Description
I was exploring Azure Linux from a bootstrappability standpoint, specifically, building it on top of live-bootstrap without additional external binary dependencies. (Conflict-of-interest disclaimer: I'm one of live-bootstrap's developers.)
The way Azure Linux is built comes very close to achieving this, using a Linux From Scratch-based strategy for creating the initial "raw" toolchain - very similar to what was done to bootstrap Gentoo previously. Unfortunately, this is all defeated by the use of a prebuilt Azure Linux Docker image to wrap the LFS environment, creating precisely the kind of circular dependency (and potential Trusting Trust attack vector) that bootstrapping from source is meant to avoid.
As far as I explored, beyond this initial step, all further steps rely only on binaries built in the previous steps, without pulling in further precompiled binaries. Therefore, having a NO_TOOLCHAIN_CONTAINER=y option to disable containerization of the raw toolchain build would enable propagating trust from a bootstrapping environment to the Azure Linux toolchain, and eventually the whole distribution.