aboutsummaryrefslogtreecommitdiffstats
path: root/configure
diff options
context:
space:
mode:
authorLibravatar startx2017 <vradu.startx@yandex.com>2018-08-22 08:32:01 -0400
committerLibravatar startx2017 <vradu.startx@yandex.com>2018-08-22 08:32:01 -0400
commitddd307e3447e609241abadb8d073e97b948a5bb0 (patch)
tree041028cc53f7ab392f124d68dff4cf3f11375de7 /configure
parentrelax restrictions imposed on filesystem log (fslogger) in ec7f59b8d370c29bd2... (diff)
downloadfirejail-ddd307e3447e609241abadb8d073e97b948a5bb0.tar.gz
firejail-ddd307e3447e609241abadb8d073e97b948a5bb0.tar.zst
firejail-ddd307e3447e609241abadb8d073e97b948a5bb0.zip
removed --disable-bind configuration option; some ohter minor cleanup
Diffstat (limited to 'configure')
-rwxr-xr-xconfigure17
1 files changed, 0 insertions, 17 deletions
diff --git a/configure b/configure
index 6e6f84256..cfcdae929 100755
--- a/configure
+++ b/configure
@@ -636,7 +636,6 @@ HAVE_X11
636HAVE_USERNS 636HAVE_USERNS
637HAVE_NETWORK 637HAVE_NETWORK
638HAVE_GLOBALCFG 638HAVE_GLOBALCFG
639HAVE_BIND
640HAVE_CHROOT 639HAVE_CHROOT
641HAVE_SECCOMP 640HAVE_SECCOMP
642HAVE_PRIVATE_HOME 641HAVE_PRIVATE_HOME
@@ -705,7 +704,6 @@ enable_overlayfs
705enable_private_home 704enable_private_home
706enable_seccomp 705enable_seccomp
707enable_chroot 706enable_chroot
708enable_bind
709enable_globalcfg 707enable_globalcfg
710enable_network 708enable_network
711enable_userns 709enable_userns
@@ -1352,7 +1350,6 @@ Optional Features:
1352 --disable-private-home disable private home feature 1350 --disable-private-home disable private home feature
1353 --disable-seccomp disable seccomp 1351 --disable-seccomp disable seccomp
1354 --disable-chroot disable chroot 1352 --disable-chroot disable chroot
1355 --disable-bind disable bind
1356 --disable-globalcfg if the global config file firejail.cfg is not 1353 --disable-globalcfg if the global config file firejail.cfg is not
1357 present, continue the program using defaults 1354 present, continue the program using defaults
1358 --disable-network disable network 1355 --disable-network disable network
@@ -3626,19 +3623,6 @@ if test "x$enable_chroot" != "xno"; then :
3626 3623
3627fi 3624fi
3628 3625
3629HAVE_BIND=""
3630# Check whether --enable-bind was given.
3631if test "${enable_bind+set}" = set; then :
3632 enableval=$enable_bind;
3633fi
3634
3635if test "x$enable_bind" != "xno"; then :
3636
3637 HAVE_BIND="-DHAVE_BIND"
3638
3639
3640fi
3641
3642HAVE_GLOBALCFG="" 3626HAVE_GLOBALCFG=""
3643# Check whether --enable-globalcfg was given. 3627# Check whether --enable-globalcfg was given.
3644if test "${enable_globalcfg+set}" = set; then : 3628if test "${enable_globalcfg+set}" = set; then :
@@ -5043,7 +5027,6 @@ echo " <linux/seccomp.h>: $HAVE_SECCOMP_H"
5043echo " apparmor: $HAVE_APPARMOR" 5027echo " apparmor: $HAVE_APPARMOR"
5044echo " global config: $HAVE_GLOBALCFG" 5028echo " global config: $HAVE_GLOBALCFG"
5045echo " chroot: $HAVE_CHROOT" 5029echo " chroot: $HAVE_CHROOT"
5046echo " bind: $HAVE_BIND"
5047echo " network: $HAVE_NETWORK" 5030echo " network: $HAVE_NETWORK"
5048echo " user namespace: $HAVE_USERNS" 5031echo " user namespace: $HAVE_USERNS"
5049echo " X11 sandboxing support: $HAVE_X11" 5032echo " X11 sandboxing support: $HAVE_X11"