{ config, lib, pkgs, ... }: with lib; let cfg = config.security.pam.mount; anyPamMount = any (attrByPath ["pamMount"] false) (attrValues config.security.pam.services); in { options = { security.pam.mount = { enable = mkOption { type = types.bool; default = false; description = '' Enable PAM mount system to mount fileystems on user login. ''; }; extraVolumes = mkOption { type = types.listOf types.str; default = []; description = '' List of volume definitions for pam_mount. For more information, visit <link xlink:href="http://pam-mount.sourceforge.net/pam_mount.conf.5.html" />. ''; }; }; }; config = mkIf (cfg.enable || anyPamMount) { environment.systemPackages = [ pkgs.pam_mount ]; environment.etc = [{ target = "security/pam_mount.conf.xml"; source = let extraUserVolumes = filterAttrs (n: u: u.cryptHomeLuks != null) config.users.extraUsers; userVolumeEntry = user: "<volume user=\"${user.name}\" path=\"${user.cryptHomeLuks}\" mountpoint=\"${user.home}\" />\n"; in pkgs.writeText "pam_mount.conf.xml" '' <?xml version="1.0" encoding="utf-8" ?> <!DOCTYPE pam_mount SYSTEM "pam_mount.conf.xml.dtd"> <!-- auto generated from Nixos: modules/config/users-groups.nix --> <pam_mount> <debug enable="0" /> ${concatStrings (map userVolumeEntry (attrValues extraUserVolumes))} ${concatStringsSep "\n" cfg.extraVolumes} <!-- if activated, requires ofl from hxtools to be present --> <logout wait="0" hup="no" term="no" kill="no" /> <!-- set PATH variable for pam_mount module --> <path>${pkgs.utillinux}/bin</path> <!-- create mount point if not present --> <mkmountpoint enable="1" remove="true" /> <!-- specify the binaries to be called --> <cryptmount>${pkgs.pam_mount}/bin/mount.crypt %(VOLUME) %(MNTPT)</cryptmount> <cryptumount>${pkgs.pam_mount}/bin/umount.crypt %(MNTPT)</cryptumount> <pmvarrun>${pkgs.pam_mount}/bin/pmvarrun -u %(USER) -o %(OPERATION)</pmvarrun> </pam_mount> ''; }]; }; }