diff options
author | startx2017 <vradu.startx@yandex.com> | 2018-09-06 08:56:58 -0400 |
---|---|---|
committer | startx2017 <vradu.startx@yandex.com> | 2018-09-06 08:56:58 -0400 |
commit | 0adf8f882ccd6f306f9d76ae2b599ab41bee6471 (patch) | |
tree | 608321b0cb8f7eaee5d03b968f8b8a3f4ae89099 /configure.ac | |
parent | final cleanup (diff) | |
download | firejail-0adf8f882ccd6f306f9d76ae2b599ab41bee6471.tar.gz firejail-0adf8f882ccd6f306f9d76ae2b599ab41bee6471.tar.zst firejail-0adf8f882ccd6f306f9d76ae2b599ab41bee6471.zip |
final cleanup
Diffstat (limited to 'configure.ac')
-rw-r--r-- | configure.ac | 11 |
1 files changed, 0 insertions, 11 deletions
diff --git a/configure.ac b/configure.ac index a6bc44318..1660c2011 100644 --- a/configure.ac +++ b/configure.ac | |||
@@ -9,8 +9,6 @@ AC_PROG_INSTALL | |||
9 | AC_PROG_RANLIB | 9 | AC_PROG_RANLIB |
10 | 10 | ||
11 | # LTS marker | 11 | # LTS marker |
12 | EXTRA_CFLAGS+=" -DLTS " | ||
13 | |||
14 | 12 | ||
15 | HAVE_SPECTRE="no" | 13 | HAVE_SPECTRE="no" |
16 | AC_MSG_CHECKING(for Spectre mitigation support in gcc or clang compiler) | 14 | AC_MSG_CHECKING(for Spectre mitigation support in gcc or clang compiler) |
@@ -63,14 +61,6 @@ AS_IF([test "x$enable_seccomp" != "xno"], [ | |||
63 | AC_SUBST(HAVE_SECCOMP) | 61 | AC_SUBST(HAVE_SECCOMP) |
64 | ]) | 62 | ]) |
65 | 63 | ||
66 | HAVE_BIND="" | ||
67 | AC_ARG_ENABLE([bind], | ||
68 | AS_HELP_STRING([--disable-bind], [disable bind])) | ||
69 | AS_IF([test "x$enable_bind" != "xno"], [ | ||
70 | HAVE_BIND="-DHAVE_BIND" | ||
71 | AC_SUBST(HAVE_BIND) | ||
72 | ]) | ||
73 | |||
74 | HAVE_GLOBALCFG="" | 64 | HAVE_GLOBALCFG="" |
75 | AC_ARG_ENABLE([globalcfg], | 65 | AC_ARG_ENABLE([globalcfg], |
76 | AS_HELP_STRING([--disable-globalcfg], [if the global config file firejail.cfg is not present, continue the program using defaults])) | 66 | AS_HELP_STRING([--disable-globalcfg], [if the global config file firejail.cfg is not present, continue the program using defaults])) |
@@ -161,7 +151,6 @@ echo " seccomp: $HAVE_SECCOMP" | |||
161 | echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" | 151 | echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" |
162 | echo " apparmor: $HAVE_APPARMOR" | 152 | echo " apparmor: $HAVE_APPARMOR" |
163 | echo " global config: $HAVE_GLOBALCFG" | 153 | echo " global config: $HAVE_GLOBALCFG" |
164 | echo " bind: $HAVE_BIND" | ||
165 | echo " network: $HAVE_NETWORK" | 154 | echo " network: $HAVE_NETWORK" |
166 | echo " user namespace: $HAVE_USERNS" | 155 | echo " user namespace: $HAVE_USERNS" |
167 | echo " whitelisting: $HAVE_WHITELIST" | 156 | echo " whitelisting: $HAVE_WHITELIST" |