da2fa46551
Instead of the old workaround that replaces the whole PAM config, use Debian's framework (pam-configs) to add a rule for su. Enable it for users in qubes group only. PAM Config framework documentation: https://wiki.ubuntu.com/PAMConfigFrameworkSpec Issue: QubesOS/qubes-issues#5799 Original PR this change is based on: QubesOS/qubes-core-agent-linux#171 |
||
---|---|---|
.. | ||
debian | ||
Makefile | ||
polkit-1-qubes-allow-all.pkla | ||
polkit-1-qubes-allow-all.rules | ||
qubes.sudoers |