-#! /usr/bin/env python
+#!/usr/bin/env python
srcdir=".."
action="store", dest='shared_modules', default=None)
opt.SAMBA3_ADD_OPTION('winbind')
- opt.SAMBA3_ADD_OPTION('swat')
- opt.SAMBA3_ADD_OPTION('ads')
+ opt.SAMBA3_ADD_OPTION('ads', default=None) # None means autodetection
opt.SAMBA3_ADD_OPTION('ldap')
opt.SAMBA3_ADD_OPTION('cups', with_name="enable", without_name="disable")
opt.SAMBA3_ADD_OPTION('iprint', with_name="enable", without_name="disable")
opt.SAMBA3_ADD_OPTION('syslog')
opt.SAMBA3_ADD_OPTION('automount')
opt.SAMBA3_ADD_OPTION('aio-support')
+ opt.SAMBA3_ADD_OPTION('dmapi', default=None) # None means autodetection
+ opt.SAMBA3_ADD_OPTION('fam', default=None) # None means autodetection
opt.SAMBA3_ADD_OPTION('profiling-data', default=False)
- opt.SAMBA3_ADD_OPTION('cluster-support')
+ opt.SAMBA3_ADD_OPTION('cluster-support', default=None)
+
+ opt.SAMBA3_ADD_OPTION('regedit', default=None)
opt.add_option('--with-ctdb-dir',
help=("Directory under which ctdb is installed"),
help=("enable building against (too) old version of ctdb (default=false)"),
action="store_true", dest='enable_old_ctdb', default=False)
+ opt.add_option('--with-libcephfs',
+ help=("Directory under which libcephfs is installed"),
+ action="store", dest='libcephfs_dir', default=None)
+
+ opt.SAMBA3_ADD_OPTION('glusterfs', with_name="enable", without_name="disable", default=True)
def configure(conf):
conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD')
conf.env.developer = True
- if Options.options.with_swat:
- conf.env['build_swat'] = True
-
if sys.platform != 'openbsd5':
conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
conf.CHECK_FUNCS('sigprocmask sigblock sigaction sigset innetgr')
conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf')
conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups syscall sysconf')
- conf.CHECK_FUNCS('atexit grantpt fallocate posix_fallocate')
+ conf.CHECK_FUNCS('atexit grantpt posix_openpt fallocate posix_fallocate')
conf.CHECK_FUNCS('fseeko setluid')
conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
conf.CHECK_FUNCS('fdopendir')
main() {
exit(flock(open("/dev/null", O_RDWR), LOCK_MAND|LOCK_READ) != 0);
}''', 'HAVE_KERNEL_SHARE_MODES', addmain=False, execute=True,
- msg="Checking for krenel share modes")
+ msg="Checking for kernel share modes")
+
+ # check for fam libs
+ samba_fam_libs=None
+ check_for_fam=False
+ if Options.options.with_fam is None:
+ check_for_fam=True
+ elif Options.options.with_fam == True:
+ check_for_fam=True
+
+ if check_for_fam and conf.CHECK_HEADERS('fam.h'):
+ if conf.CHECK_FUNCS_IN('FAMOpen2', 'fam'):
+ samba_fam_libs='fam'
+ elif conf.CHECK_FUNCS_IN('FAMOpen2', 'fam C'):
+ samba_fam_libs='fam C'
+ conf.CHECK_TYPE('enum FAMCodes', headers='fam.h',
+ define='HAVE_FAM_H_FAMCODES_TYPEDEF',
+ msg='Checking whether enum FAMCodes is available')
+ conf.CHECK_FUNCS_IN('FAMNoExists', 'fam')
+
+ if samba_fam_libs is not None:
+ conf.DEFINE('SAMBA_FAM_LIBS', samba_fam_libs)
+ else:
+ if Options.options.with_fam == True:
+ conf.fatal('FAM support requested, but no suitable FAM library found')
+ elif check_for_fam:
+ Logs.warn('no suitable FAM library found')
+
+ # check for DMAPI libs
+ Logs.info("Checking for DMAPI library existence")
+ conf.env['dmapi_lib'] = ''
+ samba_dmapi_lib = ''
+ if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dm'):
+ samba_dmapi_lib = 'dm'
+ else:
+ if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'jfsdm'):
+ samba_dmapi_lib = 'jfsdm'
+ else:
+ if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dmapi'):
+ samba_dmapi_lib = 'dmapi'
+ else:
+ if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'xdsm'):
+ samba_dmapi_lib = 'xdsm'
+ # only bother to test headers and compilation when a candidate
+ # library has been found
+ if Options.options.with_dmapi == True and samba_dmapi_lib == '':
+ conf.fatal('DMAPI support requested, but no suitable DMAPI library found')
+ else:
+ conf.CHECK_HEADERS('sys/dmi.h xfs/dmapi.h sys/jfsdmapi.h sys/dmapi.h dmapi.h')
+ conf.CHECK_CODE('''
+#include <time.h> /* needed by Tru64 */
+#include <sys/types.h> /* needed by AIX */
+#ifdef HAVE_XFS_DMAPI_H
+#include <xfs/dmapi.h>
+#elif defined(HAVE_SYS_DMI_H)
+#include <sys/dmi.h>
+#elif defined(HAVE_SYS_JFSDMAPI_H)
+#include <sys/jfsdmapi.h>
+#elif defined(HAVE_SYS_DMAPI_H)
+#include <sys/dmapi.h>
+#elif defined(HAVE_DMAPI_H)
+#include <dmapi.h>
+#endif
+
+/* This link test is designed to fail on IRI 6.4, but should
+ * succeed on Linux, IRIX 6.5 and AIX.
+ */
+int main(int argc, char **argv)
+{
+ char * version;
+ dm_eventset_t events;
+ /* This doesn't take an argument on IRIX 6.4. */
+ dm_init_service(&version);
+ /* IRIX 6.4 expects events to be a pointer. */
+ DMEV_ISSET(DM_EVENT_READ, events);
+
+ return 0;
+}
+''',
+ 'USE_DMAPI',
+ addmain=False,
+ execute=False,
+ lib=samba_dmapi_lib,
+ msg='Checking whether DMAPI lib '+samba_dmapi_lib+' can be used')
+
+ if conf.CONFIG_SET('USE_DMAPI'):
+ conf.env['dmapi_lib'] = samba_dmapi_lib
+ else:
+ if Options.options.with_dmapi == True:
+ conf.fatal('DMAPI support requested but not found');
# Check for various members of the stat structure
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blocks', define='HAVE_STAT_ST_BLOCKS',
__lxstat memalign mknod mlock mlockall munlock munlockall
_open __open _opendir __opendir
pathconf poll posix_fallocate
-posix_memalign prctl pread _pread __pread
+posix_memalign pread _pread __pread
pwrite _pwrite __pwrite
rdchk _read __read _readdir __readdir
_seekdir __seekdir
conf.ADD_CFLAGS('-fno-common')
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
elif (host_os.rfind('freebsd') > -1):
+ conf.DEFINE('FREEBSD', 1)
if conf.CHECK_HEADERS('sunacl.h'):
conf.DEFINE('HAVE_FREEBSD_SUNACL_H', '1')
conf.CHECK_FUNCS_IN('acl', 'sunacl')
elif (host_os.rfind('aix') > -1):
Logs.info('Using AIX ACLs')
conf.DEFINE('HAVE_AIX_ACLS',1)
- default_static_modules.extend(TO_LIST('vfs_aixacl'))
+ default_static_modules.extend(TO_LIST('vfs_aixacl vfs_aixacl2'))
elif (host_os.rfind('osf') > -1) and conf.CHECK_FUNCS_IN('pacl', 'acl_get_fd'):
Logs.info('Using Tru64 ACLs')
conf.DEFINE('HAVE_TRU64_ACLS',1)
conf.CHECK_CODE('struct aiocb a; return aio_return(&a);', 'HAVE_AIO_RETURN', msg='Checking for aio_return', headers='aio.h', lib='aio rt')
conf.CHECK_CODE('struct aiocb a; return aio_error(&a);', 'HAVE_AIO_ERROR', msg='Checking for aio_error', headers='aio.h', lib='aio rt')
conf.CHECK_CODE('struct aiocb a; return aio_cancel(1, &a);', 'HAVE_AIO_CANCEL', msg='Checking for aio_cancel', headers='aio.h', lib='aio rt')
- conf.CHECK_CODE('struct aiocb a; return aio_suspend(&a, 1, NULL);', 'HAVE_AIO_SUSPEND', msg='Checking for aio_suspend', headers='aio.h', lib='aio rt')
+ conf.CHECK_CODE('const struct aiocb * const a[1]; struct timespec t; return aio_suspend(&a, 1, &t);', 'HAVE_AIO_SUSPEND', msg='Checking for aio_suspend', headers='aio.h', lib='aio rt')
if not conf.CONFIG_SET('HAVE_AIO'):
conf.DEFINE('HAVE_NO_AIO', '1')
else:
conf.SET_TARGET_TYPE('ldap', 'EMPTY')
conf.SET_TARGET_TYPE('lber', 'EMPTY')
- if Options.options.with_ads:
- use_ads=True
+ if Options.options.with_ads == False:
+ use_ads = False
+ use_ads_krb5 = False
+ use_ads_ldap = False
+ else:
+ use_ads = True
+ use_ads_krb5 = True
+ use_ads_ldap = True
if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
Logs.warn("arcfour-hmac-md5 encryption type not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
Logs.warn("krb5_mk_req_extended not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_GET_HOST_REALM'):
Logs.warn("krb5_get_host_realm not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_FREE_HOST_REALM'):
Logs.warn("krb5_free_host_realm not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_FWD_TGT_CREDS'):
Logs.warn("krb5_fwd_tgt_creds found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_GET_INIT_CREDS_OPT_ALLOC'):
Logs.warn("krb5_get_init_creds_opt_alloc not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT'):
Logs.warn("krb5_get_init_creds_opt_free was not found or was too old in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_GET_RENEWED_CREDS'):
Logs.warn("krb5_get_renewed_creds not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL_COMPARE_ANY_REALM'):
Logs.warn("krb5_principal_compare_any_realm not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_C_STRING_TO_KEY') and \
not conf.CONFIG_SET('HAVE_KRB5_STRING_TO_KEY_SALT'):
Logs.warn("krb5_c_string_to_key not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
Logs.warn("no CREATE_KEY_FUNCTIONS detected")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
Logs.warn("no GET_ENCTYPES_FUNCTIONS detected")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
Logs.warn("no KT_FREE_FUNCTION detected")
- use_ads=False
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM'):
Logs.warn("krb5_c_verify_checksum_compare not found in -lkrb5")
- use_ads=False
+ use_ads_krb5 = False
# We don't actually use
# gsskrb5_extract_authz_data_from_sec_context, but it is a
if not conf.CONFIG_SET('HAVE_GSS_GET_NAME_ATTRIBUTE') and \
not (conf.CONFIG_SET('HAVE_GSSKRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT') and \
conf.CONFIG_SET('HAVE_GSS_INQUIRE_SEC_CONTEXT_BY_OID')):
- Logs.warn("need eiterh gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support")
- use_ads=False
+ Logs.warn("need either gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support")
+ use_ads_krb5 = False
if not conf.CONFIG_SET('HAVE_GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT'):
Logs.warn("need gss_krb5_export_lucid_sec_context for SPNEGO and gss_wrap support")
- use_ads=False
+ use_ads_krb5 = False
- if use_ads:
- conf.DEFINE('WITH_ADS', '1')
+ if use_ads_krb5:
conf.DEFINE('HAVE_KRB5', '1')
- if conf.CONFIG_SET('HAVE_LDAP'):
- conf.env['HAVE_ADS'] = '1'
+ conf.env['HAVE_KRB5'] = '1'
else:
- Logs.warn("krb5 libs don't have all features required for Active Directory support")
conf.undefine('HAVE_KRB5_H')
conf.undefine('HAVE_GSSAPI_H')
conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
conf.undefine('HAVE_GSSAPI_GSSAPI_H')
+ use_ads = False
+
+ if not conf.CONFIG_SET('HAVE_LDAP'):
+ use_ads = False
+ use_ads_ldap = False
+
+ if use_ads:
+ conf.DEFINE('WITH_ADS', '1')
+ conf.env['HAVE_ADS'] = '1'
+ Logs.info("Building with Active Directory support.")
+ elif Options.options.with_ads == False:
+ Logs.info("Building without Active Directory support (--without-ads).")
+ else:
+ if not use_ads_krb5:
+ Logs.warn("Active Directory support not available: krb5 libs don't have all required features")
+ if not use_ads_ldap:
+ Logs.warn("Active Directory support not available: LDAP support ist not available.")
+ if Options.options.with_ads:
+ conf.fatal("Active Directory support not found. Use --without-ads for building without Active Directory support.")
+ else:
+ # this is the auto-mode case
+ Logs.warn("Building without Active Directory support.")
+
if Options.options.with_utmp:
conf.env.with_utmp = True
#
# checking for clustering extensions (CTDB)
#
- if not Options.options.with_cluster_support:
+ if Options.options.with_cluster_support == False:
+ # configure is called with --without-cluster-support,
+ # so don't check for and build w/o ctdb support.
have_cluster_support = False
else:
else:
includes = ''
+ if not conf.env.USING_SYSTEM_TDB:
+ includes = includes + ' ' + srcdir + '/lib/tdb/include'
+
+ if not conf.env.USING_SYSTEM_TALLOC:
+ includes = includes + ' ' + srcdir + '/lib/talloc'
+
have_cluster_support = True
ctdb_broken = ""
have_cluster_support = False
ctdb_broken = "ctdb_private.h is required for cluster support"
+ if have_cluster_support:
+ conf.CHECK_CODE('''
+ #define NO_CONFIG_H
+ #include "replace.h"
+ #include "system/wait.h"
+ #include "system/network.h"
+ #define private #error __USED_RESERVED_WORD_private__
+ #include <talloc.h>
+ #include <tdb.h>
+ #include <ctdb.h>
+ #include <ctdb_protocol.h>
+
+ int main(void)
+ {
+ return 0;
+ }
+ ''',
+ 'HAVE_CTDB_PROTOCOL_H',
+ addmain=False,
+ includes=includes,
+ msg='Checking for header ctdb_protocol.h')
+
if have_cluster_support:
conf.CHECK_CODE('''
#define NO_CONFIG_H
Logs.info("building with cluster support")
conf.DEFINE('CLUSTER_SUPPORT', 1);
else:
- if not Options.options.with_cluster_support:
- Logs.info("building without cluster support")
+ if Options.options.with_cluster_support == False:
+ Logs.info("building without cluster support (--without-cluster-support)")
+ elif Options.options.with_cluster_support == True:
+ Logs.error("Cluster support not available: " + ctdb_broken)
+ conf.fatal("Cluster support not found, but --with-cluster-support was specified")
else:
- Logs.warn("building without cluster support: " + ctdb_broken)
+ Logs.info("building without cluster support: " + ctdb_broken)
conf.undefine('CLUSTER_SUPPORT')
-
conf.CHECK_CODE('__attribute__((destructor)) static void cleanup(void) { }',
'HAVE_FUNCTION_ATTRIBUTE_DESTRUCTOR',
addmain=False,
if conf.CHECK_HEADERS('gpfs_gpl.h'):
conf.DEFINE('HAVE_GPFS', '1')
+ if conf.CHECK_HEADERS('linux/ioctl.h sys/ioctl.h'):
+ conf.DEFINE('HAVE_LINUX_IOCTL', '1')
+
+ conf.env['CCFLAGS_CEPHFS'] = "-D_FILE_OFFSET_BITS=64"
+ if Options.options.libcephfs_dir:
+ conf.env['CPPPATH_CEPHFS'] = Options.options.libcephfs_dir + '/include'
+ conf.env['LIBPATH_CEPHFS'] = Options.options.libcephfs_dir + '/lib'
+
+ if conf.CHECK_HEADERS('cephfs/libcephfs.h', False, False, 'cephfs') and conf.CHECK_LIB('cephfs'):
+ conf.DEFINE('HAVE_CEPH', '1')
+
+ if Options.options.with_glusterfs:
+ conf.check_cfg(package='glusterfs-api', args='"glusterfs-api >= 4" --cflags --libs',
+ msg='Checking for glusterfs-api >= 4', uselib_store="GFAPI")
+ conf.CHECK_HEADERS('api/glfs.h', lib='gfapi')
+ conf.CHECK_LIB('gfapi', shlib=True)
+
+ if conf.CONFIG_SET('HAVE_API_GLFS_H'):
+ conf.DEFINE('HAVE_GLUSTERFS', '1')
+ else:
+ conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
+ conf.undefine('HAVE_GLUSTERFS')
+ else:
+ conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
+ conf.undefine('HAVE_GLUSTERFS')
+
+ conf.env.build_regedit = False
+ if not Options.options.with_regedit == False:
+ conf.PROCESS_SEPARATE_RULE('system_ncurses')
+ if conf.CONFIG_SET('HAVE_NCURSES'):
+ conf.env.build_regedit = True
+
+ if conf.env.build_regedit:
+ Logs.info("building regedit")
+ else:
+ if Options.options.with_regedit == False:
+ Logs.info("not building regedit (--without-regedit)")
+ elif Options.options.with_regedit == True:
+ Logs.error("ncurses not available, cannot build regedit")
+ conf.fatal("ncurses not available, but --with-regedit was specified")
+ else:
+ Logs.info("ncurses not available, not building regedit")
+
+
default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam
auth_sam auth_unix auth_winbind auth_wbc
auth_domain auth_builtin vfs_default
vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
vfs_smb_traffic_analyzer vfs_preopen vfs_catia vfs_scannedonly
vfs_media_harmony
+ vfs_commit
vfs_crossrename vfs_linux_xfs_sgid
vfs_time_audit idmap_autorid idmap_tdb2
- idmap_rid idmap_hash'''))
+ idmap_rid idmap_hash idmap_rfc2307'''))
if Options.options.developer:
default_static_modules.extend(TO_LIST('charset_weird'))
default_shared_modules.extend(TO_LIST('auth_skel pdb_test'))
if Options.options.enable_selftest or Options.options.developer:
- default_shared_modules.extend(TO_LIST('vfs_fake_acls'))
+ default_shared_modules.extend(TO_LIST('vfs_fake_acls vfs_nfs4acl_xattr'))
if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
default_shared_modules.extend(TO_LIST('vfs_aio_linux'))
if conf.CONFIG_SET('HAVE_LDAP'):
- default_static_modules.extend(TO_LIST('pdb_ldap idmap_ldap'))
+ default_static_modules.extend(TO_LIST('pdb_ldapsam idmap_ldap'))
if conf.CONFIG_SET('DARWINOS'):
default_static_modules.extend(TO_LIST('charset_macosxfs'))
if conf.CONFIG_SET('HAVE_GPFS'):
default_shared_modules.extend(TO_LIST('vfs_gpfs'))
+ if conf.CONFIG_SET('HAVE_LINUX_IOCTL'):
+ default_shared_modules.extend(TO_LIST('vfs_btrfs'))
+
+ if conf.CONFIG_SET('SAMBA_FAM_LIBS'):
+ default_shared_modules.extend(TO_LIST('vfs_notify_fam'))
+
+ if conf.CONFIG_SET("HAVE_CEPH"):
+ default_shared_modules.extend(TO_LIST('vfs_ceph'))
+
+ if conf.CONFIG_SET('HAVE_GLUSTERFS'):
+ default_shared_modules.extend(TO_LIST('vfs_glusterfs'))
+
explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
+ def replace_list_item(lst, item, value):
+ try:
+ idx = lst.index(item)
+ lst[idx] = value
+ except:
+ pass
+ # PDB module file name should have the same name as module registers itself
+ # In Autoconf build we export LDAP passdb module as ldapsam but WAF build
+ # was always exporting pdb_ldap. In order to support existing packages
+ # allow referring to pdb_ldapsam as pdb_ldap but use proper name internally.
+ replace_list_item(explicit_shared_modules, 'pdb_ldap', 'pdb_ldapsam')
+ replace_list_item(explicit_static_modules, 'pdb_ldap', 'pdb_ldapsam')
+
final_static_modules = default_static_modules
final_shared_modules = default_shared_modules