group->process_type = PROCESS_TYPE_IMAP;
group->listen_fd = &mail_fd[FD_IMAP];
group->ssl_listen_fd = &mail_fd[FD_IMAPS];
- group->module_dir = set->imap_use_modules ? NULL :
+ group->module_dir = !set->imap_use_modules ? NULL :
set->imap_modules;
} else if (strcmp(login_set->name, "pop3") == 0) {
group->executable = set->pop3_executable;
group->process_type = PROCESS_TYPE_POP3;
group->listen_fd = &mail_fd[FD_POP3];
group->ssl_listen_fd = &mail_fd[FD_POP3S];
- group->module_dir = set->pop3_use_modules ? NULL :
+ group->module_dir = !set->pop3_use_modules ? NULL :
set->pop3_modules;
} else
i_panic("Unknown login group name '%s'", login_set->name);
if (set->mbox_read_dotlock)
env_put("MBOX_READ_DOTLOCK=1");
- env_put(t_strconcat("MODULE_DIR=", module_dir, NULL));
+ if (module_dir != NULL && *module_dir != '\0')
+ env_put(t_strconcat("MODULE_DIR=", module_dir, NULL));
/* user given environment - may be malicious. virtual_user comes from
auth process, but don't trust that too much either. Some auth