hey guys,

i just started using James to do some custom mail forwarding and i'm running into a problem which seems to be confined to the James environment.

my project is in stealth mode so i can't give too many details away.

however i can say that our application involves a decent chunk of crypto, my mailet intercepts every message routed to James, and the mailet code works fine if i invoke it from another environment. ie, i wrote a command line tool which pretends to be James and calls my mailet.

our API, which the mailet calls, is pretty solid, having been tested by our clients and test scripts and all that. my attempts at debugging the problem so far haven't produced any results - the path through the code seems to be identical.

so my questions are -- is there anything weird about the James environment from a coding standpoint? are there things that should not be done from a mailet?

any help appreciated.

tx
jason

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to