authorKim Alvefur <zash@zash.se>2017-01-28 21:39:14 +0100
committerKim Alvefur <zash@zash.se>2017-01-28 21:39:14 +0100
commite75e05ebc9f165cc5b297c9c382fa4419e7f270b (patch)
tree6c9cf0c2b8ff612f448ee3f99ed5f320126989e2 /plugins/mod_pep.lua
parent31b47ca492ba0a844e301085dd530d63f43141e6 (diff)
parent47a4bdf758aeec7b0f7e81f498c89ea47088e464 (diff)
downloadprosody-e75e05ebc9f165cc5b297c9c382fa4419e7f270b.tar.gz
prosody-e75e05ebc9f165cc5b297c9c382fa4419e7f270b.zip
Merge 0.10->trunk
Diffstat (limited to 'plugins/mod_pep.lua')
-rw-r--r--plugins/mod_pep.lua7
1 files changed, 7 insertions, 0 deletions
diff --git a/plugins/mod_pep.lua b/plugins/mod_pep.lua
index 46517b95..5d6485fa 100644
--- a/plugins/mod_pep.lua
+++ b/plugins/mod_pep.lua
@@ -185,7 +185,11 @@ module:hook("iq/bare/http://jabber.org/protocol/pubsub:pubsub", function(event)
node = node, user = jid_bare(session.full_jid), actor = session.jid, id = id, session = session, item = st.clone(payload);
});
return true;
+ else
+ module:log("debug", "Payload is missing the <item>", node);
end
+ else
+ module:log("debug", "Unhandled payload: %s", payload and payload:top_tag() or "(no payload)");
end
elseif stanza.attr.type == 'get' then
local user = stanza.attr.to and jid_bare(stanza.attr.to) or session.username..'@'..session.host;
@@ -221,14 +225,17 @@ module:hook("iq/bare/http://jabber.org/protocol/pubsub:pubsub", function(event)
end
elseif node then -- node doesn't exist
session.send(st.error_reply(stanza, 'cancel', 'item-not-found'));
+ module:log("debug", "Item '%s' not found", node)
return true;
else --invalid request
session.send(st.error_reply(stanza, 'modify', 'bad-request'));
+ module:log("debug", "Invalid request: %s", tostring(payload));
return true;
end
else --no presence subscription
session.send(st.error_reply(stanza, 'auth', 'not-authorized')
:tag('presence-subscription-required', {xmlns='http://jabber.org/protocol/pubsub#errors'}));
+ module:log("debug", "Unauthorized request: %s", tostring(payload));
return true;
end
end