~ubuntu-branches/ubuntu/trusty/clamav/trusty-security

« back to all changes in this revision

Viewing changes to m4/reorganization/distcheck.m4

  • Committer: Package Import Robot
  • Author(s): Marc Deslauriers
  • Date: 2014-11-20 14:29:18 UTC
  • mfrom: (0.47.10) (137.1.1 trusty-proposed)
  • Revision ID: package-import@ubuntu.com-20141120142918-slpjc6vqq139e49n
Tags: 0.98.5+addedllvm-0ubuntu0.14.04.1
* Updated to 0.98.5 to fix security issues, including CVE-2013-6497.
* Removed patches no longer needed:
  - d/p/0002-Sebastian-Andrzej-Siewior.patch
  - d/p/0003-configure-use-pkg-config-for-check-so-test-is-detect.patch
  - d/p/0004-Stop-using-a-cargo-culted-syscall-table-and-trust-th.patch
  - d/p/0005-configure.ac-patches-to-got-with-autoreconf-and-auto.patch
  - d/p/0006-Fix-STAT64-definition-and-add-missing-includes.patch
* Added patches from vivid to fix FTBFS, .so version and other issues:
  - d/p/0002-Add-an-additional-n-after-the-number-in-the-pidfile.patch
  - d/p/0003-unit_tests-increment-test-timeout-from-40secs-to-5mi.patch
  - d/p/0006-remove-unnecessary-harmful-flags-from-libclamav.pc.patch
  - d/p/0010-hardcode-LLVM-linker-flag-because-llvm-config-return.patch
  - d/p/0017-Bump-.so-version-number.patch
  - d/p/0018-llvm-don-t-use-system-libs.patch
* debian/clamav-docs.docs: use wildcards, as some docs have changed.
* debian/clamav-base.postinst.in: added new options.
* debian/clamav-base.config.in: added new options.
* debian/clamav-base.templates: added new options.
* debian/control: added libssl-dev BuildDepends.
* clamav-testfiles.install: removed rar files.

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
AC_ARG_ENABLE([distcheck-werror],
 
2
              AC_HELP_STRING([--enable-distcheck-werror],
 
3
                             [enable warnings as error for distcheck
 
4
                              @<:@default=no@:>@]),
 
5
[enable_distcheckwerror=$enableval],[enable_distcheckwerror="no"])
 
6
 
 
7
# Enable distcheck warnings and Werror only for gcc versions that support them,
 
8
# and only after we've run the configure tests.
 
9
# Some configure tests fail (like checking for cos in -lm) if we enable these
 
10
# Werror flags for configure too (for example -Wstrict-prototypes makes
 
11
# configure think that -lm doesn't have cos, hence its in libc).
 
12
WERR_CFLAGS=
 
13
WERR_CFLAGS_MILTER=
 
14
if test "x$enable_distcheckwerror" = "xyes"; then
 
15
    if test "$distcheck_enable_flags" = "1"; then
 
16
        WERR_COMMON="-Wno-pointer-sign -Werror-implicit-function-declaration -Werror -Wextra -Wall -Wno-error=strict-aliasing -Wno-error=bad-function-cast -Wbad-function-cast -Wcast-align -Wendif-labels -Wfloat-equal -Wformat=2 -Wformat-security -Wmissing-declarations -Wmissing-prototypes -Wno-error=missing-prototypes -Wnested-externs -Wno-error=nested-externs -Wpointer-arith -Wstrict-prototypes -Wno-error=strict-prototypes -Wno-switch -Wno-switch-enum -Wundef -Wstrict-overflow=1 -Winit-self -Wmissing-include-dirs -Wdeclaration-after-statement -Waggregate-return -Wmissing-format-attribute -Wno-error=missing-format-attribute -Wno-error=type-limits -Wno-error=unused-but-set-variable -Wno-error=unused-function -Wno-error=unused-value -Wno-error=unused-variable -Wcast-qual -Wno-error=cast-qual -Wno-error=sign-compare -Wshadow -Wno-error=shadow -Wno-error=uninitialized -fdiagnostics-show-option -Wno-unused-parameter -Wno-error=unreachable-code -Winvalid-pch -Wno-error=invalid-pch -O2 -D_FORTIFY_SOURCE=2 -fstack-protector-all -Wstack-protector -Wno-error=aggregate-return"
 
17
        WERR_CFLAGS="$WERR_COMMON -Wwrite-strings"
 
18
        WERR_CFLAGS_MILTER="$WERR_COMMON -Wno-error=format-nonliteral"
 
19
    fi
 
20
fi
 
21
AC_SUBST([WERR_CFLAGS])
 
22
AC_SUBST([WERR_CFLAGS_MILTER])