Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

enforce-container-sigpolicy is not an available option for bootc upgrade #528

Open
arewm opened this issue May 14, 2024 · 1 comment
Open
Labels
area/cli Related to the client/CLI

Comments

@arewm
Copy link

arewm commented May 14, 2024

It is possible to enforce the container signature policy when switching and installing (via install-to-disk and install-to-filesystem) but there is no option to verify the policy when performing a bootc upgrade.

In the documentation for switch, I see

This is almost exactly the same operation as upgrade, but additionally changes the container image reference instead.

Should the upgrade path support this parameter of is the "almost exactly the same operation" different enough that the policy verification doesn't make sense?

@cgwalters cgwalters added the area/cli Related to the client/CLI label May 15, 2024
@karelvanhecke
Copy link

Looks like bootc upgrade inherits the behavior of bootc install/switch when the --enforce-container-sigpolicy flag was set.

As you can see in the following example, bootc upgrade refuses to continue with the insecureAcceptAnything default.
After changing back the default to reject, bootc upgrade will work again.

[karel@bootc-test ~]$ sudo bootc upgrade --check
ERROR Upgrading: Preparing import: Fetching manifest: containers-policy.json specifies a default of `insecureAcceptAnything`; refusing usage
[karel@bootc-test ~]$ sudoedit /etc/containers/policy.json
[karel@bootc-test ~]$ sudo bootc upgrade --check
No changes in: ostree-image-signed:docker://quay.io/karelvanhecke/bootc-test:latest

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/cli Related to the client/CLI
Projects
None yet
Development

No branches or pull requests

3 participants