summaryrefslogtreecommitdiffstats
path: root/nixos/modules/programs/i3lock.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixos/modules/programs/i3lock.nix')
-rw-r--r--nixos/modules/programs/i3lock.nix58
1 files changed, 58 insertions, 0 deletions
diff --git a/nixos/modules/programs/i3lock.nix b/nixos/modules/programs/i3lock.nix
new file mode 100644
index 000000000000..466ae59c9277
--- /dev/null
+++ b/nixos/modules/programs/i3lock.nix
@@ -0,0 +1,58 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+
+ cfg = config.programs.i3lock;
+
+in {
+
+ ###### interface
+
+ options = {
+ programs.i3lock = {
+ enable = mkEnableOption (mdDoc "i3lock");
+ package = mkOption {
+ type = types.package;
+ default = pkgs.i3lock;
+ defaultText = literalExpression "pkgs.i3lock";
+ example = literalExpression ''
+ pkgs.i3lock-color
+ '';
+ description = mdDoc ''
+ Specify which package to use for the i3lock program,
+ The i3lock package must include a i3lock file or link in its out directory in order for the u2fSupport option to work correctly.
+ '';
+ };
+ u2fSupport = mkOption {
+ type = types.bool;
+ default = false;
+ example = true;
+ description = mdDoc ''
+ Whether to enable U2F support in the i3lock program.
+ U2F enables authentication using a hardware device, such as a security key.
+ When U2F support is enabled, the i3lock program will set the setuid bit on the i3lock binary and enable the pam u2fAuth service,
+ '';
+ };
+ };
+ };
+
+ ###### implementation
+
+ config = mkIf cfg.enable {
+
+ environment.systemPackages = [ cfg.package ];
+
+ security.wrappers.i3lock = mkIf cfg.u2fSupport {
+ setuid = true;
+ owner = "root";
+ group = "root";
+ source = "${cfg.package.out}/bin/i3lock";
+ };
+
+ security.pam.services.i3lock.u2fAuth = cfg.u2fSupport;
+
+ };
+
+}