Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

canonical composefs, backing store path notes #2165

Open
cgwalters opened this issue Nov 8, 2024 · 0 comments
Open

canonical composefs, backing store path notes #2165

cgwalters opened this issue Nov 8, 2024 · 0 comments
Labels
area/composefs composefs related changes

Comments

@cgwalters
Copy link
Contributor

Chatting with Giuseppe today one thing that came up is the backing store path today in c/storage is the full-SHA (from the zstd:chunked TOC), and we don't put the expected fsverity digest in there at all.

I think for standardizing "Verified OCI" we need a canonical mapping of OCI image to composefs final merged digest, and that digest needs to include the fsverity digest. And we need to canonicalize the backing store path. I would like that to always be the fsverity digest - not anything else.

So other projects like c/storage or ostree that may have other checksums by which they wish to index can maintain that "out of band" in some way.

What this would mean though practically is c/storage would need to (if we wanted to maintain the backing store paths pointing at full-sha) create a secondary composefs at runtime based on the first one or so? Or maybe it's actually just easier to have a hardlink farm named by both fsverity digest and full-sha that we keep in sync? (i.e. objects/verity/00... and objects/fullsha/00...).

@cgwalters cgwalters added the area/composefs composefs related changes label Nov 8, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/composefs composefs related changes
Projects
None yet
Development

No branches or pull requests

1 participant