Thanks for your mail.
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
May 3 2020
Apr 29 2020
Apr 26 2020
Apr 19 2020
Apr 15 2020
Apr 13 2020
Can you elaborate further on what you mean by chain body?
Apr 11 2020
Apr 4 2020
Apr 1 2020
Mar 31 2020
Unfortunately missed this for 0.9.6, so I'll pick it up in the next release.
This has been resolved in packaging as far as I know.
Mar 29 2020
Here's an example of a more complex tls_config I use on my servers (using certbot + letsencrypt):
Mar 28 2020
You need to supply Guam with a valid X.509 certificate (issued by Let's Encrypt, for example) and adapt the tls_config section of /etc/guam/sys.config accordingly.
Guam should be listening on port 993, so please check if the Guam service is up and running.
Worked fine, I could't reproduce the issue. Closing this.
Mar 7 2020
Feb 27 2020
Feb 20 2020
Feb 13 2020
Feb 8 2020
Jan 16 2020
Closing Ticket. Change has been merged
Jan 9 2020
Patch seems to work. I haven't seen this issue after applying the patch. Thanks a lot!
Jan 8 2020
PHP >= 7.1 compat. issue. Fixed.
Jan 2 2020
Jan 1 2020
Dec 25 2019
Dec 24 2019
Closing this task then.
Dec 23 2019
Additionally I get the following traceback:
2019-12-23 14:05:25,670 pykolab.auth ERROR [21425] An error occured using _paged_search: NameError("global name 'LDAP_CONTROL_PAGED_RESULTS' is not defined",)
2019-12-23 14:05:25,670 pykolab.auth ERROR [21425] Traceback (most recent call last):
File "/usr/lib/python2.7/dist-packages/pykolab/auth/ldap/__init__.py", line 3168, in _search
secondary_domains
File "<string>", line 10, in <module>
File "/usr/lib/python2.7/dist-packages/pykolab/auth/ldap/__init__.py", line 2940, in _paged_search
if c.controlType == LDAP_CONTROL_PAGED_RESULTS
NameError: global name 'LDAP_CONTROL_PAGED_RESULTS' is not definedHi all
Dec 22 2019
This happend on a Debian 10 system with most recent pykolab package
- pykolab 0.8.17-0~kolab2
- python-ldap 3.1.0-2
Dec 17 2019
Hi all
Dec 16 2019
Sorry,
i found the solution myself.
Dec 9 2019
Dec 6 2019
Dec 4 2019
Nov 26 2019
ups, reopen
A workaround could be to move the hosted_root_dn from the [kolab_web] to [kolab] section and make a check for it. If hosted_mode is configured then look for ou=domain,$hosted_root_dn instead of the dc version. Another workaround would be to load all hosted domains into memory to avoid ldap query for every sync run. But we then need to trigger kolabd somehow to reload the domain list when domains have been changed or added
Nov 23 2019
Yes. These values are enforced. If they don't exists, kolabd recreates them.
I get that you can disable it. But when the records have been created anyway, should they not be removable?
Okay ... first issue (in my case) is that mgmt_root_dn is in the same domain name space ... One issue, but that's not the root cause
You need to disable the autogenerated secondary_mails in /etc/kolab/kolab.conf.
Yepp. the chmod mask was held against the umask and therefore resulted in the wrong chmod mask. After changing this to a correct umask octcal number it's okay.
Nov 22 2019
does this issue apply to the enterprise version of Kolab 16 as well? We're currently evaluating Kolab (opensource version) to see if it fits our needs, but incomplete ActiveSync would be somewhat of an issue for us.
Nov 18 2019
The individual directories in /run/ are secured, so there's little need to secure the files within them.
Nov 16 2019
Uploaded D847
Uploaded D853
Nov 15 2019
See Debian Bug Entry: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921016