[GH-ISSUE #480] Cannot reach core under https (404) #3357

Closed
opened 2026-04-13 14:58:10 -05:00 by GiteaMirror · 3 comments
Owner

Originally created by @juxeii on GitHub (May 5, 2025).
Original GitHub issue: https://github.com/moghtech/komodo/issues/480

Hi,

I installed komodo with sqllite with default settings.
Komodo is behind traefik as reverse proxy.

The web UI is reachable under 192.168.1.11:9120, but the configured https:://komodo.example.com name isn't.
In compose.env I have set
KOMODO_HOST=https://komodo.example.com

sqlite.compose.yaml:

services:
  ferretdb:
    image: ghcr.io/ferretdb/ferretdb:1
    labels:
      komodo.skip: # Prevent Komodo from stopping with StopAllContainers
    restart: unless-stopped
    networks:
      - default
    logging:
      driver: ${COMPOSE_LOGGING_DRIVER:-local}
    # ports:
    #   - 27017:27017
    volumes:
      - sqlite-data:/state
    environment:
      - FERRETDB_HANDLER=sqlite
  
  core:
    image: ghcr.io/moghtech/komodo-core:${COMPOSE_KOMODO_IMAGE_TAG:-latest}
    labels:
      - komodo.skip=true # Prevent Komodo from stopping with StopAllContainers
      - traefik.enable=true
      - traefik.http.routers.komodo.entrypoints=http
      - traefik.http.routers.komodo.rule=Host(`komodo.example.com`)
      - traefik.http.routers.komodo.middlewares=https-redirectscheme@file
      - traefik.http.routers.komodo-secure.entrypoints=https
      - traefik.http.routers.komodo-secure.rule=Host(`komodo.example.com`)
      - traefik.http.routers.komodo-secure.tls=true
      - traefik.http.routers.komodo-secure.service=komodo
      - traefik.http.services.komodo.loadbalancer.server.port=9120
      - traefik.docker.network=web
    restart: unless-stopped
    depends_on:
      - ferretdb
    networks:
      - web
      - default
    logging:
      driver: ${COMPOSE_LOGGING_DRIVER:-local}
    ports:
       - 9120:9120
    env_file: ./compose.env
    environment:
      KOMODO_DATABASE_ADDRESS: ferretdb
    volumes:
      ## Core cache for repos for latest commit hash / contents
      - repo-cache:/repo-cache
      ## Store sync files on server
      - /volume1/docker/komodo/syncs:/syncs
      ## Optionally mount a custom core.config.toml
      # - /path/to/core.config.toml:/config/config.toml
    ## Allows for systemd Periphery connection at 
    ## "http://host.docker.internal:8120"
    # extra_hosts:
    #   - host.docker.internal:host-gateway

  ## Deploy Periphery container using this block,
  ## or deploy the Periphery binary with systemd using 
  ## https://github.com/moghtech/komodo/tree/main/scripts
  periphery:
    image: ghcr.io/moghtech/komodo-periphery:${COMPOSE_KOMODO_IMAGE_TAG:-latest}
    labels:
      komodo.skip: # Prevent Komodo from stopping with StopAllContainers
    restart: unless-stopped
    logging:
      driver: ${COMPOSE_LOGGING_DRIVER:-local}
    env_file: ./compose.env
    networks:
      - default
    volumes:
      ## Mount external docker socket
      - /var/run/docker.sock:/var/run/docker.sock
      ## Allow Periphery to see processes outside of container
      - /proc:/proc
      ## Specify the Periphery agent root directory.
      ## Must be the same inside and outside the container,
      ## or docker will get confused. See https://github.com/moghtech/komodo/discussions/180.
      ## Default: /etc/komodo.
      - ${PERIPHERY_ROOT_DIRECTORY:-/etc/komodo}:${PERIPHERY_ROOT_DIRECTORY:-/etc/komodo}

volumes:
  # Sqlite
  sqlite-data:
  # Core
  repo-cache:

networks:
  web:
    external: true

Traefik seems to work just fine, since under the https address I have a valid lets encrypt cert.

Core log:

2025-05-05T13:06:15.117667Z  INFO core: Komodo Core version: v1.17.5

2025-05-05T13:06:15.117822Z  INFO core: CoreConfig { title: "Komodo", host: "https://komodo.example.com", port: 9120, bind_ip: "[::]", passkey: "##############", ui_write_disabled: false, disable_confirm_dialog: false, disable_websocket_reconnect: false, first_server: "https://periphery:8120", frontend_path: "/app/frontend", database: DatabaseConfig { uri: "", address: "ferretdb", username: "", password: "", app_name: "komodo_core", db_name: "komodo" }, local_auth: true, transparent_mode: false, enable_new_users: false, disable_user_registration: false, lock_login_credentials_for: [], disable_non_admin_create: false, jwt_secret: "##############", jwt_ttl: OneDay, oidc_enabled: false, oidc_provider: "https://oidc.provider.internal/application/o/komodo", oidc_redirect_host: "", oidc_client_id: "", oidc_client_secret: "", oidc_use_full_email: false, oidc_additional_audiences: [], google_oauth: OauthCredentials { enabled: false, id: "", secret: "" }, github_oauth: OauthCredentials { enabled: false, id: "", secret: "" }, webhook_secret: "##############", webhook_base_url: "", github_webhook_app: GithubWebhookAppConfig { app_id: 0, installations: [], pk_path: "/github/private-key.pem" }, logging: LogConfig { level: Info, stdio: Standard, pretty: false, otlp_endpoint: "", opentelemetry_service_name: "Komodo" }, keep_stats_for_days: 14, keep_alerts_for_days: 14, resource_poll_interval: FiveMinutes, monitoring_interval: FifteenSeconds, aws: AwsCredentials { access_key_id: "##############", secret_access_key: "##############" }, git_providers: [], docker_registries: [], secrets: {}, ssl_enabled: false, ssl_key_file: "/config/ssl/key.pem", ssl_cert_file: "/config/ssl/cert.pem", sync_directory: "/syncs", repo_directory: "/repo-cache", action_directory: "/action-cache" }

2025-05-05T13:06:15.363852Z  INFO core::api::auth: 🔑 Local Login Enabled

2025-05-05T13:06:15.403063Z  INFO core: 🔓 Core SSL Disabled

2025-05-05T13:06:15.403092Z  INFO core: Komodo Core starting on http://[::]:9120

I have tried to
KOMODO_SSL_ENABLED=true

but then core shows errors:


2025-05-05T12:58:28.068376Z  INFO core: Komodo Core version: v1.17.5

2025-05-05T12:58:28.068788Z  INFO core: CoreConfig { title: "Komodo", host: "https://komodo.example.com", port: 9120, bind_ip: "[::]", passkey: "##############", ui_write_disabled: false, disable_confirm_dialog: false, disable_websocket_reconnect: false, first_server: "https://periphery:8120", frontend_path: "/app/frontend", database: DatabaseConfig { uri: "", address: "ferretdb", username: "", password: "", app_name: "komodo_core", db_name: "komodo" }, local_auth: true, transparent_mode: false, enable_new_users: false, disable_user_registration: false, lock_login_credentials_for: [], disable_non_admin_create: false, jwt_secret: "##############", jwt_ttl: OneDay, oidc_enabled: false, oidc_provider: "https://oidc.provider.internal/application/o/komodo", oidc_redirect_host: "", oidc_client_id: "", oidc_client_secret: "", oidc_use_full_email: false, oidc_additional_audiences: [], google_oauth: OauthCredentials { enabled: false, id: "", secret: "" }, github_oauth: OauthCredentials { enabled: false, id: "", secret: "" }, webhook_secret: "##############", webhook_base_url: "", github_webhook_app: GithubWebhookAppConfig { app_id: 0, installations: [], pk_path: "/github/private-key.pem" }, logging: LogConfig { level: Info, stdio: Standard, pretty: false, otlp_endpoint: "", opentelemetry_service_name: "Komodo" }, keep_stats_for_days: 14, keep_alerts_for_days: 14, resource_poll_interval: FiveMinutes, monitoring_interval: FifteenSeconds, aws: AwsCredentials { access_key_id: "##############", secret_access_key: "##############" }, git_providers: [], docker_registries: [], secrets: {}, ssl_enabled: true, ssl_key_file: "/config/ssl/key.pem", ssl_cert_file: "/config/ssl/cert.pem", sync_directory: "/syncs", repo_directory: "/repo-cache", action_directory: "/action-cache" }

2025-05-05T12:58:28.322781Z  INFO core::api::auth: 🔑 Local Login Enabled

2025-05-05T12:58:28.349029Z  INFO core: 🔒 Core SSL Enabled

thread 'tokio-runtime-worker' panicked at bin/core/src/main.rs:104:8:

failed to install default rustls CryptoProvider: CryptoProvider { cipher_suites: [TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256], kx_groups: [X25519, secp256r1, secp384r1], signature_verification_algorithms: WebPkiSupportedAlgorithms { all: [ .. ], mapping: [ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256] }, secure_random: Ring, key_provider: Ring }

note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace

2025-05-05T12:58:28.498750Z ERROR core::monitor::alert: Error {

    context: "failed to get servers from db (in alert_servers)",

    source: Error {

        context: "failed to pull Servers from mongo",

        source: Error {

            kind: ServerSelection {

                message: "Server selection timeout: None of the available servers suitable for criteria ReadPreference(Primary). Topology: { Type: Single, Servers: [ { Address: ferretdb:27017, Type: Standalone, Average RTT: 35.944736ms, Last Update Time: 2025-05-05 12:58:28.133 +00:00:00, Max Wire Version: 21, Min Wire Version: 0 } ] }",

            },

            labels: {},

            wire_version: None,

            source: None,

        },

    },

}

Error: task 3 panicked with message "failed to install default rustls CryptoProvider: CryptoProvider { cipher_suites: [TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256], kx_groups: [X25519, secp256r1, secp384r1], signature_verification_algorithms: WebPkiSupportedAlgorithms { all: [ .. ], mapping: [ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256] }, secure_random: Ring, key_provider: Ring }"

Any ideas how to get komodo working behing traefik?

Originally created by @juxeii on GitHub (May 5, 2025). Original GitHub issue: https://github.com/moghtech/komodo/issues/480 Hi, I installed `komodo `with `sqllite `with default settings. Komodo is behind `traefik `as reverse proxy. The web UI is reachable under `192.168.1.11:9120`, but the configured `https:://komodo.example.com` name isn't. In `compose.env` I have set `KOMODO_HOST=https://komodo.example.com` `sqlite.compose.yaml`: ``` services: ferretdb: image: ghcr.io/ferretdb/ferretdb:1 labels: komodo.skip: # Prevent Komodo from stopping with StopAllContainers restart: unless-stopped networks: - default logging: driver: ${COMPOSE_LOGGING_DRIVER:-local} # ports: # - 27017:27017 volumes: - sqlite-data:/state environment: - FERRETDB_HANDLER=sqlite core: image: ghcr.io/moghtech/komodo-core:${COMPOSE_KOMODO_IMAGE_TAG:-latest} labels: - komodo.skip=true # Prevent Komodo from stopping with StopAllContainers - traefik.enable=true - traefik.http.routers.komodo.entrypoints=http - traefik.http.routers.komodo.rule=Host(`komodo.example.com`) - traefik.http.routers.komodo.middlewares=https-redirectscheme@file - traefik.http.routers.komodo-secure.entrypoints=https - traefik.http.routers.komodo-secure.rule=Host(`komodo.example.com`) - traefik.http.routers.komodo-secure.tls=true - traefik.http.routers.komodo-secure.service=komodo - traefik.http.services.komodo.loadbalancer.server.port=9120 - traefik.docker.network=web restart: unless-stopped depends_on: - ferretdb networks: - web - default logging: driver: ${COMPOSE_LOGGING_DRIVER:-local} ports: - 9120:9120 env_file: ./compose.env environment: KOMODO_DATABASE_ADDRESS: ferretdb volumes: ## Core cache for repos for latest commit hash / contents - repo-cache:/repo-cache ## Store sync files on server - /volume1/docker/komodo/syncs:/syncs ## Optionally mount a custom core.config.toml # - /path/to/core.config.toml:/config/config.toml ## Allows for systemd Periphery connection at ## "http://host.docker.internal:8120" # extra_hosts: # - host.docker.internal:host-gateway ## Deploy Periphery container using this block, ## or deploy the Periphery binary with systemd using ## https://github.com/moghtech/komodo/tree/main/scripts periphery: image: ghcr.io/moghtech/komodo-periphery:${COMPOSE_KOMODO_IMAGE_TAG:-latest} labels: komodo.skip: # Prevent Komodo from stopping with StopAllContainers restart: unless-stopped logging: driver: ${COMPOSE_LOGGING_DRIVER:-local} env_file: ./compose.env networks: - default volumes: ## Mount external docker socket - /var/run/docker.sock:/var/run/docker.sock ## Allow Periphery to see processes outside of container - /proc:/proc ## Specify the Periphery agent root directory. ## Must be the same inside and outside the container, ## or docker will get confused. See https://github.com/moghtech/komodo/discussions/180. ## Default: /etc/komodo. - ${PERIPHERY_ROOT_DIRECTORY:-/etc/komodo}:${PERIPHERY_ROOT_DIRECTORY:-/etc/komodo} volumes: # Sqlite sqlite-data: # Core repo-cache: networks: web: external: true ``` `Traefik `seems to work just fine, since under the https address I have a valid lets encrypt cert. Core log: ``` 2025-05-05T13:06:15.117667Z INFO core: Komodo Core version: v1.17.5 2025-05-05T13:06:15.117822Z INFO core: CoreConfig { title: "Komodo", host: "https://komodo.example.com", port: 9120, bind_ip: "[::]", passkey: "##############", ui_write_disabled: false, disable_confirm_dialog: false, disable_websocket_reconnect: false, first_server: "https://periphery:8120", frontend_path: "/app/frontend", database: DatabaseConfig { uri: "", address: "ferretdb", username: "", password: "", app_name: "komodo_core", db_name: "komodo" }, local_auth: true, transparent_mode: false, enable_new_users: false, disable_user_registration: false, lock_login_credentials_for: [], disable_non_admin_create: false, jwt_secret: "##############", jwt_ttl: OneDay, oidc_enabled: false, oidc_provider: "https://oidc.provider.internal/application/o/komodo", oidc_redirect_host: "", oidc_client_id: "", oidc_client_secret: "", oidc_use_full_email: false, oidc_additional_audiences: [], google_oauth: OauthCredentials { enabled: false, id: "", secret: "" }, github_oauth: OauthCredentials { enabled: false, id: "", secret: "" }, webhook_secret: "##############", webhook_base_url: "", github_webhook_app: GithubWebhookAppConfig { app_id: 0, installations: [], pk_path: "/github/private-key.pem" }, logging: LogConfig { level: Info, stdio: Standard, pretty: false, otlp_endpoint: "", opentelemetry_service_name: "Komodo" }, keep_stats_for_days: 14, keep_alerts_for_days: 14, resource_poll_interval: FiveMinutes, monitoring_interval: FifteenSeconds, aws: AwsCredentials { access_key_id: "##############", secret_access_key: "##############" }, git_providers: [], docker_registries: [], secrets: {}, ssl_enabled: false, ssl_key_file: "/config/ssl/key.pem", ssl_cert_file: "/config/ssl/cert.pem", sync_directory: "/syncs", repo_directory: "/repo-cache", action_directory: "/action-cache" } 2025-05-05T13:06:15.363852Z INFO core::api::auth: 🔑 Local Login Enabled 2025-05-05T13:06:15.403063Z INFO core: 🔓 Core SSL Disabled 2025-05-05T13:06:15.403092Z INFO core: Komodo Core starting on http://[::]:9120 ``` I have tried to `KOMODO_SSL_ENABLED=true` but then core shows errors: ``` 2025-05-05T12:58:28.068376Z INFO core: Komodo Core version: v1.17.5 2025-05-05T12:58:28.068788Z INFO core: CoreConfig { title: "Komodo", host: "https://komodo.example.com", port: 9120, bind_ip: "[::]", passkey: "##############", ui_write_disabled: false, disable_confirm_dialog: false, disable_websocket_reconnect: false, first_server: "https://periphery:8120", frontend_path: "/app/frontend", database: DatabaseConfig { uri: "", address: "ferretdb", username: "", password: "", app_name: "komodo_core", db_name: "komodo" }, local_auth: true, transparent_mode: false, enable_new_users: false, disable_user_registration: false, lock_login_credentials_for: [], disable_non_admin_create: false, jwt_secret: "##############", jwt_ttl: OneDay, oidc_enabled: false, oidc_provider: "https://oidc.provider.internal/application/o/komodo", oidc_redirect_host: "", oidc_client_id: "", oidc_client_secret: "", oidc_use_full_email: false, oidc_additional_audiences: [], google_oauth: OauthCredentials { enabled: false, id: "", secret: "" }, github_oauth: OauthCredentials { enabled: false, id: "", secret: "" }, webhook_secret: "##############", webhook_base_url: "", github_webhook_app: GithubWebhookAppConfig { app_id: 0, installations: [], pk_path: "/github/private-key.pem" }, logging: LogConfig { level: Info, stdio: Standard, pretty: false, otlp_endpoint: "", opentelemetry_service_name: "Komodo" }, keep_stats_for_days: 14, keep_alerts_for_days: 14, resource_poll_interval: FiveMinutes, monitoring_interval: FifteenSeconds, aws: AwsCredentials { access_key_id: "##############", secret_access_key: "##############" }, git_providers: [], docker_registries: [], secrets: {}, ssl_enabled: true, ssl_key_file: "/config/ssl/key.pem", ssl_cert_file: "/config/ssl/cert.pem", sync_directory: "/syncs", repo_directory: "/repo-cache", action_directory: "/action-cache" } 2025-05-05T12:58:28.322781Z INFO core::api::auth: 🔑 Local Login Enabled 2025-05-05T12:58:28.349029Z INFO core: 🔒 Core SSL Enabled thread 'tokio-runtime-worker' panicked at bin/core/src/main.rs:104:8: failed to install default rustls CryptoProvider: CryptoProvider { cipher_suites: [TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256], kx_groups: [X25519, secp256r1, secp384r1], signature_verification_algorithms: WebPkiSupportedAlgorithms { all: [ .. ], mapping: [ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256] }, secure_random: Ring, key_provider: Ring } note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace 2025-05-05T12:58:28.498750Z ERROR core::monitor::alert: Error { context: "failed to get servers from db (in alert_servers)", source: Error { context: "failed to pull Servers from mongo", source: Error { kind: ServerSelection { message: "Server selection timeout: None of the available servers suitable for criteria ReadPreference(Primary). Topology: { Type: Single, Servers: [ { Address: ferretdb:27017, Type: Standalone, Average RTT: 35.944736ms, Last Update Time: 2025-05-05 12:58:28.133 +00:00:00, Max Wire Version: 21, Min Wire Version: 0 } ] }", }, labels: {}, wire_version: None, source: None, }, }, } Error: task 3 panicked with message "failed to install default rustls CryptoProvider: CryptoProvider { cipher_suites: [TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256], kx_groups: [X25519, secp256r1, secp384r1], signature_verification_algorithms: WebPkiSupportedAlgorithms { all: [ .. ], mapping: [ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256] }, secure_random: Ring, key_provider: Ring }" ``` Any ideas how to get `komodo `working behing `traefik`?
Author
Owner

@juxeii commented on GitHub (May 5, 2025):

Forget it :)
I did not add a local CNAME in my DNS server for the https address.
Now everything is working!

<!-- gh-comment-id:2851033397 --> @juxeii commented on GitHub (May 5, 2025): Forget it :) I did not add a local CNAME in my DNS server for the `https `address. Now everything is working!
Author
Owner

@Smig0l commented on GitHub (Jun 25, 2025):

Forget it :) I did not add a local CNAME in my DNS server for the https address. Now everything is working!

hi! same situation as you.
can u explain what have u done regarding dns?
in my case nslookup komodo.example.com resolves correctly.
also i installed traefik as container.

<!-- gh-comment-id:3003730529 --> @Smig0l commented on GitHub (Jun 25, 2025): > Forget it :) I did not add a local CNAME in my DNS server for the `https `address. Now everything is working! hi! same situation as you. can u explain what have u done regarding dns? in my case `nslookup komodo.example.com` resolves correctly. also i installed traefik as container.
Author
Owner

@juxeii commented on GitHub (Jun 25, 2025):

@Smig0l Not sure what your question is. I have many services running with adguard/traefik and for this issue I simply forgot to add a DNS rewrite in adguard pointing to my traefik instance.
But I switched to technitium and here I setup the DNS resolution under a forwarder zone.

Look at traefik logs and see if there are even request coming along for komodo. Set log level to debug.

<!-- gh-comment-id:3003790555 --> @juxeii commented on GitHub (Jun 25, 2025): @Smig0l Not sure what your question is. I have many services running with `adguard/traefik` and for this issue I simply forgot to add a DNS rewrite in `adguard `pointing to my `traefik `instance. But I switched to `technitium `and here I setup the DNS resolution under a forwarder zone. Look at `traefik `logs and see if there are even request coming along for `komodo`. Set log level to `debug`.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/komodo#3357