stage1: don't symlink /proc if in docker
When commit 5a0f1666 originally introduced docker support, it symlinked /proc to the containers' /proc. In a privileged container, this will result in stage1 unmounting the containers' /proc through the symlink, which is obviously not good.
Then, commit 87cdebbc finally provided a fix for this by deleting the symlink and recreating the /proc directory. Related merge requests are !26 and !27 (closed) (which would both be closed by this).
This broke reproducibility in debuerreotype when changing from debootstrap 1.0.123 to 1.0.126, because /proc has a different timestamp. Previously, the symlink got replaced when extracting base-files (which makes the whole symlink thing questionable), now it just already exists.
Anyway, we got a special case for docker that works around a special case for docker. We can just remove both.