 da2fa46551
			
		
	
	
		da2fa46551
		
			
		
	
	
	
	
		
			
			Instead of the old workaround that replaces the whole PAM config, use Debian's framework (pam-configs) to add a rule for su. Enable it for users in qubes group only. PAM Config framework documentation: https://wiki.ubuntu.com/PAMConfigFrameworkSpec Issue: QubesOS/qubes-issues#5799 Original PR this change is based on: QubesOS/qubes-core-agent-linux#171
		
			
				
	
	
		
			5 lines
		
	
	
		
			157 B
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			5 lines
		
	
	
		
			157 B
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| etc/polkit-1/localauthority/50-local.d/qubes-allow-all.pkla
 | |
| etc/polkit-1/rules.d/00-qubes-allow-all.rules
 | |
| etc/sudoers.d/qubes
 | |
| usr/share/pam-configs/su.qubes
 |