similar to: setacl fails - does not find dovecot-acl file

Displaying 20 results from an estimated 600 matches similar to: "setacl fails - does not find dovecot-acl file"

2005 Aug 25
2
Something other than dotlock for uidlist locking?
If I read the code correctly, only dotlocks are supported for locking of dovecot-uidlist. And I don't see any settings in the config file for it. As it turns out, dotlocks are very slow on my system, due to their implementation via hardlinks. Would it be possible to support other locking mechanisms for locking of the uidlist file? -jdb
2007 Apr 08
3
Released 1.0.rc31
http://dovecot.org/releases/dovecot-1.0.rc31.tar.gz http://dovecot.org/releases/dovecot-1.0.rc31.tar.gz.sig mbox + NFS combination shouldn't break anymore. v1.0 still planned to be released next friday. - mbox: Give "mbox file was modified while we were syncing" error only if we detect some problems in the mbox file. The check can't be trusted with NFS. - Convert
2007 Apr 08
3
Released 1.0.rc31
http://dovecot.org/releases/dovecot-1.0.rc31.tar.gz http://dovecot.org/releases/dovecot-1.0.rc31.tar.gz.sig mbox + NFS combination shouldn't break anymore. v1.0 still planned to be released next friday. - mbox: Give "mbox file was modified while we were syncing" error only if we detect some problems in the mbox file. The check can't be trusted with NFS. - Convert
2017 Jan 02
0
differential SETACL silently fails if no vfile exists
In version 2.2.13, with `acl = vfile`, setting a differential ACL permission doesn't work if there are no permissions set yet. Example IMAP log: b1 GETACL test * ACL test valodim lrwstipekxacd b1 OK Getacl completed. b2 SETACL test valodim -l b2 OK Setacl complete. b3 GETACL test * ACL test valodim lrwstipekxacd b3 OK Getacl completed. My expectation was that the file would be created with
2020 Aug 13
1
2.3.11.3 mail_cache_open_or_create_path called with null path
Originally reported here - https://marc.info/?l=openbsd-ports&m=159731598419071&w=2 OpenBSD's printf functions have a (mostly annoying but occasionally useful) feature where they generate a syslog entry if printf %s format is called with a null pointer. It is tripped in lmtp/lda deliveries with 2.3.11.3: lmtp: vfprintf %s NULL in "Cache %s: " dovecot-lda: vfprintf %s NULL
2011 Sep 11
1
setacl on complete mailbox
Hi List, how can I grant a user full control on another mailbox (the complete mailbox with all folder and subfolders). With the setacl command I could do this but first I have to list all folders and then I have to do one setacl command for each folder. Is there a command to this in one line? Also for new created folders? Greetz, Tobias
2014 Feb 21
1
Why SETACL accepts non-existant users (was Re: Why are ACLs for non-existent mailboxes accepted?)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thu, 20 Feb 2014, Boris wrote: > On Thursday 20 February 2014 20:45:32 Boris wrote: >> Dovecot 2.2.9-1 accepts SETACL commands that share mailboxes to non-existent >> mailboxes. There is no error message. Is this intended behavior? There is a "false friend" here. A "mailbox" in the tongue of many English
2009 Feb 06
2
[patch] 'c' and 'd' in setacl
Hi Timo, Hi *, I just recognized that the new imap-acl plugin in dovecot 1.2 does not know the obsolete rights 'd' and 'c' when setting. According to RFC 4314 section 2.1.1.: If a client includes the "d" right in a rights list, then it MUST be treated as if the client had included every member of the "delete" right. and If a client includes
2019 Dec 13
2
Dovecot 2.3.9 - lmtp crashes with Signal 11
Hi Aki, first thanks for the quick fix. Unfortunately, it only resolves the issue partially. For the ?To: undisclosed-recipients:;?, it works now. For ?To: ? it still crashes (i. e. what I did with my manual lmtp dialog). Michael > On 13. Dec 2019, at 11:54, Aki Tuomi <aki.tuomi at open-xchange.com> wrote: > > Hi! > > We have released v2.3.9.1 fixing this issue. >
2009 Jun 15
2
Dovecot v1.2 assert() in ACL
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, using Dovecot v1.2 changeset: 9126:b745911012bb ACL config: acl = vfile # To let users LIST mailboxes shared by other users, Dovecot needs a # shared mailbox dictionary. For example: acl_shared_dict = file:/var/cache/dovecot/shared-mailboxes telnet localhost imap 0 login .... 1 getacl Sent * ACL "Sent"
2019 Dec 13
1
Dovecot 2.3.9 - lmtp crashes with Signal 11
Can you provide p *addr? Aki On 13.12.2019 13.15, Michael Stilkerich wrote: > HI, > > and the backtrace (essentially same as before except for the line numbers moved by the code changes): > > Core was generated by `dovecot/lmtp'. [50/749] > Program terminated
2012 Aug 29
1
ACL MySQL dict: to_user==from_user entries
Hi! We run dovecot 2.1.6 with ACL support and MySQL dict for shared/shared-boxes/user/$to/$from. When a user does a SETACL (via IMAP) to himself he is added as $to and $from to the MySQL dict. Se for example this IMAP conversation: 5 GETACL INBOX * ACL "INBOX" "user at domain" lrwstipekxacd 5 OK Getacl completed. 6 SETACL INBOX user at domain lrwstipekxacd 6 OK Setacl
2019 Dec 13
2
Dovecot 2.3.9 - lmtp crashes with Signal 11
Hallo Aki, the affected code location seems to be concerned with parsing to ?To:? header. I checked all the mails causing the crash, the To: header is either empty (but present) or contains ?undisclosed-recipients:;?. I checked this manually and sure enough lmtp crashes: nc -C -U dovecot-lmtp 220 keira.mike2k.de Dovecot
2012 Oct 30
0
Dovecot does not update acl_shared_dict file
Hi all, Firstly, thanks for all your effort with this software. Much appreciated. I am having a slight issues trying to enable reading of other users mailboxes. The docs are a little sparse for those that aren't mailadmin heros, I wonder if anyone could please help me see where I am going wrong. I would like to allow some users to list and read the mailboxes of others. E.g: When
2009 Mar 05
3
ACL changes not respected by already loged in clients
Hi *, and yet another ACL problem. ;-) User A allows User B to access his mailbox foobar: * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE AUTH=PLAIN] Dovecot ready. l login userA secret l OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE SORT THREAD=REFERENCES MULTIAPPEND UNSELECT IDLE CHILDREN NAMESPACE UIDPLUS LIST-EXTENDED I18NLEVEL=1 CONDSTORE
2011 Nov 08
1
Failing to share folders when listescape is enabled (2.0.14)
Hello, How I can share a folder with dots when the listescape plugin is enabled? In this example user001 is sharing two foders named "docs-abc" and "docs-a.b.c" to user002. The first folder (without dots) is seen by user002 but the second is not found by dovecot because it search a system folder named ".docs-a.b.c" but the system folder is
2013 Feb 26
1
2.2.rc2: problem with acl_shared_dict
Hello, 2.2.rc2, configuration as before: acl_shared_dict=file:... The contents of this file is used for e.g. LISTing shared mailboxes. But even with file and directory beeing world writable, it's not written into on SETACL commands. Instead, at least sometimes (it seems to make a difference if GETACL is used before in the session) the imap process crashes on SETACL or DELETEACL. Feb 26
2011 Jun 27
1
ACLs: Group ACL adds empty ACL for user of same name, why?
I'm playing around with ACLs, Groups and SOGo on Debian Stable, Dovecot 1.2.15. If I set an ACL for a group 'developers': 6 setacl "INBOX.Trash" "$developers" "lrsw" 6 OK Setacl complete. The dovecot-acl file for INBOX.Trash then contains a group setting for the group, and a user setting for a user of the same name, giving it no permissions.
2013 Nov 28
2
shared folder - ACL
Hello everyone, I've trying to configure shared folders in dovecot 2.1.6 without success. My configuration is: mail_plugins = quota autocreate mail_log notify acl ... plugin { ... acl_shared_dict = file:/etc/dovecot/shared-mailboxes.db ... } Protocol imap { ... mail_plugins = imap_quota imap_acl ... } When I try to set acl to a folder: a02 setacl inbox.test1 user1 lr a02 BAD Error
2009 Feb 18
1
v1.2 can't set ACL to empty string
Hi *, according to RfC4314 the rights argument to the setacl command might be an empty string ("zero right characters"): The third argument is a string containing an optional plus ("+") or minus ("-") prefix, followed by zero or more rights characters. existing clients (horde in particular) actually use this to remove all rights from an user. Currently