Linux & DevOps

How to Test Sealed Bootable Container Images on Fedora Atomic Desktops

2026-05-02 21:59:23

Introduction

Fedora Atomic Desktops now offer sealed bootable container images for testing. These images create a fully verified boot chain from firmware to the operating system, leveraging Secure Boot, systemd-boot, Unified Kernel Images (UKIs), and composefs with fs-verity. This guide walks you through the process of testing these images, whether you want to use pre-built versions or build your own. By the end, you'll be able to experience the benefits of a tamper-proof boot process and contribute feedback to the development community.

How to Test Sealed Bootable Container Images on Fedora Atomic Desktops
Source: fedoramagazine.org

What You Need

Step-by-Step Instructions

Step 1: Understand the Components

Before diving in, familiarize yourself with the key parts of a sealed bootable container image:

Both systemd-boot and the UKI are signed for Secure Boot using test keys (not the official Fedora keys). This ensures the boot chain is verified from the firmware onward.

Step 2: Check Your System's Compatibility

These images only support UEFI boot on x86_64 and aarch64 architectures. Verify your system:

Step 3: Choose Your Testing Method

You have two options:

Both methods are documented in the official GitHub repository: github.com/travier/fedora-atomic-desktops-sealed.

Step 4 (Option A): Use Pre-Built Images

  1. Go to the repository and download the latest release of the disk image (e.g., .raw or .iso file).
  2. Write the image to a USB drive using dd or a tool like Fedora Media Writer:
    dd if=path/to/image.raw of=/dev/sdX bs=4M status=progress
    (Replace /dev/sdX with your USB device.)
  3. Boot from the USB drive. If Secure Boot is enabled, you may see a warning about the unsigned test keys – proceed to test.
  4. Once booted, log in as root (no password set by default) and explore the sealed system. Note that SSH is enabled by default for debugging – disable it if you don't need it.

Step 4 (Option B): Build Your Own Sealed Image

  1. Clone the repository: git clone https://github.com/travier/fedora-atomic-desktops-sealed.git.
  2. Install dependencies: podman, buildah, and bootc (see the repository's README for exact versions).
  3. Follow the build instructions in the BUILD.md file – this typically involves running a script that creates a container image with composefs, signs the UKI with test keys, and generates a bootable disk image.
  4. Write the resulting disk image to a USB drive or install it directly to a disk using bootc install.

Step 5: Boot and Verify the Secure Chain

After booting, run the following commands to confirm the boot chain is sealed:

How to Test Sealed Bootable Container Images on Fedora Atomic Desktops
Source: fedoramagazine.org

If Secure Boot is active, the system will refuse to boot if any component has been tampered with.

Step 6: Test TPM-Based Unlocking (Optional)

The sealed images enable passwordless disk unlocking using the TPM. This works because the boot chain is verified, so the TPM can safely release the encryption key. To test this:

  1. Install the system to a disk (not just live boot) using bootc install.
  2. Reboot and ensure Secure Boot is active.
  3. You should be prompted only for the TPM PIN (if set) or boot directly to the desktop without a disk password.

Step 7: Provide Feedback and Report Issues

Testing is valuable! Before reporting issues, check the known issues list on the repository. If you find a new bug, open an issue with as much detail as possible (hardware, boot logs, steps to reproduce). The maintainers will redirect to the appropriate upstream projects (bootc, composefs, systemd, etc.).

Tips and Best Practices

Explore

From QDOS to GitHub: Building Your Own DOS from 45-Year-Old Source Code Python 3.14.0rc2 Released Early; Third Release Candidate Added for Final 2025 Debut How to Harness GeForce NOW's RTX 5080 Power to Stream May's Biggest Game Releases Tesla Semi Deploys in Southern California Port Drayage Pilot with MDB Transportation How to Analyze the OnePlus-Realme Merger and Its Implications for the Smartphone Market