about summary refs log tree commit diff
path: root/nixos/modules/security
diff options
context:
space:
mode:
authorworldofpeace <worldofpeace@protonmail.ch>2020-04-28 17:50:42 -0400
committerGitHub <noreply@github.com>2020-04-28 17:50:42 -0400
commita0ebabf60a3febbd0ba4b401b13503e1fae24934 (patch)
treedb53677a2aec2104d0ecac6b9d3a5545d163ce93 /nixos/modules/security
parentf5c04ecb2c2ba4620b6935d605f6249c8ebae6e0 (diff)
parentdc1efa99a08eec9d56fcd55b2a182a601ab7608e (diff)
downloadnixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar
nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.gz
nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.bz2
nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.lz
nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.xz
nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.zst
nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.zip
Merge pull request #80896 from clkamp/pam-unix-add-nodelay
nixos/security/pam: Add nodelay option
Diffstat (limited to 'nixos/modules/security')
-rw-r--r--nixos/modules/security/pam.nix12
1 files changed, 10 insertions, 2 deletions
diff --git a/nixos/modules/security/pam.nix b/nixos/modules/security/pam.nix
index aeb8629767bc..b99316803f35 100644
--- a/nixos/modules/security/pam.nix
+++ b/nixos/modules/security/pam.nix
@@ -219,6 +219,14 @@ let
         '';
       };
 
+      nodelay = mkOption {
+        default = false;
+        type = types.bool;
+        description = ''
+          Wheather the delay after typing a wrong password should be disabled.
+        '';
+      };
+
       requireWheel = mkOption {
         default = false;
         type = types.bool;
@@ -366,7 +374,7 @@ let
             || cfg.enableGnomeKeyring
             || cfg.googleAuthenticator.enable
             || cfg.duoSecurity.enable)) ''
-              auth required pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} likeauth
+              auth required pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth
               ${optionalString config.security.pam.enableEcryptfs
                 "auth optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so unwrap"}
               ${optionalString cfg.pamMount
@@ -382,7 +390,7 @@ let
                 "auth required ${pkgs.duo-unix}/lib/security/pam_duo.so"}
             '') + ''
           ${optionalString cfg.unixAuth
-              "auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} likeauth try_first_pass"}
+              "auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth try_first_pass"}
           ${optionalString cfg.otpwAuth
               "auth sufficient ${pkgs.otpw}/lib/security/pam_otpw.so"}
           ${optionalString use_ldap