mirror of
https://github.com/flatcar/scripts.git
synced 2026-05-05 12:16:41 +02:00
Compare commits
53 Commits
debug-rclo
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
7c15a061f8 | ||
|
|
bd7e729047 | ||
|
|
54f89caa16 | ||
|
|
690e13e8ce | ||
|
|
71d6ff8c38 | ||
|
|
0815cdf5be | ||
|
|
c4b6797a89 | ||
|
|
84255d5da1 | ||
|
|
fa3b9c0ad2 | ||
|
|
400b4dabd4 | ||
|
|
3fa05e9bda | ||
|
|
7c3ca9c250 | ||
|
|
e34ee7a91d | ||
|
|
d9a60336d3 | ||
|
|
045178e923 | ||
|
|
2c1e758318 | ||
|
|
ecb2e3cd76 | ||
|
|
30a0171ddc | ||
|
|
ae2e05911c | ||
|
|
87799f19e1 | ||
|
|
8c571a62be | ||
|
|
694490e3f1 | ||
|
|
d8c5d9b3f7 | ||
|
|
6463a796a9 | ||
|
|
7f10cc873b | ||
|
|
b09e9e856a | ||
|
|
e5c8901a3d | ||
|
|
2b3ad8eeaa | ||
|
|
75776dcff7 | ||
|
|
0871a3161a | ||
|
|
983315c398 | ||
|
|
20a59b28e8 | ||
|
|
6e8746f372 | ||
|
|
03425fd0c9 | ||
|
|
2fb7105dba | ||
|
|
2d7b05f635 | ||
|
|
63c4137c94 | ||
|
|
56f0755cf8 | ||
|
|
d515161137 | ||
|
|
2e399ee52d | ||
|
|
c8915792a8 | ||
|
|
22028e4595 | ||
|
|
e48c9ffebe | ||
|
|
87c3463c99 | ||
|
|
73caf995db | ||
|
|
28831b50a6 | ||
|
|
8f8977f668 | ||
|
|
433f8c40fd | ||
|
|
d42574d094 | ||
|
|
d121b9594e | ||
|
|
d85bbc31a1 | ||
|
|
ad886d8959 | ||
|
|
1752158c22 |
@ -49,6 +49,8 @@ DEFINE_string developer_data "" \
|
|||||||
"Insert a custom cloudinit file into the image."
|
"Insert a custom cloudinit file into the image."
|
||||||
DEFINE_string devcontainer_binhost "${DEFAULT_DEVCONTAINER_BINHOST}" \
|
DEFINE_string devcontainer_binhost "${DEFAULT_DEVCONTAINER_BINHOST}" \
|
||||||
"Override portage binhost configuration used in development container."
|
"Override portage binhost configuration used in development container."
|
||||||
|
DEFINE_string oem_sysexts "everything!" \
|
||||||
|
"A comma-separated list of OEMs to build, by default build all the OEM sysexts. Used only if building OEM sysexts"
|
||||||
|
|
||||||
# include upload options
|
# include upload options
|
||||||
. "${BUILD_LIBRARY_DIR}/release_util.sh" || exit 1
|
. "${BUILD_LIBRARY_DIR}/release_util.sh" || exit 1
|
||||||
@ -193,7 +195,7 @@ if [[ "${SYSEXT}" -eq 1 ]]; then
|
|||||||
create_prod_sysexts "${FLATCAR_PRODUCTION_IMAGE_NAME}"
|
create_prod_sysexts "${FLATCAR_PRODUCTION_IMAGE_NAME}"
|
||||||
fi
|
fi
|
||||||
if [[ "${OEM_SYSEXT}" -eq 1 ]]; then
|
if [[ "${OEM_SYSEXT}" -eq 1 ]]; then
|
||||||
create_oem_sysexts "${FLATCAR_PRODUCTION_IMAGE_NAME}"
|
create_oem_sysexts "${FLATCAR_PRODUCTION_IMAGE_NAME}" "${FLAGS_oem_sysexts}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ ${FLAGS_extract_update} -eq ${FLAGS_TRUE} ]]; then
|
if [[ ${FLAGS_extract_update} -eq ${FLAGS_TRUE} ]]; then
|
||||||
|
|||||||
@ -152,7 +152,12 @@ emerge_to_image() {
|
|||||||
sudo -E ROOT="${root_fs_dir}" \
|
sudo -E ROOT="${root_fs_dir}" \
|
||||||
FEATURES="-ebuild-locks -merge-wait" \
|
FEATURES="-ebuild-locks -merge-wait" \
|
||||||
PORTAGE_CONFIGROOT="${BUILD_DIR}"/configroot \
|
PORTAGE_CONFIGROOT="${BUILD_DIR}"/configroot \
|
||||||
emerge --usepkgonly --jobs="${NUM_JOBS}" --verbose "$@"
|
emerge \
|
||||||
|
--usepkgonly \
|
||||||
|
--binpkg-respect-use=y \
|
||||||
|
--jobs="${NUM_JOBS}" \
|
||||||
|
--verbose \
|
||||||
|
"$@"
|
||||||
|
|
||||||
# Shortcut if this was just baselayout
|
# Shortcut if this was just baselayout
|
||||||
[[ "$*" == *sys-apps/baselayout ]] && return
|
[[ "$*" == *sys-apps/baselayout ]] && return
|
||||||
|
|||||||
@ -88,8 +88,8 @@ def _SplitAndStrip(data):
|
|||||||
if 'not found' in line:
|
if 'not found' in line:
|
||||||
raise _LibNotFound(line)
|
raise _LibNotFound(line)
|
||||||
line = re.sub('.*not a dynamic executable.*', '', line)
|
line = re.sub('.*not a dynamic executable.*', '', line)
|
||||||
line = re.sub('.* =>\s+', '', line)
|
line = re.sub(r'.* =>\s+', '', line)
|
||||||
line = re.sub('\(0x.*\)\s?', '', line)
|
line = re.sub(r'\(0x.*\)\s?', '', line)
|
||||||
line = line.strip()
|
line = line.strip()
|
||||||
if not len(line):
|
if not len(line):
|
||||||
continue
|
continue
|
||||||
|
|||||||
@ -40,13 +40,13 @@ with open(os.path.join(outputdir, "grub_modules.config"), "w") as f:
|
|||||||
f.write(json.dumps({"9": {"binaryvalues": [{"prefix": "grub_module", "values": hashvalues}]}}))
|
f.write(json.dumps({"9": {"binaryvalues": [{"prefix": "grub_module", "values": hashvalues}]}}))
|
||||||
|
|
||||||
with open(os.path.join(outputdir, "kernel_cmdline.config"), "w") as f:
|
with open(os.path.join(outputdir, "kernel_cmdline.config"), "w") as f:
|
||||||
f.write(json.dumps({"8": {"asciivalues": [{"prefix": "grub_kernel_cmdline", "values": [{"value": "rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-[ab] mount.usr=PARTUUID=\S{36} rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT (console=\S+)? (flatcar.autologin=\S+)? verity.usrhash=\\S{64}", "description": "Flatcar kernel command line %s" % version}]}]}}))
|
f.write(json.dumps({"8": {"asciivalues": [{"prefix": "grub_kernel_cmdline", "values": [{"value": r"rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-[ab] mount.usr=PARTUUID=\S{36} rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT (console=\S+)? (flatcar.autologin=\S+)? verity.usrhash=\\S{64}", "description": "Flatcar kernel command line %s" % version}]}]}}))
|
||||||
|
|
||||||
commands = [{"value": '\[.*\]', "description": "Flatcar Grub configuration %s" % version},
|
commands = [{"value": r'\[.*\]', "description": "Flatcar Grub configuration %s" % version},
|
||||||
{"value": 'gptprio.next -d usr -u usr_uuid', "description": "Flatcar Grub configuration %s" % version},
|
{"value": 'gptprio.next -d usr -u usr_uuid', "description": "Flatcar Grub configuration %s" % version},
|
||||||
{"value": 'insmod all_video', "description": "Flatcar Grub configuration %s" % version},
|
{"value": 'insmod all_video', "description": "Flatcar Grub configuration %s" % version},
|
||||||
{"value": 'linux /flatcar/vmlinuz-[ab] rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT (console=\S+)? (flatcar.autologin=\S+)?', "description": "Flatcar Grub configuration %s" % version},
|
{"value": r'linux /flatcar/vmlinuz-[ab] rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT (console=\S+)? (flatcar.autologin=\S+)?', "description": "Flatcar Grub configuration %s" % version},
|
||||||
{"value": 'menuentry Flatcar \S+ --id=flatcar\S* {', "description": "Flatcar Grub configuration %s" % version},
|
{"value": r'menuentry Flatcar \S+ --id=flatcar\S* {', "description": "Flatcar Grub configuration %s" % version},
|
||||||
{"value": 'search --no-floppy --set randomize_disk_guid --disk-uuid 00000000-0000-0000-0000-000000000001', "description": "Flatcar Grub configuration %s" % version},
|
{"value": 'search --no-floppy --set randomize_disk_guid --disk-uuid 00000000-0000-0000-0000-000000000001', "description": "Flatcar Grub configuration %s" % version},
|
||||||
{"value": 'search --no-floppy --set oem --part-label OEM --hint hd0,gpt1', "description": "Flatcar Grub configuration %s" % version},
|
{"value": 'search --no-floppy --set oem --part-label OEM --hint hd0,gpt1', "description": "Flatcar Grub configuration %s" % version},
|
||||||
{"value": 'set .+', "description": "Flatcar Grub configuration %s" % version},
|
{"value": 'set .+', "description": "Flatcar Grub configuration %s" % version},
|
||||||
|
|||||||
@ -79,7 +79,7 @@ if [ -z "$linux_console" ]; then
|
|||||||
terminal_output console serial_com0
|
terminal_output console serial_com0
|
||||||
elif [ "$grub_platform" = efi ]; then
|
elif [ "$grub_platform" = efi ]; then
|
||||||
if [ "$grub_cpu" = arm64 ]; then
|
if [ "$grub_cpu" = arm64 ]; then
|
||||||
set linux_console="console=ttyAMA0,115200n8"
|
set linux_console="console=ttyAMA0,115200n8 console=tty0"
|
||||||
else
|
else
|
||||||
set linux_console="console=ttyS0,115200n8 console=tty0"
|
set linux_console="console=ttyS0,115200n8 console=tty0"
|
||||||
fi
|
fi
|
||||||
|
|||||||
@ -37,6 +37,9 @@ switch_to_strict_mode
|
|||||||
. "${BUILD_LIBRARY_DIR}/board_options.sh" || exit 1
|
. "${BUILD_LIBRARY_DIR}/board_options.sh" || exit 1
|
||||||
. "${BUILD_LIBRARY_DIR}/sbsign_util.sh" || exit 1
|
. "${BUILD_LIBRARY_DIR}/sbsign_util.sh" || exit 1
|
||||||
|
|
||||||
|
SBSIGN_DB_KEY="${SBSIGN_DB_KEY:-/usr/share/sb_keys/DB.key}"
|
||||||
|
SBSIGN_DB_CERT="${SBSIGN_DB_CERT:-/usr/share/sb_keys/DB.crt}"
|
||||||
|
|
||||||
# Our GRUB lives under flatcar/grub so new pygrub versions cannot find grub.cfg
|
# Our GRUB lives under flatcar/grub so new pygrub versions cannot find grub.cfg
|
||||||
GRUB_DIR="flatcar/grub/${FLAGS_target}"
|
GRUB_DIR="flatcar/grub/${FLAGS_target}"
|
||||||
|
|
||||||
@ -202,8 +205,8 @@ case "${FLAGS_target}" in
|
|||||||
|
|
||||||
# Unofficial build: Sign shim with our development key.
|
# Unofficial build: Sign shim with our development key.
|
||||||
sudo sbsign \
|
sudo sbsign \
|
||||||
--key /usr/share/sb_keys/DB.key \
|
--key "${SBSIGN_DB_KEY}" \
|
||||||
--cert /usr/share/sb_keys/DB.crt \
|
--cert "${SBSIGN_DB_CERT}" \
|
||||||
--output "${ESP_DIR}/EFI/boot/boot${EFI_ARCH}.efi" \
|
--output "${ESP_DIR}/EFI/boot/boot${EFI_ARCH}.efi" \
|
||||||
"${BOARD_ROOT}/usr/lib/shim/shim${EFI_ARCH}.efi"
|
"${BOARD_ROOT}/usr/lib/shim/shim${EFI_ARCH}.efi"
|
||||||
else
|
else
|
||||||
|
|||||||
@ -276,13 +276,26 @@ create_prod_sysexts() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
create_oem_sysexts() {
|
create_oem_sysexts() {
|
||||||
local image_name="$1"
|
local image_name=${1}; shift
|
||||||
|
local requested_oem_sysexts_csv=${1}; shift
|
||||||
local image_sysext_base="${image_name%.bin}_sysext.squashfs"
|
local image_sysext_base="${image_name%.bin}_sysext.squashfs"
|
||||||
local overlay_path
|
local overlay_path
|
||||||
overlay_path=$(portageq get_repo_path / coreos-overlay)
|
overlay_path=$(portageq get_repo_path / coreos-overlay)
|
||||||
|
|
||||||
local -a oem_sysexts
|
local -a oem_sysexts
|
||||||
get_oem_sysext_matrix "${ARCH}" oem_sysexts
|
get_oem_sysext_matrix "${ARCH}" oem_sysexts
|
||||||
|
if [[ ${requested_oem_sysexts_csv} != 'everything!' ]]; then
|
||||||
|
local -a all_oems requested_oems invalid_oems
|
||||||
|
all_oems=( "${oem_sysexts[@]}" )
|
||||||
|
all_oems=( "${all_oems[@]%%|*}" )
|
||||||
|
all_oems=( "${all_oems[@]#oem-}" )
|
||||||
|
mapfile -t requested_oems <<<"${requested_oem_sysexts_csv//,/$'\n'}"
|
||||||
|
mapfile -t invalid_oems < <(comm -23 <(printf '%s\n' "${requested_oems[@]}" | sort -u) <(printf '%s\n' "${all_oems[@]}" | sort -u))
|
||||||
|
if [[ ${#invalid_oems[@]} -gt 0 ]]; then
|
||||||
|
die "Requested OEMs to build sysexts for are invalid: ${invalid_oems[*]}, valid OEMs are ${all_oems[*]}"
|
||||||
|
fi
|
||||||
|
mapfile -t oem_sysexts < <(printf '%s\n' "${oem_sysexts[@]}" | grep '^oem-\('"${requested_oem_sysexts_csv//,/'\|'}"'\)|')
|
||||||
|
fi
|
||||||
|
|
||||||
local sysext name metapkg useflags
|
local sysext name metapkg useflags
|
||||||
for sysext in "${oem_sysexts[@]}"; do
|
for sysext in "${oem_sysexts[@]}"; do
|
||||||
|
|||||||
@ -3,8 +3,8 @@
|
|||||||
# found in the LICENSE file.
|
# found in the LICENSE file.
|
||||||
|
|
||||||
if [[ ${COREOS_OFFICIAL:-0} -ne 1 ]]; then
|
if [[ ${COREOS_OFFICIAL:-0} -ne 1 ]]; then
|
||||||
SBSIGN_KEY="/usr/share/sb_keys/shim.key"
|
SBSIGN_KEY="${SBSIGN_KEY:-/usr/share/sb_keys/shim.key}"
|
||||||
SBSIGN_CERT="/usr/share/sb_keys/shim.pem"
|
SBSIGN_CERT="${SBSIGN_CERT:-/usr/share/sb_keys/shim.pem}"
|
||||||
else
|
else
|
||||||
SBSIGN_KEY="pkcs11:token=flatcar-secure-boot-prod-2026-04"
|
SBSIGN_KEY="pkcs11:token=flatcar-secure-boot-prod-2026-04"
|
||||||
unset SBSIGN_CERT
|
unset SBSIGN_CERT
|
||||||
|
|||||||
@ -806,12 +806,12 @@ _write_qemu_common() {
|
|||||||
cat >"${VM_README}" <<EOF
|
cat >"${VM_README}" <<EOF
|
||||||
If you have qemu installed (or in the SDK), you can start the image with:
|
If you have qemu installed (or in the SDK), you can start the image with:
|
||||||
cd path/to/image
|
cd path/to/image
|
||||||
./$(basename "${script}") -curses
|
./$(basename "${script}") -display curses
|
||||||
|
|
||||||
If you need to use a different ssh key or different ssh port:
|
If you need to use a different ssh key or different ssh port:
|
||||||
./$(basename "${script}") -a ~/.ssh/authorized_keys -p 2223 -- -curses
|
./$(basename "${script}") -a ~/.ssh/authorized_keys -p 2223 -- -display curses
|
||||||
|
|
||||||
If you rather you can use the -nographic option instad of -curses. In this
|
If you rather you can use the -nographic option instad of '-display curses'. In this
|
||||||
mode you can switch from the vm to the qemu monitor console with: Ctrl-a c
|
mode you can switch from the vm to the qemu monitor console with: Ctrl-a c
|
||||||
See the qemu man page for more details on the monitor console.
|
See the qemu man page for more details on the monitor console.
|
||||||
|
|
||||||
@ -890,11 +890,17 @@ _write_qemu_uefi_secure_conf() {
|
|||||||
esac
|
esac
|
||||||
|
|
||||||
# TODO: Remove the temporary flatcar shim signing cert
|
# TODO: Remove the temporary flatcar shim signing cert
|
||||||
|
local _sb_db_cert="${SBSIGN_DB_CERT:-/usr/share/sb_keys/DB.crt}"
|
||||||
|
local _sb_extra_db_certs=()
|
||||||
|
if [[ -z ${SBSIGN_DB_CERT:-} ]]; then
|
||||||
|
# Default behavior: include the temporary dev shim cert alongside DB.crt
|
||||||
|
_sb_extra_db_certs=( --add-db "${owner}" "${BUILD_LIBRARY_DIR}/flatcar-sb-dev-shim-2025.cert" )
|
||||||
|
fi
|
||||||
virt-fw-vars \
|
virt-fw-vars \
|
||||||
--input "${flash_in}" \
|
--input "${flash_in}" \
|
||||||
--output "$(_dst_dir)/${flash_rw}" \
|
--output "$(_dst_dir)/${flash_rw}" \
|
||||||
--add-db "${owner}" /usr/share/sb_keys/DB.crt \
|
--add-db "${owner}" "${_sb_db_cert}" \
|
||||||
--add-db "${owner}" "${BUILD_LIBRARY_DIR}/flatcar-sb-dev-shim-2025.cert"
|
"${_sb_extra_db_certs[@]}"
|
||||||
|
|
||||||
sed -e "s%^SECURE_BOOT=.*%SECURE_BOOT=1%" -i "${script}"
|
sed -e "s%^SECURE_BOOT=.*%SECURE_BOOT=1%" -i "${script}"
|
||||||
}
|
}
|
||||||
@ -911,7 +917,7 @@ _write_pxe_conf() {
|
|||||||
cat >>"${VM_README}" <<EOF
|
cat >>"${VM_README}" <<EOF
|
||||||
|
|
||||||
You can pass extra kernel parameters with -append, for example:
|
You can pass extra kernel parameters with -append, for example:
|
||||||
./$(basename "${script}") -curses -append 'sshkey="PUT AN SSH KEY HERE"'
|
./$(basename "${script}") -display curses -append 'sshkey="PUT AN SSH KEY HERE"'
|
||||||
|
|
||||||
When using -nographic or -serial you must also enable the serial console:
|
When using -nographic or -serial you must also enable the serial console:
|
||||||
./$(basename "${script}") -nographic -append 'console=ttyS0,115200n8'
|
./$(basename "${script}") -nographic -append 'console=ttyS0,115200n8'
|
||||||
|
|||||||
@ -125,10 +125,6 @@ fi
|
|||||||
|
|
||||||
# --
|
# --
|
||||||
|
|
||||||
docker_build() {
|
|
||||||
PROGRESS_NO_TRUNC=1 $docker build --progress plain "${@}"
|
|
||||||
}
|
|
||||||
|
|
||||||
# build plain SDK container w/o board support
|
# build plain SDK container w/o board support
|
||||||
#
|
#
|
||||||
import_image="flatcar-sdk-import:${docker_vernum}"
|
import_image="flatcar-sdk-import:${docker_vernum}"
|
||||||
|
|||||||
1
changelog/changes/2026-03-25-erofs-tools.md
Normal file
1
changelog/changes/2026-03-25-erofs-tools.md
Normal file
@ -0,0 +1 @@
|
|||||||
|
- Add EROFS tools for containerd ([Flatcar#2047](https://github.com/flatcar/Flatcar/issues/2047))
|
||||||
@ -0,0 +1 @@
|
|||||||
|
- Enable VNC console serial logs on ARM64 QEMU/KVM instances ([flatcar/scripts#2359](https://github.com/flatcar/scripts/pull/2359))
|
||||||
@ -0,0 +1 @@
|
|||||||
|
- Linux Firmware ([20260410](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20260410))
|
||||||
@ -0,0 +1 @@
|
|||||||
|
- ca-certificates ([3.123.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_123_1.html))
|
||||||
1
changelog/updates/2026-04-28-linux-6.12.84-update.md
Normal file
1
changelog/updates/2026-04-28-linux-6.12.84-update.md
Normal file
@ -0,0 +1 @@
|
|||||||
|
- Linux ([6.12.84](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.84) (includes [6.12.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.83), [6.12.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.82)))
|
||||||
1
changelog/updates/2026-05-01-linux-6.12.85-update.md
Normal file
1
changelog/updates/2026-05-01-linux-6.12.85-update.md
Normal file
@ -0,0 +1 @@
|
|||||||
|
- Linux ([6.12.85](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.85))
|
||||||
@ -232,10 +232,15 @@ function docker_image_from_buildcache() {
|
|||||||
local url="https://${BUILDCACHE_SERVER}/containers/${version}/${tgz}"
|
local url="https://${BUILDCACHE_SERVER}/containers/${version}/${tgz}"
|
||||||
local url_release="https://mirror.release.flatcar-linux.net/containers/${version}/${tgz}"
|
local url_release="https://mirror.release.flatcar-linux.net/containers/${version}/${tgz}"
|
||||||
|
|
||||||
curl --fail --silent --show-error --location --retry-delay 1 --retry 60 \
|
local curl_progress=(--silent --show-error)
|
||||||
|
if [[ -t 2 ]]; then
|
||||||
|
curl_progress=(--progress-bar)
|
||||||
|
fi
|
||||||
|
|
||||||
|
curl --fail "${curl_progress[@]}" --location --retry-delay 1 --retry 60 \
|
||||||
--retry-connrefused --retry-max-time 60 --connect-timeout 20 \
|
--retry-connrefused --retry-max-time 60 --connect-timeout 20 \
|
||||||
--remote-name "${url}" \
|
--remote-name "${url}" \
|
||||||
|| curl --fail --silent --show-error --location --retry-delay 1 --retry 60 \
|
|| curl --fail "${curl_progress[@]}" --location --retry-delay 1 --retry 60 \
|
||||||
--retry-connrefused --retry-max-time 60 --connect-timeout 20 \
|
--retry-connrefused --retry-max-time 60 --connect-timeout 20 \
|
||||||
--remote-name "${url_release}"
|
--remote-name "${url_release}"
|
||||||
|
|
||||||
@ -254,7 +259,7 @@ function docker_image_from_registry_or_buildcache() {
|
|||||||
return
|
return
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "Falling back to tar ball download..." >&2
|
echo "Container image not found in registry, downloading SDK tarball instead (this is normal for nightly builds)..." >&2
|
||||||
docker_image_from_buildcache "${image}" "${version}" zst || \
|
docker_image_from_buildcache "${image}" "${version}" zst || \
|
||||||
docker_image_from_buildcache "${image}" "${version}" gz
|
docker_image_from_buildcache "${image}" "${version}" gz
|
||||||
}
|
}
|
||||||
|
|||||||
@ -48,6 +48,10 @@ DEFINE_string getbinpkgver "" \
|
|||||||
# include upload options
|
# include upload options
|
||||||
. "${BUILD_LIBRARY_DIR}/release_util.sh" || exit 1
|
. "${BUILD_LIBRARY_DIR}/release_util.sh" || exit 1
|
||||||
|
|
||||||
|
# Override the default value to false so that
|
||||||
|
# ./flatcar_production_qemu_uefi.sh can launch the qemu VM later.
|
||||||
|
FLAGS_only_store_compressed=${FLAGS_FALSE}
|
||||||
|
|
||||||
# Parse command line
|
# Parse command line
|
||||||
FLAGS "$@" || exit 1
|
FLAGS "$@" || exit 1
|
||||||
eval set -- "${FLAGS_ARGV}"
|
eval set -- "${FLAGS_ARGV}"
|
||||||
|
|||||||
@ -1 +1 @@
|
|||||||
ghcr.io/flatcar/mantle:git-92391e8fba518db259e561c89ad3f84450523b74
|
ghcr.io/flatcar/mantle:git-859a6b1262f61e0aabc74c4c091d4fe49cb57af1
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
FLATCAR_VERSION=4671.0.0+nightly-20260415-2100
|
FLATCAR_VERSION=4690.0.0+nightly-20260504-2100
|
||||||
FLATCAR_VERSION_ID=4671.0.0
|
FLATCAR_VERSION_ID=4690.0.0
|
||||||
FLATCAR_BUILD_ID="nightly-20260415-2100"
|
FLATCAR_BUILD_ID="nightly-20260504-2100"
|
||||||
FLATCAR_SDK_VERSION=4671.0.0+nightly-20260415-2100
|
FLATCAR_SDK_VERSION=4690.0.0+nightly-20260504-2100
|
||||||
|
|||||||
@ -1 +1 @@
|
|||||||
DIST nss-3.122.tar.gz 77654239 BLAKE2B a34de23e316cff66f989074c91b6a33788db7fc21bbeadafeb76001aa198dbaf024d33845bbee2c319f5dc65850f0cd6a83cdd50419d2dead6b5ffc25484c03d SHA512 53847c2de0e4608b387d5688ecf005a2a78da67408bda31f522539306816e25580d6046656cd5bb7fb9642feb625a904a17d3102573be96a9fd8b46e14037ff7
|
DIST nss-3.123.1.tar.gz 77762541 BLAKE2B 68cd408dce23a039ee91ffcfa156817310b56227ab9d9ce130a7909fe0b306777d82b1fe8aac64451b8266feb87d3c0f9d7a8bed757c5c451e077c96a6263f92 SHA512 988927a07d1ac4533e7e89d01a08504e6ff70a7b111c1267e54a9cfe0a3a5674bb8b25e14ad6dca0d8765da3ca591a9be4f977ca172be3cf7af95a52f2e19214
|
||||||
|
|||||||
@ -192,6 +192,7 @@ RDEPEND="${RDEPEND}
|
|||||||
sys-fs/cryptsetup
|
sys-fs/cryptsetup
|
||||||
sys-fs/dosfstools
|
sys-fs/dosfstools
|
||||||
sys-fs/e2fsprogs
|
sys-fs/e2fsprogs
|
||||||
|
sys-fs/erofs-utils
|
||||||
sys-fs/lsscsi
|
sys-fs/lsscsi
|
||||||
sys-fs/lvm2
|
sys-fs/lvm2
|
||||||
sys-fs/mdadm
|
sys-fs/mdadm
|
||||||
|
|||||||
@ -14,7 +14,7 @@ DIST bitflags-2.9.0.crate 47654 BLAKE2B df924872ccb929f3e428976764d50e5468112cb8
|
|||||||
DIST block-buffer-0.10.4.crate 10538 BLAKE2B d819c4f9c4be85868e8b105fb7e479d2e58d3ed85c3339bd677a3e111f85cb1ff624a54d7802ab79a6e1d9221115f66388568340480fe83eae1cb448f19f5b11 SHA512 b7d436d8e627e16e6ddc300ee8f706a6cef28ff6f09eff848eedee46f84bdcd03601303c92ab8996042e55922866a59259948177c0a4496eed723523e77f6fdb
|
DIST block-buffer-0.10.4.crate 10538 BLAKE2B d819c4f9c4be85868e8b105fb7e479d2e58d3ed85c3339bd677a3e111f85cb1ff624a54d7802ab79a6e1d9221115f66388568340480fe83eae1cb448f19f5b11 SHA512 b7d436d8e627e16e6ddc300ee8f706a6cef28ff6f09eff848eedee46f84bdcd03601303c92ab8996042e55922866a59259948177c0a4496eed723523e77f6fdb
|
||||||
DIST bstr-1.12.0.crate 351557 BLAKE2B b57f018ad6c0767b23ff65f30fb7bde6199956e50200b7574c04df851aa7c5510874c98caed575c2d6b1984286d39df96a2f29773081915a4bc94257146b831c SHA512 a2b6bb347c4bda37bbc0908a4b1191261fe69de3f767e196b43410a757cd5ade65c9349be76f0d585b4250a9b811c7834fdfe34274a54e989985f353f5ba345a
|
DIST bstr-1.12.0.crate 351557 BLAKE2B b57f018ad6c0767b23ff65f30fb7bde6199956e50200b7574c04df851aa7c5510874c98caed575c2d6b1984286d39df96a2f29773081915a4bc94257146b831c SHA512 a2b6bb347c4bda37bbc0908a4b1191261fe69de3f767e196b43410a757cd5ade65c9349be76f0d585b4250a9b811c7834fdfe34274a54e989985f353f5ba345a
|
||||||
DIST bumpalo-3.17.0.crate 91975 BLAKE2B b0aca1d64373425384eddcdf8d60dc977058a3d1570451de944ce48aacdb984e73a29ab64fb5b23413582d57a8e32ad8155f6a1479eb00f804afe9d8a9d9e163 SHA512 b2acfb463aa705b9c6a9555858b84f565234110988c880cdb761ab8dc87892ee5d22e65fa935d2cfef9d58869fec0ab64d810b26bf122fdd89b454b6ce65ea1f
|
DIST bumpalo-3.17.0.crate 91975 BLAKE2B b0aca1d64373425384eddcdf8d60dc977058a3d1570451de944ce48aacdb984e73a29ab64fb5b23413582d57a8e32ad8155f6a1479eb00f804afe9d8a9d9e163 SHA512 b2acfb463aa705b9c6a9555858b84f565234110988c880cdb761ab8dc87892ee5d22e65fa935d2cfef9d58869fec0ab64d810b26bf122fdd89b454b6ce65ea1f
|
||||||
DIST bytes-1.10.1.crate 76779 BLAKE2B 96573ff7852cd2d4f37a68cb4d76bc43d2018dc25b7b7e2164df022de4e1974f22d4d3ea7cbfb280667650cdb5063d600f4f76cbdca43dae508f29ced449b0f7 SHA512 03429f01927b94ba6c958c46b2e5bf92a23b39ce9385689e21accd34a5d3be01fd0f665f4bbffb1f7c5bdf1edfb1bf11d5ccad00eff0f9388be39fe2f753d296
|
DIST bytes-1.11.1.crate 78584 BLAKE2B 4985426ff626d880a0da3d592ba48d697c88a83f48177e2b7380cb55e736a43f3cdf662d99cf0908b599aa8eccfebff2910405559e490b71adcf3f078673cd72 SHA512 7933d18c1a2c1496add2c7193e92c3aa17029c530b7031604ccb7c77c68903f53cf7d41396448b32bdd4f540fef4b37564972dac7b225e6e2ca99cd61179a6ab
|
||||||
DIST bzip2-0.4.4.crate 34197 BLAKE2B b69f8ad38b44eb4912b33d53467492b0ebe6ed740451bdfe9133e71c47a8dbd85b1110a9607c4cc627fbabc44cd86fe0396bb545864632ffb6169f9cfa547b6c SHA512 9cd2b9159bd0b42ac908ecad41f0a737272af94ae0d6dcfe182d2f44bcea4632d32b0456f02322047ea9d6f46377db6cd083f468782bccd6126bcc75cb852555
|
DIST bzip2-0.4.4.crate 34197 BLAKE2B b69f8ad38b44eb4912b33d53467492b0ebe6ed740451bdfe9133e71c47a8dbd85b1110a9607c4cc627fbabc44cd86fe0396bb545864632ffb6169f9cfa547b6c SHA512 9cd2b9159bd0b42ac908ecad41f0a737272af94ae0d6dcfe182d2f44bcea4632d32b0456f02322047ea9d6f46377db6cd083f468782bccd6126bcc75cb852555
|
||||||
DIST bzip2-sys-0.1.13+1.0.8.crate 633818 BLAKE2B f33f1bf6f01fd30e9ac551caa0092a6346fdaf076ee52967ad7e7c68f3e5d9261413da5185aaafbb11add343a0cc0116dcd1392fe5575a9be779323b729acd48 SHA512 89631b05c21bd06a1fc5911c637d3308c3be2d7d6e0152dd62f1851d286cfbc30ad534800b718d5e273e88409b33f5aca478adccad2c7b05400b3e698eb796e7
|
DIST bzip2-sys-0.1.13+1.0.8.crate 633818 BLAKE2B f33f1bf6f01fd30e9ac551caa0092a6346fdaf076ee52967ad7e7c68f3e5d9261413da5185aaafbb11add343a0cc0116dcd1392fe5575a9be779323b729acd48 SHA512 89631b05c21bd06a1fc5911c637d3308c3be2d7d6e0152dd62f1851d286cfbc30ad534800b718d5e273e88409b33f5aca478adccad2c7b05400b3e698eb796e7
|
||||||
DIST cc-1.2.19.crate 105910 BLAKE2B 1c3d757f8155e2987ca8fa7709428905d3c66afe5d3379c3a3741c26b6abe288170bf414a9aaacd30eefa75f06dfde4e3f75cbe5cd384c558f2487ef29f1d012 SHA512 d56ebd19090e63bcdf65a738fbe34c03cdd294803ed46d66a6428ff60f2ac14a4eaf3e34870ca0ddb38e489878cb632b5912012e5ffb4e84fd813bb7585f2e2a
|
DIST cc-1.2.19.crate 105910 BLAKE2B 1c3d757f8155e2987ca8fa7709428905d3c66afe5d3379c3a3741c26b6abe288170bf414a9aaacd30eefa75f06dfde4e3f75cbe5cd384c558f2487ef29f1d012 SHA512 d56ebd19090e63bcdf65a738fbe34c03cdd294803ed46d66a6428ff60f2ac14a4eaf3e34870ca0ddb38e489878cb632b5912012e5ffb4e84fd813bb7585f2e2a
|
||||||
@ -33,7 +33,7 @@ DIST env_logger-0.10.2.crate 36402 BLAKE2B 34ef02d0f53fea474e7284fd7021ed3b44b11
|
|||||||
DIST equivalent-1.0.2.crate 7419 BLAKE2B 7ce4fb7b911961cd4ccfb48323eea4952110a069789c6bd177a63391c270df861afadd00c07db7b22768f0864f320e429e0200c433284f528336e2f81d071eff SHA512 8e0e2dc070794a85b276e93f9e4a65d3bbb8587b33fda211c34479a0b88504c913d8bef9e84d7996254aeabe1efe4ff1ef6259ff4fe3f9ccb90dd90070b3e4d4
|
DIST equivalent-1.0.2.crate 7419 BLAKE2B 7ce4fb7b911961cd4ccfb48323eea4952110a069789c6bd177a63391c270df861afadd00c07db7b22768f0864f320e429e0200c433284f528336e2f81d071eff SHA512 8e0e2dc070794a85b276e93f9e4a65d3bbb8587b33fda211c34479a0b88504c913d8bef9e84d7996254aeabe1efe4ff1ef6259ff4fe3f9ccb90dd90070b3e4d4
|
||||||
DIST errno-0.3.11.crate 12048 BLAKE2B 6d370edb0712b4b527645460eb663f6434784abe8749356674dddfe7a655fa888a9894d870c44d514186d1ce226d0d4f44955b926a10b14cd3b54d07c40cce50 SHA512 95f64e6e71c9100c36e52f2aa720d244c1a4d1182b18708773bfb4fc69ad55ed78e4918b69a96eb7ce9a2bf6d39fcc23236bb38473d3046f4ab332c260005299
|
DIST errno-0.3.11.crate 12048 BLAKE2B 6d370edb0712b4b527645460eb663f6434784abe8749356674dddfe7a655fa888a9894d870c44d514186d1ce226d0d4f44955b926a10b14cd3b54d07c40cce50 SHA512 95f64e6e71c9100c36e52f2aa720d244c1a4d1182b18708773bfb4fc69ad55ed78e4918b69a96eb7ce9a2bf6d39fcc23236bb38473d3046f4ab332c260005299
|
||||||
DIST fastrand-2.3.0.crate 15076 BLAKE2B 15c9a1c4f64d94c4bfd38ae139c6fe19b6b621a495c1b57209edd6d76d978eaf018ba77f356b5086c3f462a6de044fb5e3b172fc288309569911a17ec39951bc SHA512 267fecbb7459c8840f03425733d278dd6c4e7637b85b99552877117ed5e8015e094d86aa95841f77064136b7f382276c3cb2c2bef7b2881d272f4aa57c5cf947
|
DIST fastrand-2.3.0.crate 15076 BLAKE2B 15c9a1c4f64d94c4bfd38ae139c6fe19b6b621a495c1b57209edd6d76d978eaf018ba77f356b5086c3f462a6de044fb5e3b172fc288309569911a17ec39951bc SHA512 267fecbb7459c8840f03425733d278dd6c4e7637b85b99552877117ed5e8015e094d86aa95841f77064136b7f382276c3cb2c2bef7b2881d272f4aa57c5cf947
|
||||||
DIST flatcar-ue-rs-8464c05429d9a034d38b48563d59479fa471606b.tar.gz 84209 BLAKE2B f3eb1d6a54670426d7c1ff7238d7394548ebd6b40af8b23046783c51f7e0b486bb19d7628c232da062f906a676961bf6f512c4f8fea400f4d27f36df46ac931b SHA512 4336be600f36e56dc577487ee47812470c45dc07d6d0c6c4f06754e9425120455821393723c5c99e370f3019ac1a0a49dace3ab1c2537f3fa1899243ad3e7ab7
|
DIST flatcar-ue-rs-f1e0301c36a2f5259f5d7ea2f2a60769f922b2f5.tar.gz 84543 BLAKE2B b9e179cfa0243eec98ac97d7aa130398827dde71af6ee532859f516a2db802008233c68eb668bbf0bc17475c9085d97d7aadb5968177081d110ebc069d23a8d2 SHA512 5f9a3e4b153ad8d913ec7753ff8750fcddddc0ef40d9e64bee588ab3ae5234bed7169aaa9cf20caa8f8d9bc650223942dc0ad1820bc4b923a82fdd619476a3b6
|
||||||
DIST fnv-1.0.7.crate 11266 BLAKE2B 81da85889c91b6567e0f555e37dd915f1bd919719d1ca10c31a6861d7aec29a49ae9c1e8bc500791bf9d6b8dbb318c096d04872c5872a4b1f7d45fbd8e12842d SHA512 2195a4b34a78e2dd9838caf0ee556bf87cbb4a8ef5505aac663b614eb59dcfc0c40f432463ede41ecca57bfe7711f72673d39a85fe03d426f1324097d5628334
|
DIST fnv-1.0.7.crate 11266 BLAKE2B 81da85889c91b6567e0f555e37dd915f1bd919719d1ca10c31a6861d7aec29a49ae9c1e8bc500791bf9d6b8dbb318c096d04872c5872a4b1f7d45fbd8e12842d SHA512 2195a4b34a78e2dd9838caf0ee556bf87cbb4a8ef5505aac663b614eb59dcfc0c40f432463ede41ecca57bfe7711f72673d39a85fe03d426f1324097d5628334
|
||||||
DIST foreign-types-0.3.2.crate 7504 BLAKE2B 520818b702d990d296ecd31a8646850202509ccfa18edd0e1b260289619a6c351e758f317ec0824bd76eccb209b6f087057c25f1bd01a47897715013dd834867 SHA512 bf27b8243ed482c202d120383374f19ff09422535e24b9c1aebccc66529bf300ca17b8bbc76d67f98ac092e614497afe3add9dc68aa69c93074df05762f91232
|
DIST foreign-types-0.3.2.crate 7504 BLAKE2B 520818b702d990d296ecd31a8646850202509ccfa18edd0e1b260289619a6c351e758f317ec0824bd76eccb209b6f087057c25f1bd01a47897715013dd834867 SHA512 bf27b8243ed482c202d120383374f19ff09422535e24b9c1aebccc66529bf300ca17b8bbc76d67f98ac092e614497afe3add9dc68aa69c93074df05762f91232
|
||||||
DIST foreign-types-shared-0.1.1.crate 5672 BLAKE2B d2e42e04b6657e7a69fe0bd20c672176629c743e49a55fd007bb30e289710b70045d445ae9cae0eeaa747ee708c90e8abd9b5fc39bad8ec0666befe1b696d4f1 SHA512 bafdb2143e136fb0818e2ffd90b5c862b7181647d6568947d4e4531012bbf7a57b597221ec7056c1b562dfc0c3b5dead26d1a4111ebc15e7863737a873518a4a
|
DIST foreign-types-shared-0.1.1.crate 5672 BLAKE2B d2e42e04b6657e7a69fe0bd20c672176629c743e49a55fd007bb30e289710b70045d445ae9cae0eeaa747ee708c90e8abd9b5fc39bad8ec0666befe1b696d4f1 SHA512 bafdb2143e136fb0818e2ffd90b5c862b7181647d6568947d4e4531012bbf7a57b597221ec7056c1b562dfc0c3b5dead26d1a4111ebc15e7863737a873518a4a
|
||||||
@ -97,10 +97,10 @@ DIST num-iter-0.1.45.crate 10320 BLAKE2B 9f2a60a819e31a6e7e048ae86f7fa029015a738
|
|||||||
DIST num-traits-0.2.19.crate 51631 BLAKE2B 78637360cbf32d172510a62bd9442708af9730c0296a2bb4ebd200c08facd49bc31bf8ddd58967e0df7273a938832b620265d9f8f4d26ad16049bf6dac1cb4e5 SHA512 180018a5eceb45085e4e8d103ff21bb4d5079cea874c42a0ad4c76c99d275d434bbc1cc289f0cdec172866daa89dbfe0871410b2cc3407233fe1129786905956
|
DIST num-traits-0.2.19.crate 51631 BLAKE2B 78637360cbf32d172510a62bd9442708af9730c0296a2bb4ebd200c08facd49bc31bf8ddd58967e0df7273a938832b620265d9f8f4d26ad16049bf6dac1cb4e5 SHA512 180018a5eceb45085e4e8d103ff21bb4d5079cea874c42a0ad4c76c99d275d434bbc1cc289f0cdec172866daa89dbfe0871410b2cc3407233fe1129786905956
|
||||||
DIST object-0.36.7.crate 329938 BLAKE2B 0b02cf2f44e99002909b38125edada1a259feae59fd0e5ef52001755b6878cac710c87c60fbafdbe405281e039f68572ea3d8093d16128899090fd70df7f2fa8 SHA512 dd69172349ecf51fd2351d32cc4453760ca1d15e854a1cf5ed99112032901a54b4645b24163b946deed11f81d3e3035e1a5afd8bff20f335dbd05eceab073478
|
DIST object-0.36.7.crate 329938 BLAKE2B 0b02cf2f44e99002909b38125edada1a259feae59fd0e5ef52001755b6878cac710c87c60fbafdbe405281e039f68572ea3d8093d16128899090fd70df7f2fa8 SHA512 dd69172349ecf51fd2351d32cc4453760ca1d15e854a1cf5ed99112032901a54b4645b24163b946deed11f81d3e3035e1a5afd8bff20f335dbd05eceab073478
|
||||||
DIST once_cell-1.21.3.crate 34534 BLAKE2B 3578aaef305cad2fdffdc40c392775a3540bfab3f3aeafd22466d9507bf8346b9fcc200929d48525b051070c0aaa423ecbcaa12868b34dca007991effb224166 SHA512 32a87506c6f4598f3ca2c88556014ef2093d5db9a08602335e847caa537a866492fa74c894e7e1da2e4289a1d3dbffcb90a9e37a4a1453203832f434b8206990
|
DIST once_cell-1.21.3.crate 34534 BLAKE2B 3578aaef305cad2fdffdc40c392775a3540bfab3f3aeafd22466d9507bf8346b9fcc200929d48525b051070c0aaa423ecbcaa12868b34dca007991effb224166 SHA512 32a87506c6f4598f3ca2c88556014ef2093d5db9a08602335e847caa537a866492fa74c894e7e1da2e4289a1d3dbffcb90a9e37a4a1453203832f434b8206990
|
||||||
DIST openssl-0.10.72.crate 283852 BLAKE2B a221ff329fd068da6d88b98e32c0fb9750e074fd87eb261614ba08771df0879fefb80ed0b60a26fcf4ef808e0ff6484f7e4fcbc38146186d30ca4e74d17fa803 SHA512 ee4cfb893e7112fd274baef3283f3bc44385a3e014c9bb4eb24ffc6153fe56e2f66807d8d5874f97254390041cec3affc41bf7b2bc7e5d39bf60413ffb747786
|
DIST openssl-0.10.78.crate 292622 BLAKE2B 17ec5a5efd1fa997a8179bb107912c62c47ea901d93df1c8c0c63e548427a01e57d79c23f0d4a7d614f0d2059c6c07097a4047aa91dfbc4d224c942615eb3587 SHA512 fc27483ebf36daf4b97a43aab2b347255a35e03268c4424df133c714da41a415025be7e6d12579590ab03d237eebaacf89c056d722a66591a7e77c1f45297b4d
|
||||||
DIST openssl-macros-0.1.1.crate 5601 BLAKE2B 69dc1c1f3b7bc4f934cae0dce64c3efa501162e5279efd6af3b74f7a7716c04b6996b306b310f1c045cfa2eff2895314a47ecbb020a817e461c6d77d0bc11e92 SHA512 57e75c84f78fb83f884eeaedb0dd135ecb40192dad2facd908e6a575c9b65b38a2c93bca4630e09ea5a82c77d8bc8364cb2f5778cbfe9d8f484cafe3346b883c
|
DIST openssl-macros-0.1.1.crate 5601 BLAKE2B 69dc1c1f3b7bc4f934cae0dce64c3efa501162e5279efd6af3b74f7a7716c04b6996b306b310f1c045cfa2eff2895314a47ecbb020a817e461c6d77d0bc11e92 SHA512 57e75c84f78fb83f884eeaedb0dd135ecb40192dad2facd908e6a575c9b65b38a2c93bca4630e09ea5a82c77d8bc8364cb2f5778cbfe9d8f484cafe3346b883c
|
||||||
DIST openssl-probe-0.1.6.crate 8128 BLAKE2B 912371bbd0e105e7281eaa1462d68c6674ae11226f72a9e5c2808be12e975e39a257b5424cafdc527fac9d2313ed928f34ecf407cddbfb179283137e0817631d SHA512 6c2f02a9d42caf578fbd2a40277ad346bef32d191f27564d04a83477d62d6ad1f44945f40234e9425503e3f701a9e0ec8735ade52641170ff57fa6732666ac69
|
DIST openssl-probe-0.1.6.crate 8128 BLAKE2B 912371bbd0e105e7281eaa1462d68c6674ae11226f72a9e5c2808be12e975e39a257b5424cafdc527fac9d2313ed928f34ecf407cddbfb179283137e0817631d SHA512 6c2f02a9d42caf578fbd2a40277ad346bef32d191f27564d04a83477d62d6ad1f44945f40234e9425503e3f701a9e0ec8735ade52641170ff57fa6732666ac69
|
||||||
DIST openssl-sys-0.9.107.crate 78156 BLAKE2B 7f4b43a7dbd9f58dba412fb87108547858aa74f4d891e5b446154be28afe7f034f5361427b52c3517c58e63eb0dbfe74452bf42031dc54358c4520992df9966f SHA512 e66e0f7cb43e3d8135bc1806d8be304b1b8da0de8254afdf1e5f6d2c52af7833389c06c457cb0c94e8917ce905b35ff73ddcf7bdc81cfb58cc1b177ec4e2d693
|
DIST openssl-sys-0.9.114.crate 75617 BLAKE2B f4c313dae993116f249d27d9b161263e8ed770ea8ba0446738aa9fcb2f94d2aebb069f6a713f94ed64e99350f3241b095ef6f433b0e4f75cc3de2b0916d04a75 SHA512 a1404b613d77b039fee2e2195867f8db75520aaa558d125c99f1a6694e513e15454914dd8ab84ab1ef4ab729afd53eac8ddf5f3c42d152f758faa1d0c1fbd258
|
||||||
DIST pem-rfc7468-0.7.0.crate 24159 BLAKE2B 478d355dd970b9705ebcf44d74d61ae0694db6de16b2018548fda88546f53e35b965ff72d939def399a49fe97d3c8317a10385ace94b3d552797ec64ace1eb8f SHA512 f47d3b6c7c8bf4547916acc2a3d6671f6c1308e74641419c8f1df810d8bd940aba8f94d361e4cbef3eae3b7f11587cd3996a11be3be41d19111abfcde7a9272a
|
DIST pem-rfc7468-0.7.0.crate 24159 BLAKE2B 478d355dd970b9705ebcf44d74d61ae0694db6de16b2018548fda88546f53e35b965ff72d939def399a49fe97d3c8317a10385ace94b3d552797ec64ace1eb8f SHA512 f47d3b6c7c8bf4547916acc2a3d6671f6c1308e74641419c8f1df810d8bd940aba8f94d361e4cbef3eae3b7f11587cd3996a11be3be41d19111abfcde7a9272a
|
||||||
DIST percent-encoding-2.3.1.crate 10235 BLAKE2B cf8e2fd7b359a05b7bdaf731f9ae84c7fe6f468a53482eb2db7f93dfdaab64ac812b3664899db260055a93449462e6d219c695942fc5b030517b197b4df9b95f SHA512 5951ea8315e52cf3acfbaa023cb9e13a136b114c54a7da0bd44619ae24cd2159d4a96469d7572a2fdabd94e19513a033387117d7ca81d0eb409fb383e4acda44
|
DIST percent-encoding-2.3.1.crate 10235 BLAKE2B cf8e2fd7b359a05b7bdaf731f9ae84c7fe6f468a53482eb2db7f93dfdaab64ac812b3664899db260055a93449462e6d219c695942fc5b030517b197b4df9b95f SHA512 5951ea8315e52cf3acfbaa023cb9e13a136b114c54a7da0bd44619ae24cd2159d4a96469d7572a2fdabd94e19513a033387117d7ca81d0eb409fb383e4acda44
|
||||||
DIST pin-project-lite-0.2.16.crate 30504 BLAKE2B efd0b426fcc6ea8852bce499fac61f9755a11c6a2999cbec514f093ba7b3f94b1f2d437ee9abb243e31f3838ac1c74491a212851d7798eb249e209b35e015332 SHA512 971adfe54cfed304647fd944c1c915e78b37eaf0de3a582fb984a5e91f1b7d4db2cf0f53a9a64b64427062d4b41c0a36baddef782411a76ae3be0f8ca45f0718
|
DIST pin-project-lite-0.2.16.crate 30504 BLAKE2B efd0b426fcc6ea8852bce499fac61f9755a11c6a2999cbec514f093ba7b3f94b1f2d437ee9abb243e31f3838ac1c74491a212851d7798eb249e209b35e015332 SHA512 971adfe54cfed304647fd944c1c915e78b37eaf0de3a582fb984a5e91f1b7d4db2cf0f53a9a64b64427062d4b41c0a36baddef782411a76ae3be0f8ca45f0718
|
||||||
@ -128,7 +128,7 @@ DIST rustc-demangle-0.1.24.crate 29047 BLAKE2B 8248b014eedb26cdc0b748544ba91b9aa
|
|||||||
DIST rustix-1.0.5.crate 414160 BLAKE2B bc6d64d86501e5e97875fe290029bd6958db41ff90fa3f8d75fca88761a871904b96e0b452a7eaac7177de237ed2693ec8f32c940dce751ecaf1acedf582301a SHA512 df4c0ce07fcecadcccbb59c65e826eb327904f5a590a61539225c11ebcacf067896bb8577c73a490fbcc3ee20175782b847246095143c24f67e073f2073e8b07
|
DIST rustix-1.0.5.crate 414160 BLAKE2B bc6d64d86501e5e97875fe290029bd6958db41ff90fa3f8d75fca88761a871904b96e0b452a7eaac7177de237ed2693ec8f32c940dce751ecaf1acedf582301a SHA512 df4c0ce07fcecadcccbb59c65e826eb327904f5a590a61539225c11ebcacf067896bb8577c73a490fbcc3ee20175782b847246095143c24f67e073f2073e8b07
|
||||||
DIST rustls-0.23.35.crate 373700 BLAKE2B a4c219adfeed33e415f5cb3ca2d9df7980ed03bb43f2b1dc6f7f3b2723a69dd5d0a9d5f561d2d26da60f90a4106b54588b243c37baec7ec201df51e2abf411cd SHA512 f59f48bded60aad7b23e7c8c0f579713405ed7de45392f7984ceddaca42bc796f86674ec23b4576958042e699dd5a7ed82fac47923ae13dce930b7f3e8c0a039
|
DIST rustls-0.23.35.crate 373700 BLAKE2B a4c219adfeed33e415f5cb3ca2d9df7980ed03bb43f2b1dc6f7f3b2723a69dd5d0a9d5f561d2d26da60f90a4106b54588b243c37baec7ec201df51e2abf411cd SHA512 f59f48bded60aad7b23e7c8c0f579713405ed7de45392f7984ceddaca42bc796f86674ec23b4576958042e699dd5a7ed82fac47923ae13dce930b7f3e8c0a039
|
||||||
DIST rustls-pki-types-1.13.1.crate 34901 BLAKE2B ebe0a3ef59097ec96491337df232efc1644768ac1d7d9e465e9762a05282c072d9f6dbaf9dbca935405bcad48049f0a8b91db7b3182e16d4c5aca27f1b26033b SHA512 0357a3c66e31447fdf39ed9e29576e2dfbbb012171e71efe322c2cb13856e7441115936375555fb2f700e6a7bc97565c74dc4bc18f8b8b01d335357e220a2c1b
|
DIST rustls-pki-types-1.13.1.crate 34901 BLAKE2B ebe0a3ef59097ec96491337df232efc1644768ac1d7d9e465e9762a05282c072d9f6dbaf9dbca935405bcad48049f0a8b91db7b3182e16d4c5aca27f1b26033b SHA512 0357a3c66e31447fdf39ed9e29576e2dfbbb012171e71efe322c2cb13856e7441115936375555fb2f700e6a7bc97565c74dc4bc18f8b8b01d335357e220a2c1b
|
||||||
DIST rustls-webpki-0.103.8.crate 85810 BLAKE2B a6af950b130e130c0959013662b7be31d73d1bd98e00f507a20a9d980d7b133ee9bdeeeffa6313cdc75a02bbf06e24a314431a6f1a460ac4e00e37d046604412 SHA512 934f630a0c8be9bdc41d491ff8c6cdeb225f180c77b7f1b242d0c4a61390fce7c925ffa09527e5cf872993384a6197ba4685dd0b7466241b4e1811a557366336
|
DIST rustls-webpki-0.103.13.crate 87513 BLAKE2B c1b8db65355e598a240b545f5fdee8db234df9f4f1c2ffa41ab6e8759365fe88f867686a61dbf4002fb3330c67a172e1c97b53773e0378dbaad6c799646c74af SHA512 367829afe3432a9d80bb4da82e075dd05bc37ecaf801c0944e1af9184565d743abf92d59e6fd433e7f051daac15099273b823e6f417ec46b6b5da43bbdad59b6
|
||||||
DIST rustversion-1.0.20.crate 20666 BLAKE2B 49fabcf276fe3f59b4a1c2e8a07364ba59c5ba4e0a33fe4150ce2eb93c6da42d32ad4d4a197baf6616c1cd703d34fcf5a90186c5467c1656388d55e7962d01a3 SHA512 250be168a4ee64f4b85d78658706659122d5fbbc748f321fe2b9baf48c547de4f0004c87882642645994b7798077c514a44e06b73784a800d04e4cc673aa8906
|
DIST rustversion-1.0.20.crate 20666 BLAKE2B 49fabcf276fe3f59b4a1c2e8a07364ba59c5ba4e0a33fe4150ce2eb93c6da42d32ad4d4a197baf6616c1cd703d34fcf5a90186c5467c1656388d55e7962d01a3 SHA512 250be168a4ee64f4b85d78658706659122d5fbbc748f321fe2b9baf48c547de4f0004c87882642645994b7798077c514a44e06b73784a800d04e4cc673aa8906
|
||||||
DIST ryu-1.0.20.crate 48738 BLAKE2B b126085448cb58639a7b5867fe313dcaabaf19df478f67fcb6cf15b8e881a21e641878345e0bf1fea7d24b56b921e667fd26a39cb81fca7ea02585332068263f SHA512 329c581429d9b8baa7d9edd9cf20e23fb8002f339d9fb3d50ed4c7eb68fb19c1ba966d52a9c9602265ca5f59f2bd4393ddcb3a7ac20c64aee3096e137eb2a384
|
DIST ryu-1.0.20.crate 48738 BLAKE2B b126085448cb58639a7b5867fe313dcaabaf19df478f67fcb6cf15b8e881a21e641878345e0bf1fea7d24b56b921e667fd26a39cb81fca7ea02585332068263f SHA512 329c581429d9b8baa7d9edd9cf20e23fb8002f339d9fb3d50ed4c7eb68fb19c1ba966d52a9c9602265ca5f59f2bd4393ddcb3a7ac20c64aee3096e137eb2a384
|
||||||
DIST schannel-0.1.27.crate 42772 BLAKE2B 55b3cdf596d6d490fdbc10298eed7cb1b1bb8d6349ac8700ac2e7db66e1d75f0a5bea5b1b322bf30cc0f982262e96aa421998151a8ee1e620b5a09d25ad4263f SHA512 f469d03c2be014c248e7b6408f541584f250a9d58bc8dd8ff4d1e63f5720cadba1c0579b1e5d97b58844fadaeff10e9cfae6d5cd33c5de0fa4ebe699a8ead4a8
|
DIST schannel-0.1.27.crate 42772 BLAKE2B 55b3cdf596d6d490fdbc10298eed7cb1b1bb8d6349ac8700ac2e7db66e1d75f0a5bea5b1b322bf30cc0f982262e96aa421998151a8ee1e620b5a09d25ad4263f SHA512 f469d03c2be014c248e7b6408f541584f250a9d58bc8dd8ff4d1e63f5720cadba1c0579b1e5d97b58844fadaeff10e9cfae6d5cd33c5de0fa4ebe699a8ead4a8
|
||||||
|
|||||||
@ -20,7 +20,7 @@ CRATES="
|
|||||||
block-buffer@0.10.4
|
block-buffer@0.10.4
|
||||||
bstr@1.12.0
|
bstr@1.12.0
|
||||||
bumpalo@3.17.0
|
bumpalo@3.17.0
|
||||||
bytes@1.10.1
|
bytes@1.11.1
|
||||||
bzip2-sys@0.1.13+1.0.8
|
bzip2-sys@0.1.13+1.0.8
|
||||||
bzip2@0.4.4
|
bzip2@0.4.4
|
||||||
cc@1.2.19
|
cc@1.2.19
|
||||||
@ -104,8 +104,8 @@ CRATES="
|
|||||||
once_cell@1.21.3
|
once_cell@1.21.3
|
||||||
openssl-macros@0.1.1
|
openssl-macros@0.1.1
|
||||||
openssl-probe@0.1.6
|
openssl-probe@0.1.6
|
||||||
openssl-sys@0.9.107
|
openssl-sys@0.9.114
|
||||||
openssl@0.10.72
|
openssl@0.10.78
|
||||||
pem-rfc7468@0.7.0
|
pem-rfc7468@0.7.0
|
||||||
percent-encoding@2.3.1
|
percent-encoding@2.3.1
|
||||||
pin-project-lite@0.2.16
|
pin-project-lite@0.2.16
|
||||||
@ -132,7 +132,7 @@ CRATES="
|
|||||||
rustc-demangle@0.1.24
|
rustc-demangle@0.1.24
|
||||||
rustix@1.0.5
|
rustix@1.0.5
|
||||||
rustls-pki-types@1.13.1
|
rustls-pki-types@1.13.1
|
||||||
rustls-webpki@0.103.8
|
rustls-webpki@0.103.13
|
||||||
rustls@0.23.35
|
rustls@0.23.35
|
||||||
rustversion@1.0.20
|
rustversion@1.0.20
|
||||||
ryu@1.0.20
|
ryu@1.0.20
|
||||||
@ -235,7 +235,7 @@ if [[ ${PV} == 9999 ]]; then
|
|||||||
EGIT_REPO_URI="https://github.com/flatcar/ue-rs.git"
|
EGIT_REPO_URI="https://github.com/flatcar/ue-rs.git"
|
||||||
inherit git-r3
|
inherit git-r3
|
||||||
else
|
else
|
||||||
EGIT_VERSION="8464c05429d9a034d38b48563d59479fa471606b" # main
|
EGIT_VERSION="f1e0301c36a2f5259f5d7ea2f2a60769f922b2f5" # main
|
||||||
SRC_URI="https://github.com/flatcar/${PN}/archive/${EGIT_VERSION}.tar.gz -> flatcar-${PN}-${EGIT_VERSION}.tar.gz
|
SRC_URI="https://github.com/flatcar/${PN}/archive/${EGIT_VERSION}.tar.gz -> flatcar-${PN}-${EGIT_VERSION}.tar.gz
|
||||||
${CARGO_CRATE_URIS}"
|
${CARGO_CRATE_URIS}"
|
||||||
S="${WORKDIR}/${PN}-${EGIT_VERSION}"
|
S="${WORKDIR}/${PN}-${EGIT_VERSION}"
|
||||||
|
|||||||
@ -0,0 +1,45 @@
|
|||||||
|
https://bugs.gentoo.org/970713
|
||||||
|
|
||||||
|
From e359bdc261f9493d91b3cf792fe4fc480ecd6dc3 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Kerin Millar <kfm@plushkava.net>
|
||||||
|
Date: Thu, 13 Nov 2025 18:39:28 +0000
|
||||||
|
Subject: [PATCH] jobs.c: only call bgp_delete on a newly-created pid if
|
||||||
|
asynchronous
|
||||||
|
|
||||||
|
This is a backport of the following change from the devel branch.
|
||||||
|
|
||||||
|
jobs.c
|
||||||
|
- make_child: only call bgp_delete on a newly-created pid if that
|
||||||
|
process is asynchronous, since that is what will cause it to be
|
||||||
|
put into the bgpids table. This mostly matters for procsubs and
|
||||||
|
asynchronous jobs, but will happen for comsubs in async jobs
|
||||||
|
and coprocs as well.
|
||||||
|
|
||||||
|
Bug: https://bugs.gentoo.org/965423
|
||||||
|
Signed-off-by: Kerin Millar <kfm@plushkava.net>
|
||||||
|
---
|
||||||
|
jobs.c | 8 +++++---
|
||||||
|
1 file changed, 5 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/jobs.c b/jobs.c
|
||||||
|
index cbcc2c15..bafa7c26 100644
|
||||||
|
--- a/jobs.c
|
||||||
|
+++ b/jobs.c
|
||||||
|
@@ -2482,9 +2482,11 @@ make_child (char *command, int flags)
|
||||||
|
been reused. */
|
||||||
|
delete_old_job (pid);
|
||||||
|
|
||||||
|
- /* Perform the check for pid reuse unconditionally. Some systems reuse
|
||||||
|
- PIDs before giving a process CHILD_MAX/_SC_CHILD_MAX unique ones. */
|
||||||
|
- bgp_delete (pid); /* new process, discard any saved status */
|
||||||
|
+ /* Perform the check for background pid reuse unconditionally.
|
||||||
|
+ Some systems reuse PIDs before giving a process
|
||||||
|
+ CHILD_MAX/_SC_CHILD_MAX unique ones. */
|
||||||
|
+ if (async_p)
|
||||||
|
+ bgp_delete (pid); /* new background process, discard any saved status */
|
||||||
|
|
||||||
|
last_made_pid = pid;
|
||||||
|
|
||||||
|
--
|
||||||
|
2.51.2
|
||||||
|
|
||||||
@ -128,7 +128,7 @@ cros_pre_pkg_setup_sysroot_build_bin_dir() {
|
|||||||
# and also remove their associated debug files to avoid wasting space.
|
# and also remove their associated debug files to avoid wasting space.
|
||||||
cros_post_pkg_preinst_rm_masked_debug_files() {
|
cros_post_pkg_preinst_rm_masked_debug_files() {
|
||||||
local link debug dir=${ED}/usr/lib/debug
|
local link debug dir=${ED}/usr/lib/debug
|
||||||
[[ -d ${dir}/.build-id ]] || return
|
[[ -d ${dir}/.build-id ]] || return 0
|
||||||
while read -d $'\n' -r link; do
|
while read -d $'\n' -r link; do
|
||||||
debug=$(realpath "${link}.debug") || die
|
debug=$(realpath "${link}.debug") || die
|
||||||
rm -f -- "${link}" "${link}.debug" "${debug}" || die
|
rm -f -- "${link}" "${link}.debug" "${debug}" || die
|
||||||
|
|||||||
@ -94,7 +94,7 @@ pkg_preinst() {
|
|||||||
libdirs=$(get_all_libdirs)
|
libdirs=$(get_all_libdirs)
|
||||||
emake -C "${ED}/usr/share/${PN}" DESTDIR="${EROOT}" LIBDIRS="${libdirs}" layout
|
emake -C "${ED}/usr/share/${PN}" DESTDIR="${EROOT}" LIBDIRS="${libdirs}" layout
|
||||||
SYSTEMD_JOURNAL_GID=${ACCT_GROUP_SYSTEMD_JOURNAL_ID:-190} ROOT_UID=0 ROOT_GID=0 CORE_UID=500 CORE_GID=500 \
|
SYSTEMD_JOURNAL_GID=${ACCT_GROUP_SYSTEMD_JOURNAL_ID:-190} ROOT_UID=0 ROOT_GID=0 CORE_UID=500 CORE_GID=500 \
|
||||||
DESTDIR=${D} "${ED}/usr/share/${PN}/dumb-tmpfiles-proc.sh" "${ED}/usr/lib/tmpfiles.d" || die
|
DESTDIR=${ROOT} "${ED}/usr/share/${PN}/dumb-tmpfiles-proc.sh" --exclude CZL+ "${ED}/usr/lib/tmpfiles.d" || die
|
||||||
rm -f "${ED}/usr/share/${PN}/Makefile" "${ED}/usr/share/${PN}/dumb-tmpfiles-proc.sh" || die
|
rm -f "${ED}/usr/share/${PN}/Makefile" "${ED}/usr/share/${PN}/dumb-tmpfiles-proc.sh" || die
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -54,7 +54,7 @@ src_compile() {
|
|||||||
fi
|
fi
|
||||||
emake_args+=( VENDOR_CERT_FILE="${SHIM_SIGNING_CERTIFICATE}" )
|
emake_args+=( VENDOR_CERT_FILE="${SHIM_SIGNING_CERTIFICATE}" )
|
||||||
else
|
else
|
||||||
emake_args+=( VENDOR_CERT_FILE="/usr/share/sb_keys/shim.der" )
|
emake_args+=( VENDOR_CERT_FILE="${SHIM_SIGNING_CERTIFICATE:-/usr/share/sb_keys/shim.der}" )
|
||||||
fi
|
fi
|
||||||
emake "${emake_args[@]}" || die
|
emake "${emake_args[@]}" || die
|
||||||
}
|
}
|
||||||
|
|||||||
@ -1 +1 @@
|
|||||||
DIST linux-firmware-20260309.tar.xz 610973936 BLAKE2B 62ec056ad09d3e6740b12454845ffeea250785b566f9c6239ebae19e52d3237a49eeb18bae3726cb7a1bb0bca7ad24b9bbac440132ba8fac3d0adccf654ab4c4 SHA512 2feb9f1221d72e909e36b1d56f50c8f4f20eb00dfcbbb1fa0e9661d0f4cc1a731ef9d8167e1dbe3edd637be9fcc20a3844dae44e05826bd441f77d6b44614e53
|
DIST linux-firmware-20260410.tar.xz 619615856 BLAKE2B c35531a94841d733690dbfd1e08c6be6c24124a20eac1c75b290820839e962773640a33b29c29376137d55be95d8e5304a86425e2a631b1a0dcc62d45a5d1f6d SHA512 b16c603e058cb1a92cf199c95318adc6dee874920bee377b7c95ca8cc8dabd26d53a97f3aef52c01fde8d186352895e909483fa7c729c8793b9974ccc130a4a6
|
||||||
|
|||||||
@ -169,12 +169,12 @@ CONFIG_DM_UEVENT=y
|
|||||||
CONFIG_DM_VERITY=m
|
CONFIG_DM_VERITY=m
|
||||||
CONFIG_DM_ZERO=m
|
CONFIG_DM_ZERO=m
|
||||||
CONFIG_DNS_RESOLVER=y
|
CONFIG_DNS_RESOLVER=y
|
||||||
CONFIG_DRM=m
|
CONFIG_DRM=y
|
||||||
CONFIG_DRM_FBDEV_EMULATION=y
|
CONFIG_DRM_FBDEV_EMULATION=y
|
||||||
CONFIG_DRM_QXL=m
|
CONFIG_DRM_QXL=m
|
||||||
CONFIG_DRM_SIMPLEDRM=m
|
CONFIG_DRM_SIMPLEDRM=m
|
||||||
CONFIG_DRM_TTM_HELPER=m
|
CONFIG_DRM_TTM_HELPER=m
|
||||||
CONFIG_DRM_VIRTIO_GPU=m
|
CONFIG_DRM_VIRTIO_GPU=y
|
||||||
CONFIG_DST_CACHE=y
|
CONFIG_DST_CACHE=y
|
||||||
CONFIG_DUMMY=m
|
CONFIG_DUMMY=m
|
||||||
CONFIG_DYNAMIC_DEBUG=y
|
CONFIG_DYNAMIC_DEBUG=y
|
||||||
@ -1009,7 +1009,7 @@ CONFIG_VIA_RHINE=m
|
|||||||
CONFIG_VIA_RHINE_MMIO=y
|
CONFIG_VIA_RHINE_MMIO=y
|
||||||
CONFIG_VIRTIO_BALLOON=m
|
CONFIG_VIRTIO_BALLOON=m
|
||||||
CONFIG_VIRTIO_BLK=m
|
CONFIG_VIRTIO_BLK=m
|
||||||
CONFIG_VIRTIO_CONSOLE=m
|
CONFIG_VIRTIO_CONSOLE=y
|
||||||
CONFIG_VIRTIO_FS=m
|
CONFIG_VIRTIO_FS=m
|
||||||
CONFIG_VIRTIO_INPUT=m
|
CONFIG_VIRTIO_INPUT=m
|
||||||
CONFIG_VIRTIO_MMIO=y
|
CONFIG_VIRTIO_MMIO=y
|
||||||
|
|||||||
@ -1,2 +1,2 @@
|
|||||||
DIST linux-6.12.tar.xz 147906904 BLAKE2B b2ec2fc69218cacabbbe49f78384a5d259ca581b717617c12b000b16f4a4c59ee348ea886b37147f5f70fb9a7a01c1e2c8f19021078f6b23f5bc62d1c48d5e5e SHA512 a37b1823df7b4f72542f689b65882634740ba0401a42fdcf6601d9efd2e132e5a7650e70450ba76f6cd1f13ca31180f2ccee9d54fe4df89bc0000ade4380a548
|
DIST linux-6.12.tar.xz 147906904 BLAKE2B b2ec2fc69218cacabbbe49f78384a5d259ca581b717617c12b000b16f4a4c59ee348ea886b37147f5f70fb9a7a01c1e2c8f19021078f6b23f5bc62d1c48d5e5e SHA512 a37b1823df7b4f72542f689b65882634740ba0401a42fdcf6601d9efd2e132e5a7650e70450ba76f6cd1f13ca31180f2ccee9d54fe4df89bc0000ade4380a548
|
||||||
DIST patch-6.12.81.xz 4327232 BLAKE2B eb81e142bc7825061ae43efb062248f88868346bc6d449de0fd524b419ab1f5d524e9042390778971321229035c0f4dc5b481101bb2aa2f47512975e5ff5c790 SHA512 fbd813a24adeb4892079bae49b13c46acb7bb234f19a996de00b7ac2d95ca382d0e56195e393c1bd0a09051f1e36301e972924bd1fba2848e62c5d531d092b3d
|
DIST patch-6.12.85.xz 4377956 BLAKE2B a4ce6472229c01003884ece108f60f2e9458d7fae38ebc47e7b598e1245e7a396fbc01aca3a7d310825b1f39acbe588b6865311d3ac7b4f48d2f404a728c942e SHA512 6b7c0c220ca26b900462b21641f8615f7c84dc25cc79527c8d32e9ac5742bb89851d30a69e1f1b1bfdb5bd353153c31ae523538eca1cead8cc12261a47f4a18b
|
||||||
|
|||||||
@ -1,24 +1,24 @@
|
|||||||
-----BEGIN PGP SIGNED MESSAGE-----
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||||||
Hash: SHA512
|
Hash: SHA512
|
||||||
|
|
||||||
MANIFEST Manifest.files.gz 606986 BLAKE2B a1a7c8f65fa2d227109ddc598ecd792925cbf4dd59fd721d0e3d30d2ca2d680abe6f48efd8c7f747286a8b9b83dd77ab08effbd12fd5cff7aea22ff05b4b3249 SHA512 1d46d342b6898d53ef6e234a4ca25659b7a64373067f8d911b4a7efe73a227178e519cb54901fc15172d8a4113aeafaf14390ce5e552d1e17e50d3297a8f0701
|
MANIFEST Manifest.files.gz 607306 BLAKE2B 92017b6799c6b9c6711d15259ccc5be7553c29a3562d24a367c7d7fa515cce981f1217aad923c07afa53479c855092c79ea478c7db5c27df5970742f0481eaaf SHA512 4fb6dcd2062715f4926aa685e41323a46d1b1f83e7be9008f32bd997a354c2cf495d9a497cf42a39b59bc734dabbeb4a8cb987031227e5f6741d4c6fc3ec95bf
|
||||||
TIMESTAMP 2026-04-01T07:08:01Z
|
TIMESTAMP 2026-05-01T07:08:09Z
|
||||||
-----BEGIN PGP SIGNATURE-----
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
|
||||||
iQKvBAEBCgCZFiEE4dartjv8+0ugL98c7FkO6skYklAFAmnMxFEbFIAAAAAABAAO
|
iQKvBAEBCgCZFiEE4dartjv8+0ugL98c7FkO6skYklAFAmn0UVkbFIAAAAAABAAO
|
||||||
bWFudTIsMi41KzEuMTEsMiwyXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25z
|
bWFudTIsMi41KzEuMTEsMiwyXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25z
|
||||||
Lm9wZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRFMUQ2QUJCNjNCRkNGQjRCQTAyRkRG
|
Lm9wZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRFMUQ2QUJCNjNCRkNGQjRCQTAyRkRG
|
||||||
MUNFQzU5MEVFQUM5MTg5MjUwAAoJEOxZDurJGJJQCCMQAJqLP7jt/MtqrWUu66/N
|
MUNFQzU5MEVFQUM5MTg5MjUwAAoJEOxZDurJGJJQehAQAIbfYrOfZXXVM5NCsVSH
|
||||||
g4C4QYQY65p5tHkq6lFs/X24MeAtuRUgKbaOQm02KZJNb61bvZBdgtNE8P14qWJX
|
s9QR1OC6QdiSTci3jmOmSqRzMQtIEq0MpOmuFYtJuoCZcGuE8jKpSyx12PArZRYW
|
||||||
LtJ8hqYOJiDT3hDhnL5Z+UbjIxDdn6m2udztvXvdkgRiQEUnhaTv8BpeOwvdGnZ4
|
abGU7C+hGt6qF73p47FewiTLHQv3kBEKV8H/sJCuFv6aoOqczSxFnpJiIDP2Cr2O
|
||||||
nswP+jJ5hMK4tYuMFy96jO39jKAbKo4HNYQCW8CJe4/HRSboXe20Z+N74xqq5M2e
|
5oQtnpvS06Yu+GcRzkwiKQ05UP4yprfoFk7Y7RlaTniVoSNdXwTEVF33CuJNQyT8
|
||||||
aajm7K7adRALxIYM2Ih3V64LfVsPn31TzMfXaFk0y4p3f82uZ/hTophDZIdePR0M
|
7mD68mxYAlL71M56yE7a6AZPMd+QpqJf+mqpGBMAO3A9J0UHdYTnQG4RZZsgLvvy
|
||||||
a1hkcQRPdHOmbVftt3llye5XoSmq0d+Pie7axQUJVwlFd+gORzNqvK3U+9PeeKjB
|
Zg0hSafEedVmokw5Iw8QqGdBHscCoL2H5I+0rPhjwHto9MrD5lmFYWh10xi3ncGW
|
||||||
FU6wU1vmR2mlIE90prbdDKPkoNhOnn9CVLHRHYl0M8WLh4TATrDl0HcUbEOrE/CC
|
EV7YKfY7nzr2UdPWyingtMcHXgUz4oo1rNHSfBJ9bNizqxraJUFo4ZEC7xTHyeiB
|
||||||
vay9V4s+lABWZh2D/BToIrWUs0UMpWtt/5e5ZANrECj7T5ExWngHY7zCCDn1dySw
|
yjKPVOFXkr0njGso3O6Xo+KRyG5bfNWst3Bz5E6rxlGozwEZtvtfOHYrUe8vzQHp
|
||||||
Poabc3KIQlBzmstxNBqTUIvxdaxhvF+Hh7Fj4Grzzmsgio76mBhQLUF2ML8vquVe
|
LNmczBy8M13dMC6DIYtalp9Gdi9K8Si+bFCepe9Ux92DFDcaymT3WyJauva+3NT/
|
||||||
ipeNd0fnGIWUN6eGdC6BZ73wVC66r53bSjHPMa+N6KyCgmHbGP/HCE0GuUvnKtBc
|
g76MRRW9Ez/p7h1J0wRYF0GLLaYC7l7kr4pavUHu8VvP0SS/fQanCmIpnPYUUqwe
|
||||||
joBONGhatuZEM3zLIMLLxHg4cMYVEF2vA19Mh89OhYQDlIbEf5Bc/LpPYOtN3LdD
|
/rzIzuZGtU1lW0ynXlGiosxh3zIQgw7WthjlsQTWH3XiRu02ZKrkCDY56ZDmmGl0
|
||||||
vHcXTmn2vbBiAIieKmqm6Elk
|
INhWuascPpUN8zEuK0URt1zS
|
||||||
=iTBC
|
=xCZR
|
||||||
-----END PGP SIGNATURE-----
|
-----END PGP SIGNATURE-----
|
||||||
|
|||||||
Binary file not shown.
43
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202604-03.xml
vendored
Normal file
43
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202604-03.xml
vendored
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||||
|
<glsa id="202604-03">
|
||||||
|
<title>FUSE: Multiple Vulnerabilities</title>
|
||||||
|
<synopsis>Multiple vulnerabilities have been found in FUSE, the worst of which can lead to code execution.</synopsis>
|
||||||
|
<product type="ebuild">fuse</product>
|
||||||
|
<announced>2026-04-17</announced>
|
||||||
|
<revised count="1">2026-04-17</revised>
|
||||||
|
<bug>971552</bug>
|
||||||
|
<access>remote</access>
|
||||||
|
<affected>
|
||||||
|
<package name="sys-fs/fuse" auto="yes" arch="*">
|
||||||
|
<unaffected range="ge" slot="3">3.18.1</unaffected>
|
||||||
|
<vulnerable range="lt" slot="3">3.18.1</vulnerable>
|
||||||
|
</package>
|
||||||
|
</affected>
|
||||||
|
<background>
|
||||||
|
<p>FUSE (Filesystem in Userspace) is an interface for userspace programs to export a filesystem to the Linux kernel.</p>
|
||||||
|
</background>
|
||||||
|
<description>
|
||||||
|
<p>The following vulnerabilities have been discovered in FUSE: a NULL pointer dereference (when running with the NUMA architecture) and a use-after-free. The worst of which can lead to code execution. Please review the CVE identifiers referenced below for details.</p>
|
||||||
|
</description>
|
||||||
|
<impact type="normal">
|
||||||
|
<p>The following is a possible outcome: denial of service (crash) and potential code execution.</p>
|
||||||
|
</impact>
|
||||||
|
<workaround>
|
||||||
|
<p>There is no known workaround at this time.</p>
|
||||||
|
</workaround>
|
||||||
|
<resolution>
|
||||||
|
<p>All FUSE users should upgrade to the latest version:</p>
|
||||||
|
|
||||||
|
<code>
|
||||||
|
# emerge --sync
|
||||||
|
# emerge --ask --oneshot --verbose ">=sys-fs/fuse-3.18.1:3"
|
||||||
|
</code>
|
||||||
|
</resolution>
|
||||||
|
<references>
|
||||||
|
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2026-33150">CVE-2026-33150</uri>
|
||||||
|
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2026-33179">CVE-2026-33179</uri>
|
||||||
|
</references>
|
||||||
|
<metadata tag="requester" timestamp="2026-04-17T19:33:25.077082Z">csfore</metadata>
|
||||||
|
<metadata tag="submitter" timestamp="2026-04-17T19:33:25.079638Z">csfore</metadata>
|
||||||
|
</glsa>
|
||||||
42
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202604-04.xml
vendored
Normal file
42
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202604-04.xml
vendored
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||||
|
<glsa id="202604-04">
|
||||||
|
<title>DTrace: Arbitrary file creation via dtprobed</title>
|
||||||
|
<synopsis>A DTrace component, dtprobed, allows arbitrary file creation through crafted USDT provider names.</synopsis>
|
||||||
|
<product type="ebuild">dtrace</product>
|
||||||
|
<announced>2026-04-17</announced>
|
||||||
|
<revised count="1">2026-04-17</revised>
|
||||||
|
<bug>971491</bug>
|
||||||
|
<access>local</access>
|
||||||
|
<affected>
|
||||||
|
<package name="dev-debug/dtrace" auto="yes" arch="*">
|
||||||
|
<unaffected range="ge">2.0.6</unaffected>
|
||||||
|
<vulnerable range="lt">2.0.6</vulnerable>
|
||||||
|
</package>
|
||||||
|
</affected>
|
||||||
|
<background>
|
||||||
|
<p>DTrace is a dynamic tracing tool for analysing or debugging the whole system. Specifically, dtprobed is a component of the DTrace system that keeps track of USDT probes within running processes, parsing and storing the DOF they provide for later consumption by dtrace proper.</p>
|
||||||
|
</background>
|
||||||
|
<description>
|
||||||
|
<p>A vulnerability has been found in dtprobed that allows for arbitrary file creation through specially crafted USDT provider names.</p>
|
||||||
|
</description>
|
||||||
|
<impact type="normal">
|
||||||
|
<p>The worst possible outcome is the ability for an attacker to run arbitrary code via the maliciously created file.</p>
|
||||||
|
</impact>
|
||||||
|
<workaround>
|
||||||
|
<p>There is no known workaround at this time.</p>
|
||||||
|
</workaround>
|
||||||
|
<resolution>
|
||||||
|
<p>All DTrace users should upgrade to the latest version:</p>
|
||||||
|
|
||||||
|
<code>
|
||||||
|
# emerge --sync
|
||||||
|
# emerge --ask --oneshot --verbose ">=dev-debug/dtrace-2.0.6"
|
||||||
|
</code>
|
||||||
|
</resolution>
|
||||||
|
<references>
|
||||||
|
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2026-21991">CVE-2026-21991</uri>
|
||||||
|
</references>
|
||||||
|
<metadata tag="requester" timestamp="2026-04-17T20:47:15.308512Z">csfore</metadata>
|
||||||
|
<metadata tag="submitter" timestamp="2026-04-17T20:47:15.311877Z">csfore</metadata>
|
||||||
|
</glsa>
|
||||||
@ -1 +1 @@
|
|||||||
Wed, 01 Apr 2026 07:08:00 +0000
|
Fri, 01 May 2026 07:08:08 +0000
|
||||||
|
|||||||
@ -1 +1 @@
|
|||||||
d2078931cc4cb1c6d04130dacbed885a7d2bf71c 1773030064 2026-03-09T04:21:04Z
|
f40d2fdd24a34342a4c050396f064a038ebebb9b 1776459195 2026-04-17T20:53:15Z
|
||||||
|
|||||||
@ -17,11 +17,6 @@ RUN if ! grep -q portage /etc/passwd; then \
|
|||||||
echo "portage:x:250:250:portage:/var/tmp/portage:/bin/false" >>/etc/passwd; \
|
echo "portage:x:250:250:portage:/var/tmp/portage:/bin/false" >>/etc/passwd; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# fix "Unable to unshare: EPERM ..." in containers
|
|
||||||
# (see https://github.com/gentoo/gentoo-docker-images/issues/81)
|
|
||||||
RUN echo 'export FEATURES="-ipc-sandbox -network-sandbox -pid-sandbox"' \
|
|
||||||
>> /etc/skel/.bashrc
|
|
||||||
|
|
||||||
RUN groupadd sdk
|
RUN groupadd sdk
|
||||||
RUN useradd -g sdk -G portage sdk
|
RUN useradd -g sdk -G portage sdk
|
||||||
RUN echo "sdk ALL=(ALL) NOPASSWD: ALL" > /etc/sudoers.d/sdk-user
|
RUN echo "sdk ALL=(ALL) NOPASSWD: ALL" > /etc/sudoers.d/sdk-user
|
||||||
|
|||||||
@ -4,22 +4,13 @@ FROM ${BASE}
|
|||||||
COPY --chown=sdk:sdk sdk_container/ /mnt/host/source
|
COPY --chown=sdk:sdk sdk_container/ /mnt/host/source
|
||||||
COPY --chown=sdk:sdk . /mnt/host/source/src/scripts
|
COPY --chown=sdk:sdk . /mnt/host/source/src/scripts
|
||||||
|
|
||||||
# Disable all sandboxing for SDK updates since some core packages
|
|
||||||
# (like GO) fail to build from a permission error otherwise.
|
|
||||||
RUN cp /home/sdk/.bashrc /home/sdk/.bashrc.bak
|
|
||||||
RUN echo 'export FEATURES="-sandbox -usersandbox -ipc-sandbox -network-sandbox -pid-sandbox"' \
|
|
||||||
>> /home/sdk/.bashrc
|
|
||||||
|
|
||||||
RUN chown sdk:sdk /mnt/host/source
|
RUN chown sdk:sdk /mnt/host/source
|
||||||
RUN /home/sdk/sdk_entry.sh ./update_chroot --toolchain_boards="amd64-usr arm64-usr"
|
RUN FEATURES="-ipc-sandbox -network-sandbox -pid-sandbox" \
|
||||||
|
/home/sdk/sdk_entry.sh ./update_chroot --toolchain_boards="amd64-usr arm64-usr"
|
||||||
|
|
||||||
RUN /home/sdk/sdk_entry.sh ./setup_board --board="arm64-usr" --regen_configs
|
RUN /home/sdk/sdk_entry.sh ./setup_board --board="arm64-usr" --regen_configs
|
||||||
RUN /home/sdk/sdk_entry.sh ./setup_board --board="amd64-usr" --regen_configs
|
RUN /home/sdk/sdk_entry.sh ./setup_board --board="amd64-usr" --regen_configs
|
||||||
|
|
||||||
# Restore original .bashrc to remove sandbox disablement
|
|
||||||
RUN mv /home/sdk/.bashrc.bak /home/sdk/.bashrc
|
|
||||||
RUN chown sdk:sdk /home/sdk/.bashrc
|
|
||||||
|
|
||||||
# Clean up ephemeral key directory variables that were added during build
|
# Clean up ephemeral key directory variables that were added during build
|
||||||
RUN sed -i -e '/export MODULE_SIGNING_KEY_DIR=/d' \
|
RUN sed -i -e '/export MODULE_SIGNING_KEY_DIR=/d' \
|
||||||
-e '/export MODULES_SIGN_KEY=/d' \
|
-e '/export MODULES_SIGN_KEY=/d' \
|
||||||
|
|||||||
@ -41,6 +41,11 @@ docker=${docker_a[*]}
|
|||||||
function call_docker() {
|
function call_docker() {
|
||||||
"${docker_a[@]}" "${@}"
|
"${docker_a[@]}" "${@}"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function docker_build() {
|
||||||
|
PROGRESS_NO_TRUNC=1 call_docker build --progress plain "${@}"
|
||||||
|
}
|
||||||
|
|
||||||
# --
|
# --
|
||||||
|
|
||||||
# Common "echo" function
|
# Common "echo" function
|
||||||
@ -213,6 +218,9 @@ function setup_sdk_env() {
|
|||||||
\
|
\
|
||||||
USE FEATURES PORTAGE_USERNAME FORCE_STAGES \
|
USE FEATURES PORTAGE_USERNAME FORCE_STAGES \
|
||||||
SIGNER \
|
SIGNER \
|
||||||
|
SBSIGN_KEY SBSIGN_CERT SBSIGN_DB_KEY SBSIGN_DB_CERT \
|
||||||
|
SHIM_SIGNING_CERTIFICATE \
|
||||||
|
MODULE_SIGNING_KEY_DIR SYSEXT_SIGNING_KEY_DIR \
|
||||||
all_proxy ftp_proxy http_proxy https_proxy no_proxy; do
|
all_proxy ftp_proxy http_proxy https_proxy no_proxy; do
|
||||||
|
|
||||||
if [ -n "${!var:-}" ] ; then
|
if [ -n "${!var:-}" ] ; then
|
||||||
@ -300,6 +308,7 @@ function gnupg_ssh_gcloud_mount_opts() {
|
|||||||
if [[ -e ${GOOGLE_APPLICATION_CREDENTIALS:-} ]] ; then
|
if [[ -e ${GOOGLE_APPLICATION_CREDENTIALS:-} ]] ; then
|
||||||
creds_dir=$(dirname "${GOOGLE_APPLICATION_CREDENTIALS}")
|
creds_dir=$(dirname "${GOOGLE_APPLICATION_CREDENTIALS}")
|
||||||
if [[ -d ${creds_dir} ]] ; then
|
if [[ -d ${creds_dir} ]] ; then
|
||||||
|
echo "Mounting gcloud credentials from ${creds_dir} (used for artifact uploads, safe to ignore if not needed, not baked into any image)"
|
||||||
echo "-v $creds_dir:$creds_dir"
|
echo "-v $creds_dir:$creds_dir"
|
||||||
args_ref+=( -v "${creds_dir}:${creds_dir}" )
|
args_ref+=( -v "${creds_dir}:${creds_dir}" )
|
||||||
fi
|
fi
|
||||||
|
|||||||
@ -72,10 +72,14 @@ fi
|
|||||||
|
|
||||||
# Create key directory if not already configured in .bashrc
|
# Create key directory if not already configured in .bashrc
|
||||||
if ! grep -q 'export MODULE_SIGNING_KEY_DIR=' /home/sdk/.bashrc; then
|
if ! grep -q 'export MODULE_SIGNING_KEY_DIR=' /home/sdk/.bashrc; then
|
||||||
# For official builds, use ephemeral keys. For unofficial builds, use persistent directory
|
if [[ -n ${MODULE_SIGNING_KEY_DIR:-} ]]; then
|
||||||
if [[ ${COREOS_OFFICIAL:-0} -eq 1 ]]; then
|
# Pre-set via environment (e.g. .sdkenv) — use as-is
|
||||||
|
:
|
||||||
|
elif [[ ${COREOS_OFFICIAL:-0} -eq 1 ]]; then
|
||||||
|
# For official builds, use ephemeral keys
|
||||||
MODULE_SIGNING_KEY_DIR=$(su sdk -c "mktemp -d")
|
MODULE_SIGNING_KEY_DIR=$(su sdk -c "mktemp -d")
|
||||||
else
|
else
|
||||||
|
# For unofficial builds, use persistent directory
|
||||||
MODULE_SIGNING_KEY_DIR="/home/sdk/.module-signing-keys"
|
MODULE_SIGNING_KEY_DIR="/home/sdk/.module-signing-keys"
|
||||||
su sdk -c "mkdir -p ${MODULE_SIGNING_KEY_DIR@Q}"
|
su sdk -c "mkdir -p ${MODULE_SIGNING_KEY_DIR@Q}"
|
||||||
fi
|
fi
|
||||||
@ -97,7 +101,10 @@ if grep -q 'export SYSEXT_SIGNING_KEY_DIR' /home/sdk/.bashrc; then
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
grep -q 'export SYSEXT_SIGNING_KEY_DIR' /home/sdk/.bashrc || {
|
grep -q 'export SYSEXT_SIGNING_KEY_DIR' /home/sdk/.bashrc || {
|
||||||
if [[ ${COREOS_OFFICIAL:-0} -eq 1 ]]; then
|
if [[ -n ${SYSEXT_SIGNING_KEY_DIR:-} ]]; then
|
||||||
|
# Pre-set via environment (e.g. .sdkenv) — use as-is
|
||||||
|
:
|
||||||
|
elif [[ ${COREOS_OFFICIAL:-0} -eq 1 ]]; then
|
||||||
SYSEXT_SIGNING_KEY_DIR=$(su sdk -c "mktemp -d")
|
SYSEXT_SIGNING_KEY_DIR=$(su sdk -c "mktemp -d")
|
||||||
else
|
else
|
||||||
SYSEXT_SIGNING_KEY_DIR="/home/sdk/.sysext-signing-keys"
|
SYSEXT_SIGNING_KEY_DIR="/home/sdk/.sysext-signing-keys"
|
||||||
|
|||||||
@ -75,7 +75,8 @@ fi
|
|||||||
yell "Creating new SDK container image ${new_sdk_version} from ${base_sdk_version}"
|
yell "Creating new SDK container image ${new_sdk_version} from ${base_sdk_version}"
|
||||||
create_versionfile "${new_sdk_version}" "${os_version}"
|
create_versionfile "${new_sdk_version}" "${os_version}"
|
||||||
|
|
||||||
$docker build -t "${sdk_build_image}" \
|
docker_build \
|
||||||
|
-t "${sdk_build_image}" \
|
||||||
--build-arg BASE="$sdk_container_common_registry/flatcar-sdk-all:${base_sdk_version}" \
|
--build-arg BASE="$sdk_container_common_registry/flatcar-sdk-all:${base_sdk_version}" \
|
||||||
-f sdk_lib/Dockerfile.sdk-update \
|
-f sdk_lib/Dockerfile.sdk-update \
|
||||||
.
|
.
|
||||||
@ -87,7 +88,7 @@ for a in all arm64 amd64; do
|
|||||||
arm64) rmarch="amd64-usr"; rmcross="x86_64-cros-linux-gnu";;
|
arm64) rmarch="amd64-usr"; rmcross="x86_64-cros-linux-gnu";;
|
||||||
amd64) rmarch="arm64-usr"; rmcross="aarch64-cros-linux-gnu";;
|
amd64) rmarch="arm64-usr"; rmcross="aarch64-cros-linux-gnu";;
|
||||||
esac
|
esac
|
||||||
$docker build -t "$sdk_container_common_registry/flatcar-sdk-${a}:${docker_vernum}" \
|
docker_build -t "$sdk_container_common_registry/flatcar-sdk-${a}:${docker_vernum}" \
|
||||||
--build-arg VERSION="${docker_vernum}" \
|
--build-arg VERSION="${docker_vernum}" \
|
||||||
--build-arg RMARCH="${rmarch}" \
|
--build-arg RMARCH="${rmarch}" \
|
||||||
--build-arg RMCROSS="${rmcross}" \
|
--build-arg RMCROSS="${rmcross}" \
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user