diff options
author | netblue30 <netblue30@yahoo.com> | 2018-08-21 08:39:23 -0400 |
---|---|---|
committer | netblue30 <netblue30@yahoo.com> | 2018-08-21 08:39:23 -0400 |
commit | b185faae4d0fc17ab362ff5974313c223757a218 (patch) | |
tree | 8bfde3d366e2aab271f77cf5e4e369d100521450 /configure | |
parent | testing (diff) | |
download | firejail-b185faae4d0fc17ab362ff5974313c223757a218.tar.gz firejail-b185faae4d0fc17ab362ff5974313c223757a218.tar.zst firejail-b185faae4d0fc17ab362ff5974313c223757a218.zip |
autoconf
Diffstat (limited to 'configure')
-rwxr-xr-x | configure | 68 |
1 files changed, 0 insertions, 68 deletions
@@ -631,15 +631,11 @@ HAVE_FATAL_WARNINGS | |||
631 | HAVE_SUID | 631 | HAVE_SUID |
632 | HAVE_WHITELIST | 632 | HAVE_WHITELIST |
633 | HAVE_FILE_TRANSFER | 633 | HAVE_FILE_TRANSFER |
634 | HAVE_X11 | ||
635 | HAVE_USERNS | 634 | HAVE_USERNS |
636 | HAVE_NETWORK | 635 | HAVE_NETWORK |
637 | HAVE_GLOBALCFG | 636 | HAVE_GLOBALCFG |
638 | HAVE_BIND | 637 | HAVE_BIND |
639 | HAVE_CHROOT | ||
640 | HAVE_SECCOMP | 638 | HAVE_SECCOMP |
641 | HAVE_PRIVATE_HOME | ||
642 | HAVE_OVERLAYFS | ||
643 | EXTRA_LDFLAGS | 639 | EXTRA_LDFLAGS |
644 | EGREP | 640 | EGREP |
645 | GREP | 641 | GREP |
@@ -700,15 +696,11 @@ ac_subst_files='' | |||
700 | ac_user_opts=' | 696 | ac_user_opts=' |
701 | enable_option_checking | 697 | enable_option_checking |
702 | enable_apparmor | 698 | enable_apparmor |
703 | enable_overlayfs | ||
704 | enable_private_home | ||
705 | enable_seccomp | 699 | enable_seccomp |
706 | enable_chroot | ||
707 | enable_bind | 700 | enable_bind |
708 | enable_globalcfg | 701 | enable_globalcfg |
709 | enable_network | 702 | enable_network |
710 | enable_userns | 703 | enable_userns |
711 | enable_x11 | ||
712 | enable_file_transfer | 704 | enable_file_transfer |
713 | enable_whitelist | 705 | enable_whitelist |
714 | enable_suid | 706 | enable_suid |
@@ -1346,16 +1338,12 @@ Optional Features: | |||
1346 | --disable-FEATURE do not include FEATURE (same as --enable-FEATURE=no) | 1338 | --disable-FEATURE do not include FEATURE (same as --enable-FEATURE=no) |
1347 | --enable-FEATURE[=ARG] include FEATURE [ARG=yes] | 1339 | --enable-FEATURE[=ARG] include FEATURE [ARG=yes] |
1348 | --enable-apparmor enable apparmor | 1340 | --enable-apparmor enable apparmor |
1349 | --disable-overlayfs disable overlayfs | ||
1350 | --disable-private-home disable private home feature | ||
1351 | --disable-seccomp disable seccomp | 1341 | --disable-seccomp disable seccomp |
1352 | --disable-chroot disable chroot | ||
1353 | --disable-bind disable bind | 1342 | --disable-bind disable bind |
1354 | --disable-globalcfg if the global config file firejail.cfg is not | 1343 | --disable-globalcfg if the global config file firejail.cfg is not |
1355 | present, continue the program using defaults | 1344 | present, continue the program using defaults |
1356 | --disable-network disable network | 1345 | --disable-network disable network |
1357 | --disable-userns disable user namespace | 1346 | --disable-userns disable user namespace |
1358 | --disable-x11 disable X11 sandboxing support | ||
1359 | --disable-file-transfer disable file transfer | 1347 | --disable-file-transfer disable file transfer |
1360 | --disable-whitelist disable whitelist | 1348 | --disable-whitelist disable whitelist |
1361 | --disable-suid install as a non-SUID executable | 1349 | --disable-suid install as a non-SUID executable |
@@ -3574,32 +3562,6 @@ if test "x$enable_apparmor" = "xyes"; then : | |||
3574 | fi | 3562 | fi |
3575 | 3563 | ||
3576 | 3564 | ||
3577 | HAVE_OVERLAYFS="" | ||
3578 | # Check whether --enable-overlayfs was given. | ||
3579 | if test "${enable_overlayfs+set}" = set; then : | ||
3580 | enableval=$enable_overlayfs; | ||
3581 | fi | ||
3582 | |||
3583 | if test "x$enable_overlayfs" != "xno"; then : | ||
3584 | |||
3585 | HAVE_OVERLAYFS="-DHAVE_OVERLAYFS" | ||
3586 | |||
3587 | |||
3588 | fi | ||
3589 | |||
3590 | HAVE_PRIVATEHOME="" | ||
3591 | # Check whether --enable-private-home was given. | ||
3592 | if test "${enable_private_home+set}" = set; then : | ||
3593 | enableval=$enable_private_home; | ||
3594 | fi | ||
3595 | |||
3596 | if test "x$enable_private_home" != "xno"; then : | ||
3597 | |||
3598 | HAVE_PRIVATE_HOME="-DHAVE_PRIVATE_HOME" | ||
3599 | |||
3600 | |||
3601 | fi | ||
3602 | |||
3603 | HAVE_SECCOMP="" | 3565 | HAVE_SECCOMP="" |
3604 | # Check whether --enable-seccomp was given. | 3566 | # Check whether --enable-seccomp was given. |
3605 | if test "${enable_seccomp+set}" = set; then : | 3567 | if test "${enable_seccomp+set}" = set; then : |
@@ -3613,19 +3575,6 @@ if test "x$enable_seccomp" != "xno"; then : | |||
3613 | 3575 | ||
3614 | fi | 3576 | fi |
3615 | 3577 | ||
3616 | HAVE_CHROOT="" | ||
3617 | # Check whether --enable-chroot was given. | ||
3618 | if test "${enable_chroot+set}" = set; then : | ||
3619 | enableval=$enable_chroot; | ||
3620 | fi | ||
3621 | |||
3622 | if test "x$enable_chroot" != "xno"; then : | ||
3623 | |||
3624 | HAVE_CHROOT="-DHAVE_CHROOT" | ||
3625 | |||
3626 | |||
3627 | fi | ||
3628 | |||
3629 | HAVE_BIND="" | 3578 | HAVE_BIND="" |
3630 | # Check whether --enable-bind was given. | 3579 | # Check whether --enable-bind was given. |
3631 | if test "${enable_bind+set}" = set; then : | 3580 | if test "${enable_bind+set}" = set; then : |
@@ -3678,19 +3627,6 @@ if test "x$enable_userns" != "xno"; then : | |||
3678 | 3627 | ||
3679 | fi | 3628 | fi |
3680 | 3629 | ||
3681 | HAVE_X11="" | ||
3682 | # Check whether --enable-x11 was given. | ||
3683 | if test "${enable_x11+set}" = set; then : | ||
3684 | enableval=$enable_x11; | ||
3685 | fi | ||
3686 | |||
3687 | if test "x$enable_x11" != "xno"; then : | ||
3688 | |||
3689 | HAVE_X11="-DHAVE_X11" | ||
3690 | |||
3691 | |||
3692 | fi | ||
3693 | |||
3694 | HAVE_FILE_TRANSFER="" | 3630 | HAVE_FILE_TRANSFER="" |
3695 | # Check whether --enable-file-transfer was given. | 3631 | # Check whether --enable-file-transfer was given. |
3696 | if test "${enable_file_transfer+set}" = set; then : | 3632 | if test "${enable_file_transfer+set}" = set; then : |
@@ -5021,15 +4957,11 @@ echo " seccomp: $HAVE_SECCOMP" | |||
5021 | echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" | 4957 | echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" |
5022 | echo " apparmor: $HAVE_APPARMOR" | 4958 | echo " apparmor: $HAVE_APPARMOR" |
5023 | echo " global config: $HAVE_GLOBALCFG" | 4959 | echo " global config: $HAVE_GLOBALCFG" |
5024 | echo " chroot: $HAVE_CHROOT" | ||
5025 | echo " bind: $HAVE_BIND" | 4960 | echo " bind: $HAVE_BIND" |
5026 | echo " network: $HAVE_NETWORK" | 4961 | echo " network: $HAVE_NETWORK" |
5027 | echo " user namespace: $HAVE_USERNS" | 4962 | echo " user namespace: $HAVE_USERNS" |
5028 | echo " X11 sandboxing support: $HAVE_X11" | ||
5029 | echo " whitelisting: $HAVE_WHITELIST" | 4963 | echo " whitelisting: $HAVE_WHITELIST" |
5030 | echo " private home support: $HAVE_PRIVATE_HOME" | ||
5031 | echo " file transfer support: $HAVE_FILE_TRANSFER" | 4964 | echo " file transfer support: $HAVE_FILE_TRANSFER" |
5032 | echo " overlayfs support: $HAVE_OVERLAYFS" | ||
5033 | echo " busybox workaround: $BUSYBOX_WORKAROUND" | 4965 | echo " busybox workaround: $BUSYBOX_WORKAROUND" |
5034 | echo " Spectre compiler patch: $HAVE_SPECTRE" | 4966 | echo " Spectre compiler patch: $HAVE_SPECTRE" |
5035 | echo " EXTRA_LDFLAGS: $EXTRA_LDFLAGS" | 4967 | echo " EXTRA_LDFLAGS: $EXTRA_LDFLAGS" |