da2fa46551
Instead of the old workaround that replaces the whole PAM config, use Debian's framework (pam-configs) to add a rule for su. Enable it for users in qubes group only. PAM Config framework documentation: https://wiki.ubuntu.com/PAMConfigFrameworkSpec Issue: QubesOS/qubes-issues#5799 Original PR this change is based on: QubesOS/qubes-core-agent-linux#171
5 lines
157 B
Plaintext
5 lines
157 B
Plaintext
etc/polkit-1/localauthority/50-local.d/qubes-allow-all.pkla
|
|
etc/polkit-1/rules.d/00-qubes-allow-all.rules
|
|
etc/sudoers.d/qubes
|
|
usr/share/pam-configs/su.qubes
|