# 'DNSSEC_' + default_dnssec.underscorify().to_upper())
# substs.set('DEFAULT_DNSSEC_MODE', default_dnssec)
#
+# default_private_dns = get_option('default-private-dns')
+# if fuzzer_build
+# default_private_dns = 'no'
+# endif
+# if default_private_dns != 'no' and conf.get('HAVE_GNUTLS') == 0
+# message('default-private-dns cannot be set to strict or opportunistic when gnutls is disabled. Setting default-private-dns to no.')
+# default_private_dns = 'no'
+# endif
+# conf.set('DEFAULT_PRIVATE_DNS_MODE',
+# 'PRIVATE_DNS_' + default_private_dns.underscorify().to_upper())
+# substs.set('DEFAULT_PRIVATE_DNS_MODE', default_private_dns)
+#
# want_importd = get_option('importd')
# if want_importd != 'false'
# have = (conf.get('HAVE_LIBCURL') == 1 and
# libbasic_gcrypt,
# libsystemd_resolve_core],
# dependencies : [threads,
+# libgnutls,
# libgpg_error,
# libm,
# libidn],
executable('elogind-user-runtime-dir',
executable('elogind-user-runtime-dir',
executable('elogind-user-runtime-dir',
+executable('elogind-user-runtime-dir',
executable('elogind-user-runtime-dir',
user_runtime_dir_sources,
include_directories : includes,
# 'symbolic gateway hostnames: @0@'.format(', '.join(gateway_hostnames)),
#
# 'default DNSSEC mode: @0@'.format(default_dnssec),
+# 'default private DNS mode: @0@'.format(default_private_dns),
# 'default cgroup hierarchy: @0@'.format(default_hierarchy),
#endif // 0
'default KillUserProcesses setting: @0@'.format(kill_user_processes)]
# description : 'default DNSSEC mode',
# choices : ['yes', 'allow-downgrade', 'no'],
# value : 'allow-downgrade')
+# option('default-private-dns', type : 'combo',
+# description : 'default private DNS mode',
+# choices : ['opportunistic', 'no'],
+# value : 'no')
# option('dns-servers', type : 'string',
# description : 'space-separated list of default DNS servers',
# value : '8.8.8.8 8.8.4.4 2001:4860:4860::8888 2001:4860:4860::8844')