3173 Commits

Author SHA1 Message Date
Geoff Levand
fe848f57cf dev-db/etcd: Set CROS_WORKON_COMMIT for arm64
The current CROS_WORKON_COMMIT of etcd-2.2.4 does not build from
arm64.  Add a temporary conditional to set CROS_WORKON_COMMIT to
a known good revision for arm64.

Signed-off-by: Geoff Levand <geoff@infradead.org>
2016-01-21 15:34:31 -08:00
Michael Marineau
676a9f2173 Merge pull request #1734 from marineam/go
Go 1.5.3
2016-01-21 13:51:40 -08:00
Nick Owens
7b6add8913 net-misc/ntp: sync with upstream to 4.2.8p6 2016-01-20 22:42:05 -08:00
Michael Marineau
524e466cc1 go: update 1.5 ebuild to 1.5.3 (remains ~amd64 for now) 2016-01-19 20:52:36 -08:00
Michael Marineau
e31ec800f0 go: a couple minor cleanups from upstream 2016-01-19 20:51:39 -08:00
Nick Owens
f2332e96f6 sys-kernel/coreos-{sources,kernel}: *actually* apply patch for CVE-2016-0728 2016-01-19 17:13:00 -08:00
Nick Owens
fad7f689ed sys-kernel/coreos-{sources,kernel}: apply patch for CVE-2016-0728 2016-01-19 14:35:01 -08:00
Geoff Levand
8cabe64b95 arm64_defconfig: Set CONFIG_MODULE_SIG
Needed for module signatures.  Also fixes kernel build errors.

Signed-off-by: Geoff Levand <geoff@infradead.org>
2016-01-18 12:31:25 -08:00
Nick Owens
9962a886b8 sys-kernel/coreos-kernel: enable BINFMT_MISC 2016-01-15 17:37:42 -08:00
Nick Owens
3a84cc82dd net-misc/openssh: import upstream gentoo patch for CVE-2016-0777 2016-01-14 10:51:47 -08:00
Alex Crawford
c70bc7fae5 dev-db/etcd: bump to v2.2.4 2016-01-13 14:16:22 -08:00
Alex Crawford
efe4e7f38e Merge pull request #1719 from crawford/ignition
sys-apps/ignition: bump to v0.2.6
2016-01-13 13:59:31 -08:00
Amin Shayan
876e1aba79 app-emulation/docker: don't clobber --selinux-enabled
exec docker "$@" ${USE_SELINUX} will override DOCKER_OPTS if it contains
--selinux-enabled=false, and puts double --selinux-enabled in args which
is confusing too.

docker daemon --host=fd:// --selinux-enabled=false --selinux-enabled
2016-01-13 13:50:51 -08:00
Alex Crawford
39d860c840 sys-kernel/bootengine: include shadow.conf changes 2016-01-13 13:18:09 -08:00
Alex Crawford
ba199c19f0 sys-apps/ignition: bump to v0.2.6 2016-01-13 13:11:54 -08:00
Alex Crawford
d0a248ae67 Merge pull request #1691 from endocode/kayrus/fix_flannel
Use defined ETCD_SSL_DIR path inside the flannel container
2016-01-13 10:22:30 -08:00
Alex Crawford
71484782c6 Merge pull request #1714 from steveeJ/rkt-0.15.0
app-emulation/rkt: 0.13.0 -> 0.15.0, add fly stage1
2016-01-13 09:38:21 -08:00
Stefan Junker
4fdc882533 app-emulation/rkt: mask accidentally bumped major version 2016-01-13 18:32:45 +01:00
Stefan Junker
698fe73e75 app-emulation/rkt: add dep for sys-apps/acl 2016-01-13 18:11:56 +01:00
Geoff Levand
39ea28cf2f Merge pull request #1684 from glevand/for-merge-etcd
dev-db/etcd: Fix unstable build error
2016-01-12 16:12:01 -08:00
mjg59
2377278911 Merge pull request #1716 from mjg59/docker_selinux
Update docker to include SELinux fixes
2016-01-12 15:33:38 -08:00
Alex Crawford
28ce07b18d Merge pull request #1718 from crawford/kernel
coreos-{kernel/sources}: bump to v4.4-coreos
2016-01-12 14:28:16 -08:00
Matthew Garrett
ed64a5f415 Update docker to include SELinux fixes 2016-01-12 11:31:33 -08:00
Alex Crawford
3d5f8b9498 coreos-{kernel/sources}: bump to v4.4-coreos 2016-01-11 22:15:17 -08:00
Alex Crawford
3ca8557817 sys-apps/shadow: split shadow.conf
This will allow bootengine to only apply the shadow config that applies to /etc.
2016-01-11 19:20:39 -08:00
Michael Marineau
568db4e356 grub: bump version: includes upstream and coreos changes 2016-01-11 14:11:53 -08:00
Stefan Junker
6d105eef95 app-emulation/rkt: 0.13.0 -> 0.15.0, add fly stage1
metadata
* Add IUSE and description rkt_stage1_fly

ebuild
* Bump version to 0.15.0
* Add IUSE rkt_stage1_fly and enable by default
* Rewrite rkt ebuild to support multiple stage1 flavors
2016-01-11 16:08:02 +01:00
Nick Owens
6f45c13c1c coreos-devel/mantle: include fix for core user in sdk 2016-01-07 14:58:15 -08:00
Nick Owens
29be341cff coreos-devel/mantle: install kolet binary to where kola expects it 2016-01-07 14:57:09 -08:00
Michael Marineau
2867d33ce7 Merge pull request #1711 from marineam/kernel-fixes
Minor cleanup/fixes for the kernel eclass
2016-01-06 23:24:05 -08:00
Alex Crawford
162d3eb814 Merge pull request #1712 from crawford/ignition
sys-apps/ignition: bump to v0.2.5
2016-01-06 21:25:04 -08:00
Alex Crawford
c9104d8471 sys-apps/ignition: bump to v0.2.5 2016-01-06 18:26:51 -08:00
Michael Marineau
67a462e423 coreos-kernel: fix shredding of private module signing key
Two errors here: shred_keys was not updated when the keys were moved
from the top level directory to the certs directory and shred_keys was
getting called after `rm -r certs`, leaving nothing to shred.

Now the ebuild will fail if shred fails.
2016-01-06 17:53:36 -08:00
Michael Marineau
13899916c5 coreos-kernel: restore call to linux-info's get_version
Since moving call to dracut into the coreos-kernel package in
pkg_setup step the pkg_setup function provided by linux-info hasn't been
called, breaking tc-arch-kernel which depends on the detected kernel
version to know if it should return "x86" or "x86_64".

Instead of calling `linux-info_pkg_setup` we now call `get_version`
directly which only looks up the version in the source, the old behavior
allowed for falling back to `get_running_version` which is not useful.
2016-01-06 17:53:35 -08:00
Michael Marineau
009659e01d coreos-kernel: move pkg_setup to follow execution order 2016-01-06 16:15:44 -08:00
Michael Marineau
fdf8ea8f8e coreos-kernel: fix check for unclean source tree and check earlier
This check was broken in when the source symlinks were moved from `${S}`
to `${S}/source`. Also, since it is a environment sanity check running
the check as early as possible in `pkg_pretend` is appropriate.
2016-01-06 16:15:04 -08:00
Michael Marineau
c166fb7731 coreos-kernel: prune old ebuild 2016-01-06 12:18:37 -08:00
mjg59
a0adaa12fd Merge pull request #1703 from mjg59/master
Fix up selinux policy for overlays
2016-01-05 14:52:25 -08:00
Nick Owens
2eaf7edc15 Merge pull request #1709 from mischief/mantle
coreos-devel/mantle: bump to latest commit
2016-01-05 12:28:22 -08:00
Michael Marineau
4c467290b1 Merge pull request #1707 from marineam/glibc-rpcgen
glibc: ensure cross-rpcgen is compiled during the compile phase
2016-01-05 12:14:19 -08:00
Nick Owens
220ab594e8 coreos-devel/mantle: bump to latest commit 2016-01-05 12:01:44 -08:00
Alex Crawford
dcc90fe804 Merge pull request #1708 from crawford/etcd
dev-db/etcd: bump to v2.2.3
2016-01-04 19:13:11 -08:00
Vito Caputo
5425b74c21 Merge pull request #1698 from experimental-platform/preserve-system-map
coreos-kernel: preserve 'System.map' during kernel build
2016-01-04 12:43:43 -08:00
Alex Crawford
fdf1e701e3 dev-db/etcd: bump to v2.2.3 2016-01-04 12:15:01 -08:00
Michael Marineau
a6105d7821 glibc: ensure cross-rpcgen is compiled during the compile phase
When bootstrapping glibc installs headers but is not built. However a
native tool, cross-rpcgen, must be built in order to generate rpcsvc
header files. By skipping directly to `make headers-install` the tool
winds up getting built during src_install, building as root instead of
the portage user and so on. Although uncommon this may lead to
permission issues with ccache.
2015-12-31 18:50:40 -05:00
Michael Marineau
bfa49f1871 Merge pull request #1705 from marineam/devpts
glibc: Do not check /dev/pts options
2015-12-28 16:21:39 -08:00
Michael Marineau
8411c483a3 glibc: Do not check /dev/pts options
The SDK chroot has no control over /dev/pts since it is bind-mounted
from the host system. As far as I can tell there isn't any significant
issue caused by the `tty` group having a different gid on the host
system from the SDK anyway.
2015-12-28 16:20:21 -08:00
Kamil Domański
e91a9e8525 preserve 'System.map' during kernel build
allows the proper operation of 'depmod' when building out-of-tree modules
2015-12-23 16:05:43 +01:00
Matthew Garrett
49e4570444 Don't verify write permissions on lower inodes on overlayfs
If a user opens a file r/w on overlayfs, and if the underlying inode is
currently still on the lower fs, right now we're verifying whether selinux
policy permits writes to the selinux context on the underlying inode. This
is suboptimal, since we don't want confined processes to be able to write to
these files if they're able to escape from a container and so don't want to
permit this in policy. Have overlayfs pass down an additional flag when
verifying the permission on lower inodes, and mask off the write bits in
the selinux permissions check if that flag is set.
2015-12-22 08:03:58 +00:00
Matthew Garrett
23a4b9d2b1 Fix up selinux policy for overlays
MCS is restricting us from performing relabelfrom, and docker uses another
label for the underlying files so we need to permit entrypoint from there.
2015-12-22 07:39:52 +00:00