r54789 - in /desktop/unstable/gdm3/debian: changelog gdm3.gdm-fingerprint.pam
bigon at users.alioth.debian.org
bigon at users.alioth.debian.org
Thu Nov 9 11:00:37 UTC 2017
Author: bigon
Date: Thu Nov 9 11:00:35 2017
New Revision: 54789
URL: http://svn.debian.org/wsvn/pkg-gnome/?sc=1&rev=54789
Log:
debian/gdm3.gdm-fingerprint.pam: Add PAM service to allow the user to
authenticate using fingerprints. This requires installing libpam-fprintd
(>= 0.8.0-2) and that the fprintd module is NOT included in common-auth
Added:
desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam
Modified:
desktop/unstable/gdm3/debian/changelog
Modified: desktop/unstable/gdm3/debian/changelog
URL: http://svn.debian.org/wsvn/pkg-gnome/desktop/unstable/gdm3/debian/changelog?rev=54789&op=diff
==============================================================================
--- desktop/unstable/gdm3/debian/changelog [utf-8] (original)
+++ desktop/unstable/gdm3/debian/changelog [utf-8] Thu Nov 9 11:00:35 2017
@@ -1,3 +1,11 @@
+gdm3 (3.26.2.1-2) UNRELEASED; urgency=medium
+
+ * debian/gdm3.gdm-fingerprint.pam: Add PAM service to allow the user to
+ authenticate using fingerprints. This requires installing libpam-fprintd
+ (>= 0.8.0-2) and that the fprintd module is NOT included in common-auth
+
+ -- Laurent Bigonville <bigon at debian.org> Thu, 09 Nov 2017 11:51:14 +0100
+
gdm3 (3.26.2.1-1) unstable; urgency=medium
* New upstream release
Added: desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam
URL: http://svn.debian.org/wsvn/pkg-gnome/desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam?rev=54789&op=file
==============================================================================
--- desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam (added)
+++ desktop/unstable/gdm3/debian/gdm3.gdm-fingerprint.pam [utf-8] Thu Nov 9 11:00:35 2017
@@ -0,0 +1,22 @@
+#%PAM-1.0
+auth requisite pam_nologin.so
+auth required pam_succeed_if.so user != root quiet_success
+auth required pam_fprintd.so
+auth optional pam_gnome_keyring.so
+ at include common-account
+# SELinux needs to be the first session rule. This ensures that any
+# lingering context has been cleared. Without this it is possible
+# that a module could execute code in the wrong domain.
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
+session required pam_loginuid.so
+# SELinux needs to intervene at login time to ensure that the process
+# starts in the proper default security context. Only sessions which are
+# intended to run in the user's context should be run after this.
+session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
+session optional pam_keyinit.so force revoke
+session required pam_limits.so
+session required pam_env.so readenv=1
+session required pam_env.so readenv=1 envfile=/etc/default/locale
+ at include common-session
+session optional pam_gnome_keyring.so auto_start
+password required pam_fprintd.so
More information about the pkg-gnome-commits
mailing list