i managed to create a simple script to unlock the keyring. I'm no security expert and this is by no means a reccomended way to do it, but as i always say convenience is inversely proportional to security. besides for fingerprint log in, your fingerprint are probably all over the device your protecting anyway...
anyway without further ado this is one way to do it:
- create a simple text file somewhere for this example i will create it at
/etc/gnome/pwd.txt. this file will contain your keyring password and nothing else
- run
chmod 600 /etc/gnome/pwd.txt so that only the file owner can read it
- now you need to run
chown $USER:$USER /etc/gnome/pwd.txt to ensure that only your user can read this file
- create script called say
fbi with these contents:
#!/bin/bash
/bin/echo -n $(/bin/cat /etc/gnome/pwd.txt)|/usr/bin/gnome-keyring-daemon --daemonize --login
- then also run set the permissions right with
chmod 700 /absolute/path/to/fbi and chown $USER:$USER /absolute/path/to/fbi
- now make user service by creating a file called say
/etc/systemd/user/cia.service with the following contents
[Unit]
Description=Super Top Secret Service
[Service]
ExecStart=/absolute/path/to/fbi
[Install]
WantedBy=graphical-session.target
- run
systemctl --user enable cia and voila now you automagically unlock your keyring on login
it is secure? no it is not. if someone got a hold of your harddrive, sure they can't read the keyring, but they can find the file that contains the password. this has no real benefit, as far as i can tell, from simply setting a blank password. it is convenient? sure is. and hey you can also save not save your passwordfile on the machine your trying to protect :^3 still not secure tho if that file gets into the wrong hands