Hi Maxim,

Maxim Cournoyer <maxim.courno...@gmail.com> writes:

Hi muradm,

muradm <m...@muradm.net> writes:

[...]

Could you look into adding "regular" login PAM support instead of a bypass disabled by default? The user should still be prompted for
its
password, and it should go through the PAM auth module.

I'm not very PAM-aware, but I believe there are examples spread in
the
code base.

This patch provides necessary configuration for proper PAM support.
I decided to take screen-locker-service-type's configuration as
basis, since it is was most simpliest and adequate enough for this
case.
This patch does not disables, baypasses or cheats PAM in any way. User may navigate to CUPS portal. In the event of administrative
actions taken by user, CUPS portal asks user to authenticate.
With this configuration, it will attempt to authenticate as local system user. In the event of proper system user/password supplied and positively authenticated against PAM using "cups" service name, user allowed to take administrative action. In the event of invalid
system user/password supplied, CUPS portal will keep looping
begging for password (just as in your original case). If user decides to Cancel the authentication dialog, CUPS portal is navigated to
Unauthorized access informing page.

Why would I submit something that it is not working?

I didn't mean to imply that it didn't work; I just thought that it was somehow bypassing PAM (and the original problem it caused in the first place). As I wrote earlier, I know next to nothing about PAM, and
misread your patch.

I've now installed the change. Thanks for the fix, and thanks to
Ricardo for the reminder.

Cool, thanks!

Attachment: signature.asc
Description: PGP signature

Reply via email to