File tree Expand file tree Collapse file tree 1 file changed +18
-1
lines changed Expand file tree Collapse file tree 1 file changed +18
-1
lines changed Original file line number Diff line number Diff line change @@ -287,9 +287,26 @@ mechanism to check the integrity of the upper composefs.
287
287
For more information about this, see
288
288
[ this tracking issue] ( https://github.com/bootc-dev/bootc/issues/1190 ) .
289
289
290
- ### Enabling fsverity across upgrades
290
+ Note that the default ` /etc ` and ` /var ` mounts are unaffected by
291
+ this configuration. Because ` /etc ` in particular can easily
292
+ contain arbitrary executable code (` /etc/systemd/system ` unit files),
293
+ many deployment scenarios that want to hard require fsverity will also
294
+ want a "transient etc" model.
295
+
296
+ ### Caveats
297
+
298
+ #### Does not apply to logically bound images
299
+
300
+ The [ logically bound images] ( logically-bound-images.md ) store is currently
301
+ implemented using a separate mechanism and configuring fsverity
302
+ for the bootc storage has no effect on it.
303
+
304
+ #### Enabling fsverity across upgrades
291
305
292
306
At the current time the integration is only for
293
307
installation; there is not yet support for automatically ensuring that
294
308
fsverity is enabled when upgrading from a state with
295
309
` composefs.enabled = yes ` to ` composefs.enabled = verity ` .
310
+ Because older objects may not have fsverity enabled,
311
+ the new system will likely fail at runtime to access these older files
312
+ across the upgrade.
You can’t perform that action at this time.
0 commit comments