[pkg-kolab] Kolab + GOsa debugging
Mark Pavlichuk
pav5088 at internode.on.net
Fri Oct 24 01:40:46 UTC 2008
When asking about this in #ldap they asked for my entire slapd.conf as
well, so here it is :
# (c) 2003 Tassilo Erlewein <tassilo.erlewein at erfrakon.de>
# (c) 2003-2007 Martin Konold <martin.konold at erfrakon.de>
# (c) 2003 Achim Frank <achim.frank at erfrakon.de>
# This program is Free Software under the GNU General Public License (>=v2).
# Read the file COPYING that comes with this packages for details.
# this file is automatically written by the Kolab config backend and
should have the
# file mode 0640
modulepath /usr/lib/ldap
moduleload back_bdb
moduleload back_monitor
moduleload refint
moduleload unique
# manual additions are lost unless made to the template in the Kolab
config directory
# the template is /etc/kolab/templates/slapd.conf.template
include /etc/ldap/schema/core.schema
include /etc/ldap/schema/cosine.schema
include /etc/ldap/schema/inetorgperson.schema
include /etc/ldap/schema/rfc2739.schema
include /usr/share/kolabd/schema/horde.schema
include /etc/ldap/schema/nis.schema
include /etc/ldap/schema/samba3.schema
include /etc/ldap/schema/trust.schema
include /etc/ldap/schema/gosystem.schema
include /etc/ldap/schema/gofon.schema
include /etc/ldap/schema/goto.schema
include /etc/ldap/schema/gosa+samba3.schema
include /etc/ldap/schema/gofax.schema
include /etc/ldap/schema/goserver.schema
include /etc/ldap/schema/goto-mime.schema
include /etc/ldap/schema/kolab2.schema
pidfile /var/run/slapd/slapd.pid
argsfile /var/run/slapd/slapd.args
#schemacheck doesn't exists in debian's slapd 2.4
#schemacheck on
TLSCertificateFile /etc/kolab/cert.pem
TLSCertificateKeyFile /etc/kolab/key.pem
rootDSE /etc/kolab/rootDSE.ldif
defaultsearchbase "dc=strategicit,dc=homelinux,dc=net"
#require none
allow bind_v2
loglevel 0
database bdb
suffix "dc=strategicit,dc=homelinux,dc=net"
cachesize 10000
checkpoint 512 5
idlcachesize 10000
idletimeout 300
# The idletimeout can be increased if some clients develop
# problems. Please report to kolab-devel at kolab.org
# if you encounter such a client.
dirtyread
directory /var/lib/ldap
rootdn "cn=manager,cn=internal,dc=strategicit,dc=homelinux,dc=net"
rootpw "{SSHA}kZj6t2/eJYWwD2VG0F1CLphYT+YizPAL"
replica uri=ldap://127.0.0.1:9999
binddn="cn=replicator"
bindmethod=simple
credentials=secret
#### Provide the modern syncprov/syncrepl method of ldap replication
# This database is a synchronisation provider
# Note that a database can be both a consumer and a provider
moduleload syncprov
overlay syncprov
# Guarantee that contextCSN gets written.
syncprov-checkpoint 1024 16
# Save a log of last write operations
syncprov-sessionlog 4096
# Support delta-based syncrepl
syncprov-reloadhint TRUE
# Put an index on attributes used for synchronisation
# Note that these indexes are used locally both for server and client
# during synchronisation.
index entryCSN eq
index entryUUID eq
#### Using overlays to improve data consistency
# Ensure that we never get dangling member attributes
# Checked on rename and delete
overlay refint
refint_attributes member
# The mail and the uid attribute must be unique.
overlay unique
unique_attributes mail uid
index objectClass pres,eq
index uid approx,sub,pres,eq
index mail approx,sub,pres,eq
index alias approx,sub,pres,eq
index cn approx,sub,pres,eq
index sn approx,sub,pres,eq
index givenName approx,sub,pres,eq
index kolabDelegate approx,sub,pres,eq
index kolabHomeServer pres,eq
index kolabDeleteflag pres,eq
index member pres,eq
include /etc/ldap/slapd.access
access to dn="dc=strategicit,dc=homelinux,dc=net" attrs=children
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=domain-maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
access to dn="cn=internal,dc=strategicit,dc=homelinux,dc=net" attrs=children
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=domain-maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
access to attrs=userPassword
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
=wx
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
=wx
by self =wx
by anonymous =x
by * none stop
access to attrs=mail
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by * read stop
access to attrs=alias
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by * read stop
access to attrs=uid
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by * read stop
access to attrs=cyrus-userquota
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by self read stop
access to attrs=kolabHomeServer
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by * read stop
access to attrs=kolabHomeMTA
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by * read stop
access to attrs=kolabAllowSMTPRecipient
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by self read stop
access to dn="cn=nobody,dc=strategicit,dc=homelinux,dc=net"
by anonymous auth stop
access to dn="cn=manager,cn=internal,dc=strategicit,dc=homelinux,dc=net"
by dn="cn=nobody,cn=internal,dc=strategicit,dc=homelinux,dc=net" read
by self write
by anonymous auth stop
access to dn="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by dn="cn=nobody,cn=internal,dc=strategicit,dc=homelinux,dc=net" read
by self write
by anonymous auth stop
access to dn="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
read
by dn="cn=nobody,cn=internal,dc=strategicit,dc=homelinux,dc=net" read
by self write
by anonymous auth stop
access to dn.regex="(.*,)?cn=internal,dc=strategicit,dc=homelinux,dc=net"
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by self write
by dn="cn=nobody,cn=internal,dc=strategicit,dc=homelinux,dc=net" read
by anonymous auth stop
access to dn.regex="(.*,)?cn=external,dc=strategicit,dc=homelinux,dc=net"
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by * read stop
access to dn="cn=external,dc=strategicit,dc=homelinux,dc=net"
by dn="cn=nobody,cn=internal,dc=strategicit,dc=homelinux,dc=net" read
by * search stop
access to dn="cn=internal,dc=strategicit,dc=homelinux,dc=net"
by dn="cn=nobody,cn=internal,dc=strategicit,dc=homelinux,dc=net" read
by * search stop
access to dn="k=kolab,dc=strategicit,dc=homelinux,dc=net"
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
read
by
group/kolabGroupOfNames="cn=domain-maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
read
by dn="cn=nobody,cn=internal,dc=strategicit,dc=homelinux,dc=net" read
by * none stop
access to *
by self write
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by
group/kolabGroupOfNames="cn=maintainer,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by * read stop
include /etc/ldap/slapd.replicas
database monitor
access to *
by
group/kolabGroupOfNames="cn=admin,cn=internal,dc=strategicit,dc=homelinux,dc=net"
write
by * none stop
--
Mark Pavlichuk
Strategic IT
ph. (07)47242890
m. 0409 124577
More information about the pkg-kolab-devel
mailing list