{ config, lib, pkgs, ... }: with lib; let cfg = config.security.pam.mount; anyPamMount = any (attrByPath ["pamMount"] false) (attrValues config.security.pam.services); in { options = { security.pam.mount = { enable = mkOption { type = types.bool; default = false; description = '' Enable PAM mount system to mount fileystems on user login. ''; }; extraVolumes = mkOption { type = types.listOf types.str; default = []; description = '' List of volume definitions for pam_mount. For more information, visit . ''; }; }; }; config = mkIf (cfg.enable || anyPamMount) { environment.systemPackages = [ pkgs.pam_mount ]; environment.etc = [{ target = "security/pam_mount.conf.xml"; source = let extraUserVolumes = filterAttrs (n: u: u.cryptHomeLuks != null) config.users.users; userVolumeEntry = user: "\n"; in pkgs.writeText "pam_mount.conf.xml" '' ${concatStrings (map userVolumeEntry (attrValues extraUserVolumes))} ${concatStringsSep "\n" cfg.extraVolumes} ${pkgs.utillinux}/bin ${pkgs.pam_mount}/bin/mount.crypt %(VOLUME) %(MNTPT) ${pkgs.pam_mount}/bin/umount.crypt %(MNTPT) ${pkgs.pam_mount}/bin/pmvarrun -u %(USER) -o %(OPERATION) ''; }]; }; }