Displaying 12 results from an estimated 12 matches for "t_strdup".
2003 Oct 03
4
PATCH: mysql authentication
Here's another patch. This one isn't much different from the last patch,
except it tries a little harder to make sure that the required fields
are returned by the query (like the pgsql module does).
One question about how t_strdup works. How and who should memory
returned by t_strdup be freed? My patch has a function my_get_str()
which returns the value of t_strdup, and then I do this:
user.uid = atoi(my_get_str(res, row, "uid")); /* XXX leak */
user.gid = atoi(my_get_str(res, row, "gid")); /...
2017 Oct 26
3
ManageSieve: authenticate "EXTERNAL" not behaving correctly
Hi,
I've enabled client certificate authentication for imap and managesieve.
When I use Thunderbird with the sieve plugin it tries to login, but
times out.
Initially I reported this to the sieve plugin, but we came to the
conclusion that it managesieve is misbehaving.
https://github.com/thsmi/sieve/issues/94
Thunderbird (win10-64) 52.4.0 (32bit)
Sieve 0.2.3k
Dovecot (Ubuntu 16.04.3 LTS)
2005 Jul 13
0
Minor bugs still in test77
Thinking of patches I always apply, I've got a couple (attached) that
fix minor bugs and maybe should be applied - or implemented better and
then applied ;) - to the main distribution?
1) LIST bugs:
LIST "~/mail/" ""
and
LIST "" "~/mail/"
(where "~/mail/" is a namespace prefix) don't reply the same way as
UW-IMAP does and in at
2013 Aug 01
0
[PATCH] quota-status: remove unnecessary newlines
...src/plugins/quota/quota-status.c 2013-08-01 14:35:35.000000000 +0200
+++ b/src/plugins/quota/quota-status.c 2013-08-01 17:58:26.000000000 +0200
@@ -107,7 +107,7 @@
/* over quota */
value = mail_user_plugin_getenv(user, "quota_status_overquota");
if (value == NULL)
- value = t_strdup_printf("554 5.2.2 %s\n\n", error);
+ value = t_strdup_printf("554 5.2.2 %s", error);
}
value = t_strdup(value); /* user's pool is being freed */
mail_user_unref(&user);
2007 Mar 26
7
MANAGESIEVE patch v3 for dovecot 1.0.rc28
Hello dovecot users,
I have updated the MANAGESIEVE patch to apply and compile against
dovecot 1.0.rc28. Not much has changed with respect to the functionality
of the previous version however:
ChangeLog vs v2
- Updated source to compile with dovecot 1.0.rc28, tested with rc27
(debian package)
- Daemon now uses the same location for .dovecot.sieve as dovecot-lda
This is typically
2008 Dec 02
2
symlink() failure in 1.2 managesieve
I've been simultaneously learning about dovecot and experimenting with
the 1.2.alpha4. To start I built an rpm under CentOS 5.2 from:
dovecot-1.2.alpha4.tar.gz
dovecot-1.2-managesieve-0.11.2.tar.gz
dovecot-1.2.alpha4-managesieve-0.11.2.diff.gz
dovecot-1.2.alpha4.tar.gz
dovecot-1.2-sieve-0.1.2.tar.gz
and then setup with mysql to use virtual users. Mail-wise, it all
works. :)
2008 Nov 01
2
antispam plugin problem
Hi people!
(Especially Johannes, probably =)
I recently switched to DSPAM + antispam plugin combination.
Mostly I am happy but there is a problem with calling dspam-exec in order to
relearn the messages.
Moving messages to spam folder does not work, giving the error message
'Failed to call dspam' to client.
I tried to add some debug output and here are the results:
This is the output of
2005 Mar 18
2
Pine and prefix - LIST command bug?
I've been having problems with Pine 4.62 talking to Dovecot 1.0 stable.
It's fine when the folder collection path is empty, but if I have
"~/mail/" or "mail/" it gives access errors (I'm using the "~/mail/",
"mail/" etc. hidden namespaces for backwards compatability).
It seems to me that Dovecot is not replying correctly to a "LIST"
2003 Apr 15
1
PATCH allow_zero_gid option
...w_zg)
{
if (user != NULL && *user != '\0')
env_put(t_strconcat("RESTRICT_USER=", user, NULL));
if (chroot_dir != NULL && *chroot_dir != '\0')
env_put(t_strconcat("RESTRICT_CHROOT=", chroot_dir, NULL));
+ if (allow_zg == TRUE)
+ env_put(t_strdup("ALLOW_ZERO_GID=TRUE"));
env_put(t_strdup_printf("RESTRICT_SETUID=%s", dec2str(uid)));
env_put(t_strdup_printf("RESTRICT_SETGID=%s", dec2str(gid)));
@@ -45,6 +47,7 @@ void restrict_access_set_env(const char
void restrict_access_by_env(int disallow_root)
{
co...
2008 Dec 08
3
"nopassword" extra field useless with LDAP passdb
Hi,
We are trying to implement a highly secure mail server with user authentication restricted to SSL certificates only (not using passwords at all). Still, user information is stored in a LDAP directory. In this configuration LDAP is used to check whether the user is registered (and probably supply quota and other info), and actual authentication is done by SSL layer.
According to wiki, a
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...src/auth/auth.c 2010-01-24 17:14:17.000000000 -0600
+++ dovecot-1.2.11+lemonade/src/auth/auth.c 2010-04-08 09:59:12.000000000 -0500
@@ -37,6 +37,8 @@
masterdb_p = &auth->masterdbs;
auth_passdb = NULL;
for (i = 1; ; i++) {
+ bool is_master; /* APPLE - urlauth */
+
driver = getenv(t_strdup_printf("PASSDB_%u_DRIVER", i));
if (driver == NULL)
break;
@@ -49,7 +51,16 @@
auth_passdb->pass =
getenv(t_strdup_printf("PASSDB_%u_PASS", i)) != NULL;
- if (getenv(t_strdup_printf("PASSDB_%u_MASTER", i)) == NULL) {
+ /* APPLE...
2010 Apr 14
4
PostgreSQL driver supporting [round-robin] load balancing and redundancy [LONG]
...dprintf(("%s: %p", __func__, x_ctx));
+
+ add_subquery_to(x_ctx, "commit", NULL);
+
+ init_sync_transaction_query(&sync_qry, x_ctx);
+ pgdb_sync_query((void *)x_ctx->super.db, &sync_qry.super.super);
+
+ errmsg = (char *)sync_qry.errmsg;
+ if (errmsg) {
+ *error_r = t_strdup(errmsg);
+ i_free(errmsg);
+
+ return -1;
+ }
+
+ return 0;
+}
+
+static void
+multi_pgsql_transaction_rollback(struct sql_transaction_context *ctx)
+{
+ struct multi_pgsql_transaction_context *x_ctx;
+
+ x_ctx = (void *)ctx;
+ dprintf(("%s: %p", __func__, x_ctx));
+
+ pool_unref(&...