[neon/kde/kscreenlocker/Neon/unstable] debian: add pam files
Carlos De Maine
null at kde.org
Sat Nov 4 05:20:56 GMT 2023
Git commit e374eaf306a83401d462b22342be488ebdd3df93 by Carlos De Maine.
Committed on 04/11/2023 at 06:20.
Pushed by carlosdem into branch 'Neon/unstable'.
add pam files
A +25 -0 debian/kscreenlocker.kde-fingerprint.pam
A +25 -0 debian/kscreenlocker.kde-smartcard.pam
A +27 -0 debian/kscreenlocker.kde.pam
M +4 -2 debian/rules
https://invent.kde.org/neon/kde/kscreenlocker/-/commit/e374eaf306a83401d462b22342be488ebdd3df93
diff --git a/debian/kscreenlocker.kde-fingerprint.pam b/debian/kscreenlocker.kde-fingerprint.pam
new file mode 100644
index 0000000..07e73c5
--- /dev/null
+++ b/debian/kscreenlocker.kde-fingerprint.pam
@@ -0,0 +1,25 @@
+#%PAM-1.0
+auth requisite pam_nologin.so
+auth required pam_succeed_if.so user != root quiet_success
+auth required pam_fprintd.so
+auth optional pam_kwallet5.so
+ at include common-account
+# SELinux needs to be the first session rule. This ensures that any
+# lingering context has been cleared. Without this it is possible that a
+# module could execute code in the wrong domain.
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
+session required pam_loginuid.so
+# SELinux needs to intervene at login time to ensure that the process starts
+# in the proper default security context. Only sessions which are intended
+# to run in the user's context should be run after this.
+# pam_selinux.so changes the SELinux context of the used TTY and configures
+# SELinux in order to transition to the user context with the next execve()
+# call.
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
+session optional pam_keyinit.so force revoke
+session required pam_limits.so
+session required pam_env.so readenv=1
+session required pam_env.so readenv=1 user_readenv=1 envfile=/etc/default/locale
+ at include common-session
+session optional pam_kwallet5.so auto_start
+password required pam_fprintd.so
diff --git a/debian/kscreenlocker.kde-smartcard.pam b/debian/kscreenlocker.kde-smartcard.pam
new file mode 100644
index 0000000..01332f6
--- /dev/null
+++ b/debian/kscreenlocker.kde-smartcard.pam
@@ -0,0 +1,25 @@
+#%PAM-1.0
+auth [success=ok user_unknown=ignore default=bad] pam_succeed_if.so user != root quiet_success
+auth required pam_sss.so allow_missing_name require_cert_auth
+auth requisite pam_nologin.so
+auth optional pam_kwallet5.so
+
+ at include common-account
+# SELinux needs to be the first session rule. This ensures that any
+# lingering context has been cleared. Without this it is possible
+# that a module could execute code in the wrong domain.
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
+session required pam_loginuid.so
+# SELinux needs to intervene at login time to ensure that the process
+# starts in the proper default security context. Only sessions which are
+# intended to run in the user's context should be run after this.
+# pam_selinux.so changes the SELinux context of the used TTY and configures
+# SELinux in order to transition to the user context with the next execve()
+# call.
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
+session optional pam_keyinit.so force revoke
+session required pam_limits.so
+session required pam_env.so readenv=1
+session required pam_env.so readenv=1 user_readenv=1 envfile=/etc/default/locale
+ at include common-session
+session optional pam_kwallet5.so auto_start
diff --git a/debian/kscreenlocker.kde.pam b/debian/kscreenlocker.kde.pam
new file mode 100644
index 0000000..4ac40ed
--- /dev/null
+++ b/debian/kscreenlocker.kde.pam
@@ -0,0 +1,27 @@
+#%PAM-1.0
+auth requisite pam_nologin.so
+auth required pam_succeed_if.so user != root quiet_success
+ at include common-auth
+auth optional pam_kwallet5.so
+ at include common-account
+# SELinux needs to be the first session rule. This ensures that any
+# lingering context has been cleared. Without this it is possible that a
+# module could execute code in the wrong domain.
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
+session required pam_loginuid.so
+# SELinux needs to intervene at login time to ensure that the process
+# starts in the proper default security context. Only sessions which are
+# intended to run in the user's context should be run after this.
+# pam_selinux.so changes the SELinux context of the used TTY and configures
+# SELinux in order to transition to the user context with the next execve()
+# call.
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
+session optional pam_keyinit.so force revoke
+session required pam_limits.so
+session required pam_env.so readenv=1
+session required pam_env.so readenv=1 user_readenv=1 envfile=/etc/default/locale
+ at include common-session
+# SELinux needs to intervene at login time to ensure that the process starts
+# in the proper default security context. Only sessions which are intended
+# to run in the user's context should be run after this.
+ at include common-password
diff --git a/debian/rules b/debian/rules
index 47c772a..1d62f8d 100755
--- a/debian/rules
+++ b/debian/rules
@@ -5,5 +5,7 @@
%:
dh $@ --with kf6 --buildsystem kf6
-override_dh_shlibdeps:
- dh_shlibdeps -l$(CURDIR)/debian/$(shell dh_listpackages | head -n1)/usr/kf6/lib/$(DEB_HOST_MULTIARCH)/
+override_dh_installpam:
+ dh_installpam --name=kde
+ dh_installpam --name=kde-fingerprint
+ dh_installpam --name=kde-smartcard
\ No newline at end of file
More information about the Neon-commits
mailing list