Fix GNOME Keyring permission issue: move tmpfiles rules to user level

Agent-Logs-Url: https://github.com/naturallaw777/staging_alpha/sessions/3ed85d6b-ada9-48e1-941f-1150e1491157

Co-authored-by: naturallaw777 <99053422+naturallaw777@users.noreply.github.com>
This commit is contained in:
copilot-swe-agent[bot]
2026-04-30 16:32:36 +00:00
committed by GitHub
parent 976d8f3609
commit bfc60eeb2c
+5 -7
View File
@@ -70,13 +70,11 @@
security.pam.services.gdm-password.enableGnomeKeyring = true; security.pam.services.gdm-password.enableGnomeKeyring = true;
security.pam.services.gdm-autologin.enableGnomeKeyring = true; security.pam.services.gdm-autologin.enableGnomeKeyring = true;
# Declaratively guarantee the GNOME Keyring default pointer exists. # Declaratively guarantee the GNOME Keyring default pointer exists for the free user.
# The 'f' directive creates the file only when it is absent, so legacy # Running this at the user level prevents root from corrupting ~/.local permissions on fresh installs.
# machines that already have a valid pointer are never overwritten. systemd.user.tmpfiles.rules = [
# The content 'login' tells pam_gnome_keyring which keyring to unlock on login. "d %h/.local/share/keyrings 0700 - - - -"
systemd.tmpfiles.rules = [ "f %h/.local/share/keyrings/default 0600 - - - login\n"
"d /home/free/.local/share/keyrings 0700 free users -"
"f /home/free/.local/share/keyrings/default 0600 free users - login\n"
]; ];
# ── Audio ────────────────────────────────────────────────── # ── Audio ──────────────────────────────────────────────────