How increase size of home directory partition (ext4 + luks encryption) on Fedora Silverblue 38?

I want increase size of my home directory on Fedora Silverblue.
It is new OS for me, so I have some problem with it.
On classic Linux OS I will create new partition (I not sure how increase luks partition withiut data lose), change mount point UUID in /etc/fstab file and reboot.
But it`s not working in Silverblue.

I already created new bigger partition (ext4 + luks) luks-87b7864b-9b00-4376-833a-7f7b5840486f in same LVM group, copy files from old home to new home partition under BOOT USB, but I dont understand how change mount point.
I try edit /etc/fstab, but OS stiil try boot old partition.
Also I found mount point configuration in systemd.
I hope somebody help me with it.

Details:

My problem

➜  ~ export LANG=C; df -h /home
Filesystem                                                                                           Size  Used Avail Use% Mounted on
/dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7   32G   27G  2.8G  91% /var/home

Current fstab

$ cat /etc/fstab

#
/dev/mapper/lvm-lvm0    /                       ext4    defaults        1 1
UUID=f5c15d95-945f-466b-8386-f1e2742fe943 /boot                   ext3    defaults        1 2
UUID=1932-30BD          /boot/efi               vfat    umask=0077,shortname=winnt 0 2
/dev/mapper/lvm-lvm3    /var                    ext4    defaults        1 2
/dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7 /var/home               ext4    defaults,x-systemd.device-timeout=0 1 2

Mount points in systemd

$ sudo systemctl list-unit-files -t mount

UNIT FILE                                                STATE     PRESET  
-.mount                                                   generated -       
boot-efi.mount                                      generated -       
boot.mount                                           generated -       
dev-hugepages.mount                        static    -       
dev-mqueue.mount                             static    -       
proc-fs-nfsd.mount                              static    -       
proc-sys-fs-binfmt_misc.mount         disabled  disabled
run-vmblock\x2dfuse.mount             disabled  disabled
sys-fs-fuse-connections.mount         static    -       
sys-kernel-config.mount                     static    -       
sys-kernel-debug.mount                    static    -       
sys-kernel-tracing.mount                   static    -       
tmp.mount                                           static    -       
var-home.mount                                 generated -       
var-lib-nfs-rpc_pipefs.mount            static    -       
var.mount                                             generated -       

16 unit files listed.

Contnet of var-home.mount

$ sudo systemctl edit var-home.mount

  GNU nano 7.2                                                                 /etc/systemd/system/var-home.mount.d/.#override.conf048e5e48090a6f75                                                                           
### Editing /etc/systemd/system/var-home.mount.d/override.conf
### Anything between here and the comment below will become the contents of the drop-in file

### Edits below this comment will be discarded

### /run/systemd/generator/var-home.mount
# # Automatically generated by systemd-fstab-generator
# 
# [Unit]
# Documentation=man:fstab(5) man:systemd-fstab-generator(8)
# SourcePath=/etc/fstab
# Before=local-fs.target
# Requires=systemd-fsck@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service
# After=systemd-fsck@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service
# After=blockdev@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.target
# 
# [Mount]
# What=/dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7
# Where=/var/home
# Type=ext4

Content of /run/systemd/generator/var-home.mount

# Automatically generated by systemd-fstab-generator

[Unit]
Documentation=man:fstab(5) man:systemd-fstab-generator(8)
SourcePath=/etc/fstab
Before=local-fs.target
Requires=systemd-fsck@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service
After=systemd-fsck@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service
After=blockdev@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.target

[Mount]
What=/dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7
Where=/var/home
Type=ext4

The systemd units are auto-generated as written in the comments and are thus ephemeral.

You should modify the content of /etc/fstab and reboot.

That was the first thing I did.
I replaced in /etc/fstab the uuid of the old partition with the new one.
But when booting, it still asks for the password of the old one and then the operating system will not boot.

old luks partition - b57988f3-c069-4875-966f-0ec01db438a7
new partition - 87b7864b-9b00-4376-833a-7f7b5840486f

I doing next:

$ cat /etc/fstab
/dev/mapper/lvm-lvm0    /                       ext4    defaults        1 1
UUID=f5c15d95-945f-466b-8386-f1e2742fe943 /boot                   ext3    defaults        1 2
UUID=1932-30BD          /boot/efi               vfat    umask=0077,shortname=winnt 0 2
/dev/mapper/lvm-lvm3    /var                    ext4    defaults        1 2
#/dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7 /var/home               ext4    defaults,x-systemd.device-timeout=0 1 2
/dev/mapper/luks-87b7864b-9b00-4376-833a-7f7b5840486f /var/home               ext4    defaults,x-systemd.device-timeout=0 1 2

Journalctrl rows from boot with changed fstab

$ clear && export LANG=c; journalctl --no-pager  -b -1 | grep -E "(luks|var-home|cryptsetup)" | grep -E -v "(rclone|appimagela|jetbrains|audit\[|kernel)"

Sep 19 09:28:28 fedora systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Sep 19 09:28:29 fedora systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep 19 09:28:30 fedora systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep 19 09:28:30 fedora systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes.
Sep 19 09:28:30 serieznyi-notebook systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Cryptsetup Units Slice.
Sep 19 09:28:31 serieznyi-notebook systemd[1]: Starting systemd-cryptsetup@luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service - Cryptography Setup for luks-b57988f3-c069-4875-966f-0ec01db438a7...

Journalctrl rows from boot when I rollback all changes

$ clear && export LANG=c; journalctl --no-pager  -b -0 | grep -E "(luks|var-home|cryptsetup)" | grep -E -v "(rclone|appimagela|jetbrains|audit\[|kernel)"

Sep 19 09:40:02 fedora systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Sep 19 09:40:04 fedora systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep 19 09:40:05 fedora systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep 19 09:40:05 fedora systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes.
Sep 19 09:40:05 serieznyi-notebook systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Cryptsetup Units Slice.
Sep 19 09:40:06 serieznyi-notebook systemd[1]: Starting systemd-cryptsetup@luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service - Cryptography Setup for luks-b57988f3-c069-4875-966f-0ec01db438a7...
Sep 19 09:53:30 serieznyi-notebook systemd-cryptsetup[934]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/b57988f3-c069-4875-966f-0ec01db438a7.
Sep 19 09:53:32 serieznyi-notebook systemd-cryptsetup[934]: Failed to activate with specified passphrase. (Passphrase incorrect?)
Sep 19 09:53:43 serieznyi-notebook systemd-cryptsetup[934]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/b57988f3-c069-4875-966f-0ec01db438a7.
Sep 19 09:53:45 serieznyi-notebook systemd[1]: Found device dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.device - /dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7.
Sep 19 09:53:45 serieznyi-notebook systemd[1]: Starting systemd-fsck@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service - File System Check on /dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7...
Sep 19 09:53:45 serieznyi-notebook systemd[1]: Finished systemd-cryptsetup@luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service - Cryptography Setup for luks-b57988f3-c069-4875-966f-0ec01db438a7.
Sep 19 09:53:45 serieznyi-notebook systemd[1]: Reached target blockdev@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.target - Block Device Preparation for /dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7.
Sep 19 09:53:45 serieznyi-notebook systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Sep 19 09:53:45 serieznyi-notebook systemd[1]: Finished systemd-fsck@dev-mapper-luks\x2db57988f3\x2dc069\x2d4875\x2d966f\x2d0ec01db438a7.service - File System Check on /dev/mapper/luks-b57988f3-c069-4875-966f-0ec01db438a7.
Sep 19 09:53:45 serieznyi-notebook systemd[1]: Mounting var-home.mount - /var/home...
Sep 19 09:53:45 serieznyi-notebook systemd[1]: Mounted var-home.mount - /var/home.
Sep 19 09:53:46 serieznyi-notebook systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.

Do you have the needed config in /etc/crypttab as well?

You was right. I didnt know about it file.
I edit /etc/fstab + /etc/crypttab and all is working.

Thanks you.