Lines Matching refs:rset
564 struct restrict_access_settings rset;
569 restrict_access_init(&rset);
570 restrict_access_get_env(&rset);
571 rset.allow_setuid_root = keep_setuid_root;
573 rset.uid = priv->uid;
574 rset.uid_source = priv->uid_source;
575 } else if (rset.uid == (uid_t)-1 &&
581 rset.gid = priv->gid;
582 rset.gid_source = priv->gid_source;
583 } else if (rset.gid == (gid_t)-1 && !allow_root &&
589 if (!parse_gid(set->mail_privileged_group, &rset.privileged_gid,
597 rset.extra_groups = t_strconcat(set->mail_access_groups, ",",
598 rset.extra_groups, NULL);
601 rset.first_valid_gid = set->first_valid_gid;
602 rset.last_valid_gid = set->last_valid_gid;
603 rset.chroot_dir = *priv->chroot == '\0' ? NULL : priv->chroot;
604 rset.system_groups_user = user->system_groups_user;
609 if (rset.chroot_dir == NULL) {
614 if (strcmp(rset.chroot_dir, cur_chroot) != 0) {
621 rset.chroot_dir = NULL;
625 (rset.uid == 0 || (rset.uid == (uid_t)-1 && current_euid == 0))) {
631 if (current_euid != rset.uid && rset.uid != (uid_t)-1) {
637 setuid_uid = rset.uid;
639 rset.uid = (uid_t)-1;
643 restrict_access(&rset, allow_root ? RESTRICT_ACCESS_FLAG_ALLOW_ROOT : 0,
646 restrict_access_set_env(&rset);