File tree Expand file tree Collapse file tree 1 file changed +18
-1
lines changed Expand file tree Collapse file tree 1 file changed +18
-1
lines changed Original file line number Diff line number Diff line change @@ -287,9 +287,26 @@ mechanism to check the integrity of the upper composefs.
287287For more information about this, see
288288[ this tracking issue] ( https://github.com/bootc-dev/bootc/issues/1190 ) .
289289
290- ### Enabling fsverity across upgrades
290+ Note that the default ` /etc ` and ` /var ` mounts are unaffected by
291+ this configuration. Because ` /etc ` in particular can easily
292+ contain arbitrary executable code (` /etc/systemd/system ` unit files),
293+ many deployment scenarios that want to hard require fsverity will also
294+ want a "transient etc" model.
295+
296+ ### Caveats
297+
298+ #### Does not apply to logically bound images
299+
300+ The [ logically bound images] ( logically-bound-images.md ) store is currently
301+ implemented using a separate mechanism and configuring fsverity
302+ for the bootc storage has no effect on it.
303+
304+ #### Enabling fsverity across upgrades
291305
292306At the current time the integration is only for
293307installation; there is not yet support for automatically ensuring that
294308fsverity is enabled when upgrading from a state with
295309` composefs.enabled = yes ` to ` composefs.enabled = verity ` .
310+ Because older objects may not have fsverity enabled,
311+ the new system will likely fail at runtime to access these older files
312+ across the upgrade.
You can’t perform that action at this time.
0 commit comments