-
Notifications
You must be signed in to change notification settings - Fork 351
feat: add YubiKey pam_u2f setup #1159
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
adamperkowski
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i'm sorry but there is no way i'm ever approving something like this...
- this doesn't adhere our code style at all
- it's clearly all ai
- what even are those comments supposed to be
- a LOT of unnecessary code, practically unmaintainable
not closing this just in case you want to rewrite it all by hand and make it make sense
Sorry, this was my first PR. I'll work on it. |
Co-authored-by: TuxLux40 <122551310+TuxLux40@users.noreply.github.com>
Co-authored-by: TuxLux40 <122551310+TuxLux40@users.noreply.github.com>
[WIP] Integrate dotfiles repository into linutil framework
- Create Ghostty configuration file for terminal emulator settings. - Add Starship prompt configuration for enhanced shell experience. - Establish system.yaml for package management and system configuration. - Introduce tab_data.toml for organizing dotfiles and personalization tasks. - Implement tl40-dotfiles-restore.sh script for cloning and installing dotfiles.
…s in start.sh to point to TuxLux40 repository
Type of Change
YubiKey PAM Setup Utility
YubiKey PAM Setuptocore/tabs/utils/tab_data.toml, enabling selection from the utility tab.core/tabs/utils/yubikey-pam-setup.shto automate configuration of PAM files for YubiKey authentication, including interactive target selection, backup of relevant files, deduplication of PAM config entries, secure enrollment, and rollback guidance.Documentation
docs/userguide.mdto describe the new YubiKey PAM Setup utility and its purpose.] New featureDescription
This pull request adds a new utility for "YubiKey PAM setup", allowing users to configure sudo and other PAM targets to require YubiKey (U2F) touch authentication with password fallback. The main changes include introducing the setup script, updating configuration files to register the new utility, and documenting its usage.
Testing
Tested on Arch (CachyOS to be specific). Sudo and system-auth were tested and are working. Debian and Fedora not yet tested.
Impact
A new YubiKey PAM setup option now appears in Utilities, PAM configs/backups get touched when run.
Issues / other PRs related
system-auth: The script does not yet handle avoiding duplication of lines in the system-auth file correctly like it does for
sudoAdditional Information
Checklist
cargo xtask docgen).