30045 Commits

Author SHA1 Message Date
Alex Crawford
7ac986e5ed sys-apps/seismograph: include disk GUID feature 2015-07-06 13:51:16 -07:00
Michael Marineau
5d037e2840 Merge pull request #432 from marineam/cleanup
bootstrap_sdk: do not remove make.conf
2015-07-06 13:22:41 -07:00
Michael Marineau
aa4ba8b2bb bootstrap_sdk: do not remove make.conf, turns out catalyst runs sed over it 2015-07-06 13:14:51 -07:00
Michael Marineau
1721249283 Merge pull request #1341 from coreos/revert-1337-update
Revert "Update update_engine"
2015-07-06 13:10:33 -07:00
Michael Marineau
db5b23df47 Merge pull request #431 from marineam/cleanup
Simplify SDK setup
2015-07-06 12:15:56 -07:00
Michael Marineau
9f6ef609b5 Revert "Update update_engine" 2015-07-06 06:08:46 -07:00
Michael Marineau
2eec99130b setup_board: simplify PORTAGE_USERNAME handling 2015-07-05 18:01:50 -07:00
Michael Marineau
1fa7ef236b update_chroot: remove dependency on complex 'chromeos-cache' links
The distfiles cache is always under .cache in the repo tree but there is
a lot of extra logic to make that configurable along with compatibility
symlinks for previous locations. Just yank it all out.
2015-07-05 17:54:00 -07:00
Michael Marineau
611ed7698e enter_chroot: remove subversion config goo
We do not have any svn based live ebuilds that require credentials which
I presume is the only reason for shuffling svn configs like this.
2015-07-05 17:20:43 -07:00
Michael Marineau
db734ea417 bootstrap_sdk: do not leak catalyst config into sdk tarballs
The version of repos.conf/coreos.conf that catalyst needs isn't valid
for normal SDK chroots and causes env-update to spew errors when it is
run prior to update_chroot which configures portage properly.
2015-07-05 16:57:05 -07:00
Michael Marineau
174a847e36 update_chroot: remove dependence on /usr/local/portage/* symlinks
A step in reducing the amount of initialization code required: drop
needless symlinks under /usr/local/portage to the portage trees. Just
configure portage to point directly at the source instead. Only crossdev
remains in that location because it is a locally managed overlay.
2015-07-05 16:57:05 -07:00
Michael Marineau
dcf94ca48c Merge pull request #1340 from coreos/revert-1338-fleet-0.11.0
Revert "app-admin/fleet: bump to v0.11.0"
2015-07-04 20:16:09 -07:00
Michael Marineau
1520766779 Revert "app-admin/fleet: bump to v0.11.0" 2015-07-04 13:14:32 -07:00
Michael Marineau
76856e8718 Merge pull request #430 from marineam/auzip
generate_au_zip: improve error reporting of missing files
2015-07-03 21:47:06 -07:00
Michael Marineau
0477ee2df0 Merge pull request #1337 from marineam/update
Update update_engine
2015-07-03 21:46:57 -07:00
Nick Owens
c6b9fa98be Merge pull request #1339 from mischief/networkd-nat
sys-apps/systemd: enable nat use flag for ip masquerading in networkd
2015-07-03 18:49:53 -07:00
mischief
cd117a321e sys-apps/systemd: enable nat use flag for ip masquerading in networkd 2015-07-03 18:48:05 -07:00
Nick Owens
f15f74448c Merge pull request #1338 from mischief/fleet-0.11.0
app-admin/fleet: bump to v0.11.0
2015-07-03 17:24:55 -07:00
mischief
f1278017ab app-admin/fleet: bump to v0.11.0 2015-07-03 17:19:07 -07:00
Michael Marineau
f52a4cc47e Merge pull request #1328 from exoscale/master
exoscale network workaround not needed anymore
2015-07-02 16:37:02 -07:00
retrack
1f6a7401b8 coreos-base/oem-exoscale: network workaround not needed anymore 2015-07-03 01:15:21 +02:00
Michael Marineau
a437c096fe update_engine: update to latest, fixes kernel payload code 2015-07-02 14:09:56 -07:00
Michael Marineau
7f33fd307c Revert "Revert "update_engine: lots of updates""
This reverts commit 7bbc88c31ce48c6da6fb6fd1c1bf9d3927825d9f.
2015-07-02 14:08:12 -07:00
Michael Marineau
fcd55e0171 generate_au_zip: improve error reporting of missing files 2015-07-02 13:51:39 -07:00
Michael Marineau
5d4eebf714 Merge pull request #1336 from marineam/systemd
systemd: fix systemd-escape's exit code
2015-07-02 13:03:32 -07:00
Michael Marineau
032a4d5fe6 Merge pull request #428 from marineam/selinux
build_image: make building selinux policy optional
2015-07-02 12:14:42 -07:00
Michael Marineau
8f935f6ebb Merge pull request #1335 from marineam/selinux
selinux: make selinux optional based on USE flags, disable for now.
2015-07-02 12:13:59 -07:00
Michael Marineau
bd33c8cf5d systemd: fix systemd-escape's exit code 2015-07-02 12:13:39 -07:00
Michael Marineau
9db6ac5ef7 build_image: make building selinux policy optional 2015-07-01 23:11:09 -07:00
Michael Marineau
e5c1d942ec selinux: make selinux optional based on USE flags, disable for now.
Some issues still to work out with tmpfiles and logind.
2015-07-01 22:41:43 -07:00
Nick Owens
6adadb896a Merge pull request #1332 from mischief/sfc
sys-kernel/coreos-kernel: enable sfc and mtd drivers
2015-07-01 18:50:15 -07:00
George Tankersley
35b82cbaaf Merge pull request #421 from gtank/verity
dm-verity build support
2015-07-01 18:37:30 -07:00
George Tankersley
9415e80fd1 Merge pull request #1334 from gtank/verity
bootengine: bump ebuild for verity generator
2015-07-01 18:35:03 -07:00
mischief
6b48095e48 sys-kernel/coreos-kernel: enable sfc and mtd drivers 2015-07-01 18:28:06 -07:00
mjg59
9c37f62093 Merge pull request #1326 from mjg59/master
Enable kernel lockdowns in Secure Boot environments
2015-07-01 18:09:54 -07:00
Matthew Garrett
7be98f2fdc Enable kernel lockdowns in Secure Boot environments
Secure Boot is easy to work around unless the kernel restricts
userspace's ability to modify the kernel. Add kernel patches from Fedora
that do this.
2015-07-01 17:45:21 -07:00
George Tankersley
283452e883 verity: add verity plumbing and hash injection to build scripts 2015-07-01 17:34:11 -07:00
George Tankersley
aa879ddcce grub_install: add support for verity and non-verity grub.cfg 2015-07-01 17:32:37 -07:00
George Tankersley
37446bff38 bootengine: bump ebuild for verity generator 2015-07-01 17:31:39 -07:00
Eugene Yakubovich
1de896c887 Merge pull request #1333 from eyakubovich/flannel-0.5
flannel: bump to v0.5.0
2015-07-01 15:07:29 -07:00
Eugene Yakubovich
8f67ce4565 flannel: bump to v0.5.0 2015-07-01 14:44:39 -07:00
mjg59
f29fae2428 Merge pull request #1331 from mjg59/selinux
Remove calls to host tools during selinux policy build
2015-07-01 13:41:07 -07:00
Matthew Garrett
7d9e123f97 Remove calls to host tools during selinux policy build
SELinux policies were attempting to run the host checkmodule and semodule
commands. The former is easy to fix via pointing them at the build root, the
latter we skip entirely because we don't want to install the policy at this
point - we'll do that during image build.
2015-07-01 11:58:10 -07:00
Patrick Baxter
601e5f58c0 Merge pull request #1330 from pbx0/mantle
coreos-devel/mantle: bump to latest commit
2015-07-01 11:47:03 -07:00
mjg59
28da405b75 Merge pull request #425 from mjg59/master
Build selinux policy
2015-07-01 11:37:11 -07:00
mjg59
a5ac55fa1b Merge pull request #1329 from mjg59/policycoreutils
Fix policycoreutils build
2015-07-01 11:24:43 -07:00
Patrick Baxter
94177003ac coreos-devel/mantle: bump to latest commit 2015-07-01 11:22:12 -07:00
Matthew Garrett
15c35fa751 Fix policycoreutils build
There was still some python leaking into this - skip building sepolicy
to avoid issues with cross-compilation.
2015-07-01 11:21:18 -07:00
Michael Marineau
c940294b1f Merge pull request #1327 from marineam/kernel
coreos-kernel: prepare for using patched kernels
2015-06-30 22:11:39 -07:00
Alex Crawford
7232e74bcc disk_util: use the dummy disk UUID
This dummy UUID (00000000-0000-0000-0000-000000000001) is used to
signify to Ignition that the disk is uninitialized.
2015-06-30 20:04:41 -07:00