How to Test Sealed Bootable Container Images for Fedora Atomic Desktops

Introduction

Sealed bootable container images are a new way to create fully verified boot chains for Fedora Atomic Desktops. They bundle everything needed—from firmware to the operating system's composefs image—and rely on Secure Boot with UEFI support on x86_64 and aarch64 architectures. These testing images allow you to experiment with passwordless disk unlocking using TPM in a reasonably secure default setup. This guide will walk you through testing the pre-built images or building your own, so you can contribute feedback and help shape the future of bootable containers.

How to Test Sealed Bootable Container Images for Fedora Atomic Desktops
Source: fedoramagazine.org

What You Need

Step-by-Step Instructions

Step 1: Ensure Your System Meets Requirements

Before downloading anything, confirm that your system boots with UEFI. These images do not support legacy BIOS. If you're on an aarch64 machine, verify that it uses UEFI as well. While Secure Boot is part of the sealed chain, the testing images are signed with test keys—not official Fedora keys—so you may need to temporarily disable Secure Boot or enroll the test keys (see the repository for details).

Step 2: Download a Pre-Built Image (or Build Your Own)

Head over to the releases page of the GitHub repository and grab the latest pre-built image for your architecture. Alternatively, if you want to customize the image (e.g., add packages or change kernel parameters), you can build your own using the provided containerfile and scripts. Building is more involved but gives you full control. For testing purposes, the pre-built image is recommended.

Step 3: Create a Bootable USB Drive

Use a tool like dd on Linux or Rufus on Windows to write the raw image to your USB drive. For example:

sudo dd if=fedora-atomic-desktops-sealed-*.raw of=/dev/sdX bs=4M status=progress

Replace /dev/sdX with your USB device (be careful not to overwrite your main disk). Once written, you can boot from it directly.

Step 4: Boot the Image and Test

Insert the USB drive and restart your computer. Enter the boot menu (usually F12, F2, or Del) and select the USB drive as the boot device. The system should load systemd-boot and then the Unified Kernel Image (UKI). You may see warnings about a self-signed Secure Boot key—this is normal for test images.

How to Test Sealed Bootable Container Images for Fedora Atomic Desktops
Source: fedoramagazine.org

After boot, you’ll land in a live environment. The root account has no password set, and SSH is enabled by default for debugging. Do not use this in production! Try out the TPM-based disk unlocking if your hardware supports it. You can also run bootc status to verify the boot chain integrity.

Step 5: Provide Feedback and Report Issues

Testing is most valuable when you share your experience. Check the known issues list first, then open a new issue on the same repository if you encounter something new. Include details about your hardware, steps to reproduce, and any error messages. Your feedback helps improve the project!

Tips and Important Notes

For deeper technical details on how sealed images work—composefs, UKIs, and the verified boot chain—refer to the talks and documentation linked in the original announcement. Happy testing!

Tags:

Recommended

Discover More

Long-Lost 86-DOS 1.00 Source Code, Rescued From Garage, Released by MicrosoftNew iPad Models Rumored for Late 2024: A Q&A GuideNavigating the Clicks Communicator Shipping Timeline: A Comprehensive Guide for Reservation HoldersBridging the AI Governance Gap: From Policy to Operational ReadinessNew Life for an Old Drug: DFMO Brings Hope to Children with Bachmann-Bupp Syndrome