6356 Commits

Author SHA1 Message Date
David Michael
41ed4ce671 Merge pull request #2570 from dm0-/rkt-wrappers
Vendor-prefix rkt volume names in wrappers
2017-05-18 08:54:40 -07:00
David Michael
d8550be180 app-admin/kubelet-wrapper: vendor-prefix rkt volume names
Since rkt 1.26.0, duplicate volume names are invalid.  This avoids
clashing with common user volume names like var-log.
2017-05-17 15:31:17 -07:00
David Michael
48ff7259e5 app-admin/flannel-wrapper: vendor-prefix rkt volume names
Since rkt 1.26.0, duplicate volume names are invalid.  This avoids
clashing with common user volume names.
2017-05-17 15:30:22 -07:00
David Michael
65cfeff736 app-admin/etcd-wrapper: vendor-prefix rkt volume names
Since rkt 1.26.0, duplicate volume names are invalid.  This avoids
clashing with common user volume names like var-log.
2017-05-17 15:28:18 -07:00
Derek Gonyeo
300d40c0fb Merge pull request #2569 from dgonyeo/master
coreos-base/coreos-metadata: bump to v0.9.0
2017-05-16 15:37:40 -07:00
David Michael
d699f5bda1 Merge pull request #2568 from dm0-/rkt
app-emulation/rkt: bump to 1.26.0
2017-05-16 15:34:08 -07:00
Derek Gonyeo
c3064f1d6b coreos-base/coreos-metadata: bump to v0.9.0 2017-05-16 15:30:17 -07:00
David Michael
2431d7156a app-emulation/rkt: bump to 1.26.0 2017-05-16 13:59:05 -07:00
David Michael
3838919f3c Merge pull request #2526 from dm0-/ad
Attempt Active Directory again
2017-05-10 12:42:23 -07:00
David Michael
449f378ac6 profiles: allow adcli to be built on arm64
The package isn't installed for arm64 since none of the related
SSSD packages is installed, but this at least prepares for it.
2017-05-10 11:54:57 -07:00
David Michael
8353734942 coreos-base/coreos: bump to add adcli to the amd64 image 2017-05-10 11:53:47 -07:00
David Michael
7a39bab8b4 app-admin/adcli: new package 2017-05-10 11:51:53 -07:00
David Michael
b64abc677d dev-libs/cyrus-sasl: fix the arm64 build 2017-05-10 11:51:47 -07:00
David Michael
24c4117393 net-fs/samba: clean up and fix the build
This drops unused Python and Perl modules, and it drops the runtime
Perl dependency.  It also cleans the Manifest.
2017-05-10 11:51:41 -07:00
David Michael
a453d6a6dc Revert "Revert "Revert "Revert "Active directory""""
This reverts commit 6774a76a80d948a75cde42a2eb39ae1cdea836c2.
2017-05-10 11:51:32 -07:00
David Michael
1f7ef835c7 Merge pull request #2558 from dm0-/eclass
Sync eclasses
2017-05-09 15:48:27 -07:00
David Michael
736139367a chore(metadata): Regenerate cache 2017-05-09 15:20:02 -07:00
David Michael
69a7400b74 sys-libs/nss-usrfiles: inherit toolchain-funcs 2017-05-09 15:18:47 -07:00
Euan Kemp
4ea0cda786 Merge pull request #2564 from euank/docker-17.05
app-emulation/docker: update to 17.05
2017-05-09 13:30:06 -07:00
Euan Kemp
c593aedc57 app-emulation/docker: update to 17.05
This updates to the 17.05 commit, unmodified from upstream
2017-05-09 13:12:51 -07:00
Euan Kemp
fbeaea0ff5 app-emulation/containerd: update for docker 17.05
This matches the commit at
https://github.com/moby/moby/blob/v17.05.0-ce/hack/dockerfile/binaries-commits#L7
2017-05-09 13:08:59 -07:00
Euan Kemp
d10b74b1cf Merge pull request #2562 from euank/fixup-docker
deprecate dockerd script, misc fixups
2017-05-09 12:40:39 -07:00
David Michael
ce92189b5c profiles: drop some dev-python/ws4py flags
Since there are no USE flag dependencies on ws4py (and it's unclear
if anything uses it at all), disable client and server to limit its
already numerous dependencies.
2017-05-09 11:41:12 -07:00
David Michael
163835407c sys-process/ktop: inherit epatch 2017-05-09 11:41:12 -07:00
David Michael
459747cc1f dev-util/boost-build: fix cross-compilation 2017-05-09 11:41:12 -07:00
David Michael
ccf87998ec dev-util/boost-build: import from portage-stable 2017-05-09 11:41:12 -07:00
David Michael
970ee13014 profiles: work around a new dependency cycle 2017-05-09 11:41:12 -07:00
David Michael
9d1cd99ab8 profiles: bootstrap around version blocks 2017-05-09 11:41:12 -07:00
David Michael
b4272247fb profiles: clean up some redundant versions 2017-05-09 11:41:12 -07:00
David Michael
a1f9afec2a dev-util/crosutils: update inherited eclass name 2017-05-09 11:41:12 -07:00
David Michael
b123434eea coreos-base/cros-devutils: update inherited eclass name 2017-05-09 11:41:12 -07:00
David Michael
b77d9d93fa dev-python/gdata: apply CoreOS changes 2017-05-09 11:41:12 -07:00
David Michael
08fc5885b1 dev-python/gdata: sync with Gentoo 2017-05-09 11:41:12 -07:00
David Michael
8251699410 profiles: drop redundant xattr and seccomp flags
They are set in portage-stable's default/linux/make.defaults and
base/make.defaults, which are inherited by linux arch profiles.
2017-05-09 11:41:12 -07:00
David Michael
9cdebd941c profiles: avoid more silly paths in prod images 2017-05-09 11:41:12 -07:00
David Michael
68f9fc1561 profiles: drop sloppy pkgconfig paths
Currently, the only affected package is ipset.
2017-05-09 11:41:12 -07:00
David Michael
f00c402c73 profiles: drop USE=python for libxml2
The gtk-doc package was removed after the gtk-doc-am split.
2017-05-09 11:41:12 -07:00
David Michael
e3844d02e8 sys-apps/systemd: make man pages available in the SDK 2017-05-09 11:41:12 -07:00
David Michael
1d3e52fc78 Merge pull request #2563 from dm0-/rpc
Fix CVE-2017-8779
2017-05-09 11:27:55 -07:00
Euan Kemp
1d499f2ce4 app-emulation/docker: deprecate dockerd script
This script had two main functions:

1. Select the graphdriver
This functionality is now handled in the docker daemon. It defaults to
overlay2 on recent docker versions, and does its own fs detection for
btrfs etc.
We carry a patch for 1.12.6 now to prefer overlay to devicemapper

2. Avoid enabling selinux on btrfs
This no longer matters since as of v1.10, selinux on btrfs is supported.
See moby/moby#16452

This PR replaces that original functionality with a simpler systemd environment variable, which is also more in-line with what we do for other similar choices.

The environment variable is also more discoverable and easier for users to edit.
Note: for backwards compatibility with
DOCKER_OPTS=--selinux-enabled=false (to make that take precedent), we
intentionally put the environment variable as the first option.

However, for backwards compatibility with older units, we also retain
the script. We are able to remove the graphdriver detection/selection
since that behavior now happens appropriately in docker, but we need to
keep the selinux defaulting so that people who are executing the script
and expecting selinux to work (e.g.  if they copied an old
docker.service) will continue to get selinux as expected.
2017-05-09 11:27:54 -07:00
Euan Kemp
9c0f911e27 app-emulation/docker: restart on-failure
This also syncs a few other small changes from upstream.

See https://github.com/moby/moby/pull/30210 for the network-online
change / bugs references.

There doesn't appear to be a reason the socket's user differed from
upstream, so there's no intended meaning to that change beyond syncing
with upstream.
2017-05-09 10:38:37 -07:00
Euan Kemp
39247c7945 app-emulation/docker: Fix docker-init & cleanup
Notable changes:
1.12.6:
* Bump to go 1.7
* Remove go1.6-specific cflags workaround

17.04:
* Remove go1.6-specific cflags workaround
* Fix docker-init in the docker-17.04 ebuild
* Sync with upstream a bit
2017-05-09 10:38:37 -07:00
David Michael
45155195d8 profiles: accept the latest rpcbind 2017-05-08 18:16:58 -07:00
David Michael
f93fa06e66 net-libs/libtirpc: apply CoreOS changes 2017-05-08 18:16:09 -07:00
David Michael
f68da24d2a net-libs/libtirpc: sync with the latest Gentoo version 2017-05-08 18:16:07 -07:00
David Michael
58cbd3d90b Merge pull request #2561 from dm0-/glsa
profiles: bump arm64 versions for GLSAs
2017-05-08 14:09:39 -07:00
David Michael
cbcf6b3e45 profiles: bump arm64 versions for GLSAs 2017-05-08 11:50:02 -07:00
Benjamin Gilbert
14c9b80e95 Merge pull request #2560 from bgilbert/kernel-hardening
sys-kernel/coreos-modules: Enable some kernel hardening features
2017-05-05 15:05:41 -07:00
Benjamin Gilbert
ee1709b256 sys-kernel/coreos-modules: Enable some kernel hardening features
SLAB_FREELIST_RANDOM: Randomize slab allocator freelist order,
c7ce4f60ac199fb3521c5fcd64da21cee801ec2b

IO_STRICT_DEVMEM: Disallow access to /dev/mem regions that are bound
to a kernel driver, 90a545e981267e917b9d698ce07affd69787db87

HARDENED_USERCOPY: Add more address range checks to copy_{from,to}_user(),
f5509cc18daa7f82bcc553be70df2117c8eedc16
2017-05-04 14:18:11 -07:00
Alex Crawford
e0b7a7a5f1 Merge pull request #2557 from crawford/etcd
dev-db/etcd: remove etcd 0.4.9
2017-05-04 02:30:26 -07:00