summaryrefslogtreecommitdiff
path: root/data/pam-redhat/gdm-autologin.pam
diff options
context:
space:
mode:
authorRay Strode <rstrode@redhat.com>2016-08-15 14:11:01 -0400
committerRay Strode <rstrode@redhat.com>2016-08-19 15:02:07 -0400
commit31ed6f2b3f1ab45ae07aad41c13a51ba91fd159d (patch)
tree7a3ada2efa60d90050f726943bb29160dbce7723 /data/pam-redhat/gdm-autologin.pam
parent714b6af29b916ac7da0cdab6f83460574ed49cf2 (diff)
downloadgdm-31ed6f2b3f1ab45ae07aad41c13a51ba91fd159d.tar.gz
pam: grab cached password from systemd and pass it on
If the user has an encrypted disk then systemd will cache the password they type into the keyring. It makes sense to try to use this password for automatic login purposes first, since on single user machines, the sole user password is likely to match the disk password. Of course if it doesn't work we'll fall back to the old way of doing automatic login without a password (and then the user will have to manualy enter if they need to for gnome-keyring or whatever) https://bugzilla.gnome.org/show_bug.cgi?id=769950
Diffstat (limited to 'data/pam-redhat/gdm-autologin.pam')
-rw-r--r--data/pam-redhat/gdm-autologin.pam7
1 files changed, 5 insertions, 2 deletions
diff --git a/data/pam-redhat/gdm-autologin.pam b/data/pam-redhat/gdm-autologin.pam
index 96fcfe37..c2efea86 100644
--- a/data/pam-redhat/gdm-autologin.pam
+++ b/data/pam-redhat/gdm-autologin.pam
@@ -1,6 +1,8 @@
#%PAM-1.0
-auth required pam_env.so
-auth required pam_permit.so
+auth optional pam_gdm.so
+auth substack password-auth
+auth optional pam_gnome_keyring.so
+auth sufficient pam_permit.so
auth include postlogin
account required pam_nologin.so
account include system-auth
@@ -12,4 +14,5 @@ session required pam_selinux.so open
session optional pam_keyinit.so force revoke
session required pam_namespace.so
session include system-auth
+session optional pam_gnome_keyring.so auto_start
session include postlogin