10 usage: configure [options] [settings]
12 --prefix=PREFIX installation prefix [/usr]
13 --exec-prefix=EPREFIX installation prefix for executable files [PREFIX]
14 --bindir=DIR user executables [PREFIX/bin]
15 --datadir=DIR architecture-independent data files [PREFIX/share]
16 --mandir=DIR manual pages [DATADIR/man]
17 --sysconfdir=DIR directory for configuration files [/etc]
18 --pamdir=DIR PAM directory [SYSCONFDIR/pam.d]
20 --build=build-alias a cpu-vendor-opsys for the system where the application will be built
21 --host=host-alias a cpu-vendor-opsys for the system where the application will run
22 --target=target-alias the machine that CC will produce code for
24 --enable-debug enable debugging
25 --enable-seccomp enable seccomp
26 --enable-static prepare for static build
28 --help, -h display this help and exit
37 --prefix) PREFIX=$var;;
38 --exec-prefix) EPREFIX=$var;;
39 --bindir) BINDIR=$var;;
40 --datadir) SHAREDIR=$var;;
41 --mandir) MANDIR=$var;;
42 --sysconfdir) SYSCONFDIR=$var;;
43 --pamdir) PAMDIR=$var;;
46 --target) TARGET=$var;;
47 --enable-debug) DEBUG=yes;;
48 --enable-seccomp) BUILD_SECCOMP=yes;;
49 --enable-static) BUILD_STATIC=yes;;
51 *) die "Error: unknown option $opt";;
58 cat <<EOF >>$CONFIG_MK
60 PREFIX ?= ${PREFIX:="/usr"}
61 EPREFIX ?= ${EPREFIX:="${PREFIX}"}
62 BINDIR ?= ${BINDIR:="${PREFIX}/bin"}
63 SHAREDIR ?= ${SHAREDIR:="${PREFIX}/share"}
64 MANDIR ?= ${MANDIR:="${SHAREDIR}/man"}
65 SYSCONFDIR?= ${SYSCONFDIR:="/etc"}
66 PAMDIR ?= ${PAMDIR:="${SYSCONFDIR}/pam.d"}
69 if [ -z "$BUILD" ]; then
70 BUILD="$(uname -m)-unknown-$(uname -s | tr '[:upper:]' '[:lower:]')"
72 if [ -z "$HOST" ]; then
73 [ -z "$TARGET" ] && TARGET=$BUILD
76 if [ -z "$TARGET" ]; then
77 [ -z "$HOST" ] && HOST=$BUILD
82 # Derive OS from cpu-manufacturer-os-kernel
94 OS_CFLAGS="-D_DEFAULT_SOURCE -D_GNU_SOURCE -DUID_MAX=60000 -DGID_MAX=60000"
95 printf 'CURDIR := .\n' >>$CONFIG_MK
96 printf 'PAM_DOAS = pam.d__doas__linux\n' >>$CONFIG_MK
100 [ -n "$OS_CFLAGS" ] && \
101 printf 'CFLAGS += %s\n' "$OS_CFLAGS" >>$CONFIG_MK
104 printf 'CFLAGS += -O0 -g\n' >>$CONFIG_MK
106 [ -n "$BUILD_STATIC" ] && \
107 printf 'CFLAGS += -static\n' >>$CONFIG_MK
109 # Add CPPFLAGS/CFLAGS/LDFLAGS to CC for testing features
110 XCC="${CC:=clang} $CFLAGS $OS_CFLAGS $CPPFLAGS $LDFLAGS"
111 # Make sure to disable --as-needed for CC tests.
112 XCC="$XCC -Wl,--no-as-needed"
115 func="$1"; src="$2"; shift 2
116 printf 'Checking for %-14s\t\t' "$func ..."
117 printf '%s\n' "$src" >"_$func.c"
118 $XCC "_$func.c" -o "_$func" 2>/dev/null
120 rm -f "_$func.c" "_$func"
121 if [ $ret -eq 0 ]; then
123 upperfunc="$(printf '%s\n' "$func" | tr '[[:lower:]]' '[[:upper:]]')"
124 printf 'CFLAGS += -DHAVE_%s\n' "$upperfunc" >>$CONFIG_MK
135 explicit_bzero(NULL, 0);
138 check_func "explicit_bzero" "$src" || {
139 printf 'OPENBSD += explicit_bzero.c\n' >>$CONFIG_MK
144 # Check for strlcat().
149 const char s1[] = "foo";
151 strlcat(s2, s1, sizeof(s2));
154 check_func "strlcat" "$src" || {
155 printf 'OPENBSD += strlcat.c\n' >>$CONFIG_MK
159 # Check for strlcpy().
164 const char s1[] = "foo";
166 strlcpy(s2, s1, sizeof(s2));
169 check_func "strlcpy" "$src" || {
170 printf 'OPENBSD += strlcpy.c\n' >>$CONFIG_MK
182 check_func "errc" "$src" || {
183 printf 'OPENBSD += errc.c\n' >>$CONFIG_MK
195 check_func "verrc" "$src" || {
196 printf 'OPENBSD += verrc.c\n' >>$CONFIG_MK
200 # Check for setprogname().
208 check_func "setprogname" "$src" || {
209 printf 'OPENBSD += progname.c\n' >>$CONFIG_MK
213 # Check for readpassphrase().
216 #include <readpassphrase.h>
219 readpassphrase("", buf, sizeof(buf), 0);
222 check_func "readpassphrase" "$src" || {
223 printf 'OPENBSD += readpassphrase.c\n' >>$CONFIG_MK
227 # Check for strtonum().
233 strtonum("", 1, 64, &errstr);
236 check_func "strtonum" "$src" || {
237 printf 'OPENBSD += strtonum.c\n' >>$CONFIG_MK
241 # Check for reallocarray().
246 reallocarray(NULL, 0, 0);
249 check_func "reallocarray" "$src" || {
250 printf 'OPENBSD += reallocarray.c\n' >>$CONFIG_MK
254 # Check for bsd_auth.h.
257 #include <bsd_auth.h>
261 check_func "bsd_auth_h" "$src" && \
265 # Check for pam_appl.h.
268 #include <security/pam_appl.h>
272 [ -z "$have_bsd_auth_h" ] && \
273 check_func "pam_appl_h" "$src" && {
274 printf 'SRCS += doas_pam.c\n' >>$CONFIG_MK
278 # Check for login_cap.h.
281 #include <login_cap.h>
285 check_func "login_cap_h" "$src" || {
286 printf 'OPENBSD += setusercontext.c\n' >>$CONFIG_MK
290 # Check for execvpe().
295 const char *p = { "", NULL };
299 check_func "execvpe" "$src" || {
300 printf 'OPENBSD += execvpe.c\n' >>$CONFIG_MK
304 # Check for setresuid().
312 check_func "setresuid" "$src" || {
313 printf 'OPENBSD += setresuid.c\n' >>$CONFIG_MK
317 # Check for pledge().
325 check_func "pledge" "$src" && {
330 # Check for seccomp.h
333 #include <linux/seccomp.h>
334 #include <sys/prctl.h>
337 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL);
340 [ -z "$have_pledge" -a -n "$BUILD_SECCOMP" ] && \
341 check_func "seccomp_h" "$src" && \
344 printf 'OPENBSD += pledge-seccomp.c\n' >>$CONFIG_MK
347 [ -z "$have_pledge" ] && \
348 printf 'OPENBSD += pledge-noop.c\n' >>$CONFIG_MK