summaryrefslogtreecommitdiff
path: root/src/login/elogind-user.m4
Commit message (Collapse)AuthorAge
* pam: include pam_keyinit.so in our PAM fragmentsLennart Poettering2017-07-17
| | | | | | We want that elogind --user gets its own keyring as usual, even if the barebones PAM snippet we ship upstream is used. If we don't do this we get the basic keyring elogind --system sets up for us.
* elogind-user: add pam_unix account moduleFelipe Sateler2017-07-05
| | | | | | Otherwise elogind-user@ fails because elogind validates the account Fixes: #4342
* login: drop fedora-specific PAM config, add note to DISTRO_PORTING (#4314)Felipe Sateler2017-07-05
| | | | | | | | It is impossible to ship a fully generic PAM configuration upstream. Therefore, ship a minimal configuration with the elogind --user requirements, and add a note to DISTRO_PORTING documenting this. Fixes #4284
* elogind --user: call pam_loginuid when creating user@.service (#3120)Zbigniew Jędrzejewski-Szmek2017-06-16
| | | | | | | | | | | | | This way the user service will have a loginuid, and it will be inherited by child services. This shouldn't change anything as far as elogind itself is concerned, but is nice for various services spawned from by elogind --user that expect a loginuid. pam_loginuid(8) says that it should be enabled for "..., crond and atd". user@.service should behave similarly to those two as far as audit is concerned. https://bugzilla.redhat.com/show_bug.cgi?id=1328947#c28
* pam: elogind-user - call selinux moduleKay Sievers2017-03-29
https://bugzilla.redhat.com/show_bug.cgi?id=1262933