2017-08-09 16:59:14 +02:00
|
|
|
# Configuration for the one-user-system user module.
|
|
|
|
#
|
|
|
|
# Besides these settings, the user module also places the following
|
|
|
|
# keys into the globalconfig area, based on user input in the view step.
|
|
|
|
#
|
|
|
|
# - hostname
|
|
|
|
# - username
|
|
|
|
# - password (obscured)
|
|
|
|
# - autologinUser (if enabled, set to username)
|
|
|
|
#
|
|
|
|
# These globalconfig keys are set when the jobs for this module
|
|
|
|
# are created.
|
2014-10-08 15:02:27 +02:00
|
|
|
---
|
2017-10-30 20:44:51 +01:00
|
|
|
# Used as default groups for the created user.
|
|
|
|
# Adjust to your Distribution defaults.
|
2014-10-08 15:02:27 +02:00
|
|
|
defaultGroups:
|
2015-11-17 21:55:50 +01:00
|
|
|
- users
|
2014-10-08 15:02:27 +02:00
|
|
|
- lp
|
|
|
|
- video
|
|
|
|
- network
|
|
|
|
- storage
|
|
|
|
- wheel
|
|
|
|
- audio
|
2017-10-30 20:44:51 +01:00
|
|
|
|
2017-10-30 23:20:43 +01:00
|
|
|
# Some Distributions require a 'autologin' group for the user.
|
|
|
|
# Autologin causes a user to become automatically logged in to
|
|
|
|
# the desktop environment on boot.
|
|
|
|
# Disable when your Distribution does not require such a group.
|
2015-06-11 04:02:06 +02:00
|
|
|
autologinGroup: autologin
|
2017-10-30 23:20:43 +01:00
|
|
|
# You can control the initial state for the 'autologin checkbox' in UsersViewStep here.
|
2019-08-28 17:14:00 +02:00
|
|
|
# Possible values are: true to enable or false to disable the checkbox by default.
|
2015-08-19 12:51:40 +02:00
|
|
|
doAutologin: true
|
2017-02-02 18:20:12 +01:00
|
|
|
|
2017-10-31 13:09:34 +01:00
|
|
|
# When set to a non-empty string, Calamares creates a sudoers file for the user.
|
2017-10-30 23:20:43 +01:00
|
|
|
# /etc/sudoers.d/10-installer
|
|
|
|
# Remember to add sudoersGroup to defaultGroups.
|
2017-10-31 13:09:34 +01:00
|
|
|
#
|
|
|
|
# If your Distribution already sets up a group of sudoers in its packaging,
|
|
|
|
# remove this setting (delete or comment out the line below). Otherwise,
|
|
|
|
# the setting will be duplicated in the /etc/sudoers.d/10-installer file,
|
|
|
|
# potentially confusing users.
|
2015-06-11 04:02:06 +02:00
|
|
|
sudoersGroup: wheel
|
2017-02-02 18:20:12 +01:00
|
|
|
|
2017-10-30 23:20:43 +01:00
|
|
|
# Setting this to false , causes the root account to be disabled.
|
2015-06-11 04:02:06 +02:00
|
|
|
setRootPassword: true
|
2017-10-30 23:20:43 +01:00
|
|
|
# You can control the initial state for the 'root password checkbox' in UsersViewStep here.
|
|
|
|
# Possible values are: true to enable or false to disable the checkbox by default.
|
|
|
|
# When enabled the user password is used for the root account too.
|
|
|
|
# NOTE: doReusePassword requires setRootPassword to be enabled.
|
2015-11-09 01:53:11 +01:00
|
|
|
doReusePassword: true
|
2017-09-18 16:08:21 +02:00
|
|
|
|
|
|
|
# These are optional password-requirements that a distro can enforce
|
|
|
|
# on the user. The values given in this sample file disable each check,
|
|
|
|
# as if the check was not listed at all.
|
|
|
|
#
|
|
|
|
# Checks may be listed multiple times; each is checked separately,
|
|
|
|
# and no effort is done to ensure that the checks are consistent
|
|
|
|
# (e.g. specifying a maximum length less than the minimum length
|
|
|
|
# will annoy users).
|
|
|
|
#
|
2018-01-23 15:28:49 +01:00
|
|
|
# The libpwquality check relies on the (optional) libpwquality library.
|
|
|
|
# Its value is a list of configuration statements that could also
|
|
|
|
# be found in pwquality.conf, and these are handed off to the
|
|
|
|
# libpwquality parser for evaluation. The check is ignored if
|
|
|
|
# libpwquality is not available at build time (generates a warning in
|
|
|
|
# the log). The Calamares password check rejects passwords with a
|
|
|
|
# score of < 40 with the given libpwquality settings.
|
|
|
|
#
|
|
|
|
# (additional checks may be implemented in CheckPWQuality.cpp and
|
|
|
|
# wired into UsersPage.cpp)
|
2019-08-28 17:14:00 +02:00
|
|
|
#
|
|
|
|
# To disable specific password validations,
|
|
|
|
# comment out the relevant 'passwordRequirements' keys below.
|
|
|
|
# To disable all password validations,
|
|
|
|
# set both 'allowWeakPasswords' and 'doPasswordChecks' to false.
|
2017-09-18 16:08:21 +02:00
|
|
|
passwordRequirements:
|
|
|
|
minLength: -1 # Password at least this many characters
|
|
|
|
maxLength: -1 # Password at most this many characters
|
2018-01-23 15:28:49 +01:00
|
|
|
libpwquality:
|
2018-05-23 09:30:51 +02:00
|
|
|
- minlen=0
|
|
|
|
- minclass=0
|
2019-08-28 17:14:00 +02:00
|
|
|
# You can control the visibility of the 'strong passwords' checkbox in UsersViewStep here.
|
|
|
|
# Possible values are: true to show or false to hide the checkbox.
|
|
|
|
allowWeakPasswords: true
|
|
|
|
# You can control the initial state for the 'strong passwords' checkbox in UsersViewStep here.
|
|
|
|
# Possible values are: true to enable or false to disable the checkbox by default.
|
|
|
|
doPasswordChecks: true
|
2018-05-23 11:23:46 +02:00
|
|
|
|
|
|
|
# Shell to be used for the regular user of the target system.
|
|
|
|
# There are three possible kinds of settings:
|
|
|
|
# - unset (i.e. commented out, the default), act as if set to /bin/bash
|
|
|
|
# - empty (explicit), don't pass shell information to useradd at all
|
|
|
|
# and rely on a correct configuration file in /etc/default/useradd
|
|
|
|
# - set, non-empty, use that path as shell. No validation is done
|
|
|
|
# that the shell actually exists or is executable.
|
|
|
|
# userShell: /bin/bash
|