aboutsummaryrefslogtreecommitdiffstats
path: root/configure.ac
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2016-08-02 10:03:28 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2016-08-02 10:03:28 -0400
commit355c86b0ff225bdc48b27fb4dfcb6232e4ec7b29 (patch)
tree4bc45dad2214b25b279a0d2475c5f7b38269e3d3 /configure.ac
parentMerge pull request #679 from manevich/xephyr (diff)
downloadfirejail-355c86b0ff225bdc48b27fb4dfcb6232e4ec7b29.tar.gz
firejail-355c86b0ff225bdc48b27fb4dfcb6232e4ec7b29.tar.zst
firejail-355c86b0ff225bdc48b27fb4dfcb6232e4ec7b29.zip
apparmor
Diffstat (limited to 'configure.ac')
-rw-r--r--configure.ac23
1 files changed, 23 insertions, 0 deletions
diff --git a/configure.ac b/configure.ac
index a84396ad4..315c25038 100644
--- a/configure.ac
+++ b/configure.ac
@@ -9,6 +9,27 @@ AC_PROG_CC
9AC_PROG_INSTALL 9AC_PROG_INSTALL
10AC_PROG_RANLIB 10AC_PROG_RANLIB
11 11
12# Allow to build without apparmor support by calling:
13# ./configure --disable-apparmor
14# This makes it possible to run snaps in devmode on almost any host,
15# regardless of the kernel version.
16HAVE_APPARMOR=""
17AC_ARG_ENABLE([apparmor],
18 AS_HELP_STRING([--enable-apparmor], [enable apparmor]))
19AS_IF([test "x$enable_apparmor" = "xyes"], [
20 HAVE_APPARMOR="-DHAVE_APPARMOR"
21 AC_SUBST(HAVE_APPARMOR)
22])
23
24AS_IF([test "x$enable_apparmor" = "xyes"], [
25 AC_CHECK_HEADER(sys/apparmor.h, , [AC_MSG_ERROR(
26 [Couldn't find sys/apparmor.h... please install apparmor user space library and development files] )])
27])
28AS_IF([test "x$enable_apparmor" = "xyes"], [
29 EXTRA_LDFLAGS="-lapparmor"
30])
31AC_SUBST([EXTRA_LDFLAGS])
32
12HAVE_SECCOMP="" 33HAVE_SECCOMP=""
13AC_ARG_ENABLE([seccomp], 34AC_ARG_ENABLE([seccomp],
14 AS_HELP_STRING([--disable-seccomp], [disable seccomp])) 35 AS_HELP_STRING([--disable-seccomp], [disable seccomp]))
@@ -117,6 +138,7 @@ echo " prefix: $prefix"
117echo " sysconfdir: $sysconfdir" 138echo " sysconfdir: $sysconfdir"
118echo " seccomp: $HAVE_SECCOMP" 139echo " seccomp: $HAVE_SECCOMP"
119echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" 140echo " <linux/seccomp.h>: $HAVE_SECCOMP_H"
141echo " apparmor: $HAVE_APPARMOR"
120echo " global config: $HAVE_GLOBALCFG" 142echo " global config: $HAVE_GLOBALCFG"
121echo " chroot: $HAVE_CHROOT" 143echo " chroot: $HAVE_CHROOT"
122echo " bind: $HAVE_BIND" 144echo " bind: $HAVE_BIND"
@@ -128,6 +150,7 @@ echo " file transfer support: $HAVE_FILE_TRANSFER"
128echo " fatal warnings: $HAVE_FATAL_WARNINGS" 150echo " fatal warnings: $HAVE_FATAL_WARNINGS"
129printf " uid_min: "; grep UID_MIN uids.h 151printf " uid_min: "; grep UID_MIN uids.h
130printf " gid_min: "; grep GID_MIN uids.h 152printf " gid_min: "; grep GID_MIN uids.h
153printf " EXTRA_LDFLAGS: $EXTRA_LDFLAGS"
131echo 154echo
132 155
133 156