Initial fs-verity support
authorColin Walters <walters@verbum.org>
Fri, 25 Oct 2019 22:07:44 +0000 (22:07 +0000)
committerColin Walters <walters@verbum.org>
Mon, 27 Jan 2020 15:44:16 +0000 (15:44 +0000)
commit58fa579b1be19104025b1f71b4e52a255cc2a50b
tree5d82a00c10cb4858e496317612c8d3c9af33e23d
parent570de2989c4685943b4907512939de7b3f24132c
Initial fs-verity support

Using fs-verity is natural for OSTree because it's file-based,
as opposed to block based (like dm-verity).  This only covers
files - not symlinks or directories.  And we clearly need to
have integrity for the deployment directories at least.

Also, what we likely need is an API that supports signing files
as they're committed.

So making this truly secure would need a lot more work.  Nevertheless,
I think it's time to start experimenting with it.  Among other things,
it does *finally* add an API that makes files immutable, which will
help against some accidental damage.

This is basic enablement work that is being driven by
Fedora CoreOS; see also https://github.com/coreos/coreos-assembler/pull/876
configure.ac
src/libostree/ostree-repo-commit.c
src/libostree/ostree-repo-private.h
src/libostree/ostree-repo.c
src/libostree/ostree-sysroot-deploy.c