r54789 - in /desktop/unstable/gdm3/debian: changelog gdm3.gdm-fingerprint.pam

bigon at users.alioth.debian.org bigon at users.alioth.debian.org
Thu Nov 9 11:00:37 UTC 2017


Author: bigon
Date: Thu Nov  9 11:00:35 2017
New Revision: 54789

URL: http://svn.debian.org/wsvn/pkg-gnome/?sc=1&rev=54789
Log:
debian/gdm3.gdm-fingerprint.pam: Add PAM service to allow the user to
authenticate using fingerprints. This requires installing libpam-fprintd
(>= 0.8.0-2) and that the fprintd module is NOT included in common-auth

Added:
    desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam
Modified:
    desktop/unstable/gdm3/debian/changelog

Modified: desktop/unstable/gdm3/debian/changelog
URL: http://svn.debian.org/wsvn/pkg-gnome/desktop/unstable/gdm3/debian/changelog?rev=54789&op=diff
==============================================================================
--- desktop/unstable/gdm3/debian/changelog	[utf-8] (original)
+++ desktop/unstable/gdm3/debian/changelog	[utf-8] Thu Nov  9 11:00:35 2017
@@ -1,3 +1,11 @@
+gdm3 (3.26.2.1-2) UNRELEASED; urgency=medium
+
+  * debian/gdm3.gdm-fingerprint.pam: Add PAM service to allow the user to
+    authenticate using fingerprints. This requires installing libpam-fprintd
+    (>= 0.8.0-2) and that the fprintd module is NOT included in common-auth
+
+ -- Laurent Bigonville <bigon at debian.org>  Thu, 09 Nov 2017 11:51:14 +0100
+
 gdm3 (3.26.2.1-1) unstable; urgency=medium
 
   * New upstream release

Added: desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam
URL: http://svn.debian.org/wsvn/pkg-gnome/desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam?rev=54789&op=file
==============================================================================
--- desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam	(added)
+++ desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam	[utf-8] Thu Nov  9 11:00:35 2017
@@ -0,0 +1,22 @@
+#%PAM-1.0
+auth    requisite       pam_nologin.so
+auth	required	pam_succeed_if.so user != root quiet_success
+auth	required	pam_fprintd.so
+auth    optional        pam_gnome_keyring.so
+ at include common-account
+# SELinux needs to be the first session rule. This ensures that any 
+# lingering context has been cleared. Without this it is possible 
+# that a module could execute code in the wrong domain.
+session [success=ok ignore=ignore module_unknown=ignore default=bad]        pam_selinux.so close
+session required        pam_loginuid.so
+# SELinux needs to intervene at login time to ensure that the process
+# starts in the proper default security context. Only sessions which are
+# intended to run in the user's context should be run after this.
+session [success=ok ignore=ignore module_unknown=ignore default=bad]        pam_selinux.so open
+session optional        pam_keyinit.so force revoke
+session required        pam_limits.so
+session required        pam_env.so readenv=1
+session required        pam_env.so readenv=1 envfile=/etc/default/locale
+ at include common-session
+session optional        pam_gnome_keyring.so auto_start
+password required       pam_fprintd.so




More information about the pkg-gnome-commits mailing list