|
965 | 965 | ( |
966 | 966 | (cfg.unixAuth || config.services.homed.enable) |
967 | 967 | && ( |
968 | | - config.security.pam.enableEcryptfs |
969 | | - || config.security.pam.enableFscrypt |
| 968 | + config.security.pam.enableFscrypt |
970 | 969 | || cfg.pamMount |
971 | 970 | || cfg.kwallet.enable |
972 | 971 | || cfg.enableGnomeKeyring |
|
996 | 995 | likeauth = true; |
997 | 996 | }; |
998 | 997 | } |
999 | | - { |
1000 | | - name = "ecryptfs"; |
1001 | | - enable = config.security.pam.enableEcryptfs; |
1002 | | - control = "optional"; |
1003 | | - modulePath = "${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"; |
1004 | | - settings = { |
1005 | | - unwrap = true; |
1006 | | - }; |
1007 | | - } |
1008 | 998 | { |
1009 | 999 | name = "fscrypt"; |
1010 | 1000 | enable = config.security.pam.enableFscrypt; |
@@ -1191,12 +1181,6 @@ let |
1191 | 1181 | yescrypt = true; |
1192 | 1182 | }; |
1193 | 1183 | } |
1194 | | - { |
1195 | | - name = "ecryptfs"; |
1196 | | - enable = config.security.pam.enableEcryptfs; |
1197 | | - control = "optional"; |
1198 | | - modulePath = "${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"; |
1199 | | - } |
1200 | 1184 | { |
1201 | 1185 | name = "fscrypt"; |
1202 | 1186 | enable = config.security.pam.enableFscrypt; |
@@ -1331,12 +1315,6 @@ let |
1331 | 1315 | silent = true; |
1332 | 1316 | }; |
1333 | 1317 | } |
1334 | | - { |
1335 | | - name = "ecryptfs"; |
1336 | | - enable = config.security.pam.enableEcryptfs; |
1337 | | - control = "optional"; |
1338 | | - modulePath = "${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"; |
1339 | | - } |
1340 | 1318 | # Work around https://github.com/systemd/systemd/issues/8598 |
1341 | 1319 | # Skips the pam_fscrypt module for systemd-user sessions which do not have a password |
1342 | 1320 | # anyways. |
|
2223 | 2201 |
|
2224 | 2202 | security.pam.enableUMask = lib.mkEnableOption "umask PAM module"; |
2225 | 2203 |
|
2226 | | - security.pam.enableEcryptfs = lib.mkEnableOption "eCryptfs PAM module (mounting ecryptfs home directory on login)"; |
2227 | 2204 | security.pam.enableFscrypt = lib.mkEnableOption '' |
2228 | 2205 | fscrypt, to automatically unlock directories with the user's login password. |
2229 | 2206 |
|
|
2324 | 2301 | ++ lib.optionals config.security.pam.enableFscrypt [ pkgs.fscrypt-experimental ] |
2325 | 2302 | ++ lib.optionals config.security.pam.u2f.enable [ pkgs.pam_u2f ]; |
2326 | 2303 |
|
2327 | | - boot.supportedFilesystems = lib.mkIf config.security.pam.enableEcryptfs [ "ecryptfs" ]; |
2328 | | - |
2329 | 2304 | security.wrappers = { |
2330 | 2305 | unix_chkpwd = { |
2331 | 2306 | setuid = true; |
|
0 commit comments