diff options
author | worldofpeace <worldofpeace@protonmail.ch> | 2020-04-28 17:50:42 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-04-28 17:50:42 -0400 |
commit | a0ebabf60a3febbd0ba4b401b13503e1fae24934 (patch) | |
tree | db53677a2aec2104d0ecac6b9d3a5545d163ce93 /nixos/modules/security | |
parent | f5c04ecb2c2ba4620b6935d605f6249c8ebae6e0 (diff) | |
parent | dc1efa99a08eec9d56fcd55b2a182a601ab7608e (diff) | |
download | nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.gz nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.bz2 nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.lz nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.xz nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.tar.zst nixlib-a0ebabf60a3febbd0ba4b401b13503e1fae24934.zip |
Merge pull request #80896 from clkamp/pam-unix-add-nodelay
nixos/security/pam: Add nodelay option
Diffstat (limited to 'nixos/modules/security')
-rw-r--r-- | nixos/modules/security/pam.nix | 12 |
1 files changed, 10 insertions, 2 deletions
diff --git a/nixos/modules/security/pam.nix b/nixos/modules/security/pam.nix index aeb8629767bc..b99316803f35 100644 --- a/nixos/modules/security/pam.nix +++ b/nixos/modules/security/pam.nix @@ -219,6 +219,14 @@ let ''; }; + nodelay = mkOption { + default = false; + type = types.bool; + description = '' + Wheather the delay after typing a wrong password should be disabled. + ''; + }; + requireWheel = mkOption { default = false; type = types.bool; @@ -366,7 +374,7 @@ let || cfg.enableGnomeKeyring || cfg.googleAuthenticator.enable || cfg.duoSecurity.enable)) '' - auth required pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} likeauth + auth required pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth ${optionalString config.security.pam.enableEcryptfs "auth optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so unwrap"} ${optionalString cfg.pamMount @@ -382,7 +390,7 @@ let "auth required ${pkgs.duo-unix}/lib/security/pam_duo.so"} '') + '' ${optionalString cfg.unixAuth - "auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} likeauth try_first_pass"} + "auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth try_first_pass"} ${optionalString cfg.otpwAuth "auth sufficient ${pkgs.otpw}/lib/security/pam_otpw.so"} ${optionalString use_ldap |