diff --git a/test/units/TEST-50-DISSECT.mountfsd.sh b/test/units/TEST-50-DISSECT.mountfsd.sh index d2ce67714a..52fa94ecc5 100755 --- a/test/units/TEST-50-DISSECT.mountfsd.sh +++ b/test/units/TEST-50-DISSECT.mountfsd.sh @@ -67,6 +67,14 @@ systemd-dissect --image-policy='root=verity+signed:=absent+unused' --mtree /var/ # This should fail before we install the key (! systemd-dissect --image-policy='root=signed:=absent+unused' --mtree /var/tmp/unpriv.raw >/dev/null) +# If the kernel support is present unprivileged user units should be able to use verity images too +if [ "$VERITY_SIG_SUPPORTED" -eq 1 ]; then + systemd-run -M testuser@ --user --pipe --wait \ + --property PrivateUsers=yes \ + --property RootImage="$MINIMAL_IMAGE.gpt" \ + test -e "/dev/mapper/${MINIMAL_IMAGE_ROOTHASH}-verity" +fi + # Install key in keychain mkdir -p /run/verity.d cp /tmp/test-50-unpriv-cert.crt /run/verity.d/