Projects
Kolab:3.4
pykolab
Log In
Username
Password
We truncated the diff of some files because they were too big. If you want to see the full diff for every file,
click here
.
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
Expand all
Collapse all
Changes of Revision 34
View file
pykolab.spec
Changed
@@ -23,7 +23,7 @@ Summary: Kolab Groupware Solution Name: pykolab -Version: 0.6.8 +Version: 0.6.9 Release: 1%{?dist} License: GPLv3+ Group: Applications/System
View file
debian.changelog
Changed
@@ -1,5 +1,14 @@ -pykolab (0.6.8-0~kolab5) unstable; urgency=low +pykolab (0.6.9-0~kolab5) unstable; urgency=low + * Add ucs/kolab.py + + -- Jeroen van Meeuwen (Kolab Systems) <vanmeeuwen@kolabsys.com> Fri, 22 Nov 2013 20:00:00 +0100 + +pykolab (0.6.9-0~kolab3) unstable; urgency=low + + * Do not remove setup_syncroton.py + * Trigger restarts necessary for cyrus-imapd and postfix + * New upstream version * Test for a lock directory before touching lock files -- Jeroen van Meeuwen (Kolab Systems) <vanmeeuwen@kolabsys.com> Thu, 21 Nov 2013 20:00:00 +0100
View file
debian.control
Changed
@@ -31,23 +31,27 @@ Package: pykolab Architecture: all -Depends: ${shlibs:Depends}, - ${misc:Depends}, - python, - python-ldap, - python-pyasn1, - python-pyasn1-modules, - python-sqlalchemy, - adduser (>= 3.11), - python-icalendar, - python-mysqldb, - libpython2.7 | libpython2.6 +Depends: adduser (>= 3.11), + libpython2.7 | libpython2.6, + python, + python-icalendar, + python-mysqldb, + python-ldap, + python-pyasn1, + python-pyasn1-modules, + python-sqlalchemy, + ${misc:Depends}, + ${shlibs:Depends} Description: Kolab Groupware daemon and utilities Python implementation of the Kolab Groupware server Package: kolab-cli Architecture: all -Depends: pykolab (= ${binary:Version}), python, ${misc:Depends}, python-augeas, python-cheetah +Depends: pykolab (= ${binary:Version}), + python, + python-augeas, + python-cheetah, + ${misc:Depends} Description: Command-line utilities for Kolab This package includes command-line utilities for Kolab Groupware @@ -60,7 +64,11 @@ Package: kolab-saslauthd Architecture: all -Depends: pykolab (= ${binary:Version}), python, ${misc:Depends}, sasl2-bin, lsb-base (>= 3.0-6) +Depends: lsb-base (>= 3.0-6), + pykolab (= ${binary:Version}), + python, + sasl2-bin, + ${misc:Depends} Description: SASL Authentication Daemon for Kolab A multi-domain capable Kolab SASL Authentication daemon.
View file
debian.rules
Changed
@@ -16,5 +16,8 @@ dh_auto_test || echo “ignoring test failure” override_dh_install: - dh_install -Xsetup_syncroton.py --list-missing + if [ -x "$$(which univention-install-config-registry 2>/dev/null)" ]; then \ + echo "ucs/kolab.py usr/share/pyshared/pykolab/ucs/kolab.py" >> debian/pykolab.install ; \ + fi + dh_install --list-missing
View file
debian.tar.gz/kolab-saslauthd.postinst
Added
@@ -0,0 +1,23 @@ +#!/bin/bash + +case "$1" in + configure) + if [ -f "/etc/default/kolab-saslauthd" ]; then + . /etc/default/kolab-saslauthd + fi + + if [ "$START" == "yes" ]; then + invoke-rc.d kolab-saslauthd start >/dev/null 2>&1 || true + fi + + if [ -x "/etc/init.d/cyrus-imapd" ]; then + invoke-rc.d cyrus-imapd restart >/dev/null 2>&1 || true + fi + + if [ -x "/etc/init.d/postfix" ]; then + invoke-rc.d postfix restart >/dev/null 2>&1 || true + fi + ;; +esac + +exit 0
View file
debian.tar.gz/patches/master.cf.tpl.patch
Deleted
@@ -1,25 +0,0 @@ ---- pykolab-orig/share/templates/master.cf.tpl 2013-11-13 19:58:16.000000000 +0100 -+++ pykolab/share/templates/master.cf.tpl 2013-11-13 19:59:49.000000000 +0100 -@@ -105,17 +105,17 @@ - -o smtpd_authorized_xforward_hosts=127.0.0.0/8 - - recipient_policy unix - n n - - spawn -- user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-recipient -+ user=kolab-n argv=/usr/lib/postfix/kolab_smtp_access_policy --verify-recipient - - recipient_policy_incoming unix - n n - - spawn -- user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-recipient --allow-unauthenticated -+ user=kolab-n argv=/usr/lib/postfix/kolab_smtp_access_policy --verify-recipient --allow-unauthenticated - - sender_policy unix - n n - - spawn -- user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-sender -+ user=kolab-n argv=/usr/lib/postfix/kolab_smtp_access_policy --verify-sender - - sender_policy_incoming unix - n n - - spawn -- user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-sender --allow-unauthenticated -+ user=kolab-n argv=/usr/lib/postfix/kolab_smtp_access_policy --verify-sender --allow-unauthenticated - - submission_policy unix - n n - - spawn -- user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-sender --verify-recipient -+ user=kolab-n argv=/usr/lib/postfix/kolab_smtp_access_policy --verify-sender --verify-recipient -
View file
debian.tar.gz/patches/remove-syncroton-setup.patch
Deleted
@@ -1,11 +0,0 @@ -diff -ur pykolab-0.6.5.orig/pykolab/Makefile.am pykolab-0.6.5/pykolab/Makefile.am ---- pykolab-0.6.5.orig/pykolab/Makefile.am 2013-08-22 15:26:51.000000000 +0100 -+++ pykolab-0.6.5/pykolab/Makefile.am 2013-09-15 14:52:42.164643662 +0100 -@@ -73,7 +73,6 @@ - setup/setup_mysql.py \ - setup/setup_php.py \ - setup/setup_roundcube.py \ -- setup/setup_syncroton.py \ - setup/__init__.py - - pykolab_wapclientdir = $(pythondir)/$(PACKAGE)/wap_client
View file
debian.tar.gz/patches/series
Changed
@@ -1,5 +1,3 @@ -remove-syncroton-setup.patch enable-kolabd.patch cyrus-imapd.conf-cert-paths.patch enable-wallace.patch -master.cf.tpl.patch
View file
pykolab-0.6.8.tar.gz/pykolab/wap_client/connect.py
Deleted
@@ -1,9 +0,0 @@ -def connect(): - global conn - - if conn == None: - conn = httplib.HTTPConnection(API_HOSTNAME, API_PORT) - conn.connect() - - return conn -
View file
pykolab-0.6.8.tar.gz/share/templates/roundcubemail/kolab.inc.php.tpl
Deleted
@@ -1,15 +0,0 @@ -<?php - - \$config['kolab_freebusy_server'] = 'http://' . \$_SERVER["HTTP_HOST"] . '/freebusy'; - - if (file_exists(RCUBE_CONFIG_DIR . '/' . \$_SERVER["HTTP_HOST"] . '/' . basename(__FILE__))) { - include_once(RCUBE_CONFIG_DIR . '/' . \$_SERVER["HTTP_HOST"] . '/' . basename(__FILE__)); - } - - \$config['kolab_cache'] = true; - - \$config['kolab_ssl_verify_peer'] = false; - - \$config['kolab_use_subscriptions'] = true; - -?>
View file
pykolab-0.6.8.tar.gz/.tx/config -> pykolab-0.6.9.tar.gz/.tx/config
Changed
@@ -1,5 +1,5 @@ [main] -host = https://www.transifex.net +host = https://www.transifex.com type = PO [kolab.pykolab]
View file
pykolab-0.6.8.tar.gz/bin/kolab_smtp_access_policy.py -> pykolab-0.6.9.tar.gz/bin/kolab_smtp_access_policy.py
Changed
@@ -1000,6 +1000,31 @@ sender_verified = False + if self.sender == None: + # Trusted host? + if not hasattr(self, 'client_address') or \ + self.client_address == "" or \ + self.client_address == None: + + # Nothing to compare to. + return False + + try: + import netaddr + + networks = conf.get_list( + 'kolab_smtp_access_policy', + 'empty_sender_hosts' + ) + + trusted = False + for network in networks: + if netaddr.IPNetwork(self.client_address) in netaddr.IPNetwork(network): + return True + + except ImportError, errmsg: + return False + if not cache == False: records = cache_select( sender=self.sender, @@ -1483,17 +1508,23 @@ sender_allowed = False recipient_allowed = False - if conf.verify_sender: - sender_allowed = policy_requests[instance].verify_sender() - else: - sender_allowed = True + try: + if conf.verify_sender: + sender_allowed = policy_requests[instance].verify_sender() + else: + sender_allowed = True - if conf.verify_recipient: - recipient_allowed = \ - policy_requests[instance].verify_recipients() + if conf.verify_recipient: + recipient_allowed = \ + policy_requests[instance].verify_recipients() - else: - recipient_allowed = True + else: + recipient_allowed = True + + except Exception, errmsg: + import traceback + log.error(_("Unhandled exception caught: %r") % (errmsg)) + log.error(traceback.format_exc()) if not sender_allowed: reject(_("Sender access denied"))
View file
pykolab-0.6.8.tar.gz/conf/kolab.conf -> pykolab-0.6.9.tar.gz/conf/kolab.conf
Changed
@@ -22,10 +22,113 @@ ; deployments that lack persistent search and syncrepl ldap controls. sync_interval = 300 +; Primary and secondary recipient address policies. This is called the +; recipient policy as documented in: +; +; http://docs.kolab.org/administrator-guide/configuring-the-kolab-server.html#recipient-policy +; +; Note this is the global default, and each [$domain] section can have +; their own (as in this default configuration, see [example.org]). +primary_mail = %(surname)s@%(domain)s +secondary_mail = { + 0: { + "{0}.{1}@{2}": "format('%(givenname)s'[0:1].capitalize(), '%(surname)s', '%(domain)s')" + }, + 1: { + "{0}@{1}": "format('%(uid)s', '%(domain)s')" + }, + 2: { + "{0}@{1}": "format('%(givenname)s.%(surname)s', '%(domain)s')" + } + } + +; A global default for folders to create in addition to the INBOX +; folder. +autocreate_folders = { + 'Archive': { + 'quota': 0 + }, + 'Calendar': { + 'annotations': { + '/private/vendor/kolab/folder-type': "event.default", + '/shared/vendor/kolab/folder-type': "event", + }, + }, + 'Calendar/Personal Calendar': { + 'annotations': { + '/shared/vendor/kolab/folder-type': "event", + }, + }, + 'Configuration': { + 'annotations': { + '/private/vendor/kolab/folder-type': "configuration.default", + '/shared/vendor/kolab/folder-type': "configuration.default", + }, + }, + 'Contacts': { + 'annotations': { + '/private/vendor/kolab/folder-type': "contact.default", + '/shared/vendor/kolab/folder-type': "contact", + }, + }, + 'Contacts/Personal Contacts': { + 'annotations': { + '/shared/vendor/kolab/folder-type': "contact", + }, + }, + 'Drafts': { + 'annotations': { + '/private/vendor/kolab/folder-type': "mail.drafts", + }, + }, + 'Files': { + 'annotations': { + '/private/vendor/kolab/folder-type': "file.default", + }, + }, + 'Journal': { + 'annotations': { + '/private/vendor/kolab/folder-type': "journal.default", + '/shared/vendor/kolab/folder-type': "journal", + }, + }, + 'Notes': { + 'annotations': { + '/private/vendor/kolab/folder-type': 'note.default', + '/shared/vendor/kolab/folder-type': 'note', + }, + }, + 'Sent': { + 'annotations': { + '/private/vendor/kolab/folder-type': "mail.sentitems", + }, + }, + 'Spam': { + 'annotations': { + '/private/vendor/kolab/folder-type': "mail.junkemail", + }, + }, + 'Tasks': { + 'annotations': { + '/private/vendor/kolab/folder-type': "task.default", + '/shared/vendor/kolab/folder-type': "task", + }, + }, + 'Trash': { + 'annotations': { + '/private/vendor/kolab/folder-type': "mail.wastebasket", + }, + }, + } + [ldap] ; The URI to LDAP ldap_uri = ldap://localhost:389 +; A list of integers containing supported controls, to increase the efficiency +; of individual short-lived connections with LDAP. +supported_controls = 0,2,3 + ; The base dn for the deployment. Note that this is the highest level in the ; tree Kolab will ever go. Should your OU structure allow it, you could set this ; to ou=Kolab,ou=Not-So-Private,dc=example,dc=org. @@ -122,7 +225,7 @@ ; ; For OpenLDAP, use 'entrydn' - the 'entryUUID' can regrettably not be searched ; with. -; +; ; For Active Directory, use 'objectsid'. unique_attribute = nsuniqueid @@ -157,6 +260,10 @@ cache_retention = 86400 address_search_attrs = mail, alias +; Allow hosts in these networks to submit messages with empty envelope senders, +; such as web-clients responding to MDN requests. +empty_sender_hosts = 3.2.1.0/24, 6.6.6.0/24 + ; Section for Hosted client interface settings. This is not enabled by default. ;[kolab_hosting] ; @@ -221,91 +328,4 @@ [example.org] default_quota = 1048576 primary_mail = %(givenname)s.%(surname)s@%(domain)s -secondary_mail = { - 0: { - "{0}.{1}@{2}": "format('%(givenname)s'[0:1].capitalize(), '%(surname)s', '%(domain)s')" - }, - 1: { - "{0}@{1}": "format('%(uid)s', '%(domain)s')" - }, - 2: { - "{0}@{1}": "format('%(givenname)s.%(surname)s', '%(domain)s')" - } - } -autocreate_folders = { - 'Archive': { - 'quota': 0 - }, - 'Calendar': { - 'annotations': { - '/private/vendor/kolab/folder-type': "event.default", - '/shared/vendor/kolab/folder-type': "event", - }, - }, - 'Calendar/Personal Calendar': { - 'annotations': { - '/shared/vendor/kolab/folder-type': "event", - }, - }, - 'Configuration': { - 'annotations': { - '/private/vendor/kolab/folder-type': "configuration.default", - '/shared/vendor/kolab/folder-type': "configuration.default", - }, - }, - 'Contacts': { - 'annotations': { - '/private/vendor/kolab/folder-type': "contact.default", - '/shared/vendor/kolab/folder-type': "contact", - }, - }, - 'Contacts/Personal Contacts': { - 'annotations': { - '/shared/vendor/kolab/folder-type': "contact", - }, - }, - 'Drafts': { - 'annotations': { - '/private/vendor/kolab/folder-type': "mail.drafts", - }, - }, - 'Files': { - 'annotations': { - '/private/vendor/kolab/folder-type': "file.default", - }, - }, - 'Journal': { - 'annotations': { - '/private/vendor/kolab/folder-type': "journal.default", - '/shared/vendor/kolab/folder-type': "journal", - }, - }, - 'Notes': { - 'annotations': {
View file
pykolab-0.6.8.tar.gz/configure.ac -> pykolab-0.6.9.tar.gz/configure.ac
Changed
@@ -1,9 +1,9 @@ -AC_INIT([pykolab], 0.6.8) +AC_INIT([pykolab], 0.6.9) AC_SUBST([RELEASE], 1) AC_CONFIG_SRCDIR(pykolab/constants.py.in) -ALL_LINGUAS="de es fr nl" +ALL_LINGUAS="ach af af_ZA ak de de_DE es fr nl" AM_INIT_AUTOMAKE AM_MAINTAINER_MODE
View file
pykolab-0.6.8.tar.gz/po/POTFILES.in -> pykolab-0.6.9.tar.gz/po/POTFILES.in
Changed
@@ -18,40 +18,62 @@ kolab/__init__.py kolab.py pykolab/auth/__init__.py +pykolab/auth/ldap/auth_cache.py pykolab/auth/ldap/cache.py pykolab/auth/ldap/__init__.py pykolab/auth/ldap/syncrepl.py pykolab/base.py +pykolab/cli/cmd_acl_cleanup.py +pykolab/cli/cmd_add_alias.py pykolab/cli/cmd_add_domain.py +pykolab/cli/cmd_add_user.py pykolab/cli/cmd_add_user_subscription.py +pykolab/cli/cmd_count_domain_mailboxes.py pykolab/cli/cmd_create_mailbox.py +pykolab/cli/cmd_delete_domain.py pykolab/cli/cmd_delete_mailbox_acl.py pykolab/cli/cmd_delete_mailbox.py +pykolab/cli/cmd_delete_message.py pykolab/cli/cmd_export_mailbox.py +pykolab/cli/cmd_find_domain.py pykolab/cli/cmd_list_deleted_mailboxes.py +pykolab/cli/cmd_list_domain_mailboxes.py pykolab/cli/cmd_list_domains.py pykolab/cli/cmd_list_mailbox_acls.py pykolab/cli/cmd_list_mailboxes.py pykolab/cli/cmd_list_mailbox_metadata.py +pykolab/cli/cmd_list_messages.py pykolab/cli/cmd_list_quota.py pykolab/cli/cmd_list_user_subscriptions.py +pykolab/cli/cmd_mailbox_cleanup.py pykolab/cli/cmd_remove_mailaddress.py pykolab/cli/cmd_remove_user_subscription.py pykolab/cli/cmd_rename_mailbox.py +pykolab/cli/cmd_server_info.py pykolab/cli/cmd_set_language.py pykolab/cli/cmd_set_mailbox_acl.py pykolab/cli/cmd_set_mailbox_metadata.py pykolab/cli/cmd_set_mail.py +pykolab/cli/cmd_sync_mailhost_attrs.py pykolab/cli/cmd_sync.py pykolab/cli/cmd_transfer_mailbox.py pykolab/cli/cmd_undelete_mailbox.py +pykolab/cli/cmd_user_info.py pykolab/cli/commands.py pykolab/cli/__init__.py +pykolab/cli/sieve/cmd_list.py +pykolab/cli/sieve/cmd_put.py +pykolab/cli/sieve/cmd_refresh.py +pykolab/cli/sieve/cmd_test.py +pykolab/cli/sieve/__init__.py pykolab/cli/telemetry/cmd_examine_command_issue.py pykolab/cli/telemetry/cmd_examine_session.py pykolab/cli/telemetry/cmd_expire_sessions.py pykolab/cli/telemetry/cmd_list_sessions.py pykolab/cli/telemetry/__init__.py +pykolab/cli/wap/cmd_system_capabilities.py +pykolab/cli/wap/cmd_user_types_list.py +pykolab/cli/wap/__init__.py pykolab/conf/defaults.py pykolab/conf/entitlement.py pykolab/conf/__init__.py @@ -59,12 +81,14 @@ pykolab/errors.py pykolab/imap/cyrus.py pykolab/imap/__init__.py +pykolab/imap_utf7.py pykolab/__init__.py pykolab/logger.py pykolab/plugins/defaultfolders/__init__.py pykolab/plugins/dynamicquota/__init__.py pykolab/plugins/__init__.py pykolab/plugins/recipientpolicy/__init__.py +pykolab/plugins/sievemgmt/__init__.py pykolab/setup/components.py pykolab/setup/__init__.py pykolab/setup/setup_freebusy.py @@ -76,11 +100,10 @@ pykolab/setup/setup_php.py pykolab/setup/setup_roundcube.py pykolab/setup/setup_syncroton.py -pykolab/setup/setup_zpush.py pykolab/telemetry.py pykolab/translate.py +pykolab/translit.py pykolab/utils.py -pykolab/wap_client/connect.py pykolab/wap_client/__init__.py pykolab/xml/attendee.py pykolab/xml/contact.py @@ -92,6 +115,9 @@ saslauthd.py setup-kolab.py tests/functional/__init__.py +tests/functional/purge_imap.py +tests/functional/purge_users.py +tests/functional/synchronize.py tests/functional/test_auth/__init__.py tests/functional/test_auth/test_001_ldap.py tests/functional/test_auth/test_002_sql.py @@ -99,10 +125,22 @@ tests/functional/test_auth/test_004_saslauthd.py tests/functional/test_kolabd/__init__.py tests/functional/test_kolabd/test_001_user_sync.py +tests/functional/test_kolabd/test_002_user_rename.py +tests/functional/test_kolabd/test_003_two_johns.py tests/functional/test_postfix/__init__.py +tests/functional/test_wallace/__init__.py +tests/functional/test_wallace/test_001_user_add.py +tests/functional/test_wallace/test_002_footer.py +tests/functional/test_wallace/test_003_nonascii_subject.py +tests/functional/test_wallace/test_004_nonascii_addresses.py tests/functional/test_wap_client/__init__.py tests/functional/test_wap_client/test_001_connect.py tests/functional/test_wap_client/test_002_user_add.py +tests/functional/test_wap_client/test_003_user_add_fr_FR.py +tests/functional/test_wap_client/test_004_user_add_es_ES.py +tests/functional/test_wap_client/test_005_user_add_de_CH.py +tests/functional/test_wap_client/test_006_form_value_select_options.py +tests/functional/test_wap_client/test_007_policy_uid.py tests/functional/user_add.py tests/__init__.py tests/unit/__init__.py @@ -112,8 +150,16 @@ tests/unit/test-003-event.py tests/unit/test-004-icalendar.py tests/unit/test-005-timezone.py +tests/unit/test-006-ldap_psearch.py +tests/unit/test-007-ldap_syncrepl.py +tests/unit/test-008-sievelib.py +tests/unit/test-009-parse_ldap_uri.py +tests/unit/test-010-transliterate.py test-wallace.py +ucs/kolab_sieve.py +ucs/listener.py wallace/__init__.py +wallace/module_footer.py wallace/module_optout.py wallace/module_resources.py wallace/modules.py
View file
pykolab-0.6.8.tar.gz/po/POTFILES.skip -> pykolab-0.6.9.tar.gz/po/POTFILES.skip
Changed
@@ -1,7 +1,9 @@ +activate_domain.py bin/test_parse_policy.py bin/test-read-input.py bonnie/__init__.py bonnie.py +demo.py kwap/data/templates/home/kanarip/devel/src/kolab/pykolab.git/kwap/kwap/templates/about.mak.py kwap/data/templates/home/kanarip/devel/src/kolab/pykolab.git/kwap/kwap/templates/authentication.mak.py kwap/data/templates/home/kanarip/devel/src/kolab/pykolab.git/kwap/kwap/templates/data.mak.py @@ -42,11 +44,14 @@ kwap/kwap/websetup/__init__.py kwap/kwap/websetup/schema.py kwap/setup.py +munich_demo.py play/anon-imap/anon-imap.py play/augeas-insert.py play/base_64_decode.py +play/brepr_vs_unicode.py play/cleanup_acls.py play/cliconfmgmt.py +play/conf-add-file-to-service.py play/conf-add-setting.py play/conf-list-config-files.py play/confmgmt/augeas.py @@ -76,12 +81,14 @@ play/migrate_uid_to_mail_prod.py play/migrate_uid_to_mail.py play/noheaderini.py +play/not-an-itip-message.py play/openssl/license.py play/parallel_persistent_searches.py play/parse_policy.py play/persistent_search_kolab_23.py play/persistent_search.py play/pooling.py +play/purge_users_roundcube.py play/push_contacts.py play/pygpgme/sign.py play/pygpgme/verify.py @@ -112,10 +119,12 @@ play/test_page_control.py play/test-parse_ldap_uri.py play/test.py +play/test_sk.ks.c.py play/test_socket_client.py play/test_socket.py play/test_submission.py play/test_undelete.py +play/translit.py play/unicode_test.py play/unicode-to-ascii.py play/wap/domain.info.py @@ -159,7 +168,14 @@ pykolab/auth/ldap/rhds/__init__.py pykolab/auth/ldap/sunds/__init__.py pykolab/auth/sql/__init__.py +pykolab/cli/cmd_examine_message.py +pykolab/cli/cmd_list_contacts.py +pykolab/cli/cmd_list_events.py +pykolab/cli/cmd_rebalance_mailboxes.py +pykolab/cli/cmd_role_info.py pykolab/cli/cmd_set_quota.py +pykolab/cli/cmd_summarize_quota_allocation.py +pykolab/confmgmt/augeas.py pykolab/conf/parser.py pykolab/constants.py pykolab/ical/itip.py @@ -167,10 +183,22 @@ pykolab/plugins/roundcube/__init__.py pykolab/wap_client.old/__init__.py pykolab/xml/task.py +sievelib-0.5/setup.py +sievelib-0.5/sievelib/commands.py +sievelib-0.5/sievelib/digest_md5.py +sievelib-0.5/sievelib/factory.py +sievelib-0.5/sievelib/__init__.py +sievelib-0.5/sievelib/managesieve.py +sievelib-0.5/sievelib/parser.py testaci.py +test-ask_menu.py test-search.py test-send-mail-kolab_smtp_access_policy.py test-send-mail-kolab_smtp_access_policy-relay.py +tests/functional/test_kolabd/test_004_many_aliases.py +test-subscribe-address-to-ml.py +tests/unit/test-011-base64_encoded_contact.py +tests/unit/test-012-utf7.py test-urllib.py test-wallace-loadmsg.py test-wallace-resource.py @@ -183,3 +211,4 @@ wallace/future_module_freebusy.py wallace/future_module_googletranslate.py wallace/future_module_statistics.py +wap_raw.py
View file
pykolab-0.6.9.tar.gz/po/ach.po
Added
@@ -0,0 +1,2409 @@ +# SOME DESCRIPTIVE TITLE. +# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER +# This file is distributed under the same license as the PACKAGE package. +# +# Translators: +msgid "" +msgstr "" +"Project-Id-Version: pykolab\n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2013-01-12 11:17+0000\n" +"PO-Revision-Date: 2012-08-11 13:02+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: LANGUAGE <LL@li.org>\n" +"Language: ach\n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" +"Plural-Forms: nplurals=2; plural=(n > 1)\n" + +#: ../bin/kolab_smtp_access_policy.py:206 +#, python-format +msgid "Adding policy request to instance %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:446 +msgid "Unauthorized access not allowed" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:475 +#: ../bin/kolab_smtp_access_policy.py:657 +msgid "Could not find recipient" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:494 +#: ../bin/kolab_smtp_access_policy.py:594 +#, python-format +msgid "Could not find envelope sender user %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:537 +#, python-format +msgid "Obtained authenticated user details for %r: %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:616 +#, python-format +msgid "%s is unauthorized to send on behalf of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:626 +#, python-format +msgid "User %s attempted to use envelope sender address %s " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:681 +#: ../bin/kolab_smtp_access_policy.py:692 +#, python-format +msgid "Found user %s to be a delegate user of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:716 +#, python-format +msgid "Verifying authenticated sender '%(sender)s' with " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:721 +#, python-format +msgid "Verifying unauthenticated sender '%(sender)s' " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:738 +#, python-format +msgid "Reproducing verify_recipient(%s, %s) from " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:760 +#, python-format +msgid "Using authentication domain %s instead of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:770 +#, python-format +msgid "Domain %s is a primary domain" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:778 +#, python-format +msgid "Checking the recipient for domain %s that is not " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:794 +msgid "This recipient address is related to multiple " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:803 +#, python-format +msgid "Recipient address %r not found. Allowing since " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:831 +msgid "Invalid recipient" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:842 +msgid "Could not find this user, accepting" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:905 +#: ../bin/kolab_smtp_access_policy.py:958 +#, python-format +msgid "Sender %s is not allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:945 +#, python-format +msgid "Reproducing verify_sender(%r) from cache, " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:974 +msgid "Sender uses unauthorized envelope sender address" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:991 +msgid "Could not verify sender" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:998 +msgid "Verifying whether sender is allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1012 +#, python-format +msgid "Result is %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1017 +msgid "No recipient policy restrictions exist for this sender" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1026 +msgid "Found a recipient policy to apply for this sender." +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1041 +#, python-format +msgid "Sender %s not allowed to send to recipient " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1063 +msgid "Cleaning up the cache" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1085 +msgid "" +"The 'uri' setting in the kolab_smtp_access_policy section is soon going to " +"be deprecated in favor of 'cache_uri'" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1101 +#, python-format +msgid "Operational Error in caching: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1152 +#, python-format +msgid "Caching the policy result with timestamp %d" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1229 +#, python-format +msgid "Returning action DEFER_IF_PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1234 +#, python-format +msgid "Returning action DUNNO: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1239 +#, python-format +msgid "Returning action HOLD: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1244 +#, python-format +msgid "Returning action PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1249 +#, python-format +msgid "Returning action REJECT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1298 +msgid "Starting to loop for new request" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1305 +msgid "Timeout for policy request reading exceeded"
View file
pykolab-0.6.9.tar.gz/po/af.po
Added
@@ -0,0 +1,2409 @@ +# SOME DESCRIPTIVE TITLE. +# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER +# This file is distributed under the same license as the PACKAGE package. +# +# Translators: +msgid "" +msgstr "" +"Project-Id-Version: pykolab\n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2013-01-12 11:17+0000\n" +"PO-Revision-Date: 2012-08-11 13:02+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: LANGUAGE <LL@li.org>\n" +"Language: af\n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" +"Plural-Forms: nplurals=2; plural=(n != 1)\n" + +#: ../bin/kolab_smtp_access_policy.py:206 +#, python-format +msgid "Adding policy request to instance %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:446 +msgid "Unauthorized access not allowed" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:475 +#: ../bin/kolab_smtp_access_policy.py:657 +msgid "Could not find recipient" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:494 +#: ../bin/kolab_smtp_access_policy.py:594 +#, python-format +msgid "Could not find envelope sender user %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:537 +#, python-format +msgid "Obtained authenticated user details for %r: %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:616 +#, python-format +msgid "%s is unauthorized to send on behalf of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:626 +#, python-format +msgid "User %s attempted to use envelope sender address %s " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:681 +#: ../bin/kolab_smtp_access_policy.py:692 +#, python-format +msgid "Found user %s to be a delegate user of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:716 +#, python-format +msgid "Verifying authenticated sender '%(sender)s' with " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:721 +#, python-format +msgid "Verifying unauthenticated sender '%(sender)s' " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:738 +#, python-format +msgid "Reproducing verify_recipient(%s, %s) from " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:760 +#, python-format +msgid "Using authentication domain %s instead of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:770 +#, python-format +msgid "Domain %s is a primary domain" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:778 +#, python-format +msgid "Checking the recipient for domain %s that is not " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:794 +msgid "This recipient address is related to multiple " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:803 +#, python-format +msgid "Recipient address %r not found. Allowing since " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:831 +msgid "Invalid recipient" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:842 +msgid "Could not find this user, accepting" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:905 +#: ../bin/kolab_smtp_access_policy.py:958 +#, python-format +msgid "Sender %s is not allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:945 +#, python-format +msgid "Reproducing verify_sender(%r) from cache, " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:974 +msgid "Sender uses unauthorized envelope sender address" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:991 +msgid "Could not verify sender" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:998 +msgid "Verifying whether sender is allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1012 +#, python-format +msgid "Result is %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1017 +msgid "No recipient policy restrictions exist for this sender" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1026 +msgid "Found a recipient policy to apply for this sender." +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1041 +#, python-format +msgid "Sender %s not allowed to send to recipient " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1063 +msgid "Cleaning up the cache" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1085 +msgid "" +"The 'uri' setting in the kolab_smtp_access_policy section is soon going to " +"be deprecated in favor of 'cache_uri'" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1101 +#, python-format +msgid "Operational Error in caching: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1152 +#, python-format +msgid "Caching the policy result with timestamp %d" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1229 +#, python-format +msgid "Returning action DEFER_IF_PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1234 +#, python-format +msgid "Returning action DUNNO: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1239 +#, python-format +msgid "Returning action HOLD: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1244 +#, python-format +msgid "Returning action PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1249 +#, python-format +msgid "Returning action REJECT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1298 +msgid "Starting to loop for new request" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1305 +msgid "Timeout for policy request reading exceeded"
View file
pykolab-0.6.9.tar.gz/po/af_ZA.po
Added
@@ -0,0 +1,2409 @@ +# SOME DESCRIPTIVE TITLE. +# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER +# This file is distributed under the same license as the PACKAGE package. +# +# Translators: +msgid "" +msgstr "" +"Project-Id-Version: pykolab\n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2013-01-12 11:17+0000\n" +"PO-Revision-Date: 2012-08-11 13:02+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: LANGUAGE <LL@li.org>\n" +"Language: af_ZA\n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" +"Plural-Forms: nplurals=2; plural=(n != 1)\n" + +#: ../bin/kolab_smtp_access_policy.py:206 +#, python-format +msgid "Adding policy request to instance %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:446 +msgid "Unauthorized access not allowed" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:475 +#: ../bin/kolab_smtp_access_policy.py:657 +msgid "Could not find recipient" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:494 +#: ../bin/kolab_smtp_access_policy.py:594 +#, python-format +msgid "Could not find envelope sender user %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:537 +#, python-format +msgid "Obtained authenticated user details for %r: %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:616 +#, python-format +msgid "%s is unauthorized to send on behalf of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:626 +#, python-format +msgid "User %s attempted to use envelope sender address %s " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:681 +#: ../bin/kolab_smtp_access_policy.py:692 +#, python-format +msgid "Found user %s to be a delegate user of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:716 +#, python-format +msgid "Verifying authenticated sender '%(sender)s' with " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:721 +#, python-format +msgid "Verifying unauthenticated sender '%(sender)s' " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:738 +#, python-format +msgid "Reproducing verify_recipient(%s, %s) from " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:760 +#, python-format +msgid "Using authentication domain %s instead of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:770 +#, python-format +msgid "Domain %s is a primary domain" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:778 +#, python-format +msgid "Checking the recipient for domain %s that is not " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:794 +msgid "This recipient address is related to multiple " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:803 +#, python-format +msgid "Recipient address %r not found. Allowing since " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:831 +msgid "Invalid recipient" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:842 +msgid "Could not find this user, accepting" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:905 +#: ../bin/kolab_smtp_access_policy.py:958 +#, python-format +msgid "Sender %s is not allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:945 +#, python-format +msgid "Reproducing verify_sender(%r) from cache, " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:974 +msgid "Sender uses unauthorized envelope sender address" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:991 +msgid "Could not verify sender" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:998 +msgid "Verifying whether sender is allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1012 +#, python-format +msgid "Result is %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1017 +msgid "No recipient policy restrictions exist for this sender" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1026 +msgid "Found a recipient policy to apply for this sender." +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1041 +#, python-format +msgid "Sender %s not allowed to send to recipient " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1063 +msgid "Cleaning up the cache" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1085 +msgid "" +"The 'uri' setting in the kolab_smtp_access_policy section is soon going to " +"be deprecated in favor of 'cache_uri'" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1101 +#, python-format +msgid "Operational Error in caching: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1152 +#, python-format +msgid "Caching the policy result with timestamp %d" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1229 +#, python-format +msgid "Returning action DEFER_IF_PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1234 +#, python-format +msgid "Returning action DUNNO: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1239 +#, python-format +msgid "Returning action HOLD: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1244 +#, python-format +msgid "Returning action PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1249 +#, python-format +msgid "Returning action REJECT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1298 +msgid "Starting to loop for new request" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1305 +msgid "Timeout for policy request reading exceeded"
View file
pykolab-0.6.9.tar.gz/po/ak.po
Added
@@ -0,0 +1,2409 @@ +# SOME DESCRIPTIVE TITLE. +# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER +# This file is distributed under the same license as the PACKAGE package. +# +# Translators: +msgid "" +msgstr "" +"Project-Id-Version: pykolab\n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2013-01-12 11:17+0000\n" +"PO-Revision-Date: 2012-08-11 13:02+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: LANGUAGE <LL@li.org>\n" +"Language: ak\n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" +"Plural-Forms: nplurals=2; plural=n > 1\n" + +#: ../bin/kolab_smtp_access_policy.py:206 +#, python-format +msgid "Adding policy request to instance %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:446 +msgid "Unauthorized access not allowed" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:475 +#: ../bin/kolab_smtp_access_policy.py:657 +msgid "Could not find recipient" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:494 +#: ../bin/kolab_smtp_access_policy.py:594 +#, python-format +msgid "Could not find envelope sender user %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:537 +#, python-format +msgid "Obtained authenticated user details for %r: %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:616 +#, python-format +msgid "%s is unauthorized to send on behalf of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:626 +#, python-format +msgid "User %s attempted to use envelope sender address %s " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:681 +#: ../bin/kolab_smtp_access_policy.py:692 +#, python-format +msgid "Found user %s to be a delegate user of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:716 +#, python-format +msgid "Verifying authenticated sender '%(sender)s' with " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:721 +#, python-format +msgid "Verifying unauthenticated sender '%(sender)s' " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:738 +#, python-format +msgid "Reproducing verify_recipient(%s, %s) from " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:760 +#, python-format +msgid "Using authentication domain %s instead of %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:770 +#, python-format +msgid "Domain %s is a primary domain" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:778 +#, python-format +msgid "Checking the recipient for domain %s that is not " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:794 +msgid "This recipient address is related to multiple " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:803 +#, python-format +msgid "Recipient address %r not found. Allowing since " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:831 +msgid "Invalid recipient" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:842 +msgid "Could not find this user, accepting" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:905 +#: ../bin/kolab_smtp_access_policy.py:958 +#, python-format +msgid "Sender %s is not allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:945 +#, python-format +msgid "Reproducing verify_sender(%r) from cache, " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:974 +msgid "Sender uses unauthorized envelope sender address" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:991 +msgid "Could not verify sender" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:998 +msgid "Verifying whether sender is allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1012 +#, python-format +msgid "Result is %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1017 +msgid "No recipient policy restrictions exist for this sender" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1026 +msgid "Found a recipient policy to apply for this sender." +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1041 +#, python-format +msgid "Sender %s not allowed to send to recipient " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1063 +msgid "Cleaning up the cache" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1085 +msgid "" +"The 'uri' setting in the kolab_smtp_access_policy section is soon going to " +"be deprecated in favor of 'cache_uri'" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1101 +#, python-format +msgid "Operational Error in caching: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1152 +#, python-format +msgid "Caching the policy result with timestamp %d" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1229 +#, python-format +msgid "Returning action DEFER_IF_PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1234 +#, python-format +msgid "Returning action DUNNO: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1239 +#, python-format +msgid "Returning action HOLD: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1244 +#, python-format +msgid "Returning action PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1249 +#, python-format +msgid "Returning action REJECT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1298 +msgid "Starting to loop for new request" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1305 +msgid "Timeout for policy request reading exceeded"
View file
pykolab-0.6.9.tar.gz/po/de_DE.po
Added
@@ -0,0 +1,2412 @@ +# SOME DESCRIPTIVE TITLE. +# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER +# This file is distributed under the same license as the PACKAGE package. +# +# Translators: +# <grote@kolabsys.com>, 2012. +msgid "" +msgstr "" +"Project-Id-Version: Kolab Groupware Solution\n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2013-01-12 11:17+0000\n" +"PO-Revision-Date: 2012-08-14 11:13+0000\n" +"Last-Translator: Jeroen van Meeuwen <vanmeeuwen@kolabsys.com>\n" +"Language-Team: German (Germany) (http://www.transifex.com/projects/p/kolab/" +"language/de_DE/)\n" +"Language: de_DE\n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" +"Plural-Forms: nplurals=2; plural=(n != 1)\n" + +#: ../bin/kolab_smtp_access_policy.py:206 +#, python-format +msgid "Adding policy request to instance %s" +msgstr "Füge Richtlinien-Anfrage zu Instanz %s hinzu" + +#: ../bin/kolab_smtp_access_policy.py:446 +msgid "Unauthorized access not allowed" +msgstr "Unberechtigter Zugriff nicht erlaubt" + +#: ../bin/kolab_smtp_access_policy.py:475 +#: ../bin/kolab_smtp_access_policy.py:657 +msgid "Could not find recipient" +msgstr "Konnte den Empfänger nicht finden" + +#: ../bin/kolab_smtp_access_policy.py:494 +#: ../bin/kolab_smtp_access_policy.py:594 +#, python-format +msgid "Could not find envelope sender user %s" +msgstr "Konnte den Absender-Umschlag für den Benutzer %s nicht finden" + +#: ../bin/kolab_smtp_access_policy.py:537 +#, python-format +msgid "Obtained authenticated user details for %r: %r" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:616 +#, python-format +msgid "%s is unauthorized to send on behalf of %s" +msgstr "Benutzer %s ist nicht berechtigt als Benutzer %s zu senden" + +#: ../bin/kolab_smtp_access_policy.py:626 +#, python-format +msgid "User %s attempted to use envelope sender address %s " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:681 +#: ../bin/kolab_smtp_access_policy.py:692 +#, python-format +msgid "Found user %s to be a delegate user of %s" +msgstr "Benutzer %s ist ein delegierter Benutzer von %s" + +#: ../bin/kolab_smtp_access_policy.py:716 +#, python-format +msgid "Verifying authenticated sender '%(sender)s' with " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:721 +#, python-format +msgid "Verifying unauthenticated sender '%(sender)s' " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:738 +#, python-format +msgid "Reproducing verify_recipient(%s, %s) from " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:760 +#, python-format +msgid "Using authentication domain %s instead of %s" +msgstr "Benutze Authentisierungsdomain %s anstelle von %s" + +#: ../bin/kolab_smtp_access_policy.py:770 +#, python-format +msgid "Domain %s is a primary domain" +msgstr "Die Domain %s ist die primäre Domain" + +#: ../bin/kolab_smtp_access_policy.py:778 +#, python-format +msgid "Checking the recipient for domain %s that is not " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:794 +msgid "This recipient address is related to multiple " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:803 +#, python-format +msgid "Recipient address %r not found. Allowing since " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:831 +msgid "Invalid recipient" +msgstr "Ungültiger Empfänger" + +#: ../bin/kolab_smtp_access_policy.py:842 +msgid "Could not find this user, accepting" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:905 +#: ../bin/kolab_smtp_access_policy.py:958 +#, python-format +msgid "Sender %s is not allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:945 +#, python-format +msgid "Reproducing verify_sender(%r) from cache, " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:974 +msgid "Sender uses unauthorized envelope sender address" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:991 +msgid "Could not verify sender" +msgstr "Konnte den Absender nicht verifizieren" + +#: ../bin/kolab_smtp_access_policy.py:998 +msgid "Verifying whether sender is allowed to send to " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1012 +#, python-format +msgid "Result is %r" +msgstr "Das Ergebnis ist %r" + +#: ../bin/kolab_smtp_access_policy.py:1017 +msgid "No recipient policy restrictions exist for this sender" +msgstr "Es existiert keine Empfängerrichtlinie für diesen Absender" + +#: ../bin/kolab_smtp_access_policy.py:1026 +msgid "Found a recipient policy to apply for this sender." +msgstr "Empfänger-Richtlinie für diesen Benutzer gefunden" + +#: ../bin/kolab_smtp_access_policy.py:1041 +#, python-format +msgid "Sender %s not allowed to send to recipient " +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1063 +msgid "Cleaning up the cache" +msgstr "Aufräumen des Cache" + +#: ../bin/kolab_smtp_access_policy.py:1085 +msgid "" +"The 'uri' setting in the kolab_smtp_access_policy section is soon going to " +"be deprecated in favor of 'cache_uri'" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1101 +#, python-format +msgid "Operational Error in caching: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1152 +#, python-format +msgid "Caching the policy result with timestamp %d" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1229 +#, python-format +msgid "Returning action DEFER_IF_PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1234 +#, python-format +msgid "Returning action DUNNO: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1239 +#, python-format +msgid "Returning action HOLD: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1244 +#, python-format +msgid "Returning action PERMIT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1249 +#, python-format +msgid "Returning action REJECT: %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1298 +msgid "Starting to loop for new request" +msgstr "Starte Schleife für neue Anfrage" +
View file
pykolab-0.6.8.tar.gz/po/pykolab.pot -> pykolab-0.6.9.tar.gz/po/pykolab.pot
Changed
@@ -8,7 +8,7 @@ msgstr "" "Project-Id-Version: PACKAGE VERSION\n" "Report-Msgid-Bugs-To: \n" -"POT-Creation-Date: 2012-08-14 12:22+0100\n" +"POT-Creation-Date: 2013-11-21 16:03+0100\n" "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: LANGUAGE <LL@li.org>\n" @@ -17,255 +17,278 @@ "Content-Type: text/plain; charset=CHARSET\n" "Content-Transfer-Encoding: 8bit\n" -#: ../bin/kolab_smtp_access_policy.py:206 +#: ../bin/kolab_smtp_access_policy.py:209 #, python-format msgid "Adding policy request to instance %s" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:446 +#: ../bin/kolab_smtp_access_policy.py:479 msgid "Unauthorized access not allowed" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:467 -#: ../bin/kolab_smtp_access_policy.py:657 +#: ../bin/kolab_smtp_access_policy.py:508 +#: ../bin/kolab_smtp_access_policy.py:689 msgid "Could not find recipient" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:486 -#: ../bin/kolab_smtp_access_policy.py:586 +#: ../bin/kolab_smtp_access_policy.py:527 #, python-format -msgid "Could not find envelope sender user %s" +msgid "Could not find envelope sender user %s (511)" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:529 +#: ../bin/kolab_smtp_access_policy.py:570 #, python-format msgid "Obtained authenticated user details for %r: %r" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:608 +#: ../bin/kolab_smtp_access_policy.py:627 +#, python-format +msgid "Could not find envelope sender user %s" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:649 #, python-format msgid "%s is unauthorized to send on behalf of %s" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:618 +#: ../bin/kolab_smtp_access_policy.py:659 #, python-format msgid "" "User %s attempted to use envelope sender address %s without authorization" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:681 -#: ../bin/kolab_smtp_access_policy.py:692 +#: ../bin/kolab_smtp_access_policy.py:713 +#: ../bin/kolab_smtp_access_policy.py:724 #, python-format msgid "Found user %s to be a delegate user of %s" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:716 +#: ../bin/kolab_smtp_access_policy.py:748 #, python-format msgid "" "Verifying authenticated sender '%(sender)s' with sasl_username " "'%(sasl_username)s' for recipient '%(recipient)s'" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:719 +#: ../bin/kolab_smtp_access_policy.py:751 #, python-format msgid "" "Verifying unauthenticated sender '%(sender)s' for recipient '%(recipient)s'" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:735 +#: ../bin/kolab_smtp_access_policy.py:767 #, python-format msgid "Reproducing verify_recipient(%s, %s) from cache" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:753 +#: ../bin/kolab_smtp_access_policy.py:804 #, python-format msgid "Using authentication domain %s instead of %s" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:763 +#: ../bin/kolab_smtp_access_policy.py:814 #, python-format msgid "Domain %s is a primary domain" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:771 +#: ../bin/kolab_smtp_access_policy.py:822 #, python-format msgid "" "Checking the recipient for domain %s that is not ours. This is probably a " "configuration error." msgstr "" -#: ../bin/kolab_smtp_access_policy.py:786 +#: ../bin/kolab_smtp_access_policy.py:837 msgid "" "This recipient address is related to multiple object entries and the SMTP " "Access Policy can therefore not restrict message flow" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:793 +#: ../bin/kolab_smtp_access_policy.py:854 #, python-format msgid "" "Recipient address %r not found. Allowing since the MTA was configured to " "accept the recipient." msgstr "" -#: ../bin/kolab_smtp_access_policy.py:820 +#: ../bin/kolab_smtp_access_policy.py:890 msgid "Invalid recipient" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:831 +#: ../bin/kolab_smtp_access_policy.py:901 msgid "Could not find this user, accepting" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:894 -#: ../bin/kolab_smtp_access_policy.py:945 +#: ../bin/kolab_smtp_access_policy.py:974 +#: ../bin/kolab_smtp_access_policy.py:1050 #, python-format msgid "Sender %s is not allowed to send to recipient %s" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:933 +#: ../bin/kolab_smtp_access_policy.py:1038 #, python-format msgid "Reproducing verify_sender(%r) from cache" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:960 +#: ../bin/kolab_smtp_access_policy.py:1055 +msgid "Unverifiable sender." +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1060 +msgid "Sender is not using an alias" +msgstr "" + +#: ../bin/kolab_smtp_access_policy.py:1068 msgid "Sender uses unauthorized envelope sender address" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:977 +#: ../bin/kolab_smtp_access_policy.py:1085 msgid "Could not verify sender" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:984 +#: ../bin/kolab_smtp_access_policy.py:1092 msgid "" "Verifying whether sender is allowed to send to recipient using sender policy" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:997 +#: ../bin/kolab_smtp_access_policy.py:1105 #, python-format msgid "Result is %r" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:1002 +#: ../bin/kolab_smtp_access_policy.py:1110 msgid "No recipient policy restrictions exist for this sender" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:1011 +#: ../bin/kolab_smtp_access_policy.py:1119 msgid "Found a recipient policy to apply for this sender." msgstr "" -#: ../bin/kolab_smtp_access_policy.py:1026 +#: ../bin/kolab_smtp_access_policy.py:1134 #, python-format msgid "Sender %s not allowed to send to recipient %s" msgstr "" -#: ../bin/kolab_smtp_access_policy.py:1056 +#: ../bin/kolab_smtp_access_policy.py:1155 msgid "Cleaning up the cache"
View file
pykolab-0.6.8.tar.gz/pykolab/auth/__init__.py -> pykolab-0.6.9.tar.gz/pykolab/auth/__init__.py
Changed
@@ -241,9 +241,9 @@ else: self.domains = {} for primary, secondaries in domains: - self.domains[primary] = primary + self.domains[primary.lower()] = primary.lower() for secondary in secondaries: - self.domains[secondary] = primary + self.domains[secondary.lower()] = primary.lower() return self.domains
View file
pykolab-0.6.8.tar.gz/pykolab/auth/ldap/__init__.py -> pykolab-0.6.9.tar.gz/pykolab/auth/ldap/__init__.py
Changed
@@ -2099,10 +2099,10 @@ # TODO: Where we use associateddomain is actually configurable if type(domain_attrs[dna]) == list: - primary_domain = domain_attrs[dna].pop(0) - secondary_domains = domain_attrs[dna] + primary_domain = domain_attrs[dna].pop(0).lower() + secondary_domains = [x.lower() for x in domain_attrs[dna]] else: - primary_domain = domain_attrs[dna] + primary_domain = domain_attrs[dna].lower() domains.append((primary_domain,secondary_domains))
View file
pykolab-0.6.9.tar.gz/pykolab/cli/cmd_add_alias.py
Added
@@ -0,0 +1,129 @@ +# -*- coding: utf-8 -*- +# Copyright 2010-2013 Kolab Systems AG (http://www.kolabsys.com) +# +# Jeroen van Meeuwen (Kolab Systems) <vanmeeuwen a kolabsys.com> +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 3 or, at your option, any later version +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Library General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. +# + +import sys + +import commands + +import pykolab + +from pykolab.auth import Auth +from pykolab.translate import _ + +log = pykolab.getLogger('pykolab.cli') +conf = pykolab.getConf() + +def __init__(): + commands.register('add_alias', execute, description="Add alias.") + +def execute(*args, **kw): + + try: + primary_rcpt_address = conf.cli_args.pop(0) + try: + secondary_rcpt_address = conf.cli_args.pop(0) + except: + print >> sys.stderr, _("Specify the (new) alias address") + sys.exit(1) + except: + print >> sys.stderr, _("Specify the existing recipient address") + sys.exit(1) + + if len(primary_rcpt_address.split('@')) > 1: + primary_rcpt_domain = primary_rcpt_address.split('@')[-1] + else: + primary_rcpt_domain = conf.get('kolab', 'primary_domain') + + auth = Auth(domain=primary_rcpt_domain) + + domains = auth.list_domains() + + #print domains + + if len(secondary_rcpt_address.split('@')) > 1: + secondary_rcpt_domain = secondary_rcpt_address.split('@')[-1] + else: + secondary_rcpt_domain = conf.get('kolab', 'primary_domain') + + # Check if either is in fact a domain + if not primary_rcpt_domain.lower() in domains.keys(): + print >> sys.stderr, _("Domain %r is not a local domain") % (primary_rcpt_domain) + sys.exit(1) + + if not secondary_rcpt_domain.lower() in domains.keys(): + print >> sys.stderr, _("Domain %r is not a local domain") % (secondary_rcpt_domain) + sys.exit(1) + + if not primary_rcpt_domain == secondary_rcpt_domain: + if not domains[primary_rcpt_domain] == domains[secondary_rcpt_domain]: + print >> sys.stderr, _("Primary and secondary domain do not have the same parent domain") + sys.exit(1) + + primary_recipient_dn = auth.find_recipient(primary_rcpt_address) + + if primary_recipient_dn == [] or len(primary_recipient_dn) == 0: + print >> sys.stderr, _("No such recipient %r") % (primary_rcpt_address) + sys.exit(1) + + secondary_recipient_dn = auth.find_recipient(secondary_rcpt_address) + + if not secondary_recipient_dn == [] and not len(secondary_recipient_dn) == 0: + print >> sys.stderr, _("Recipient for alias %r already exists") % (secondary_rcpt_address) + sys.exit(1) + + rcpt_attrs = conf.get_list('ldap', 'mail_attributes') + + primary_rcpt_attr = rcpt_attrs[0] + + if len(rcpt_attrs) >= 2: + secondary_rcpt_attr = rcpt_attrs[1] + else: + print >> sys.stderr, _("Environment is not configured for " + \ + "users to hold secondary mail attributes") + + sys.exit(1) + + primary_recipient = auth.get_entry_attributes(primary_rcpt_domain, primary_recipient_dn, rcpt_attrs) + + if not primary_recipient.has_key(primary_rcpt_attr): + print >> sys.stderr, _("Recipient %r is not the primary recipient for address %r") % (primary_recipient, primary_rcpt_address) + sys.exit(1) + + if not primary_recipient.has_key(secondary_rcpt_attr): + auth.set_entry_attributes(primary_rcpt_domain, primary_recipient_dn, {secondary_rcpt_attr: [ secondary_rcpt_address ] }) + else: + if isinstance(primary_recipient[secondary_rcpt_attr], basestring): + new_secondary_rcpt_attrs = [ + primary_recipient[secondary_rcpt_attr], + secondary_rcpt_address + ] + + else: + new_secondary_rcpt_attrs = \ + primary_recipient[secondary_rcpt_attr] + \ + [ secondary_rcpt_address ] + + auth.set_entry_attributes( + primary_rcpt_domain, + primary_recipient_dn, + { + secondary_rcpt_attr: new_secondary_rcpt_attrs + } + ) +
View file
pykolab-0.6.8.tar.gz/pykolab/cli/cmd_list_deleted_mailboxes.py -> pykolab-0.6.9.tar.gz/pykolab/cli/cmd_list_deleted_mailboxes.py
Changed
@@ -62,10 +62,8 @@ domains = auth.list_domains() folders = [] - for primary,secondaries in domains: - folders.extend(imap.lm("DELETED/*@%s" % (primary))) - for secondary in secondaries: - folders.extend(imap.lm("DELETED/*@%s" % (secondary))) + for domain in list(set(domains.keys())): + folders.extend(imap.lm("DELETED/*@%s" % (domain))) folders.extend(imap.lm("DELETED/*"))
View file
pykolab-0.6.8.tar.gz/pykolab/cli/cmd_list_mailbox_metadata.py -> pykolab-0.6.9.tar.gz/pykolab/cli/cmd_list_mailbox_metadata.py
Changed
@@ -87,8 +87,9 @@ metadata = imap.get_metadata(folder) - for annotation in metadata[folder].keys(): - print " %-49s %s" % ( - annotation, - metadata[folder][annotation] - ) + if metadata.has_key(folder): + for annotation in metadata[folder].keys(): + print " %-49s %s" % ( + annotation, + metadata[folder][annotation] + )
View file
pykolab-0.6.8.tar.gz/pykolab/cli/cmd_undelete_mailbox.py -> pykolab-0.6.9.tar.gz/pykolab/cli/cmd_undelete_mailbox.py
Changed
@@ -30,6 +30,14 @@ def __init__(): commands.register('undelete_mailbox', execute, description=description()) +def cli_options(): + my_option_group = conf.add_cli_parser_option_group(_("CLI Options")) + my_option_group.add_option( '--dry-run', + dest = "dry_run", + action = "store_true", + default = False, + help = _("Do not actually execute, but state what would have been executed.")) + def description(*args, **kw): return _("Recover mailboxes previously deleted.")
View file
pykolab-0.6.8.tar.gz/pykolab/imap/__init__.py -> pykolab-0.6.9.tar.gz/pykolab/imap/__init__.py
Changed
@@ -427,24 +427,33 @@ if not self.domain == None: if conf.has_option(self.domain, "autocreate_folders"): - _additional_folders = conf.get_raw( - self.domain, - "autocreate_folders" - ) + _additional_folders = conf.get_raw( + self.domain, + "autocreate_folders" + ) - additional_folders = conf.plugins.exec_hook( - "create_user_folders", - kw={ - 'folder': folder_name, - 'additional_folders': _additional_folders - } - ) + elif conf.has_option('kolab', "autocreate_folders"): + _additional_folders = conf.get_raw( + 'kolab', + "autocreate_folders" + ) + else: + _additional_folders = {} + + additional_folders = conf.plugins.exec_hook( + "create_user_folders", + kw={ + 'folder': folder_name, + 'additional_folders': _additional_folders + } + ) + + if not additional_folders == None: + self.user_mailbox_create_additional_folders( + mailbox_base_name, + additional_folders + ) - if not additional_folders == None: - self.user_mailbox_create_additional_folders( - mailbox_base_name, - additional_folders - ) if conf.has_option(self.domain, "sieve_mgmt"): sieve_mgmt_enabled = conf.get(self.domain, 'sieve_mgmt') if utils.true_or_false(sieve_mgmt_enabled):
View file
pykolab-0.6.8.tar.gz/pykolab/imap/cyrus.py -> pykolab-0.6.9.tar.gz/pykolab/imap/cyrus.py
Changed
@@ -18,6 +18,7 @@ # import cyruslib +import sys import time from urlparse import urlparse @@ -323,10 +324,16 @@ target_server = self.find_mailfolder_server(target_folder) - if not target_server == self.server: - self.xfer(undelete_folder,target_server) + if hasattr(conf,'dry_run') and not conf.dry_run: + if not target_server == self.server: + self.xfer(undelete_folder,target_server) - self.rename(undelete_folder,target_folder) + self.rename(undelete_folder,target_folder) + else: + if not target_server == self.server: + print >> sys.stdout, _("Would have transfered %s from %s to %s") % (undelete_folder, self.server, target_server) + + print >> sys.stdout, _("Would have renamed %s to %s") % (undelete_folder, target_folder) def parse_mailfolder(self, mailfolder): """
View file
pykolab-0.6.8.tar.gz/pykolab/setup/setup_imap.py -> pykolab-0.6.9.tar.gz/pykolab/setup/setup_imap.py
Changed
@@ -115,14 +115,16 @@ return annotations = [ - "/vendor/horde/share-params,mailbox,string,backend,value.shared value.priv,a", + "/vendor/kolab/activesync,mailbox,string,backend,value.priv,r", "/vendor/kolab/color,mailbox,string,backend,value.shared value.priv,a", + "/vendor/kolab/displayname,mailbox,string,backend,value.shared value.priv,a", "/vendor/kolab/folder-test,mailbox,string,backend,value.shared value.priv,a", "/vendor/kolab/folder-type,mailbox,string,backend,value.shared value.priv,a", "/vendor/kolab/incidences-for,mailbox,string,backend,value.shared value.priv,a", "/vendor/kolab/pxfb-readable-for,mailbox,string,backend,value.shared value.priv,a", + "/vendor/kolab/uniqueid,mailbox,string,backend,value.shared value.priv,a", "/vendor/kolab/h-share-attr-desc,mailbox,string,backend,value.shared value.priv,a", - "/vendor/kolab/activesync,mailbox,string,backend,value.priv,r", + "/vendor/horde/share-params,mailbox,string,backend,value.shared value.priv,a", "/vendor/x-toltec/test,mailbox,string,backend,value.shared value.priv,a", ]
View file
pykolab-0.6.8.tar.gz/pykolab/setup/setup_ldap.py -> pykolab-0.6.9.tar.gz/pykolab/setup/setup_ldap.py
Changed
@@ -584,6 +584,10 @@ 'localhost.localdomain', 'localhost' ] + + # De-duplicate attribute values before attempting to insert the object (#2205) + attrs['associateddomain'] = list(set(attrs['associateddomain'])) + attrs['aci'] = '(targetattr = "*") (version 3.0;acl "Read Access for %(domain)s Users";allow (read,compare,search)(userdn = "ldap:///%(rootdn)s??sub?(objectclass=*)");)' % (_input) # Add inetdomainbasedn in case the configured root dn is not the same as the @@ -646,10 +650,11 @@ dn = _input['rootdn'] aci = [] - if not schema_error: - aci.append('(targetattr = "homePhone || preferredDeliveryMethod || jpegPhoto || postalAddress || carLicense || userPassword || mobile || displayName || description || labeledURI || homePostalAddress || postOfficeBox || registeredAddress || postalCode || photo || title || street || pager || o || l || initials || telephoneNumber || preferredLanguage || facsimileTelephoneNumber") (version 3.0;acl "Enable self write for common attributes";allow (read,compare,search,write)(userdn = "ldap:///self");)') + if schema_error: + aci.append('(targetattr = "carLicense || description || displayName || facsimileTelephoneNumber || homePhone || homePostalAddress || initials || jpegPhoto || l || labeledURI || mobile || o || pager || photo || postOfficeBox || postalAddress || postalCode || preferredDeliveryMethod || preferredLanguage || registeredAddress || roomNumber || secretary || seeAlso || st || street || telephoneNumber || telexNumber || title || userCertificate || userPassword || userSMIMECertificate || x500UniqueIdentifier") (version 3.0; acl "Enable self write for common attributes"; allow (read,compare,search,write)(userdn = "ldap:///self");)') else: - aci.append('(targetattr = "homePhone || preferredDeliveryMethod || jpegPhoto || postalAddress || carLicense || userPassword || mobile || kolabAllowSMTPRecipient || displayName || kolabDelegate || description || labeledURI || homePostalAddress || postOfficeBox || registeredAddress || postalCode || photo || title || street || kolabInvitationPolicy || pager || o || l || initials || kolabAllowSMTPSender || telephoneNumber || preferredLanguage || facsimileTelephoneNumber") (version 3.0;acl "Enable self write for common attributes";allow (read,compare,search,write)(userdn = "ldap:///self");)') + aci.append('(targetattr = "carLicense || description || displayName || facsimileTelephoneNumber || homePhone || homePostalAddress || initials || jpegPhoto || l || labeledURI || mobile || o || pager || photo || postOfficeBox || postalAddress || postalCode || preferredDeliveryMethod || preferredLanguage || registeredAddress || roomNumber || secretary || seeAlso || st || street || telephoneNumber || telexNumber || title || userCertificate || userPassword || userSMIMECertificate || x500UniqueIdentifier || kolabDelegate || kolabInvitationPolicy || kolabAllowSMTPSender") (version 3.0; acl "Enable self write for common attributes"; allow (read,compare,search,write)(userdn = "ldap:///self");)') + aci.append('(targetattr = "*") (version 3.0;acl "Directory Administrators Group";allow (all)(groupdn = "ldap:///cn=Directory Administrators,%(rootdn)s" or roledn = "ldap:///cn=kolab-admin,%(rootdn)s");)' % (_input)) aci.append('(targetattr="*")(version 3.0; acl "Configuration Administrators Group"; allow (all) groupdn="ldap:///cn=Configuration Administrators,ou=Groups,ou=TopologyManagement,o=NetscapeRoot";)')
View file
pykolab-0.6.8.tar.gz/pykolab/setup/setup_roundcube.py -> pykolab-0.6.9.tar.gz/pykolab/setup/setup_roundcube.py
Changed
@@ -94,7 +94,7 @@ 'kolab_auth.inc.php', 'kolab_files.inc.php', 'kolab_folders.inc.php', - 'kolab.inc.php', + 'libkolab.inc.php', 'managesieve.inc.php', 'owncloud.inc.php', 'password.inc.php',
View file
pykolab-0.6.8.tar.gz/pykolab/wap_client/__init__.py -> pykolab-0.6.9.tar.gz/pykolab/wap_client/__init__.py
Changed
@@ -19,6 +19,7 @@ API_HOSTNAME = "localhost" API_SCHEME = "http" API_PORT = 80 +API_SSL = False API_BASE = "/kolab-webadmin/api/" kolab_wap_url = conf.get('kolab_wap', 'api_url') @@ -28,6 +29,10 @@ else: result = None +if hasattr(result, 'scheme') and result.scheme == 'https': + API_SSL = True + API_PORT = 443 + if hasattr(result, 'hostname'): API_HOSTNAME = result.hostname @@ -41,8 +46,6 @@ conn = None -from connect import connect - def authenticate(username=None, password=None, domain=None): global session_id @@ -71,7 +74,10 @@ global conn if conn == None: - conn = httplib.HTTPConnection(API_HOSTNAME, API_PORT) + if API_SSL: + conn = httplib.HTTPSConnection(API_HOSTNAME, API_PORT) + else: + conn = httplib.HTTPConnection(API_HOSTNAME, API_PORT) conn.connect() return conn
View file
pykolab-0.6.8.tar.gz/saslauthd/__init__.py -> pykolab-0.6.9.tar.gz/saslauthd/__init__.py
Changed
@@ -30,6 +30,7 @@ import os import shutil +import sys import time import traceback @@ -86,11 +87,15 @@ conf.finalize_conf() - utils.ensure_directory( - os.path.dirname(conf.pidfile), - conf.process_username, - conf.process_groupname - ) + try: + utils.ensure_directory( + os.path.dirname(conf.pidfile), + conf.process_username, + conf.process_groupname + ) + except Exception, errmsg: + log.error(_("Could not create %r: %r") % (os.path.dirname(conf.pidfile), errmsg)) + sys.exit(1) self.thread_count = 0 @@ -167,7 +172,26 @@ s.listen(5) while 1: - (clientsocket, address) = s.accept() + max_tries = 20 + cur_tries = 0 + bound = False + while not bound: + cur_tries += 1 + try: + (clientsocket, address) = s.accept() + bound = True + except Exception, errmsg: + log.error( + _("kolab-saslauthd could not accept " + \ + "connections on socket: %r") % (errmsg) + ) + + if cur_tries >= max_tries: + log.fatal(_("Maximum tries exceeded, exiting")) + sys.exit(1) + + time.sleep(1) + received = clientsocket.recv(4096) login = []
View file
pykolab-0.6.8.tar.gz/share/templates/master.cf.tpl -> pykolab-0.6.9.tar.gz/share/templates/master.cf.tpl
Changed
@@ -105,17 +105,17 @@ -o smtpd_authorized_xforward_hosts=127.0.0.0/8 recipient_policy unix - n n - - spawn - user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-recipient + user=kolab-n argv=$kolab_sap_executable_path --verify-recipient recipient_policy_incoming unix - n n - - spawn - user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-recipient --allow-unauthenticated + user=kolab-n argv=$kolab_sap_executable_path --verify-recipient --allow-unauthenticated sender_policy unix - n n - - spawn - user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-sender + user=kolab-n argv=$kolab_sap_executable_path --verify-sender sender_policy_incoming unix - n n - - spawn - user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-sender --allow-unauthenticated + user=kolab-n argv=$kolab_sap_executable_path --verify-sender --allow-unauthenticated submission_policy unix - n n - - spawn - user=kolab-n argv=/usr/libexec/postfix/kolab_smtp_access_policy --verify-sender --verify-recipient + user=kolab-n argv=$kolab_sap_executable_path --verify-sender --verify-recipient
View file
pykolab-0.6.9.tar.gz/share/templates/roundcubemail/libkolab.inc.php.tpl
Added
@@ -0,0 +1,16 @@ +<?php + + \$config['kolab_freebusy_server'] = 'http://' . \$_SERVER["HTTP_HOST"] . '/freebusy'; + + if (file_exists(RCUBE_CONFIG_DIR . '/' . \$_SERVER["HTTP_HOST"] . '/' . basename(__FILE__))) { + include_once(RCUBE_CONFIG_DIR . '/' . \$_SERVER["HTTP_HOST"] . '/' . basename(__FILE__)); + } + + \$config['kolab_cache'] = true; + + \$config['kolab_ssl_verify_host'] = false; + \$config['kolab_ssl_verify_peer'] = false; + + \$config['kolab_use_subscriptions'] = true; + +?>
View file
pykolab.dsc
Changed
@@ -2,7 +2,7 @@ Source: pykolab Binary: pykolab, kolab-cli, kolab-conf, kolab-saslauthd, kolab-server, kolab-telemetry, kolab-xml, wallace Architecture: all -Version: 0.6.8-0~kolab5 +Version: 0.6.9-0~kolab5 Maintainer: Jeroen van Meeuwen (Kolab Systems) <vanmeeuwen@kolabsys.com> Uploaders: Paul Klos <kolab@klos2day.nl> Homepage: http://www.kolab.org @@ -19,5 +19,5 @@ pykolab deb python optional wallace deb python optional Files: - 00000000000000000000000000000000 0 pykolab-0.6.8.tar.gz + 00000000000000000000000000000000 0 pykolab-0.6.9.tar.gz 00000000000000000000000000000000 0 debian.tar.gz
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.