@@ -146,7 +146,26 @@ However, for some use cases, it may be easier to allow some level of mutability.
146146There are two options for this, each with separate trade-offs: transient roots
147147and state overlays.
148148
149- #### Enabling transient root
149+ ### Other toplevel directories
150+
151+ Creating other toplevel directories and content (e.g. ` /afs ` , ` /arbitrarymountpoint ` )
152+ or in general further nested data is supported - just create the directory
153+ as part of your container image build process (e.g. ` RUN mkdir /arbitrarymountpoint ` ).
154+ These directories will be lifecycled with the container image state,
155+ and appear immutable by default, the same as all other directories
156+ such as ` /usr ` and ` /opt ` .
157+
158+ Mounting separate filesystems there can be done by the usual mechanisms
159+ of ` /etc/fstab ` , systemd ` .mount ` units, etc.
160+
161+ #### SELinux for arbitrary toplevels
162+
163+ Note that operating systems using SELinux may use a label such as
164+ ` default_t ` for unknown toplevel directories, which may not be
165+ accessible by some processes. In this situation you currently may
166+ need to also ensure a label is defined for them in the file contexts.
167+
168+ ## Enabling transient root
150169
151170This feature enables a fully transient writable rootfs by default.
152171To do this, set the
@@ -161,7 +180,7 @@ write (transiently, i.e. until the next reboot) to all top-level directories,
161180including ` /usr ` and ` /opt ` , with symlinks to ` /var ` for content that should
162181persist.
163182
164- #### Enabling state overlays
183+ ## Enabling state overlays
165184
166185This feature enables a writable overlay on top of ` /opt ` (or really, any
167186toplevel or subdirectory baked into the image that is normally read-only).
0 commit comments