This changes the format from:
sys-apps/systemd-212-r8::coreos GPL-2 LGPL-2.1 MIT public-domain
to a JSON structure:
[
{
"project": "sys-apps/systemd-212-r8::coreos",
"license": ["GPL-2", "LGPL-2.1", "MIT", "public-domain"]
}
]
We don't have to worry about the changing format because the previous
format was never published. This is designed to match the
bill-of-materials [1] format so that it can be consumed by the site.
[1]: https://github.com/coreos/license-bill-of-materials
Even though there's an upstream gentoo ebuild, it depends on cmake
(which had trouble cross-compiling for arm64).
tini is a simple enough program that writing our own makefile for it is
pretty easy, and it'll pay off in reduced buildtime and dependencies for
now since we can avoid dragging in cmake.
Note that we don't bother providing the static useflag and just make it
always static since we're packaging this for docker regardless.
The Gentoo ebuild has modified the dependencies to require static
libraries for the system programs instead of just the user ones.
The only CoreOS changes to the ebuild are to add the vpc patch, and
to mark arm64 stable (even though it isn't used).
5a76e4e5e9027443ef2014d8e1d06e9baa9e50aa started exporting COREOS_BUILD_ID
whenever it was found in version.txt, even if its value was blank. Because
COREOS_BUILD_ID is in ENVIRONMENT_WHITELIST, this caused generated build IDs
to be propagated into the SDK chroot environment and reused for every build
in a "cork enter" session. Stop exporting COREOS_BUILD_ID when we set it
ourselves.
See also 8e754f9c2bd4b4ec6561613ff57c095886877960.
So far `/var/lib/kubelet` was mounted as an implicit non-recursive mount.
This changes the wrapper to an explicit recursive mount.
As shown in https://github.com/kubernetes/kubernetes/issues/38498#issuecomment-282493681,
current non-recursive behavior seems to confuse the kubelet which
is incapable of cleaning up resources for orphaned pods, as the
extisting mountpoints for them are not available inside kubelet
chroot.
With `recursive=true`, those mounts are made available in the
chroot and can be unmounted on the host-side from kubelet chroot
via shared back-propagation.
Fixes https://github.com/coreos/bugs/issues/1831