summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorWanja Zaeske <wanja.zaeske@dlr.de>2022-05-18 15:22:46 +0200
committerWanja Zaeske <wanja.zaeske@dlr.de>2022-05-18 15:22:46 +0200
commit305b633423fce2fc4848bcf9e45379ef51eb738c (patch)
treef80fd90d554a32bc48f9e37cef1e8085d618707f /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent675f9f6e432e2cf36c6712aa58d0bb17c145c92d (diff)
nixos/modules/security/pam: fix #95798 & #128116
Previously, `pam_unix.so` was `required` to set PAM_AUTHTOK so that dependent pam modules (such as gnome keyering) could use the password (for example to unlock a keyring) upon login of the user. This however broke any additional auth providers (such as AD or LDAP): for any non-local user `pam_unix.so` will not yield success, thus eventually the auth would fail (even the following auth providers were actually executed, they could not overrule the already failed auth). This change replaces `required` by `optional`. Therefore, the `pam_unix.so` is executed and can set the PAM_AUTHTOK for the following optional modules, _even_ if the user is not a local user. Therefore, the gnome keyring for example is unlocked both for local and additional users upon login, and login is working for non-local users via LDAP/AD.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions