aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2018-08-21 08:39:23 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2018-08-21 08:39:23 -0400
commitb185faae4d0fc17ab362ff5974313c223757a218 (patch)
tree8bfde3d366e2aab271f77cf5e4e369d100521450
parenttesting (diff)
downloadfirejail-b185faae4d0fc17ab362ff5974313c223757a218.tar.gz
firejail-b185faae4d0fc17ab362ff5974313c223757a218.tar.zst
firejail-b185faae4d0fc17ab362ff5974313c223757a218.zip
autoconf
-rwxr-xr-xconfigure68
-rw-r--r--configure.ac36
-rw-r--r--src/common.mk.in6
3 files changed, 1 insertions, 109 deletions
diff --git a/configure b/configure
index 0dfed3876..b15f649df 100755
--- a/configure
+++ b/configure
@@ -631,15 +631,11 @@ HAVE_FATAL_WARNINGS
631HAVE_SUID 631HAVE_SUID
632HAVE_WHITELIST 632HAVE_WHITELIST
633HAVE_FILE_TRANSFER 633HAVE_FILE_TRANSFER
634HAVE_X11
635HAVE_USERNS 634HAVE_USERNS
636HAVE_NETWORK 635HAVE_NETWORK
637HAVE_GLOBALCFG 636HAVE_GLOBALCFG
638HAVE_BIND 637HAVE_BIND
639HAVE_CHROOT
640HAVE_SECCOMP 638HAVE_SECCOMP
641HAVE_PRIVATE_HOME
642HAVE_OVERLAYFS
643EXTRA_LDFLAGS 639EXTRA_LDFLAGS
644EGREP 640EGREP
645GREP 641GREP
@@ -700,15 +696,11 @@ ac_subst_files=''
700ac_user_opts=' 696ac_user_opts='
701enable_option_checking 697enable_option_checking
702enable_apparmor 698enable_apparmor
703enable_overlayfs
704enable_private_home
705enable_seccomp 699enable_seccomp
706enable_chroot
707enable_bind 700enable_bind
708enable_globalcfg 701enable_globalcfg
709enable_network 702enable_network
710enable_userns 703enable_userns
711enable_x11
712enable_file_transfer 704enable_file_transfer
713enable_whitelist 705enable_whitelist
714enable_suid 706enable_suid
@@ -1346,16 +1338,12 @@ Optional Features:
1346 --disable-FEATURE do not include FEATURE (same as --enable-FEATURE=no) 1338 --disable-FEATURE do not include FEATURE (same as --enable-FEATURE=no)
1347 --enable-FEATURE[=ARG] include FEATURE [ARG=yes] 1339 --enable-FEATURE[=ARG] include FEATURE [ARG=yes]
1348 --enable-apparmor enable apparmor 1340 --enable-apparmor enable apparmor
1349 --disable-overlayfs disable overlayfs
1350 --disable-private-home disable private home feature
1351 --disable-seccomp disable seccomp 1341 --disable-seccomp disable seccomp
1352 --disable-chroot disable chroot
1353 --disable-bind disable bind 1342 --disable-bind disable bind
1354 --disable-globalcfg if the global config file firejail.cfg is not 1343 --disable-globalcfg if the global config file firejail.cfg is not
1355 present, continue the program using defaults 1344 present, continue the program using defaults
1356 --disable-network disable network 1345 --disable-network disable network
1357 --disable-userns disable user namespace 1346 --disable-userns disable user namespace
1358 --disable-x11 disable X11 sandboxing support
1359 --disable-file-transfer disable file transfer 1347 --disable-file-transfer disable file transfer
1360 --disable-whitelist disable whitelist 1348 --disable-whitelist disable whitelist
1361 --disable-suid install as a non-SUID executable 1349 --disable-suid install as a non-SUID executable
@@ -3574,32 +3562,6 @@ if test "x$enable_apparmor" = "xyes"; then :
3574fi 3562fi
3575 3563
3576 3564
3577HAVE_OVERLAYFS=""
3578# Check whether --enable-overlayfs was given.
3579if test "${enable_overlayfs+set}" = set; then :
3580 enableval=$enable_overlayfs;
3581fi
3582
3583if test "x$enable_overlayfs" != "xno"; then :
3584
3585 HAVE_OVERLAYFS="-DHAVE_OVERLAYFS"
3586
3587
3588fi
3589
3590HAVE_PRIVATEHOME=""
3591# Check whether --enable-private-home was given.
3592if test "${enable_private_home+set}" = set; then :
3593 enableval=$enable_private_home;
3594fi
3595
3596if test "x$enable_private_home" != "xno"; then :
3597
3598 HAVE_PRIVATE_HOME="-DHAVE_PRIVATE_HOME"
3599
3600
3601fi
3602
3603HAVE_SECCOMP="" 3565HAVE_SECCOMP=""
3604# Check whether --enable-seccomp was given. 3566# Check whether --enable-seccomp was given.
3605if test "${enable_seccomp+set}" = set; then : 3567if test "${enable_seccomp+set}" = set; then :
@@ -3613,19 +3575,6 @@ if test "x$enable_seccomp" != "xno"; then :
3613 3575
3614fi 3576fi
3615 3577
3616HAVE_CHROOT=""
3617# Check whether --enable-chroot was given.
3618if test "${enable_chroot+set}" = set; then :
3619 enableval=$enable_chroot;
3620fi
3621
3622if test "x$enable_chroot" != "xno"; then :
3623
3624 HAVE_CHROOT="-DHAVE_CHROOT"
3625
3626
3627fi
3628
3629HAVE_BIND="" 3578HAVE_BIND=""
3630# Check whether --enable-bind was given. 3579# Check whether --enable-bind was given.
3631if test "${enable_bind+set}" = set; then : 3580if test "${enable_bind+set}" = set; then :
@@ -3678,19 +3627,6 @@ if test "x$enable_userns" != "xno"; then :
3678 3627
3679fi 3628fi
3680 3629
3681HAVE_X11=""
3682# Check whether --enable-x11 was given.
3683if test "${enable_x11+set}" = set; then :
3684 enableval=$enable_x11;
3685fi
3686
3687if test "x$enable_x11" != "xno"; then :
3688
3689 HAVE_X11="-DHAVE_X11"
3690
3691
3692fi
3693
3694HAVE_FILE_TRANSFER="" 3630HAVE_FILE_TRANSFER=""
3695# Check whether --enable-file-transfer was given. 3631# Check whether --enable-file-transfer was given.
3696if test "${enable_file_transfer+set}" = set; then : 3632if test "${enable_file_transfer+set}" = set; then :
@@ -5021,15 +4957,11 @@ echo " seccomp: $HAVE_SECCOMP"
5021echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" 4957echo " <linux/seccomp.h>: $HAVE_SECCOMP_H"
5022echo " apparmor: $HAVE_APPARMOR" 4958echo " apparmor: $HAVE_APPARMOR"
5023echo " global config: $HAVE_GLOBALCFG" 4959echo " global config: $HAVE_GLOBALCFG"
5024echo " chroot: $HAVE_CHROOT"
5025echo " bind: $HAVE_BIND" 4960echo " bind: $HAVE_BIND"
5026echo " network: $HAVE_NETWORK" 4961echo " network: $HAVE_NETWORK"
5027echo " user namespace: $HAVE_USERNS" 4962echo " user namespace: $HAVE_USERNS"
5028echo " X11 sandboxing support: $HAVE_X11"
5029echo " whitelisting: $HAVE_WHITELIST" 4963echo " whitelisting: $HAVE_WHITELIST"
5030echo " private home support: $HAVE_PRIVATE_HOME"
5031echo " file transfer support: $HAVE_FILE_TRANSFER" 4964echo " file transfer support: $HAVE_FILE_TRANSFER"
5032echo " overlayfs support: $HAVE_OVERLAYFS"
5033echo " busybox workaround: $BUSYBOX_WORKAROUND" 4965echo " busybox workaround: $BUSYBOX_WORKAROUND"
5034echo " Spectre compiler patch: $HAVE_SPECTRE" 4966echo " Spectre compiler patch: $HAVE_SPECTRE"
5035echo " EXTRA_LDFLAGS: $EXTRA_LDFLAGS" 4967echo " EXTRA_LDFLAGS: $EXTRA_LDFLAGS"
diff --git a/configure.ac b/configure.ac
index 6408609fd..0cd5c7dd0 100644
--- a/configure.ac
+++ b/configure.ac
@@ -55,22 +55,6 @@ AS_IF([test "x$enable_apparmor" = "xyes"], [
55]) 55])
56AC_SUBST([EXTRA_LDFLAGS]) 56AC_SUBST([EXTRA_LDFLAGS])
57 57
58HAVE_OVERLAYFS=""
59AC_ARG_ENABLE([overlayfs],
60 AS_HELP_STRING([--disable-overlayfs], [disable overlayfs]))
61AS_IF([test "x$enable_overlayfs" != "xno"], [
62 HAVE_OVERLAYFS="-DHAVE_OVERLAYFS"
63 AC_SUBST(HAVE_OVERLAYFS)
64])
65
66HAVE_PRIVATEHOME=""
67AC_ARG_ENABLE([private-home],
68 AS_HELP_STRING([--disable-private-home], [disable private home feature]))
69AS_IF([test "x$enable_private_home" != "xno"], [
70 HAVE_PRIVATE_HOME="-DHAVE_PRIVATE_HOME"
71 AC_SUBST(HAVE_PRIVATE_HOME)
72])
73
74HAVE_SECCOMP="" 58HAVE_SECCOMP=""
75AC_ARG_ENABLE([seccomp], 59AC_ARG_ENABLE([seccomp],
76 AS_HELP_STRING([--disable-seccomp], [disable seccomp])) 60 AS_HELP_STRING([--disable-seccomp], [disable seccomp]))
@@ -79,14 +63,6 @@ AS_IF([test "x$enable_seccomp" != "xno"], [
79 AC_SUBST(HAVE_SECCOMP) 63 AC_SUBST(HAVE_SECCOMP)
80]) 64])
81 65
82HAVE_CHROOT=""
83AC_ARG_ENABLE([chroot],
84 AS_HELP_STRING([--disable-chroot], [disable chroot]))
85AS_IF([test "x$enable_chroot" != "xno"], [
86 HAVE_CHROOT="-DHAVE_CHROOT"
87 AC_SUBST(HAVE_CHROOT)
88])
89
90HAVE_BIND="" 66HAVE_BIND=""
91AC_ARG_ENABLE([bind], 67AC_ARG_ENABLE([bind],
92 AS_HELP_STRING([--disable-bind], [disable bind])) 68 AS_HELP_STRING([--disable-bind], [disable bind]))
@@ -119,14 +95,6 @@ AS_IF([test "x$enable_userns" != "xno"], [
119 AC_SUBST(HAVE_USERNS) 95 AC_SUBST(HAVE_USERNS)
120]) 96])
121 97
122HAVE_X11=""
123AC_ARG_ENABLE([x11],
124 AS_HELP_STRING([--disable-x11], [disable X11 sandboxing support]))
125AS_IF([test "x$enable_x11" != "xno"], [
126 HAVE_X11="-DHAVE_X11"
127 AC_SUBST(HAVE_X11)
128])
129
130HAVE_FILE_TRANSFER="" 98HAVE_FILE_TRANSFER=""
131AC_ARG_ENABLE([file-transfer], 99AC_ARG_ENABLE([file-transfer],
132 AS_HELP_STRING([--disable-file-transfer], [disable file transfer])) 100 AS_HELP_STRING([--disable-file-transfer], [disable file transfer]))
@@ -201,15 +169,11 @@ echo " seccomp: $HAVE_SECCOMP"
201echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" 169echo " <linux/seccomp.h>: $HAVE_SECCOMP_H"
202echo " apparmor: $HAVE_APPARMOR" 170echo " apparmor: $HAVE_APPARMOR"
203echo " global config: $HAVE_GLOBALCFG" 171echo " global config: $HAVE_GLOBALCFG"
204echo " chroot: $HAVE_CHROOT"
205echo " bind: $HAVE_BIND" 172echo " bind: $HAVE_BIND"
206echo " network: $HAVE_NETWORK" 173echo " network: $HAVE_NETWORK"
207echo " user namespace: $HAVE_USERNS" 174echo " user namespace: $HAVE_USERNS"
208echo " X11 sandboxing support: $HAVE_X11"
209echo " whitelisting: $HAVE_WHITELIST" 175echo " whitelisting: $HAVE_WHITELIST"
210echo " private home support: $HAVE_PRIVATE_HOME"
211echo " file transfer support: $HAVE_FILE_TRANSFER" 176echo " file transfer support: $HAVE_FILE_TRANSFER"
212echo " overlayfs support: $HAVE_OVERLAYFS"
213echo " busybox workaround: $BUSYBOX_WORKAROUND" 177echo " busybox workaround: $BUSYBOX_WORKAROUND"
214echo " Spectre compiler patch: $HAVE_SPECTRE" 178echo " Spectre compiler patch: $HAVE_SPECTRE"
215echo " EXTRA_LDFLAGS: $EXTRA_LDFLAGS" 179echo " EXTRA_LDFLAGS: $EXTRA_LDFLAGS"
diff --git a/src/common.mk.in b/src/common.mk.in
index fd9f2e5a5..7440b7b45 100644
--- a/src/common.mk.in
+++ b/src/common.mk.in
@@ -10,18 +10,14 @@ VERSION=@PACKAGE_VERSION@
10NAME=@PACKAGE_NAME@ 10NAME=@PACKAGE_NAME@
11HAVE_SECCOMP_H=@HAVE_SECCOMP_H@ 11HAVE_SECCOMP_H=@HAVE_SECCOMP_H@
12HAVE_SECCOMP=@HAVE_SECCOMP@ 12HAVE_SECCOMP=@HAVE_SECCOMP@
13HAVE_CHROOT=@HAVE_CHROOT@
14HAVE_BIND=@HAVE_BIND@ 13HAVE_BIND=@HAVE_BIND@
15HAVE_FATAL_WARNINGS=@HAVE_FATAL_WARNINGS@ 14HAVE_FATAL_WARNINGS=@HAVE_FATAL_WARNINGS@
16HAVE_NETWORK=@HAVE_NETWORK@ 15HAVE_NETWORK=@HAVE_NETWORK@
17HAVE_USERNS=@HAVE_USERNS@ 16HAVE_USERNS=@HAVE_USERNS@
18HAVE_X11=@HAVE_X11@
19HAVE_FILE_TRANSFER=@HAVE_FILE_TRANSFER@ 17HAVE_FILE_TRANSFER=@HAVE_FILE_TRANSFER@
20HAVE_WHITELIST=@HAVE_WHITELIST@ 18HAVE_WHITELIST=@HAVE_WHITELIST@
21HAVE_GLOBALCFG=@HAVE_GLOBALCFG@ 19HAVE_GLOBALCFG=@HAVE_GLOBALCFG@
22HAVE_APPARMOR=@HAVE_APPARMOR@ 20HAVE_APPARMOR=@HAVE_APPARMOR@
23HAVE_OVERLAYFS=@HAVE_OVERLAYFS@
24HAVE_PRIVATE_HOME=@HAVE_PRIVATE_HOME@
25HAVE_GCOV=@HAVE_GCOV@ 21HAVE_GCOV=@HAVE_GCOV@
26 22
27H_FILE_LIST = $(sort $(wildcard *.[h])) 23H_FILE_LIST = $(sort $(wildcard *.[h]))
@@ -29,7 +25,7 @@ C_FILE_LIST = $(sort $(wildcard *.c))
29OBJS = $(C_FILE_LIST:.c=.o) 25OBJS = $(C_FILE_LIST:.c=.o)
30BINOBJS = $(foreach file, $(OBJS), $file) 26BINOBJS = $(foreach file, $(OBJS), $file)
31 27
32CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' $(HAVE_GCOV) -DPREFIX='"$(prefix)"' -DSYSCONFDIR='"$(sysconfdir)/firejail"' -DLIBDIR='"$(libdir)"' $(HAVE_X11) $(HAVE_PRIVATE_HOME) $(HAVE_APPARMOR) $(HAVE_OVERLAYFS) $(HAVE_SECCOMP) $(HAVE_GLOBALCFG) $(HAVE_SECCOMP_H) $(HAVE_CHROOT) $(HAVE_NETWORK) $(HAVE_USERNS) $(HAVE_BIND) $(HAVE_FILE_TRANSFER) $(HAVE_WHITELIST) -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -pie -Wformat -Wformat-security 28CFLAGS += -ggdb $(HAVE_FATAL_WARNINGS) -O2 -DVERSION='"$(VERSION)"' $(HAVE_GCOV) -DPREFIX='"$(prefix)"' -DSYSCONFDIR='"$(sysconfdir)/firejail"' -DLIBDIR='"$(libdir)"' $(HAVE_APPARMOR) $(HAVE_SECCOMP) $(HAVE_GLOBALCFG) $(HAVE_SECCOMP_H) $(HAVE_NETWORK) $(HAVE_USERNS) $(HAVE_BIND) $(HAVE_FILE_TRANSFER) $(HAVE_WHITELIST) -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -pie -Wformat -Wformat-security
33LDFLAGS += -pie -Wl,-z,relro -Wl,-z,now -lpthread 29LDFLAGS += -pie -Wl,-z,relro -Wl,-z,now -lpthread
34EXTRA_LDFLAGS +=@EXTRA_LDFLAGS@ 30EXTRA_LDFLAGS +=@EXTRA_LDFLAGS@
35EXTRA_CFLAGS +=@EXTRA_CFLAGS@ 31EXTRA_CFLAGS +=@EXTRA_CFLAGS@