Currently fscrypt adds keys to session keyring (KEY_SPEC_SESSION_KEYRING). Applications started within systemd --user instance have their own session keyring which means they would have no access to encrypted directories. To fix this we need add keys to user keyring (KEY_SPEC_USER_KEYRING) instead.
You can test it by invoking systemd-run --user keyctl show,and check logs, the keyring is empty.
Using user keyring is recommended by systemd developers, see systemd/systemd#1299 (comment)
neithernut/pam_e4crypt#14
systemd/systemd#5715
Currently fscrypt adds keys to session keyring (KEY_SPEC_SESSION_KEYRING). Applications started within
systemd --userinstance have their own session keyring which means they would have no access to encrypted directories. To fix this we need add keys to user keyring (KEY_SPEC_USER_KEYRING) instead.You can test it by invoking
systemd-run --user keyctl show,and check logs, the keyring is empty.Using user keyring is recommended by systemd developers, see systemd/systemd#1299 (comment)
neithernut/pam_e4crypt#14
systemd/systemd#5715