Guild icon
S3Drive
Community / support / S3Drive via flatpak on Arch does not unlock the keyring
Avatar
Hi there! I have just installed the app locally and neither signing in nor the "Connect" button work. Here is what I get in console: method call InitAppWindow method call InitSystemTray method call CreateContextMenu value_to_menu_item type:label, label:Show value_to_menu_item type:label, label:Hide value_to_menu_item type:label, label:Start drive mount value_to_menu_item type:label, label:Stop drive mount value_to_menu_item type:label, label:Clear mount cache value_to_menu_item type:label, label:Start WebDav value_to_menu_item type:label, label:Stop WebDav value_to_menu_item type:label, label:Support value_to_menu_item type:label, label:Visit Website value_to_menu_item type:label, label:About value_to_menu_item type:label, label:Changelog value_to_menu_item type:label, label:Logs value_to_menu_item type:label, label:Version 1.9.8 method call SetContextMenu flutter: Initializing auth ** (kapsa:2): WARNING **: 07:54:35.908: libsecret_error: Failed to unlock the keyring (edited)
Avatar
Any hint on this guy? I am stuck on my linux box (Arch) but I am willing to debug what is going on
Avatar
@Tom was wondering if I can do anything for solving this
Avatar
@Ari Sorry for the delay. Well, it would certainly be helpful to know if you can run other Flatpak apps that use Keyring / libsecret without problems. Something like Keepass or similar. If other Flatpak apps can utilize keyring on Arch, then we could possibly look up how they configured their environment and apply to S3Drive.
Avatar
No problem! I do have KeepassXC installed and use it via web browser but that might not be enough. Which other apps would you suggest? I am not really a big Flatpak user...
Avatar
Problem If KeePassXC is sandboxed in a Flatpak, browsers can only access it, if they are not sandboxed, i.e. installed as an deb/rpm package or similar on the host. Sandboxing both the browser, i.e. Firefox, and KeePassXC – or at least the browser and installing KeePassXC natively, which you’d actually want for security reasons – is not possibl...
Avatar
What would be your preferred distrubtion method for S3Drive on Archlinux?
Avatar
The most common pattern is to write a wrapper that deploys from other packages (aka tar.gz or deb) and publish it in the https://aur.archlinux.org Flatpak or AppImage are also perfectly fine - I think this problem is more due to the way the keyring is (not) configured on Arch (which usually locks everything by default)
10:37 PM
for example for Gnome you'd have to have something to open it up
GNOME Keyring exposes an XDG Portal backend (for use with applications sandboxed through flatpak for example). In order for it to work outside of GNOME, one must add their desktop environment to the /usr/share/xdg-desktop-portal/portals/gnome-keyring.portal configuration file by modifying the UseIn key
I don't use Gnome so I'll probably have to discover how to expose my keyring - is there any way to disable it?
Avatar
and indeed installing xdg-desktop-portal-gtk worked!
👍 1
Avatar
That's great news. Would that be simply: pacman -S xdg-desktop-portal-gtk on Archlinux?
Avatar
yep that's exactly what I did
Avatar
Hmmm no this still happens
Gtk-Message: 08:59:02.590: Failed to load module "xapp-gtk3-module" Gtk-Message: 08:59:02.590: Failed to load module "canberra-gtk-module" package:media_kit_libs_linux registered. (kapsa:2): WARNING : 08:59:02.774: libsecret_error: Failed to unlock the keyring flutter: Failed to init encrypted preferences. PlatformException(Libsecret error, Failed to unlock the keyring, null, null)
Avatar
Ok I also had to do what described in this comment for having keepassxc working as keyring https://github.com/keepassxreboot/keepassxc/issues/6274#issuecomment-810983553 Added this file cat .local/share/dbus-1/services/org.freedesktop.secrets.service [D-BUS Service] Name=org.freedesktop.secrets Exec=/usr/bin/keepassxc And finally enabled the Secret Service https://avaldes.co/2020/01/28/secret-service-keepassxc.html
5:10 PM
@Tom see above - I guess on the README you could just say "Make sure your linux desktop has a configured org.freedesktop.secrets.service" and call it a day (Arch users will figured it out)
Exported 16 message(s)
Timezone: UTC+0