diff -Nuar --exclude '*.orig' nrpe-2.15.orig/configure.in nrpe-2.15/configure.in --- nrpe-2.15.orig/configure.in 2013-09-06 08:27:13.000000000 -0700 +++ nrpe-2.15/configure.in 2014-04-19 09:20:50.406150828 -0700 @@ -45,7 +45,7 @@ AC_HEADER_STDC AC_HEADER_TIME AC_HEADER_SYS_WAIT -AC_CHECK_HEADERS(ctype.h dirent.h errno.h fcntl.h getopt.h grp.h inttypes.h netdb.h pwd.h signal.h stdint.h strings.h string.h syslog.h tcpd.h unistd.h arpa/inet.h netinet/in.h socket.h sys/types.h sys/time.h sys/resource.h sys/wait.h sys/socket.h sys/stat.h) +AC_CHECK_HEADERS(ctype.h dirent.h errno.h fcntl.h getopt.h grp.h inttypes.h netdb.h pwd.h signal.h stdint.h strings.h string.h syslog.h unistd.h arpa/inet.h netinet/in.h socket.h sys/types.h sys/time.h sys/resource.h sys/wait.h sys/socket.h sys/stat.h) dnl Checks for typedefs, structures, and compiler characteristics. AC_C_CONST @@ -164,11 +164,20 @@ AC_CHECK_LIB(nsl,main,SOCKETLIBS="$SOCKETLIBS -lnsl") AC_CHECK_LIB(socket,socket,SOCKETLIBS="$SOCKETLIBS -lsocket") AC_SUBST(SOCKETLIBS) -AC_CHECK_LIB(wrap,main,[ - LIBWRAPLIBS="$LIBWRAPLIBS -lwrap" + +AC_ARG_ENABLE([tcp-wrapper], + AS_HELP_STRING([--disable-tcp-wrapper], [Disable building with TCP wrappers. *** DISABLING IS A SECURITY RISK! *** Read the SECURITY file before using this option! @<:@default=enable@:>@])) + +LIBWRAPLIBS="" +AS_IF([test "x$enable_tcp_wrapper" != "xno"], [ + AC_CHECK_LIB([wrap],[hosts_access],[ + LIBWRAPLIBS="$LIBWRAPLIBS -lwrap" AC_DEFINE(HAVE_LIBWRAP,[1],[Have the TCP wrappers library]) - ]) + AC_DEFINE(HAVE_TCPD_H,[1],[Have the TCP wrappers library]) + ]) +]) AC_SUBST(LIBWRAPLIBS) + AC_CHECK_FUNCS(strdup strstr strtoul initgroups closesocket) dnl socklen_t check - from curl @@ -440,8 +449,11 @@ AC_SUBST(TARGET_PLATFORM) AC_ARG_ENABLE([command-args], - AS_HELP_STRING([--enable-command-args],[allows clients to specify command arguments. *** THIS IS A SECURITY RISK! *** Read the SECURITY file before using this option!]), - AC_DEFINE_UNQUOTED(ENABLE_COMMAND_ARGUMENTS,[1],[Enable command-line arguments])) + AS_HELP_STRING([--enable-command-args],[allows clients to specify command arguments. *** THIS IS A SECURITY RISK! *** Read the SECURITY file before using this option!])) + +AS_IF([test "x$enable_command_args" = "xyes"], [ + AC_DEFINE(ENABLE_COMMAND_ARGUMENTS,[1],[Enable command-line arguments]) +]) AC_ARG_ENABLE([bash-command-substitution], AS_HELP_STRING([--enable-bash-command-substitution],[allows clients to pass bash command substitutions of the form $(command). *** THIS IS A HIGH SECURITY RISK! *** Read the SECURITY file before using this option!]),