summary refs log blame commit diff
path: root/nixos/modules/programs/i3lock.nix
blob: 466ae59c9277f60f1632ce8b51e52e7eb621d0a1 (plain) (tree)

























































                                                                                                                                          
{ config, lib, pkgs, ... }:

with lib;

let

  cfg = config.programs.i3lock;

in {

  ###### interface

  options = {
    programs.i3lock = {
      enable = mkEnableOption (mdDoc "i3lock");
      package = mkOption {
        type        = types.package;
        default     = pkgs.i3lock;
        defaultText = literalExpression "pkgs.i3lock";
        example     = literalExpression ''
          pkgs.i3lock-color
        '';
        description = mdDoc ''
          Specify which package to use for the i3lock program,
          The i3lock package must include a i3lock file or link in its out directory in order for the u2fSupport option to work correctly.
        '';
      };
      u2fSupport = mkOption {
        type        = types.bool;
        default     = false;
        example     = true;
        description = mdDoc ''
          Whether to enable U2F support in the i3lock program.
          U2F enables authentication using a hardware device, such as a security key.
          When U2F support is enabled, the i3lock program will set the setuid bit on the i3lock binary and enable the pam u2fAuth service,
        '';
      };
    };
  };

  ###### implementation

  config = mkIf cfg.enable {

    environment.systemPackages = [ cfg.package ];

    security.wrappers.i3lock = mkIf cfg.u2fSupport {
      setuid = true;
      owner = "root";
      group = "root";
      source = "${cfg.package.out}/bin/i3lock";
    };

    security.pam.services.i3lock.u2fAuth = cfg.u2fSupport;

  };

}