aboutsummaryrefslogtreecommitdiffstats
path: root/configure
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2018-08-21 08:39:23 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2018-08-21 08:39:23 -0400
commitb185faae4d0fc17ab362ff5974313c223757a218 (patch)
tree8bfde3d366e2aab271f77cf5e4e369d100521450 /configure
parenttesting (diff)
downloadfirejail-b185faae4d0fc17ab362ff5974313c223757a218.tar.gz
firejail-b185faae4d0fc17ab362ff5974313c223757a218.tar.zst
firejail-b185faae4d0fc17ab362ff5974313c223757a218.zip
autoconf
Diffstat (limited to 'configure')
-rwxr-xr-xconfigure68
1 files changed, 0 insertions, 68 deletions
diff --git a/configure b/configure
index 0dfed3876..b15f649df 100755
--- a/configure
+++ b/configure
@@ -631,15 +631,11 @@ HAVE_FATAL_WARNINGS
631HAVE_SUID 631HAVE_SUID
632HAVE_WHITELIST 632HAVE_WHITELIST
633HAVE_FILE_TRANSFER 633HAVE_FILE_TRANSFER
634HAVE_X11
635HAVE_USERNS 634HAVE_USERNS
636HAVE_NETWORK 635HAVE_NETWORK
637HAVE_GLOBALCFG 636HAVE_GLOBALCFG
638HAVE_BIND 637HAVE_BIND
639HAVE_CHROOT
640HAVE_SECCOMP 638HAVE_SECCOMP
641HAVE_PRIVATE_HOME
642HAVE_OVERLAYFS
643EXTRA_LDFLAGS 639EXTRA_LDFLAGS
644EGREP 640EGREP
645GREP 641GREP
@@ -700,15 +696,11 @@ ac_subst_files=''
700ac_user_opts=' 696ac_user_opts='
701enable_option_checking 697enable_option_checking
702enable_apparmor 698enable_apparmor
703enable_overlayfs
704enable_private_home
705enable_seccomp 699enable_seccomp
706enable_chroot
707enable_bind 700enable_bind
708enable_globalcfg 701enable_globalcfg
709enable_network 702enable_network
710enable_userns 703enable_userns
711enable_x11
712enable_file_transfer 704enable_file_transfer
713enable_whitelist 705enable_whitelist
714enable_suid 706enable_suid
@@ -1346,16 +1338,12 @@ Optional Features:
1346 --disable-FEATURE do not include FEATURE (same as --enable-FEATURE=no) 1338 --disable-FEATURE do not include FEATURE (same as --enable-FEATURE=no)
1347 --enable-FEATURE[=ARG] include FEATURE [ARG=yes] 1339 --enable-FEATURE[=ARG] include FEATURE [ARG=yes]
1348 --enable-apparmor enable apparmor 1340 --enable-apparmor enable apparmor
1349 --disable-overlayfs disable overlayfs
1350 --disable-private-home disable private home feature
1351 --disable-seccomp disable seccomp 1341 --disable-seccomp disable seccomp
1352 --disable-chroot disable chroot
1353 --disable-bind disable bind 1342 --disable-bind disable bind
1354 --disable-globalcfg if the global config file firejail.cfg is not 1343 --disable-globalcfg if the global config file firejail.cfg is not
1355 present, continue the program using defaults 1344 present, continue the program using defaults
1356 --disable-network disable network 1345 --disable-network disable network
1357 --disable-userns disable user namespace 1346 --disable-userns disable user namespace
1358 --disable-x11 disable X11 sandboxing support
1359 --disable-file-transfer disable file transfer 1347 --disable-file-transfer disable file transfer
1360 --disable-whitelist disable whitelist 1348 --disable-whitelist disable whitelist
1361 --disable-suid install as a non-SUID executable 1349 --disable-suid install as a non-SUID executable
@@ -3574,32 +3562,6 @@ if test "x$enable_apparmor" = "xyes"; then :
3574fi 3562fi
3575 3563
3576 3564
3577HAVE_OVERLAYFS=""
3578# Check whether --enable-overlayfs was given.
3579if test "${enable_overlayfs+set}" = set; then :
3580 enableval=$enable_overlayfs;
3581fi
3582
3583if test "x$enable_overlayfs" != "xno"; then :
3584
3585 HAVE_OVERLAYFS="-DHAVE_OVERLAYFS"
3586
3587
3588fi
3589
3590HAVE_PRIVATEHOME=""
3591# Check whether --enable-private-home was given.
3592if test "${enable_private_home+set}" = set; then :
3593 enableval=$enable_private_home;
3594fi
3595
3596if test "x$enable_private_home" != "xno"; then :
3597
3598 HAVE_PRIVATE_HOME="-DHAVE_PRIVATE_HOME"
3599
3600
3601fi
3602
3603HAVE_SECCOMP="" 3565HAVE_SECCOMP=""
3604# Check whether --enable-seccomp was given. 3566# Check whether --enable-seccomp was given.
3605if test "${enable_seccomp+set}" = set; then : 3567if test "${enable_seccomp+set}" = set; then :
@@ -3613,19 +3575,6 @@ if test "x$enable_seccomp" != "xno"; then :
3613 3575
3614fi 3576fi
3615 3577
3616HAVE_CHROOT=""
3617# Check whether --enable-chroot was given.
3618if test "${enable_chroot+set}" = set; then :
3619 enableval=$enable_chroot;
3620fi
3621
3622if test "x$enable_chroot" != "xno"; then :
3623
3624 HAVE_CHROOT="-DHAVE_CHROOT"
3625
3626
3627fi
3628
3629HAVE_BIND="" 3578HAVE_BIND=""
3630# Check whether --enable-bind was given. 3579# Check whether --enable-bind was given.
3631if test "${enable_bind+set}" = set; then : 3580if test "${enable_bind+set}" = set; then :
@@ -3678,19 +3627,6 @@ if test "x$enable_userns" != "xno"; then :
3678 3627
3679fi 3628fi
3680 3629
3681HAVE_X11=""
3682# Check whether --enable-x11 was given.
3683if test "${enable_x11+set}" = set; then :
3684 enableval=$enable_x11;
3685fi
3686
3687if test "x$enable_x11" != "xno"; then :
3688
3689 HAVE_X11="-DHAVE_X11"
3690
3691
3692fi
3693
3694HAVE_FILE_TRANSFER="" 3630HAVE_FILE_TRANSFER=""
3695# Check whether --enable-file-transfer was given. 3631# Check whether --enable-file-transfer was given.
3696if test "${enable_file_transfer+set}" = set; then : 3632if test "${enable_file_transfer+set}" = set; then :
@@ -5021,15 +4957,11 @@ echo " seccomp: $HAVE_SECCOMP"
5021echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" 4957echo " <linux/seccomp.h>: $HAVE_SECCOMP_H"
5022echo " apparmor: $HAVE_APPARMOR" 4958echo " apparmor: $HAVE_APPARMOR"
5023echo " global config: $HAVE_GLOBALCFG" 4959echo " global config: $HAVE_GLOBALCFG"
5024echo " chroot: $HAVE_CHROOT"
5025echo " bind: $HAVE_BIND" 4960echo " bind: $HAVE_BIND"
5026echo " network: $HAVE_NETWORK" 4961echo " network: $HAVE_NETWORK"
5027echo " user namespace: $HAVE_USERNS" 4962echo " user namespace: $HAVE_USERNS"
5028echo " X11 sandboxing support: $HAVE_X11"
5029echo " whitelisting: $HAVE_WHITELIST" 4963echo " whitelisting: $HAVE_WHITELIST"
5030echo " private home support: $HAVE_PRIVATE_HOME"
5031echo " file transfer support: $HAVE_FILE_TRANSFER" 4964echo " file transfer support: $HAVE_FILE_TRANSFER"
5032echo " overlayfs support: $HAVE_OVERLAYFS"
5033echo " busybox workaround: $BUSYBOX_WORKAROUND" 4965echo " busybox workaround: $BUSYBOX_WORKAROUND"
5034echo " Spectre compiler patch: $HAVE_SPECTRE" 4966echo " Spectre compiler patch: $HAVE_SPECTRE"
5035echo " EXTRA_LDFLAGS: $EXTRA_LDFLAGS" 4967echo " EXTRA_LDFLAGS: $EXTRA_LDFLAGS"