+1
nixos/modules/module-list.nix
+1
nixos/modules/module-list.nix
+24
-3
nixos/modules/security/pam.nix
+24
-3
nixos/modules/security/pam.nix
···account [success=ok ignore=ignore default=die] ${pkgs.google-guest-oslogin}/lib/security/pam_oslogin_login.soaccount [success=ok default=ignore] ${pkgs.google-guest-oslogin}/lib/security/pam_oslogin_admin.so······auth optional pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth···auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth try_first_pass······session required ${pkgs.pam}/lib/security/pam_mkhomedir.so silent skel=${config.security.pam.makeHomeDir.skelDirectory} umask=0077···
+1
-1
nixos/modules/system/boot/systemd.nix
+1
-1
nixos/modules/system/boot/systemd.nix
+43
nixos/modules/system/boot/systemd/homed.nix
+43
nixos/modules/system/boot/systemd/homed.nix
···+message = "systemd-homed requires the use of systemd nss module. services.nscd.enable must be set to true,";
+1
nixos/tests/all-tests.nix
+1
nixos/tests/all-tests.nix
···
+99
nixos/tests/systemd-homed.nix
+99
nixos/tests/systemd-homed.nix
···+machine.succeed("NEWPASSWORD=${password} homectl create --shell=/run/current-system/sw/bin/bash --storage=luks -G wheel test-homed-user")+machine.wait_until_tty_matches("5", "Password incorrect or not sufficient for authentication of user test-homed-user.")+machine.succeed("userdbctl group wheel -s io.systemd.NameServiceSwitch | grep test-homed-user")
+1
-1
pkgs/os-specific/linux/systemd/default.nix
+1
-1
pkgs/os-specific/linux/systemd/default.nix