|
|
@@ -1,7 +1,8 @@
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
let
|
|
|
|
let
|
|
|
|
cfg = config.sane.gui.unl0kr;
|
|
|
|
cfg = config.sane.programs.unl0kr;
|
|
|
|
tty = "tty${builtins.toString cfg.vt}";
|
|
|
|
|
|
|
|
|
|
|
|
tty = "tty${builtins.toString cfg.config.vt}";
|
|
|
|
redirect-tty = pkgs.static-nix-shell.mkPython3Bin {
|
|
|
|
redirect-tty = pkgs.static-nix-shell.mkPython3Bin {
|
|
|
|
pname = "redirect-tty";
|
|
|
|
pname = "redirect-tty";
|
|
|
|
src = ./.;
|
|
|
|
src = ./.;
|
|
|
@@ -25,37 +26,41 @@ let
|
|
|
|
|
|
|
|
|
|
|
|
redirect-tty "/dev/${tty}" unl0kr &
|
|
|
|
redirect-tty "/dev/${tty}" unl0kr &
|
|
|
|
# login -p: preserve environment
|
|
|
|
# login -p: preserve environment
|
|
|
|
login -p ${cfg.user}
|
|
|
|
login -p ${cfg.config.user}
|
|
|
|
'';
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
in
|
|
|
|
in
|
|
|
|
{
|
|
|
|
{
|
|
|
|
options = with lib; {
|
|
|
|
sane.programs.unl0kr = {
|
|
|
|
sane.gui.unl0kr.enable = mkOption {
|
|
|
|
configOption = with lib; mkOption {
|
|
|
|
|
|
|
|
default = {};
|
|
|
|
|
|
|
|
type = types.submodule {
|
|
|
|
|
|
|
|
options.autostart = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
description = ''
|
|
|
|
whether to launch unl0kr at boot.
|
|
|
|
whether to launch unl0kr at boot.
|
|
|
|
unl0kr takes the role of a greeter, presenting a virtual keyboard to the framebuffer
|
|
|
|
unl0kr takes the role of a greeter, presenting a virtual keyboard to the framebuffer
|
|
|
|
and allowing password auth via either keyboard, mouse, or touch.
|
|
|
|
and allowing password auth via either keyboard, mouse, or touch.
|
|
|
|
'';
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
sane.gui.unl0kr.vt = mkOption {
|
|
|
|
options.vt = mkOption {
|
|
|
|
type = types.int;
|
|
|
|
type = types.int;
|
|
|
|
default = 1;
|
|
|
|
default = 1;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
sane.gui.unl0kr.user = mkOption {
|
|
|
|
options.user = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
type = types.str;
|
|
|
|
|
|
|
|
# TODO: derive this from sane.programs...enableFor.user.* info
|
|
|
|
default = "colin";
|
|
|
|
default = "colin";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
sane.gui.unl0kr.afterLogin = mkOption {
|
|
|
|
options.afterLogin = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
description = ''
|
|
|
|
shell code to run after a successful login (via .profile).
|
|
|
|
shell code to run after a successful login (via .profile).
|
|
|
|
'';
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
sane.gui.unl0kr.delay = mkOption {
|
|
|
|
options.delay = mkOption {
|
|
|
|
type = types.int;
|
|
|
|
type = types.int;
|
|
|
|
default = 3;
|
|
|
|
default = 3;
|
|
|
|
description = ''
|
|
|
|
description = ''
|
|
|
@@ -63,11 +68,7 @@ in
|
|
|
|
this is a safety mechanism, to allow users an exit in case DE is broken.
|
|
|
|
this is a safety mechanism, to allow users an exit in case DE is broken.
|
|
|
|
'';
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
sane.gui.unl0kr.package = mkOption {
|
|
|
|
options.launcher = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
|
|
|
|
default = pkgs.unl0kr;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
sane.gui.unl0kr.launcher = mkOption {
|
|
|
|
|
|
|
|
type = types.package;
|
|
|
|
type = types.package;
|
|
|
|
default = launcher;
|
|
|
|
default = launcher;
|
|
|
|
description = ''
|
|
|
|
description = ''
|
|
|
@@ -76,15 +77,29 @@ in
|
|
|
|
'';
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
|
|
|
|
|
|
|
|
# lib.mkAfter so that launching the DE happens *after* any other .profile setup.
|
|
|
|
|
|
|
|
# alternatively, we could recurse: exec a new login shell with some env-var signalling to not launch the DE,
|
|
|
|
|
|
|
|
# run with `-c "{cfg.afterLogin}"`
|
|
|
|
|
|
|
|
fs.".profile".symlink.text = lib.mkAfter (lib.optionalString (cfg.config.afterLogin != null) ''
|
|
|
|
|
|
|
|
# if already running a desktop environment, or if running from ssh, then `tty` will show /dev/pts/NN.
|
|
|
|
|
|
|
|
if [ "$(tty)" = "/dev/${tty}" ]; then
|
|
|
|
|
|
|
|
echo 'launching default session in ${builtins.toString cfg.config.delay}s'
|
|
|
|
|
|
|
|
sleep ${builtins.toString cfg.config.delay} && exec ${cfg.config.afterLogin}
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
'');
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
systemd = lib.mkIf cfg.enabled {
|
|
|
|
# prevent nixos-rebuild from killing us after a redeploy
|
|
|
|
# prevent nixos-rebuild from killing us after a redeploy
|
|
|
|
systemd.services."autovt@${tty}".enable = false;
|
|
|
|
services."autovt@${tty}".enable = false;
|
|
|
|
systemd.services.unl0kr = {
|
|
|
|
services.unl0kr = {
|
|
|
|
# --skip-login is funny here: it *doesn't* skip the login; rather it has getty not try to read the username for itself
|
|
|
|
# --skip-login is funny here: it *doesn't* skip the login; rather it has getty not try to read the username for itself
|
|
|
|
# and instead launch --login-program *immediately*
|
|
|
|
# and instead launch --login-program *immediately*
|
|
|
|
# N.B.: exec paths here must be absolute. neither systemd nor agetty query PATH.
|
|
|
|
# N.B.: exec paths here must be absolute. neither systemd nor agetty query PATH.
|
|
|
|
serviceConfig.ExecStart = "${pkgs.util-linux}/bin/agetty --login-program '${cfg.launcher}/bin/unl0kr-login' --noclear --skip-login --keep-baud ${tty} 115200,38400,9600 $TERM";
|
|
|
|
serviceConfig.ExecStart = "${pkgs.util-linux}/bin/agetty --login-program '${cfg.config.launcher}/bin/unl0kr-login' --noclear --skip-login --keep-baud ${tty} 115200,38400,9600 $TERM";
|
|
|
|
|
|
|
|
|
|
|
|
serviceConfig.Type = "simple";
|
|
|
|
serviceConfig.Type = "simple";
|
|
|
|
serviceConfig.Restart = "always";
|
|
|
|
serviceConfig.Restart = "always";
|
|
|
@@ -105,26 +120,17 @@ in
|
|
|
|
restartIfChanged = false;
|
|
|
|
restartIfChanged = false;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
systemd.defaultUnit = "graphical.target";
|
|
|
|
defaultUnit = "graphical.target";
|
|
|
|
|
|
|
|
};
|
|
|
|
# lib.mkAfter so that launching the DE happens *after* any other .profile setup.
|
|
|
|
|
|
|
|
# alternatively, we could recurse: exec a new login shell with some env-var signalling to not launch the DE,
|
|
|
|
|
|
|
|
# run with `-c "{cfg.afterLogin}"`
|
|
|
|
|
|
|
|
sane.users."${cfg.user}".fs.".profile".symlink.text = lib.mkAfter (lib.optionalString (cfg.afterLogin != null) ''
|
|
|
|
|
|
|
|
# if already running a desktop environment, or if running from ssh, then `tty` will show /dev/pts/NN.
|
|
|
|
|
|
|
|
if [ "$(tty)" = "/dev/${tty}" ]; then
|
|
|
|
|
|
|
|
echo 'launching default session in ${builtins.toString cfg.delay}s'
|
|
|
|
|
|
|
|
sleep ${builtins.toString cfg.delay} && exec ${cfg.afterLogin}
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
'');
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
security.loginDefs.settings = lib.mkIf cfg.enabled {
|
|
|
|
# see: `man login.defs`
|
|
|
|
# see: `man login.defs`
|
|
|
|
# disable timeout for `login` program.
|
|
|
|
# disable timeout for `login` program.
|
|
|
|
# LOGIN_TIMEOUT=0 lets me pipe input into `login` and not worry about the pipe randomly dying.
|
|
|
|
# LOGIN_TIMEOUT=0 lets me pipe input into `login` and not worry about the pipe randomly dying.
|
|
|
|
security.loginDefs.settings.LOGIN_TIMEOUT = 0;
|
|
|
|
LOGIN_TIMEOUT = 0;
|
|
|
|
# LOGIN_RETRIES=1 ensures that if the password is wrong, then login exits and the whole service restarts so unl0kr re-appears.
|
|
|
|
# LOGIN_RETRIES=1 ensures that if the password is wrong, then login exits and the whole service restarts so unl0kr re-appears.
|
|
|
|
# docs mention `UNIX_MAX_RETRIES` setting within pam_unix (hardcoded to 3): seems that's an upper-limit to this value, but no lower limit.
|
|
|
|
# docs mention `UNIX_MAX_RETRIES` setting within pam_unix (hardcoded to 3): seems that's an upper-limit to this value, but no lower limit.
|
|
|
|
security.loginDefs.settings.LOGIN_RETRIES = 1;
|
|
|
|
LOGIN_RETRIES = 1;
|
|
|
|
security.loginDefs.settings.FAIL_DELAY = 1; #< delay this long after failed loging before allowing retry
|
|
|
|
FAIL_DELAY = 1; #< delay this long after failed loging before allowing retry
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|