Skip to content

Commit 833dda4

Browse files
committed
docs/filesystem: Explain a little bit more about fsverity
- Doesn't apply to LBIs, and actually c/storage has no knob for this - Elaborate a bit on /etc and /var Signed-off-by: Colin Walters <[email protected]>
1 parent 61c7ee4 commit 833dda4

File tree

1 file changed

+18
-1
lines changed

1 file changed

+18
-1
lines changed

docs/src/filesystem.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -287,9 +287,26 @@ mechanism to check the integrity of the upper composefs.
287287
For more information about this, see
288288
[this tracking issue](https://github.com/bootc-dev/bootc/issues/1190).
289289

290-
### Enabling fsverity across upgrades
290+
Note that the default `/etc` and `/var` mounts are unaffected by
291+
this configuration. Because `/etc` in particular can easily
292+
contain arbitrary executable code (`/etc/systemd/system` unit files),
293+
many deployment scenarios that want to hard require fsverity will also
294+
want a "transient etc" model.
295+
296+
### Caveats
297+
298+
#### Does not apply to logically bound images
299+
300+
The [logically bound images](logically-bound-images.md) store is currently
301+
implemented using a separate mechanism and configuring fsverity
302+
for the bootc storage has no effect on it.
303+
304+
#### Enabling fsverity across upgrades
291305

292306
At the current time the integration is only for
293307
installation; there is not yet support for automatically ensuring that
294308
fsverity is enabled when upgrading from a state with
295309
`composefs.enabled = yes` to `composefs.enabled = verity`.
310+
Because older objects may not have fsverity enabled,
311+
the new system will likely fail at runtime to access these older files
312+
across the upgrade.

0 commit comments

Comments
 (0)