X-Git-Url: http://git.samba.org/?a=blobdiff_plain;f=source3%2Fwscript;h=a9368b284cdc63ddb3e1acecad83e405c5a925de;hb=6c007951bb5ada8cc3a2eabdc40568fa84da2831;hp=9a32ab7e75901af780ed87a47a7291ec66325b15;hpb=e8a7d9c822ae4be4533f9e34885816a5b7831154;p=samba.git diff --git a/source3/wscript b/source3/wscript index 9a32ab7e759..c1fadef79f7 100644 --- a/source3/wscript +++ b/source3/wscript @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python srcdir=".." @@ -21,24 +21,18 @@ def set_options(opt): opt.add_option('--with-shared-modules', help=("Comma-separated list of names of modules to build shared"), action="store", dest='shared_modules', default=None) - opt.add_option('--enable-selftest', - help=("enable options necessary for selftest"), - action="store_true", dest='enable_selftest', default=False) opt.SAMBA3_ADD_OPTION('winbind') - opt.SAMBA3_ADD_OPTION('swat') opt.SAMBA3_ADD_OPTION('ads') - opt.SAMBA3_ADD_OPTION('mit-krb5-checks', default=False) opt.SAMBA3_ADD_OPTION('ldap') opt.SAMBA3_ADD_OPTION('cups', with_name="enable", without_name="disable") opt.SAMBA3_ADD_OPTION('iprint', with_name="enable", without_name="disable") opt.SAMBA3_ADD_OPTION('pam') opt.SAMBA3_ADD_OPTION('pam_smbpass') opt.SAMBA3_ADD_OPTION('quotas') - opt.SAMBA3_ADD_OPTION('sys-quotas') opt.SAMBA3_ADD_OPTION('sendfile-support') opt.SAMBA3_ADD_OPTION('utmp') - opt.SAMBA3_ADD_OPTION('pthreadpool', with_name="enable", without_name="disable") + opt.SAMBA3_ADD_OPTION('pthreadpool', with_name="enable", without_name="disable", default=True) opt.SAMBA3_ADD_OPTION('avahi', with_name="enable", without_name="disable") opt.SAMBA3_ADD_OPTION('iconv') opt.SAMBA3_ADD_OPTION('acl-support') @@ -46,9 +40,14 @@ def set_options(opt): opt.SAMBA3_ADD_OPTION('syslog') opt.SAMBA3_ADD_OPTION('automount') opt.SAMBA3_ADD_OPTION('aio-support') + opt.SAMBA3_ADD_OPTION('dmapi', default=None) # None means autodetection + opt.SAMBA3_ADD_OPTION('fam', default=None) # None means autodetection opt.SAMBA3_ADD_OPTION('profiling-data', default=False) + opt.SAMBA3_ADD_OPTION('libarchive', default=None) - opt.SAMBA3_ADD_OPTION('cluster-support') + opt.SAMBA3_ADD_OPTION('cluster-support', default=None) + + opt.SAMBA3_ADD_OPTION('regedit', default=None) opt.add_option('--with-ctdb-dir', help=("Directory under which ctdb is installed"), @@ -57,36 +56,42 @@ def set_options(opt): help=("enable building against (too) old version of ctdb (default=false)"), action="store_true", dest='enable_old_ctdb', default=False) + opt.add_option('--with-libcephfs', + help=("Directory under which libcephfs is installed"), + action="store", dest='libcephfs_dir', default=None) + + opt.SAMBA3_ADD_OPTION('glusterfs', with_name="enable", without_name="disable", default=True) def configure(conf): from samba_utils import TO_LIST + default_static_modules = [] + default_shared_modules = [] + if Options.options.developer: conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD') conf.env.developer = True - if Options.options.with_swat: - conf.env['build_swat'] = True - - conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True) + if sys.platform != 'openbsd5': + conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True) conf.CHECK_HEADERS('execinfo.h libexc.h libunwind.h netdb.h') conf.CHECK_HEADERS('linux/falloc.h') - conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod mknod64') + conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod') conf.CHECK_FUNCS('strtol strchr strupr chflags') conf.CHECK_FUNCS('getrlimit fsync fdatasync setpgid') conf.CHECK_FUNCS('setsid glob strpbrk crypt16 getauthuid') conf.CHECK_FUNCS('sigprocmask sigblock sigaction sigset innetgr') conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf') - conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups sysconf stat64 fstat64') - conf.CHECK_FUNCS('lstat64 fopen64 atexit grantpt lseek64 ftruncate64 fallocate fallocate64 posix_fallocate posix_fallocate64') - conf.CHECK_FUNCS('fseeko fseek64 fseeko64 ftell64 ftello64 setluid') + conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups syscall sysconf') + conf.CHECK_FUNCS('atexit grantpt posix_openpt fallocate posix_fallocate') + conf.CHECK_FUNCS('fseeko setluid') conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h') - conf.CHECK_FUNCS('opendir64 readdir64 seekdir64 telldir64 rewinddir64 closedir64') - conf.CHECK_FUNCS('fdopendir fdopendir64') - conf.CHECK_FUNCS('getpwent_r getdents64 setenv strcasecmp fcvt fcvtl') + conf.CHECK_FUNCS('fdopendir') + conf.CHECK_FUNCS('fstatat') + conf.CHECK_FUNCS('getpwent_r setenv strcasecmp fcvt fcvtl') conf.CHECK_FUNCS('syslog vsyslog timegm setlocale') conf.CHECK_FUNCS_IN('nanosleep', 'rt') conf.CHECK_FUNCS('lutimes futimes utimensat futimens') @@ -94,10 +99,10 @@ def configure(conf): conf.CHECK_FUNCS('memalign posix_memalign hstrerror') conf.CHECK_FUNCS('shmget') conf.CHECK_FUNCS_IN('shm_open', 'rt', checklibc=True) - conf.CHECK_FUNCS('gettext dgettext bindtextdomain textdomain bind_textdomain_codeset') #FIXME: for some reason this one still fails conf.CHECK_FUNCS_IN('yp_get_default_domain', 'nsl') conf.CHECK_FUNCS_IN('dn_expand _dn_expand __dn_expand', 'resolv') + conf.CHECK_FUNCS_IN('dn_expand', 'inet') conf.CHECK_DECLS('fdatasync', reverse=True) conf.CHECK_DECLS('readahead', reverse=True, headers='fcntl.h') @@ -108,18 +113,16 @@ def configure(conf): #if defined(HAVE_UNISTD_H) #include #endif -long ret = splice(0,0,1,0,400,0); +long ret = splice(0,0,1,0,400,SPLICE_F_MOVE); ''', 'HAVE_LINUX_SPLICE', headers='fcntl.h'): conf.CHECK_DECLS('splice', reverse=True, headers='fcntl.h') # Check for inotify support - conf.CHECK_HEADERS('linux/inotify.h asm/unistd.h sys/inotify.h') - conf.CHECK_FUNCS('inotify_init') - if "HAVE_INOTIFY_INIT" in conf.env: - if "HAVE_LINUX_INOTIFY_H" in conf.env or "HAVE_SYS_INOTIFY_H" in conf.env: - conf.DEFINE('HAVE_INOTIFY', 1) + conf.CHECK_HEADERS('sys/inotify.h') + if "HAVE_SYS_INOTIFY_H" in conf.env: + conf.DEFINE('HAVE_INOTIFY', 1) # Check for kernel change notify support conf.CHECK_CODE(''' @@ -157,22 +160,135 @@ main() { #include #include #ifndef LOCK_MAND -#define LOCK_MAND 32 -#define LOCK_READ 64 +#define LOCK_MAND 32 +#define LOCK_READ 64 #endif main() { exit(flock(open("/dev/null", O_RDWR), LOCK_MAND|LOCK_READ) != 0); }''', 'HAVE_KERNEL_SHARE_MODES', addmain=False, execute=True, - msg="Checking for krenel share modes") + msg="Checking for kernel share modes") + + # check for fam libs + samba_fam_libs=None + check_for_fam=False + if Options.options.with_fam is None: + check_for_fam=True + elif Options.options.with_fam == True: + check_for_fam=True + + if check_for_fam and conf.CHECK_HEADERS('fam.h'): + if conf.CHECK_FUNCS_IN('FAMOpen2', 'fam'): + samba_fam_libs='fam' + elif conf.CHECK_FUNCS_IN('FAMOpen2', 'fam C'): + samba_fam_libs='fam C' + conf.CHECK_TYPE('enum FAMCodes', headers='fam.h', + define='HAVE_FAM_H_FAMCODES_TYPEDEF', + msg='Checking whether enum FAMCodes is available') + conf.CHECK_FUNCS_IN('FAMNoExists', 'fam') + + if samba_fam_libs is not None: + conf.DEFINE('SAMBA_FAM_LIBS', samba_fam_libs) + else: + if Options.options.with_fam == True: + conf.fatal('FAM support requested, but no suitable FAM library found') + elif check_for_fam: + Logs.warn('no suitable FAM library found') + + # check for libarchive (tar command in smbclient) + # None means autodetect, True/False means enable/disable + conf.env['archive_lib'] = '' + if Options.options.with_libarchive is not False: + libarchive_mandatory = Options.options.with_libarchive == True + Logs.info("Checking for libarchive existence") + if conf.CHECK_BUNDLED_SYSTEM('libarchive', minversion='3.1.2'): + conf.env['archive_lib'] = 'libarchive' + elif libarchive_mandatory: + conf.fatal('libarchive support requested, but no suitable pkgconfig found') + + # check for DMAPI libs + Logs.info("Checking for DMAPI library existence") + conf.env['dmapi_lib'] = '' + samba_dmapi_lib = '' + if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dm'): + samba_dmapi_lib = 'dm' + else: + if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'jfsdm'): + samba_dmapi_lib = 'jfsdm' + else: + if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dmapi'): + samba_dmapi_lib = 'dmapi' + else: + if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'xdsm'): + samba_dmapi_lib = 'xdsm' + # only bother to test headers and compilation when a candidate + # library has been found + if Options.options.with_dmapi == True and samba_dmapi_lib == '': + conf.fatal('DMAPI support requested, but no suitable DMAPI library found') + else: + conf.CHECK_HEADERS('sys/dmi.h xfs/dmapi.h sys/jfsdmapi.h sys/dmapi.h dmapi.h') + conf.CHECK_CODE(''' +#include /* needed by Tru64 */ +#include /* needed by AIX */ +#ifdef HAVE_XFS_DMAPI_H +#include +#elif defined(HAVE_SYS_DMI_H) +#include +#elif defined(HAVE_SYS_JFSDMAPI_H) +#include +#elif defined(HAVE_SYS_DMAPI_H) +#include +#elif defined(HAVE_DMAPI_H) +#include +#endif + +/* This link test is designed to fail on IRI 6.4, but should + * succeed on Linux, IRIX 6.5 and AIX. + */ +int main(int argc, char **argv) +{ + char * version; + dm_eventset_t events; + /* This doesn't take an argument on IRIX 6.4. */ + dm_init_service(&version); + /* IRIX 6.4 expects events to be a pointer. */ + DMEV_ISSET(DM_EVENT_READ, events); + + return 0; +} +''', + 'USE_DMAPI', + addmain=False, + execute=False, + lib=samba_dmapi_lib, + msg='Checking whether DMAPI lib '+samba_dmapi_lib+' can be used') + + if conf.CONFIG_SET('USE_DMAPI'): + conf.env['dmapi_lib'] = samba_dmapi_lib + else: + if Options.options.with_dmapi == True: + conf.fatal('DMAPI support requested but not found'); # Check for various members of the stat structure - conf.CHECK_TYPES('blksize_t blkcnt_t') conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blocks', define='HAVE_STAT_ST_BLOCKS', headers='sys/stat.h') conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blksize', define='HAVE_STAT_ST_BLKSIZE', headers='sys/stat.h') conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_flags', define='HAVE_STAT_ST_FLAGS', - headers='sys/types.h sys/stat.h unistd.h') + headers='sys/types.h sys/stat.h unistd.h') + + if "HAVE_BLKCNT_T" in conf.env: + conf.CHECK_CODE(''' + return sizeof(blkcnt_t) == 4 ? 0 : 1''', + 'SIZEOF_BLKCNT_T_4', execute=True, + headers='replace.h sys/types.h sys/stat.h unistd.h', + msg="Checking whether blkcnt_t is 32 bit") + + if "HAVE_BLKCNT_T" in conf.env: + conf.CHECK_CODE(''' + return sizeof(blkcnt_t) == 8 ? 0 : 1''', + 'SIZEOF_BLKCNT_T_8', execute=True, + headers='replace.h sys/types.h sys/stat.h unistd.h', + msg="Checking whether blkcnt_t is 64 bit") # Check for POSIX capability support conf.CHECK_FUNCS_IN('cap_get_proc', 'cap', headers='sys/capability.h') @@ -225,39 +341,34 @@ if (0) { msg="Checking for LL suffix on long long integers") conf.CHECK_FUNCS(''' -_acl __acl add_proplist_entry atexit attr_getf attr_list attr_listf -attropen attr_remove attr_removef attr_set attr_setf backtrace_symbols -bindtextdomain _chdir __chdir chflags chmod _close __close _closedir -__closedir closedir64 creat64 crypt16 delproplist devnm dgettext dirfd +_acl __acl atexit + _chdir __chdir chflags chmod _close __close _closedir +__closedir crypt16 devnm dirfd DNSServiceRegister _dup __dup _dup2 __dup2 endmntent execl -extattr_delete_fd extattr_delete_link extattr_get_fd extattr_get_file -extattr_get_link extattr_list_fd extattr_list_file extattr_list_link -extattr_set_fd extattr_set_file extattr_set_link _facl __facl _fchdir +_facl __facl _fchdir __fchdir fchmod fchown _fcntl __fcntl fcvt fcvtl fdatasync -fdelproplist fgetea fgetproplist fgetxattr flistea flistxattr fopen64 -_fork __fork fremoveea fremovexattr fseeko fseek64 fseeko64 fsetea -fsetproplist fsetxattr _fstat __fstat fstat64 _fstat64 __fstat64 fsync -ftell64 ftello64 ftruncate64 futimens futimes __fxstat getauthuid -getcwd _getcwd __getcwd getdents __getdents getdents64 getdirentries +_fork __fork fseeko +fsetxattr _fstat __fstat fsync +futimens futimes __fxstat getauthuid +getcwd _getcwd __getcwd getdents __getdents getdirentries getgrent getgrnam getgrouplist getgrset getmntent getpagesize -getproplist get_proplist_entry getpwanam getpwent_r getrlimit gettext +getpwanam getpwent_r getrlimit glob grantpt hstrerror initgroups innetgr -inotify_init lgetea lgetxattr listea listxattr llistea llistxattr -llseek _llseek __llseek lremoveea lremovexattr _lseek __lseek lseek64 -lsetea lsetxattr _lstat __lstat lstat64 _lstat64 __lstat64 lutimes -__lxstat memalign mknod mknod64 mlock mlockall munlock munlockall -_open __open open64 _open64 __open64 _opendir __opendir -opendir64 pathconf poll posix_fallocate posix_fallocate64 -posix_memalign prctl pread _pread __pread pread64 _pread64 __pread64 -pwrite _pwrite __pwrite pwrite64 _pwrite64 -__pwrite64 rdchk _read __read _readdir __readdir readdir64 _readdir64 -__readdir64 removeea removexattr rewinddir64 _seekdir __seekdir -seekdir64 select setea setenv setgidx setgroups setlocale setluid -setmntent setpgid setpriv setproplist setsid setuidx -setxattr shmget shm_open sigaction sigblock sigprocmask sigset -sizeof_proplist_entry _stat __stat stat64 _stat64 __stat64 statvfs +llseek _llseek __llseek _lseek __lseek +_lstat __lstat lutimes +__lxstat memalign mknod mlock mlockall munlock munlockall +_open __open _opendir __opendir +pathconf poll posix_fallocate +posix_memalign pread _pread __pread +pwrite _pwrite __pwrite +rdchk _read __read _readdir __readdir +_seekdir __seekdir +select setenv setgidx setgroups setlocale setluid +setmntent setpgid setpriv setsid setuidx +shmget shm_open sigaction sigblock sigprocmask sigset +_stat __stat statvfs strcasecmp strchr strpbrk strsignal strtol strupr sysconf sysctl sysctlbyname -__sys_llseek syslog _telldir __telldir telldir64 textdomain timegm +__sys_llseek syslog _telldir __telldir timegm utimensat vsyslog _write __write __xstat ''') @@ -281,28 +392,50 @@ utimensat vsyslog _write __write __xstat conf.DEFINE('STAT_ST_BLOCKSIZE', '512') elif (host_os.rfind('darwin') > -1): conf.DEFINE('DARWINOS', 1) - conf.DEFINE('STAT_ST_BLOCKSIZE', '512') conf.ADD_CFLAGS('-fno-common') + conf.DEFINE('STAT_ST_BLOCKSIZE', '512') elif (host_os.rfind('freebsd') > -1): + conf.DEFINE('FREEBSD', 1) if conf.CHECK_HEADERS('sunacl.h'): conf.DEFINE('HAVE_FREEBSD_SUNACL_H', '1') - conf.CHECK_FUNCS_IN('acl', 'sunacl') - conf.DEFINE('STAT_ST_BLOCKSIZE', '512') - elif (host_os.rfind('netbsd') > -1): + conf.CHECK_FUNCS_IN(['acl'], 'sunacl') conf.DEFINE('STAT_ST_BLOCKSIZE', '512') - elif (host_os.rfind('openbsd') > -1): + elif (host_os.rfind('irix') > -1): + conf.DEFINE('IRIX', 1) conf.DEFINE('STAT_ST_BLOCKSIZE', '512') - elif (host_os.rfind('sunos') > -1): + elif (host_os.rfind('aix') > -1): + conf.DEFINE('AIX', 1) + conf.DEFINE('STAT_ST_BLOCKSIZE', 'DEV_BSIZE') + elif (host_os.rfind('hpux') > -1): + conf.DEFINE('HPUX', 1) + conf.DEFINE('STAT_ST_BLOCKSIZE', '8192') + elif (host_os.rfind('osf') > -1): + conf.DEFINE('OSF1', 1) conf.DEFINE('STAT_ST_BLOCKSIZE', '512') + # FIXME: Add more checks here. else: - Logs.warn("Unknown host_os '%s', please report this to samba-technical@samba.org" % host_os) + conf.DEFINE('STAT_ST_BLOCKSIZE', '512') - #FIXME: add more checks if Options.options.with_acl_support: - if host_os.rfind('linux') > -1: - conf.CHECK_FUNCS_IN('acl_get_file', 'acl') - conf.CHECK_FUNCS_IN('getxattr', 'attr') + if (host_os.rfind('hpux') > -1): + Logs.info('Using HPUX ACLs') + conf.DEFINE('HAVE_HPUX_ACLS',1) + conf.DEFINE('POSIX_ACL_NEEDS_MASK',1) + default_static_modules.extend(TO_LIST('vfs_hpuxacl')) + elif (host_os.rfind('aix') > -1): + Logs.info('Using AIX ACLs') + conf.DEFINE('HAVE_AIX_ACLS',1) + default_static_modules.extend(TO_LIST('vfs_aixacl vfs_aixacl2')) + elif (host_os.rfind('darwin') > -1): + Logs.warn('ACLs on Darwin currently not supported') + conf.fatal("ACL support not available on Darwin/MacOS. " + "Use --without-acl-support for building without " + "ACL support. " + "ACL support is required to change permissions " + "from Windows clients.") + else: + conf.CHECK_FUNCS_IN(['acl_get_file'], 'acl') if conf.CHECK_CODE(''' acl_t acl; int entry_id; @@ -311,7 +444,7 @@ return acl_get_entry(acl, entry_id, entry_p); ''', 'HAVE_POSIX_ACLS', headers='sys/types.h sys/acl.h', link=False, - msg="Checking for POSIX ACL support") : + msg="Checking for POSIX ACL support") : conf.CHECK_CODE(''' acl_permset_t permset_d; acl_perm_t perm; @@ -320,12 +453,22 @@ return acl_get_perm_np(permset_d, perm); 'HAVE_ACL_GET_PERM_NP', headers='sys/types.h sys/acl.h', link=True, msg="Checking whether acl_get_perm_np() is available") - else: - conf.DEFINE('HAVE_NO_ACLS', 1) - conf.SET_TARGET_TYPE('acl', 'EMPTY') - else: - conf.DEFINE('HAVE_NO_ACLS', 1) - conf.SET_TARGET_TYPE('acl', 'EMPTY') + default_static_modules.extend(TO_LIST('vfs_posixacl')) + elif conf.CHECK_FUNCS_IN(['facl'], 'sec'): + Logs.info('Using solaris or UnixWare ACLs') + conf.DEFINE('HAVE_SOLARIS_UNIXWARE_ACLS',1) + default_static_modules.extend(TO_LIST('vfs_solarisacl')) + elif conf.CHECK_FUNCS_IN(['acl_get_fd'], 'pacl'): + Logs.info('Using Tru64 ACLs') + conf.DEFINE('HAVE_TRU64_ACLS',1) + default_static_modules.extend(TO_LIST('vfs_tru64acl')) + else: + conf.fatal("ACL support not found. Try installing libacl1-dev " + "or libacl-devel. " + "Otherwise, use --without-acl-support to build " + "without ACL support. " + "ACL support is required to change permissions from " + "Windows clients.") if conf.CHECK_FUNCS('dirfd'): conf.DEFINE('HAVE_DIRFD_DECL', 1) @@ -338,59 +481,30 @@ return acl_get_perm_np(permset_d, perm); if conf.CONFIG_SET('HAVE_FALLOCATE'): conf.CHECK_CODE(''' - int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''', - 'HAVE_LINUX_FALLOCATE', - msg="Checking whether the Linux 'fallocate' function is available", - headers='unistd.h sys/types.h fcntl.h linux/falloc.h') - if conf.CONFIG_SET('HAVE_FALLOCATE64'): - conf.CHECK_CODE(''' - int ret = fallocate64(0, FALLOC_FL_KEEP_SIZE, 0, 10);''', - 'HAVE_LINUX_FALLOCATE64', - msg="Checking whether the Linux 'fallocate64' function is available", - headers='unistd.h sys/types.h fcntl.h linux/falloc.h') + int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''', + 'HAVE_LINUX_FALLOCATE', + msg="Checking whether the Linux 'fallocate' function is available", + headers='unistd.h sys/types.h fcntl.h linux/falloc.h') conf.CHECK_CODE(''' - ssize_t err = readahead(0,0,0x80000);''', - 'HAVE_LINUX_READAHEAD', - msg="Checking whether Linux readahead is available", - headers='unistd.h fcntl.h') + ssize_t err = readahead(0,0,0x80000);''', + 'HAVE_LINUX_READAHEAD', + msg="Checking whether Linux readahead is available", + headers='unistd.h fcntl.h') conf.CHECK_DECLS('readahead', headers='fcntl.h', always=True) - conf.CHECK_CODE(''' - struct ucred cred; - socklen_t cred_len; - int ret = getsockopt(0, SOL_SOCKET, SO_PEERCRED, &cred, &cred_len);''', - 'HAVE_PEERCRED', - msg="Checking whether we can use SO_PEERCRED to get socket credentials", - headers='sys/types.h sys/socket.h') - - conf.CHECK_CODE(''' - #if defined(HAVE_LONGLONG) && (defined(HAVE_OFF64_T) || (defined(SIZEOF_OFF_T) && (SIZEOF_OFF_T == 8))) - #include - #else - __COMPILE_ERROR_ - #endif - int i;''', - 'HAVE_EXPLICIT_LARGEFILE_SUPPORT', - msg="Checking whether large file support can be enabled") + conf.CHECK_CODE('int fd = openat(AT_FDCWD, ".", O_RDONLY);', + 'HAVE_OPENAT', + msg='Checking for openat', + headers='fcntl.h') if Options.options.with_aio_support: - conf.CHECK_FUNCS_IN('aio_read', 'aio') - conf.CHECK_FUNCS_IN('aio_read', 'rt') + conf.CHECK_FUNCS_IN('aio_read', 'aio') + conf.CHECK_FUNCS_IN('aio_read', 'rt') conf.CHECK_CODE('struct aiocb a; return aio_read(&a);', - 'HAVE_AIO', - msg='Checking for asynchronous io support', - headers='sys/types.h aio.h', - lib='aio rt') - conf.CHECK_CODE('struct aiocb64 a; return aio_read64(&a);', - 'HAVE_AIO64', - msg='Checking for 64-bit asynchronous io support', - headers='sys/types.h aio.h', - lib='aio rt') - if conf.CONFIG_SET('HAVE_AIO64'): - conf.DEFINE('HAVE_AIOCB64', '1') - conf.DEFINE('WITH_AIO', '1') - elif conf.CONFIG_SET('HAVE_AIO'): - conf.DEFINE('WITH_AIO', '1') + 'HAVE_AIO', + msg='Checking for asynchronous io support', + headers='sys/types.h aio.h', + lib='aio rt') if conf.CONFIG_SET('HAVE_AIO'): conf.CHECK_CODE('struct aiocb a; return aio_read(&a);', 'HAVE_AIO_READ', msg='Checking for aio_read', headers='aio.h', lib='aio rt') conf.CHECK_CODE('struct aiocb a; return aio_write(&a);', 'HAVE_AIO_WRITE', msg='Checking for aio_write', headers='aio.h', lib='aio rt') @@ -398,41 +512,56 @@ return acl_get_perm_np(permset_d, perm); conf.CHECK_CODE('struct aiocb a; return aio_return(&a);', 'HAVE_AIO_RETURN', msg='Checking for aio_return', headers='aio.h', lib='aio rt') conf.CHECK_CODE('struct aiocb a; return aio_error(&a);', 'HAVE_AIO_ERROR', msg='Checking for aio_error', headers='aio.h', lib='aio rt') conf.CHECK_CODE('struct aiocb a; return aio_cancel(1, &a);', 'HAVE_AIO_CANCEL', msg='Checking for aio_cancel', headers='aio.h', lib='aio rt') - conf.CHECK_CODE('struct aiocb a; return aio_suspend(&a, 1, NULL);', 'HAVE_AIO_SUSPEND', msg='Checking for aio_suspend', headers='aio.h', lib='aio rt') - if conf.CONFIG_SET('HAVE_AIO64'): - conf.CHECK_CODE('struct aiocb a; return aio_read64(&a);', 'HAVE_AIO_READ64', msg='Checking for aio_read64', headers='aio.h', lib='aio rt') - conf.CHECK_CODE('struct aiocb a; return aio_write64(&a);', 'HAVE_AIO_WRITE64', msg='Checking for aio_write64', headers='aio.h', lib='aio rt') - conf.CHECK_CODE('struct aiocb a; return aio_fsync64(1, &a);', 'HAVE_AIO_FSYNC64', msg='Checking for aio_fsync64', headers='aio.h', lib='aio rt') - conf.CHECK_CODE('struct aiocb a; return aio_return64(&a);', 'HAVE_AIO_RETURN64', msg='Checking for aio_return64', headers='aio.h', lib='aio rt') - conf.CHECK_CODE('struct aiocb a; return aio_error64(&a);', 'HAVE_AIO_ERROR64', msg='Checking for aio_error64', headers='aio.h', lib='aio rt') - conf.CHECK_CODE('struct aiocb a; return aio_cancel64(1, &a);', 'HAVE_AIO_CANCEL64', msg='Checking for aio_cancel64', headers='aio.h', lib='aio rt') - conf.CHECK_CODE('struct aiocb a; return aio_suspend64(&a, 1, NULL);', 'HAVE_AIO_SUSPEND64', msg='Checking for aio_suspend64', headers='aio.h', lib='aio rt') + conf.CHECK_CODE('const struct aiocb * const a[1]; struct timespec t; return aio_suspend(&a, 1, &t);', 'HAVE_AIO_SUSPEND', msg='Checking for aio_suspend', headers='aio.h', lib='aio rt') if not conf.CONFIG_SET('HAVE_AIO'): conf.DEFINE('HAVE_NO_AIO', '1') else: conf.DEFINE('HAVE_NO_AIO', '1') + if host_os.rfind('linux') > -1: + conf.CHECK_FUNCS_IN('io_submit', 'aio') + conf.CHECK_CODE(''' +struct io_event ioev; +struct iocb *ioc; +io_context_t ctx; +struct timespec ts; +int fd; +char *buf; +fd = eventfd(0, EFD_NONBLOCK | EFD_CLOEXEC); +io_queue_init(128,&ctx); +io_prep_pwrite(ioc, 1, buf, 1, 0); +io_prep_pread(ioc, 1, buf, 1, 0); +io_set_eventfd(ioc, fd); +io_set_callback(ioc, (io_callback_t)(0)); +io_submit(ctx, 1, &ioc); +io_getevents(ctx, 1, 1, &ioev, &ts); +''', + 'HAVE_LINUX_KERNEL_AIO', + msg='Checking for linux kernel asynchronous io support', + headers='unistd.h stdlib.h sys/types.h fcntl.h sys/eventfd.h libaio.h', + lib='aio') + conf.CHECK_CODE(''' struct msghdr msg; union { - struct cmsghdr cm; + struct cmsghdr cm; char control[CMSG_SPACE(sizeof(int))]; } control_un; msg.msg_control = control_un.control; msg.msg_controllen = sizeof(control_un.control); ''', - 'HAVE_MSGHDR_MSG_CONTROL', - msg='Checking if we can use msg_control for passing file descriptors', - headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h') + 'HAVE_MSGHDR_MSG_CONTROL', + msg='Checking if we can use msg_control for passing file descriptors', + headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h') conf.CHECK_CODE(''' struct msghdr msg; int fd; msg.msg_acctrights = (caddr_t) &fd; msg.msg_acctrightslen = sizeof(fd); ''', - 'HAVE_MSGHDR_MSG_ACCTRIGHTS', - msg='Checking if we can use msg_acctrights for passing file descriptors', - headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h') + 'HAVE_MSGHDR_MSG_ACCTRIGHTS', + msg='Checking if we can use msg_acctrights for passing file descriptors', + headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h') if Options.options.with_winbind: conf.env.build_winbind = True @@ -441,12 +570,6 @@ msg.msg_acctrightslen = sizeof(fd); conf.find_program('awk', var='AWK') conf.find_program('perl', var='PERL') - # Darwin has extra options to xattr-family functions - conf.CHECK_CODE('getxattr(0, 0, 0, 0, 0, 0);', - 'XATTR_ADD_OPT', - msg="Checking whether xattr interface takes additional options", - headers='sys/types.h attr/xattr.h sys/xattr.h') - conf.CHECK_HEADERS('asm/types.h') conf.CHECK_CODE('dev_t dev; int i = major(dev); return 0', "HAVE_DEVICE_MAJOR_FN", @@ -487,7 +610,7 @@ msg.msg_acctrightslen = sizeof(fd); # we would normally use --libs here, but cups-config incorrectly adds # gssapi_krb5 and other libraries to its --libs output. That breaks the use # of an in-tree heimdal kerberos - conf.check_cfg(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags", + conf.check_cfg(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags", package="", uselib_store="CUPS") conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups') conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', 'cups') @@ -501,7 +624,7 @@ msg.msg_acctrightslen = sizeof(fd); conf.SET_TARGET_TYPE('cups', 'EMPTY') if Options.options.with_iprint: - if conf.CONFIG_SET('HAVE_CUPS'): + if conf.CONFIG_SET('HAVE_CUPS'): conf.DEFINE('HAVE_IPRINT', '1') else: Logs.warn("--enable-iprint=yes but cups support not sufficient") @@ -535,7 +658,7 @@ msg.msg_acctrightslen = sizeof(fd); conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '2') # last but not least, if ldap_init() exists, we want to use ldap - if conf.CONFIG_SET('HAVE_LDAP_INIT'): + if conf.CONFIG_SET('HAVE_LDAP_INIT') and conf.CONFIG_SET('HAVE_LDAP_H'): conf.DEFINE('HAVE_LDAP', '1') conf.DEFINE('LDAP_DEPRECATED', '1') conf.env['HAVE_LDAP'] = '1' @@ -544,255 +667,127 @@ msg.msg_acctrightslen = sizeof(fd); if conf.CONFIG_SET('HAVE_BER_SOCKBUF_ADD_IO') and \ conf.CONFIG_SET('HAVE_LDAP_OPT_SOCKBUF'): conf.DEFINE('HAVE_LDAP_SASL_WRAPPING', '1') + else: + conf.fatal("LDAP support not found. " + "Try installing libldap2-dev or openldap-devel. " + "Otherwise, use --without-ldap to build without " + "LDAP support. " + "LDAP support is required for the LDAP passdb backend, " + "LDAP idmap backends and ADS. " + "ADS support improves communication with " + "Active Directory domain controllers.") else: conf.SET_TARGET_TYPE('ldap', 'EMPTY') conf.SET_TARGET_TYPE('lber', 'EMPTY') - # Check for kerberos - have_gssapi=False - if Options.options.with_mit_krb5_checks and conf.env.developer: - Logs.info("Looking for kerberos features") - conf.find_program('krb5-config', var='KRB5_CONFIG') - if conf.env.KRB5_CONFIG: - conf.check_cfg(path="krb5-config", args="--cflags --libs", - package="gssapi", uselib_store="KRB5") - conf.CHECK_HEADERS('krb5.h krb5/locate_plugin.h', lib='krb5') - conf.CHECK_HEADERS('gssapi.h gssapi/gssapi_generic.h gssapi/gssapi.h gssapi/gssapi_ext.h gssapi/gssapi_krb5.h com_err.h', lib='krb5') - - if conf.CONFIG_SET('HAVE_KRB5_LOCATE_PLUGIN_H'): - conf.env['WINBIND_KRB5_LOCATOR'] = 'bin/winbind_krb5_locator.so' - - conf.CHECK_FUNCS_IN('_et_list', 'com_err') - conf.CHECK_FUNCS_IN('krb5_encrypt_data', 'k5crypto') - conf.CHECK_FUNCS_IN('des_set_key','crypto') - conf.CHECK_FUNCS_IN('copy_Authenticator', 'asn1') - conf.CHECK_FUNCS_IN('roken_getaddrinfo_hostspec', 'roken') - if conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi') or \ - conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi_krb5'): - have_gssapi=True - conf.CHECK_FUNCS_IN('gss_wrap_iov gss_krb5_import_cred gss_get_name_attribute gss_mech_krb5 gss_oid_equal gss_inquire_sec_context_by_oid', 'gssapi gssapi_krb5 krb5') - conf.CHECK_FUNCS_IN('krb5_mk_req_extended krb5_kt_compare', 'krb5') - conf.CHECK_FUNCS(''' -krb5_set_real_time krb5_set_default_in_tkt_etypes krb5_set_default_tgs_enctypes -krb5_set_default_tgs_ktypes krb5_principal2salt krb5_use_enctype -krb5_string_to_key krb5_get_pw_salt krb5_string_to_key_salt krb5_auth_con_setkey -krb5_auth_con_setuseruserkey krb5_locate_kdc krb5_get_permitted_enctypes -krb5_get_default_in_tkt_etypes krb5_free_data_contents -krb5_principal_get_comp_string krb5_free_unparsed_name -krb5_free_keytab_entry_contents krb5_kt_free_entry krb5_krbhst_init -krb5_krbhst_get_addrinfo krb5_c_enctype_compare krb5_enctypes_compatible_keys -krb5_crypto_init krb5_crypto_destroy krb5_decode_ap_req free_AP_REQ -krb5_verify_checksum krb5_c_verify_checksum krb5_principal_compare_any_realm -krb5_parse_name_norealm krb5_princ_size krb5_get_init_creds_opt_set_pac_request -krb5_get_renewed_creds krb5_get_kdc_cred krb5_free_error_contents -initialize_krb5_error_table krb5_get_init_creds_opt_alloc -krb5_get_init_creds_opt_free krb5_get_init_creds_opt_get_error -krb5_enctype_to_string krb5_fwd_tgt_creds krb5_auth_con_set_req_cksumtype -krb5_get_creds_opt_alloc krb5_get_creds_opt_set_impersonate krb5_get_creds -krb5_get_credentials_for_user krb5_get_host_realm krb5_free_host_realm''', - lib='krb5 k5crypto') - conf.CHECK_DECLS('''krb5_get_credentials_for_user - krb5_auth_con_set_req_cksumtype''', - headers='krb5.h', always=True) - conf.CHECK_VARIABLE('AP_OPTS_USE_SUBKEY', headers='krb5.h') - conf.CHECK_VARIABLE('KV5M_KEYTAB', headers='krb5.h') - conf.CHECK_VARIABLE('KRB5_KU_OTHER_CKSUM', headers='krb5.h') - conf.CHECK_VARIABLE('KRB5_KEYUSAGE_APP_DATA_CKSUM', headers='krb5.h') - conf.CHECK_STRUCTURE_MEMBER('krb5_keytab_entry', 'key', headers='krb5.h', - define='HAVE_KRB5_KEYTAB_ENTRY_KEY') - conf.CHECK_STRUCTURE_MEMBER('krb5_keytab_entry', 'keyblock', headers='krb5.h', - define='HAVE_KRB5_KEYTAB_ENTRY_KEYBLOCK') - conf.CHECK_STRUCTURE_MEMBER('krb5_address', 'magic', headers='krb5.h', - define='HAVE_MAGIC_IN_KRB5_ADDRESS') - conf.CHECK_STRUCTURE_MEMBER('krb5_address', 'addrtype', headers='krb5.h', - define='HAVE_ADDRTYPE_IN_KRB5_ADDRESS') - conf.CHECK_STRUCTURE_MEMBER('krb5_ticket', 'enc_part2', headers='krb5.h', - define='HAVE_KRB5_TKT_ENC_PART2') - conf.CHECK_STRUCTURE_MEMBER('krb5_creds', 'keyblock', headers='krb5.h', - define='HAVE_KRB5_KEYBLOCK_IN_CREDS') - conf.CHECK_STRUCTURE_MEMBER('krb5_creds', 'session', headers='krb5.h', - define='HAVE_KRB5_SESSION_IN_CREDS') - conf.CHECK_STRUCTURE_MEMBER('krb5_ap_req', 'ticket', headers='krb5.h', - define='HAVE_TICKET_POINTER_IN_KRB5_AP_REQ') - - conf.CHECK_TYPE('krb5_encrypt_block', headers='krb5.h') - - conf.CHECK_CODE(''' -krb5_ticket ticket; -krb5_kvno kvno; -krb5_enctype enctype; -enctype = ticket.enc_part.enctype; -kvno = ticket.enc_part.kvno; -''', - 'KRB5_TICKET_HAS_KEYINFO', - headers='krb5.h', link=False, - msg="Checking whether the krb5_ticket structure contains the kvno and enctype") - conf.CHECK_CODE(''' -krb5_context ctx; -krb5_get_init_creds_opt *opt = NULL; -krb5_get_init_creds_opt_free(ctx, opt); -''', - 'KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT', - headers='krb5.h', link=False, - msg="Checking whether krb5_get_init_creds_opt_free takes a context argument") - conf.CHECK_CODE('krb5_mk_error(0,0,0)', - 'HAVE_SHORT_KRB5_MK_ERROR_INTERFACE', - headers='krb5.h', link=False, - msg="Checking whether krb5_mk_error takes 3 arguments MIT or 9 Heimdal") - conf.CHECK_CODE(''' -const krb5_data *pkdata; -krb5_context context; -krb5_principal principal; -pkdata = krb5_princ_component(context, principal, 0); -''', - 'HAVE_KRB5_PRINC_COMPONENT', - headers='krb5.h', lib='krb5', - msg="Checking whether krb5_princ_component is available") - - conf.CHECK_CODE(''' -int main(void) { -char buf[256]; -krb5_enctype_to_string(1, buf, 256); -return 0; -}''', - 'HAVE_KRB5_ENCTYPE_TO_STRING_WITH_SIZE_T_ARG', - headers='krb5.h', lib='krb5 k5crypto', - addmain=False, cflags='-Werror', - msg="Checking whether krb5_enctype_to_string takes size_t argument") - - conf.CHECK_CODE(''' -int main(void) { -krb5_context context = NULL; -char *str = NULL; -krb5_enctype_to_string(context, 1, &str); -if (str) free (str); -return 0; -}''', - 'HAVE_KRB5_ENCTYPE_TO_STRING_WITH_KRB5_CONTEXT_ARG', - headers='krb5.h stdlib.h', lib='krb5', - addmain=False, cflags='-Werror', - msg="Checking whether krb5_enctype_to_string takes krb5_context argument") - conf.CHECK_CODE(''' -int main(void) { -krb5_context ctx = NULL; -krb5_principal princ = NULL; -const char *str = krb5_princ_realm(ctx, princ)->data; -return 0; -}''', - 'HAVE_KRB5_PRINC_REALM', - headers='krb5.h', lib='krb5', - addmain=False, - msg="Checking whether the macro krb5_princ_realm is defined") - conf.CHECK_CODE(''' -int main(void) { - krb5_context context; - krb5_principal principal; - const char *realm; realm = krb5_principal_get_realm(context, principal); - return 0; -}''', - 'HAVE_KRB5_PRINCIPAL_GET_REALM', - headers='krb5.h', lib='krb5', - addmain=False, - msg="Checking whether krb5_principal_get_realm is defined") - if conf.CHECK_CODE('''krb5_verify_checksum(0, 0, 0, 0, 0, 0, 0);''', - 'KRB5_VERIFY_CHECKSUM_ARGS', - headers='krb5.h', lib='krb5', - msg="Checking whether krb5_verify_checksum takes 7 arguments"): - conf.DEFINE('KRB5_VERIFY_CHECKSUM_ARGS', '7') - else: - conf.DEFINE('KRB5_VERIFY_CHECKSUM_ARGS', '6') - - conf.CHECK_CODE(''' -krb5_enctype enctype; -enctype = ENCTYPE_ARCFOUR_HMAC_MD5; -''', - '_HAVE_ENCTYPE_ARCFOUR_HMAC_MD5', - headers='krb5.h', lib='krb5', - msg="Checking whether the ENCTYPE_ARCFOUR_HMAC_MD5 key type definition is available"); - conf.CHECK_CODE(''' -krb5_keytype keytype; -keytype = KEYTYPE_ARCFOUR_56; -''', - '_HAVE_KEYTYPE_ARCFOUR_56', - headers='krb5.h', lib='krb5', - msg="Checking whether the HAVE_KEYTYPE_ARCFOUR_56 key type definition is available"); - if conf.CONFIG_SET('_HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and conf.CONFIG_SET('_HAVE_KEYTYPE_ARCFOUR_56'): - conf.DEFINE('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5', '1') - - conf.CHECK_CODE(''' -krb5_enctype enctype; -enctype = ENCTYPE_ARCFOUR_HMAC; -''', - 'HAVE_ENCTYPE_ARCFOUR_HMAC', - headers='krb5.h', lib='krb5', - msg="Checking whether the ENCTYPE_ARCFOUR_HMAC key type definition is available"); - - conf.CHECK_CODE(''' -krb5_context context; -krb5_keytab keytab; -krb5_init_context(&context); -return krb5_kt_resolve(context, "WRFILE:api", &keytab); -''', - 'HAVE_WRFILE_KEYTAB', - headers='krb5.h', lib='krb5', execute=True, - msg="Checking whether the WRFILE:-keytab is supported"); - - # Check for KRB5_DEPRECATED handling - conf.CHECK_CODE('''#define KRB5_DEPRECATED 1 -#include ''', - 'HAVE_KRB5_DEPRECATED_WITH_IDENTIFIER', addmain=False, - link=False, - msg="Checking for KRB5_DEPRECATED define taking an identifier") - - if Options.options.with_ads: - use_ads=True + if Options.options.with_ads == False: + use_ads = False + use_ads_krb5 = False + use_ads_ldap = False + else: + use_ads = True + use_ads_krb5 = True + use_ads_ldap = True if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \ not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'): Logs.warn("arcfour-hmac-md5 encryption type not found in -lkrb5") - use_ads=False + use_ads_krb5 = False if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'): Logs.warn("krb5_mk_req_extended not found in -lkrb5") - use_ads=False + use_ads_krb5 = False + if not conf.CONFIG_SET('HAVE_KRB5_GET_HOST_REALM'): + Logs.warn("krb5_get_host_realm not found in -lkrb5") + use_ads_krb5 = False + if not conf.CONFIG_SET('HAVE_KRB5_FREE_HOST_REALM'): + Logs.warn("krb5_free_host_realm not found in -lkrb5") + use_ads_krb5 = False + if not conf.CONFIG_SET('HAVE_KRB5_FWD_TGT_CREDS'): + Logs.warn("krb5_fwd_tgt_creds found in -lkrb5") + use_ads_krb5 = False + if not conf.CONFIG_SET('HAVE_KRB5_GET_INIT_CREDS_OPT_ALLOC'): + Logs.warn("krb5_get_init_creds_opt_alloc not found in -lkrb5") + use_ads_krb5 = False + if not conf.CONFIG_SET('KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT'): + Logs.warn("krb5_get_init_creds_opt_free was not found or was too old in -lkrb5") + use_ads_krb5 = False + if not conf.CONFIG_SET('HAVE_KRB5_GET_RENEWED_CREDS'): + Logs.warn("krb5_get_renewed_creds not found in -lkrb5") + use_ads_krb5 = False + if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL_COMPARE_ANY_REALM'): + Logs.warn("krb5_principal_compare_any_realm not found in -lkrb5") + use_ads_krb5 = False + if not conf.CONFIG_SET('HAVE_KRB5_C_STRING_TO_KEY') and \ + not conf.CONFIG_SET('HAVE_KRB5_STRING_TO_KEY_SALT'): + Logs.warn("krb5_c_string_to_key not found in -lkrb5") + use_ads_krb5 = False if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \ not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'): Logs.warn("no CREATE_KEY_FUNCTIONS detected") - use_ads=False + use_ads_krb5 = False if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \ not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'): Logs.warn("no GET_ENCTYPES_FUNCTIONS detected") - use_ads=False + use_ads_krb5 = False if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \ not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'): Logs.warn("no KT_FREE_FUNCTION detected") - use_ads=False - if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM') and \ - not conf.CONFIG_SET('HAVE_KRB5_VERIFY_CHECKSUM'): - Logs.warn("no KRB5_VERIFY_CHECKSUM_FUNCTION detected") - use_ads=False - if not conf.CONFIG_SET('KRB5_TICKET_HAS_KEYINFO'): - # We only need the following functions if we can't get the enctype - # and kvno out of the ticket directly (ie. on Heimdal). - if not conf.CONFIG_SET('HAVE_FREE_AP_REQ'): - Logs.warn("no KRB5_AP_REQ_FREE_FUNCTION detected") - use_ads=False - if not conf.CONFIG_SET('HAVE_KRB5_DECODE_AP_REQ'): - Logs.warn("no KRB5_AP_REQ_DECODING_FUNCTION detected") - use_ads=False - if use_ads: - conf.DEFINE('WITH_ADS', '1') + use_ads_krb5 = False + if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM'): + Logs.warn("krb5_c_verify_checksum_compare not found in -lkrb5") + use_ads_krb5 = False + + # We don't actually use + # gsskrb5_extract_authz_data_from_sec_context, but it is a + # clue that this Heimdal, which does the PAC processing we + # need on the standard gss_inquire_sec_context_by_oid + if not conf.CONFIG_SET('HAVE_GSS_GET_NAME_ATTRIBUTE') and \ + not (conf.CONFIG_SET('HAVE_GSSKRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT') and \ + conf.CONFIG_SET('HAVE_GSS_INQUIRE_SEC_CONTEXT_BY_OID')): + Logs.warn("need either gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support") + use_ads_krb5 = False + + if not conf.CONFIG_SET('HAVE_GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT'): + Logs.warn("need gss_krb5_export_lucid_sec_context for SPNEGO and gss_wrap support") + use_ads_krb5 = False + + if use_ads_krb5: conf.DEFINE('HAVE_KRB5', '1') - if have_gssapi: - conf.DEFINE('HAVE_GSSAPI', '1') - if conf.CONFIG_SET('HAVE_LDAP'): - conf.env['HAVE_ADS'] = '1' + conf.env['HAVE_KRB5'] = '1' else: - Logs.warn("krb5 libs don't have all features required for Active Directory support") conf.undefine('HAVE_KRB5_H') conf.undefine('HAVE_GSSAPI_H') conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H') conf.undefine('HAVE_GSSAPI_GSSAPI_H') + use_ads = False + + if not conf.CONFIG_SET('HAVE_LDAP'): + use_ads = False + use_ads_ldap = False + + if use_ads: + conf.DEFINE('WITH_ADS', '1') + conf.env['HAVE_ADS'] = '1' + Logs.info("Building with Active Directory support.") + elif Options.options.with_ads == False: + Logs.info("Building without Active Directory support (--without-ads).") + else: + if not use_ads_krb5: + Logs.warn("Active Directory support not available: krb5 libs don't have all required features") + if not use_ads_ldap: + Logs.warn("Active Directory support not available: LDAP support is not available.") + if Options.options.with_ads: + conf.fatal("Active Directory support not found. Use --without-ads " + "for building without Active Directory support. " + "ADS support improves communication with " + "Active Directory domain controllers.") + else: + # this is the auto-mode case + Logs.warn("Building without Active Directory support.") + if Options.options.with_utmp: + conf.env.with_utmp = True + if not conf.CHECK_HEADERS('utmp.h'): conf.env.with_utmp = False conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent') conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_name', headers='utmp.h', define='HAVE_UT_UT_NAME') @@ -812,16 +807,21 @@ return krb5_kt_resolve(context, "WRFILE:api", &keytab); define='HAVE_UT_UT_PID') conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_exit.e_exit', headers='utmp.h', define='HAVE_UT_UT_EXIT') - conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_addr_v6', headers='utmp.h', - define='HAVE_UT_UT_ADDR_V6') - conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_addr', headers='utmp.h', - define='HAVE_UT_UT_ADDR') conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_syslen', headers='utmpx.h', define='HAVE_UX_UT_SYSLEN') conf.CHECK_CODE('struct utmp utarg; struct utmp *utreturn; utreturn = pututline(&utarg);', 'PUTUTLINE_RETURNS_UTMP', headers='utmp.h', msg="Checking whether pututline returns pointer") - conf.DEFINE('WITH_UTMP', 1) + conf.CHECK_SIZEOF(['((struct utmp *)NULL)->ut_line'], headers='utmp.h', + define='SIZEOF_UTMP_UT_LINE') + if not conf.CONFIG_SET('SIZEOF_UTMP_UT_LINE'): + conf.env.with_utmp = False + elif int(conf.env.SIZEOF_UTMP_UT_LINE) < 15: + conf.env.with_utmp = False + if conf.env.with_utmp: + conf.DEFINE('WITH_UTMP', 1) + else: + Logs.warn("--with-utmp but utmp support not sufficient") if Options.options.with_avahi: conf.env.with_avahi = True @@ -855,7 +855,7 @@ return krb5_kt_resolve(context, "WRFILE:api", &keytab); conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h') conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h') conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam') - conf.CHECK_CODE(''' + conf.CHECK_CODE(''' #if defined(HAVE_SECURITY_PAM_APPL_H) #include #elif defined(HAVE_PAM_PAM_APPL_H) @@ -866,7 +866,7 @@ pam_set_item(0, PAM_RHOST, 0); 'HAVE_PAM_RHOST', lib='pam', msg="Checking whether PAM_RHOST is available"); - conf.CHECK_CODE(''' + conf.CHECK_CODE(''' #if defined(HAVE_SECURITY_PAM_APPL_H) #include #elif defined(HAVE_PAM_PAM_APPL_H) @@ -877,7 +877,7 @@ pam_set_item(0, PAM_TTY, 0); 'HAVE_PAM_TTY', lib='pam', msg="Checking whether PAM_TTY is available"); - conf.CHECK_CODE(''' + conf.CHECK_CODE(''' #if (!defined(LINUX)) #define PAM_EXTERN extern @@ -914,59 +914,123 @@ int i; i = PAM_RADIO_TYPE; conf.DEFINE('WITH_PAM', 1) conf.DEFINE('WITH_PAM_MODULES', 1) + if Options.options.with_pam_smbpass: + conf.env.with_pam_smbpass = True + seteuid = False + +# +# Ensure we select the correct set of system calls on Linux. +# + if (host_os.rfind('linux') > -1): + conf.CHECK_CODE(''' +#if defined(HAVE_UNISTD_H) +#include +#endif +#include +#include +#include +#include + +#ifdef HAVE_SYS_PRIV_H +#include +#endif +#ifdef HAVE_SYS_ID_H +#include +#endif + +#if defined(HAVE_SYSCALL_H) +#include +#endif + +#if defined(HAVE_SYS_SYSCALL_H) +#include +#endif + +syscall(SYS_setresuid32, -1, -1, -1); +syscall(SYS_setresgid32, -1, -1, -1); +syscall(SYS_setreuid32, -1, -1); +syscall(SYS_setregid32, -1, -1); +syscall(SYS_setuid32, -1); +syscall(SYS_setgid32, -1); +syscall(SYS_setgroups32, 0, NULL); +''', + 'USE_LINUX_32BIT_SYSCALLS', + msg="Checking whether Linux should use 32-bit credential calls"); + + if (conf.CONFIG_SET('USE_LINUX_32BIT_SYSCALLS')): + seteuid = conf.CHECK_CODE(''' + #define AUTOCONF_TEST 1 + #define USE_LINUX_THREAD_CREDENTIALS 1 + #define USE_LINUX_32BIT_SYSCALLS 1 + #include "../lib/util/setid.c" + #include "./lib/util_sec.c" + ''', + 'USE_LINUX_THREAD_CREDENTIALS', + addmain=False, + execute=True, + msg="Checking whether we can use Linux thread-specific credentials with 32-bit system calls") + else: + seteuid = conf.CHECK_CODE(''' + #define AUTOCONF_TEST 1 + #define USE_LINUX_THREAD_CREDENTIALS 1 + #include "../lib/util/setid.c" + #include "./lib/util_sec.c" + ''', + 'USE_LINUX_THREAD_CREDENTIALS', + addmain=False, + execute=True, + msg="Checking whether we can use Linux thread-specific credentials") if not seteuid: seteuid = conf.CHECK_CODE(''' - #define AUTOCONF_TEST 1 - #define USE_SETREUID 1 - #include "./lib/util_sec.c" - ''', - 'USE_SETREUID', - addmain=False, - execute=True, - msg="Checking whether setreuid is available") + #define AUTOCONF_TEST 1 + #define USE_SETREUID 1 + #include "../lib/util/setid.c" + #include "./lib/util_sec.c" + ''', + 'USE_SETREUID', + addmain=False, + execute=True, + msg="Checking whether setreuid is available") if not seteuid: seteuid = conf.CHECK_CODE(''' - #define AUTOCONF_TEST 1 - #define USE_SETRESUID 1 - #include "./lib/util_sec.c" - ''', - 'USE_SETRESUID', - addmain=False, - execute=True, - msg="Checking whether setresuid is available") + #define AUTOCONF_TEST 1 + #define USE_SETRESUID 1 + #include "../lib/util/setid.c" + #include "./lib/util_sec.c" + ''', + 'USE_SETRESUID', + addmain=False, + execute=True, + msg="Checking whether setresuid is available") if not seteuid: seteuid = conf.CHECK_CODE(''' - #define AUTOCONF_TEST 1 - #define USE_SETEUID 1 - #include "./lib/util_sec.c" - ''', - 'USE_SETEUID', - addmain=False, - execute=True, - msg="Checking whether seteuid is available") + #define AUTOCONF_TEST 1 + #define USE_SETEUID 1 + #include "../lib/util/setid.c" + #include "./lib/util_sec.c" + ''', + 'USE_SETEUID', + addmain=False, + execute=True, + msg="Checking whether seteuid is available") if not seteuid: seteuid = conf.CHECK_CODE(''' - #define AUTOCONF_TEST 1 - #define USE_SETUIDX 1 - #include "./lib/util_sec.c" - ''', - 'USE_SETUIDX', - addmain=False, - execute=True, - mandatory=True, - msg="Checking whether setuidx is available") + #define AUTOCONF_TEST 1 + #define USE_SETUIDX 1 + #include "../lib/util/setid.c" + #include "./lib/util_sec.c" + ''', + 'USE_SETUIDX', + addmain=False, + execute=True, + mandatory=True, + msg="Checking whether setuidx is available") if Options.options.with_dnsupdate: - conf.CHECK_HEADERS('uuid/uuid.h') - conf.CHECK_FUNCS_IN('uuid_generate', 'uuid') - if not conf.CONFIG_SET('HAVE_UUID_UUID_H') and not conf.CONFIG_SET('HAVE_UUID_GENERATE'): - Logs.warn("--with-dnsupdate=yes but uuid support not sufficient") - elif not conf.CONFIG_SET('HAVE_GSSAPI'): + if not conf.CONFIG_SET('HAVE_KRB5'): Logs.warn("--with-dnsupdate=yes but gssapi support not sufficient") else: conf.DEFINE('WITH_DNS_UPDATES', 1) - else: - conf.SET_TARGET_TYPE('uuid', 'EMPTY') conf.CHECK_HEADERS('valgrind.h valgrind/valgrind.h valgrind/memcheck.h') if Options.options.developer: if conf.CONFIG_SET('HAVE_VALGRIND_H') or conf.CONFIG_SET('HAVE_VALGRIND_VALGRIND_H'): @@ -976,74 +1040,48 @@ int i; i = PAM_RADIO_TYPE; #include #include ''', - 'HAVE_LINUX_NETLINK_H', + 'HAVE_LINUX_NETLINK_H', msg="Checking whether Linux netlink is available"): + conf.CHECK_CODE(''' #include #include #include ''', - 'HAVE_LINUX_RTNETLINK_H', - msg='Checking whether Linux rtnetlink is available') - if conf.CHECK_TYPE('struct dirent64', headers='sys/types.h dirent.h') and conf.CONFIG_SET('HAVE_READDIR64'): - conf.DEFINE('HAVE_STRUCT_DIRENT64', '1') - else: - conf.undefine('HAVE_STRUCT_DIRENT64') + 'HAVE_LINUX_RTNETLINK_H', + msg='Checking whether Linux rtnetlink is available') conf.CHECK_CODE(''' #include "../tests/fcntl_lock.c" ''', - 'HAVE_FCNTL_LOCK', - addmain=False, - execute=True, - msg='Checking whether fcntl locking is available') - - conf.CHECK_CODE(''' -#include "../tests/fcntl_lock64.c" -''', - 'HAVE_BROKEN_FCNTL64_LOCKS', - addmain=False, - execute=True, - msg='Checking whether fcntl64 locks are broken') + 'HAVE_FCNTL_LOCK', + addmain=False, + execute=True, + msg='Checking whether fcntl locking is available') - if not conf.CONFIG_SET('HAVE_BROKEN_FCNTL64_LOCKS'): - conf.CHECK_CODE(''' -#if defined(HAVE_UNISTD_H) -#include -#endif -#include +# glibc up to 2.3.6 had dangerously broken posix_fallocate(). DON'T USE IT. + if not conf.CHECK_CODE(''' +#define _XOPEN_SOURCE 600 #include - -#ifdef HAVE_FCNTL_H -#include -#endif - -#ifdef HAVE_SYS_FCNTL_H -#include +#if defined(__GLIBC__) && ((__GLIBC__ < 2) || (__GLIBC__ == 2 && __GLIBC_MINOR__ < 4)) +#error probably broken posix_fallocate #endif -main() { struct flock64 fl64; -#if defined(F_SETLKW64) && defined(F_SETLK64) && defined(F_GETLK64) -exit(0); -#else -exit(1); -#endif -} ''', - 'HAVE_STRUCT_FLOCK64', - addmain=False, - execute=True, - msg="Checking whether the flock64 struct is available") + '_HAVE_UNBROKEN_POSIX_FALLOCATE', + msg='Checking for broken posix_fallocate'): + conf.DEFINE('HAVE_BROKEN_POSIX_FALLOCATE', '1') + conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtim.tv_nsec', - define='HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') # Linux, Solaris + define='HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') # Linux, Solaris conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimensec', - define='HAVE_STRUCT_STAT_ST_MTIMENSEC') # BSD, if defined _POSIX_SOURCE + define='HAVE_STRUCT_STAT_ST_MTIMENSEC') # BSD, if defined _POSIX_SOURCE conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimespec.tv_nsec', - define='HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') # BSD, if not defined _POSIX_SOURCE + define='HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') # BSD, if not defined _POSIX_SOURCE conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtime_n', - define='HAVE_STRUCT_STAT_ST_MTIME_N') # AIX + define='HAVE_STRUCT_STAT_ST_MTIME_N') # AIX conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_umtime', - define='HAVE_STRUCT_STAT_ST_UMTIME') # Tru64 + define='HAVE_STRUCT_STAT_ST_UMTIME') # Tru64 if conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') or \ conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMENSEC') or \ conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') or \ @@ -1053,52 +1091,50 @@ exit(1); # recent FreeBSD, NetBSD have creation timestamps called birthtime: conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtime', - define='HAVE_STRUCT_STAT_ST_BIRTHTIME') + define='HAVE_STRUCT_STAT_ST_BIRTHTIME') conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimespec.tv_nsec', - define='HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC') + define='HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC') conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimensec', - define='HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC') + define='HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC') conf.CHECK_CODE(''' ssize_t err = posix_fadvise(0,0,0x80000,POSIX_FADV_WILLNEED); ''', - 'HAVE_POSIX_FADVISE', - msg='Checking whether posix_fadvise is available', - headers='unistd.h fcntl.h') + 'HAVE_POSIX_FADVISE', + msg='Checking whether posix_fadvise is available', + headers='unistd.h fcntl.h') for v in ['_SC_NGROUPS_MAX', '_SC_NPROC_ONLN', '_SC_NPROCESSORS_ONLN', '_SC_PAGESIZE' ]: conf.CHECK_CODE(''' - #include - return sysconf(%s) == -1 ? 1 : 0; - ''' % v, - 'SYSCONF%s' % v, - msg='Checking whether sysconf(%s) is available' % v) - - conf.CHECK_DECLS('__NR_inotify_init', reverse=True, headers='asm/unistd.h') + #include + return sysconf(%s) == -1 ? 1 : 0; + ''' % v, + 'SYSCONF%s' % v, + msg='Checking whether sysconf(%s) is available' % v) conf.CHECK_CODE(''' #include #include syscall(SYS_initgroups, 16, NULL, NULL, 0); - ''', - 'HAVE_DARWIN_INITGROUPS', - msg='Checking whether to use the Darwin-specific initgroups system call') + ''', + 'HAVE_DARWIN_INITGROUPS', + msg='Checking whether to use the Darwin-specific initgroups system call') conf.CHECK_CODE('''struct utimbuf tbuf; tbuf.actime = 0; tbuf.modtime = 1; exit(utime("foo.c",&tbuf));''', - 'HAVE_UTIMBUF', - headers='sys/types.h utime.h', - msg='Checking whether struct utimbuf is available') + 'HAVE_UTIMBUF', + headers='sys/types.h utime.h', + msg='Checking whether struct utimbuf is available') if conf.CHECK_CODE('''struct sigevent s;''', - 'HAVE_STRUCT_SIGEVENT', - headers='sys/types.h stdlib.h stddef.h signal.h', - msg='Checking whether we have the struct sigevent'): + 'HAVE_STRUCT_SIGEVENT', + headers='sys/types.h stdlib.h stddef.h signal.h', + msg='Checking whether we have the struct sigevent'): conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sival_ptr', - define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIVAL_PTR', - headers='signal.h'); + define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIVAL_PTR', + headers='signal.h'); conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sigval_ptr', - define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIGVAL_PTR', - headers='signal.h'); + define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIGVAL_PTR', + headers='signal.h'); if os.path.exists('/proc/sys/kernel/core_pattern'): conf.DEFINE('HAVE_SYS_KERNEL_PROC_CORE_PATTERN', '1') @@ -1106,26 +1142,26 @@ syscall(SYS_initgroups, 16, NULL, NULL, 0); if conf.CHECK_CODE(''' #include main() { - struct tm *tm; - if (sizeof(time_t) == 8) { - time_t max_time = 0x7fffffffffffffffll; - tm = gmtime(&max_time); - /* This should fail with 32-bit tm_year. */ - if (tm == NULL) { - /* Max time_t that works with 32-bit int tm_year in struct tm. */ - max_time = 67768036191676799ll; - tm = gmtime(&max_time); - if (tm) { - exit(0); - } - } - } - exit(1); + struct tm *tm; + if (sizeof(time_t) == 8) { + time_t max_time = 0x7fffffffffffffffll; + tm = gmtime(&max_time); + /* This should fail with 32-bit tm_year. */ + if (tm == NULL) { + /* Max time_t that works with 32-bit int tm_year in struct tm. */ + max_time = 67768036191676799ll; + tm = gmtime(&max_time); + if (tm) { + exit(0); + } + } + } + exit(1); }''', - '__TIME_T_MAX', - addmain=False, - execute=True, - msg="Checking for the maximum value of the 'time_t' type"): + '__TIME_T_MAX', + addmain=False, + execute=True, + msg="Checking for the maximum value of the 'time_t' type"): conf.DEFINE('TIME_T_MAX', '67768036191676799ll') conf.CHECK_CODE(''' @@ -1135,9 +1171,9 @@ main() { #include main() { dev_t dev = makedev(1,2); return 0; } ''', - 'HAVE_MAKEDEV', - addmain=False, - msg='Checking whether the macro for makedev is available') + 'HAVE_MAKEDEV', + addmain=False, + msg='Checking whether the macro for makedev is available') conf.CHECK_CODE(''' #include @@ -1145,204 +1181,153 @@ main() { dev_t dev = makedev(1,2); return 0; } #include void exit_on_core(int ignored) { - exit(1); + exit(1); } main() { - char *newpath; - signal(SIGSEGV, exit_on_core); - newpath = realpath("/tmp", NULL); - exit((newpath != NULL) ? 0 : 1); + char *newpath; + signal(SIGSEGV, exit_on_core); + newpath = realpath("/tmp", NULL); + exit((newpath != NULL) ? 0 : 1); } ''', - 'REALPATH_TAKES_NULL', - addmain=False, - execute=True, - msg='Checking whether the realpath function allows a NULL argument') + 'REALPATH_TAKES_NULL', + addmain=False, + execute=True, + msg='Checking whether the realpath function allows a NULL argument') conf.CHECK_CODE('''#include "../tests/ftruncate.c"''', - 'HAVE_FTRUNCATE_EXTEND', - msg='Checking for ftruncate extend', - addmain=False, - execute=True) - if os.getenv('RUN_FROM_BUILD_FARM'): - Logs.info("enabling buildfarm hacks") - conf.DEFINE('ENABLE_BUILD_FARM_HACKS', '1') + 'HAVE_FTRUNCATE_EXTEND', + msg='Checking for ftruncate extend', + addmain=False, + execute=True) if Options.options.with_sendfile_support: if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('k*bsd*-gnu') > -1) or (host_os.rfind('kopensolaris*-gnu') > -1): conf.CHECK_CODE(''' - int tofd, fromfd; - off64_t offset; - size_t total; - ssize_t nwritten = sendfile64(tofd, fromfd, &offset, total); - ''', - '_HAVE_SENDFILE64', - headers='sys/sendfile', - msg='Checking for linux sendfile64 support') - conf.CHECK_CODE(''' - int tofd, fromfd; - off_t offset; - size_t total; - ssize_t nwritten = sendfile(tofd, fromfd, &offset, total); - ''', - '_HAVE_SENDFILE', - headers='sys/sendfile', - msg='Checking for linux sendfile support') - - # Try and cope with broken Linux sendfile.... - conf.CHECK_CODE('''#if defined(_FILE_OFFSET_BITS) && (_FILE_OFFSET_BITS == 64) - #undef _FILE_OFFSET_BITS - #endif - #include - int tofd, fromfd; - off_t offset; - size_t total; - ssize_t nwritten = sendfile(tofd, fromfd, &offset, total); - ''', - '_HAVE_BROKEN_LINUX_SENDFILE', - msg='Checking for broken linux sendfile support') - if conf.CONFIG_SET('_HAVE_SENDFILE64'): - conf.DEFINE('HAVE_SENDFILE64', '1') - conf.DEFINE('LINUX_SENDFILE_API', '1') - conf.DEFINE('WITH_SENDFILE', '1') - elif conf.CONFIG_SET('_HAVE_SENDFILE'): + int tofd, fromfd; + off_t offset; + size_t total; + ssize_t nwritten = sendfile(tofd, fromfd, &offset, total); + ''', + '_HAVE_SENDFILE', + headers='sys/sendfile.h', + msg='Checking for linux sendfile support') + + if conf.CONFIG_SET('_HAVE_SENDFILE'): conf.DEFINE('HAVE_SENDFILE', '1') conf.DEFINE('LINUX_SENDFILE_API', '1') conf.DEFINE('WITH_SENDFILE', '1') - elif conf.CONFIG_SET('_HAVE_BROKEN_LINUX_SENDFILE'): - conf.DEFINE('LINUX_BROKEN_SENDFILE_API', '1') - conf.DEFINE('WITH_SENDFILE', '1') - elif (host_os.rfind('freebsd') > -1) or (host_os.rfind('dragonfly') > -1): + elif (host_os.rfind('freebsd') > -1) or (host_os.rfind('dragonfly') > -1): conf.CHECK_CODE(''' - #include - #include - #include - #include - int fromfd, tofd, ret, total=0; - off_t offset, nwritten; - struct sf_hdtr hdr; - struct iovec hdtrl; - hdr.headers = &hdtrl; - hdr.hdr_cnt = 1; - hdr.trailers = NULL; - hdr.trl_cnt = 0; - hdtrl.iov_base = NULL; - hdtrl.iov_len = 0; - ret = sendfile(fromfd, tofd, offset, total, &hdr, &nwritten, 0) - ''', - '_HAVE_SENDFILE', - msg='Checking for freebsd sendfile support') + #include + #include + #include + #include + int fromfd, tofd, ret, total=0; + off_t offset, nwritten; + struct sf_hdtr hdr; + struct iovec hdtrl; + hdr.headers = &hdtrl; + hdr.hdr_cnt = 1; + hdr.trailers = NULL; + hdr.trl_cnt = 0; + hdtrl.iov_base = NULL; + hdtrl.iov_len = 0; + ret = sendfile(fromfd, tofd, offset, total, &hdr, &nwritten, 0) + ''', + '_HAVE_SENDFILE', + msg='Checking for freebsd sendfile support') if conf.CONFIG_SET('_HAVE_SENDFILE'): conf.DEFINE('HAVE_SENDFILE', '1') conf.DEFINE('FREEBSD_SENDFILE_API', '1') conf.DEFINE('WITH_SENDFILE', '1') - elif (host_os.rfind('hpux') > -1): + elif (host_os.rfind('darwin') > -1): conf.CHECK_CODE(''' - #include - #include - int fromfd, tofd; - size_t total=0; - struct iovec hdtrl[2]; - ssize_t nwritten; - off64_t offset; - hdtrl[0].iov_base = 0; - hdtrl[0].iov_len = 0; - nwritten = sendfile64(tofd, fromfd, offset, total, &hdtrl[0], 0); - ''', - '_HAVE_SENDFILE64', - msg='Checking for hpux sendfile64 support') - conf.CHECK_CODE(''' - #include - #include - int fromfd, tofd; - size_t total=0; - struct iovec hdtrl[2]; - ssize_t nwritten; - off_t offset; - hdtrl[0].iov_base = 0; - hdtrl[0].iov_len = 0; - nwritten = sendfile(tofd, fromfd, offset, total, &hdtrl[0], 0); - ''', - '_HAVE_SENDFILE', - msg='Checking for hpux sendfile support') - if conf.CONFIG_SET('_HAVE_SENDFILE64'): - conf.DEFINE('HAVE_SENDFILE64', '1') - conf.DEFINE('HPUX_SENDFILE_API', '1') + #include + #include + #include + int fromfd, tofd, ret; + off_t offset, nwritten; + struct sf_hdtr hdr; + struct iovec hdtrl; + hdr.headers = &hdtrl; + hdr.hdr_cnt = 1; + hdr.trailers = (void *)0; + hdr.trl_cnt = 0; + hdtrl.iov_base = (void *)0; + hdtrl.iov_len = 0; + ret = sendfile(fromfd, tofd, offset, &nwritten, &hdr, 0); + ''', + '_HAVE_SENDFILE', + msg='Checking for darwin sendfile support') + if conf.CONFIG_SET('_HAVE_SENDFILE'): + conf.DEFINE('HAVE_SENDFILE', '1') + conf.DEFINE('DARWIN_SENDFILE_API', '1') conf.DEFINE('WITH_SENDFILE', '1') - elif conf.CONFIG_SET('_HAVE_SENDFILE'): + elif (host_os.rfind('hpux') > -1) or (host_os.rfind('osf') > -1): + conf.CHECK_CODE(''' + #include + #include + int fromfd, tofd; + size_t total=0; + struct iovec hdtrl[2]; + ssize_t nwritten; + off_t offset; + hdtrl[0].iov_base = 0; + hdtrl[0].iov_len = 0; + nwritten = sendfile(tofd, fromfd, offset, total, &hdtrl[0], 0); + ''', + '_HAVE_SENDFILE', + msg='Checking for osf/hpux sendfile support') + if conf.CONFIG_SET('_HAVE_SENDFILE'): conf.DEFINE('HAVE_SENDFILE', '1') conf.DEFINE('HPUX_SENDFILE_API', '1') conf.DEFINE('WITH_SENDFILE', '1') - elif (host_os.rfind('solaris') > -1): + elif (host_os.rfind('solaris') > -1): conf.CHECK_FUNCS_IN('sendfile', 'sendfilev') conf.CHECK_CODE(''' - #include - int sfvcnt; - size_t xferred; - struct sendfilevec vec[2]; - ssize_t nwritten; - int tofd; - sfvcnt = 2; - vec[0].sfv_fd = SFV_FD_SELF; - vec[0].sfv_flag = 0; - vec[0].sfv_off = 0; - vec[0].sfv_len = 0; - vec[1].sfv_fd = 0; - vec[1].sfv_flag = 0; - vec[1].sfv_off = 0; - vec[1].sfv_len = 0; - nwritten = sendfilev64(tofd, vec, sfvcnt, &xferred); - ''', - '_HAVE_SENDFILEV64', - msg='Checking for solaris sendfilev64 support') - conf.CHECK_CODE(''' - #include , - int sfvcnt; - size_t xferred; - struct sendfilevec vec[2]; - ssize_t nwritten; - int tofd; - sfvcnt = 2; - vec[0].sfv_fd = SFV_FD_SELF; - vec[0].sfv_flag = 0; - vec[0].sfv_off = 0; - vec[0].sfv_len = 0; - vec[1].sfv_fd = 0; - vec[1].sfv_flag = 0; - vec[1].sfv_off = 0; - vec[1].sfv_len = 0; - nwritten = sendfilev(tofd, vec, sfvcnt, &xferred); - ''', - '_HAVE_SENDFILEV', - msg='Checking for solaris sendfilev support') - if conf.CONFIG_SET('_HAVE_SENDFILEV64'): - conf.DEFINE('HAVE_SENDFILEV64', '1') - conf.DEFINE('SOLARIS_SENDFILE_API', '1') - conf.DEFINE('WITH_SENDFILE', '1') - elif conf.CONFIG_SET('_HAVE_SENDFILEV'): + #include , + int sfvcnt; + size_t xferred; + struct sendfilevec vec[2]; + ssize_t nwritten; + int tofd; + sfvcnt = 2; + vec[0].sfv_fd = SFV_FD_SELF; + vec[0].sfv_flag = 0; + vec[0].sfv_off = 0; + vec[0].sfv_len = 0; + vec[1].sfv_fd = 0; + vec[1].sfv_flag = 0; + vec[1].sfv_off = 0; + vec[1].sfv_len = 0; + nwritten = sendfilev(tofd, vec, sfvcnt, &xferred); + ''', + '_HAVE_SENDFILEV', + msg='Checking for solaris sendfilev support') + if conf.CONFIG_SET('_HAVE_SENDFILEV'): conf.DEFINE('HAVE_SENDFILEV', '1') conf.DEFINE('SOLARIS_SENDFILE_API', '1') conf.DEFINE('WITH_SENDFILE', '1') - elif (host_os.rfind('aix') > -1): + elif (host_os.rfind('aix') > -1): conf.CHECK_CODE(''' - #include - int fromfd, tofd; - size_t total=0; - struct sf_parms hdtrl; - ssize_t nwritten; - off64_t offset; - hdtrl.header_data = 0; - hdtrl.header_length = 0; - hdtrl.file_descriptor = fromfd; - hdtrl.file_offset = 0; - hdtrl.file_bytes = 0; - hdtrl.trailer_data = 0; - hdtrl.trailer_length = 0; - nwritten = send_file(&tofd, &hdtrl, 0); - ''', - '_HAVE_SENDFILE', - msg='Checking for AIX send_file support') + #include + int fromfd, tofd; + size_t total=0; + struct sf_parms hdtrl; + ssize_t nwritten; + hdtrl.header_data = 0; + hdtrl.header_length = 0; + hdtrl.file_descriptor = fromfd; + hdtrl.file_offset = 0; + hdtrl.file_bytes = 0; + hdtrl.trailer_data = 0; + hdtrl.trailer_length = 0; + nwritten = send_file(&tofd, &hdtrl, 0); + ''', + '_HAVE_SENDFILE', + msg='Checking for AIX send_file support') if conf.CONFIG_SET('_HAVE_SENDFILE'): conf.DEFINE('HAVE_SENDFILE', '1') conf.DEFINE('AIX_SENDFILE_API', '1') @@ -1352,7 +1337,7 @@ main() { conf.CHECK_CODE(''' #include main() { - char *s = getcwd(NULL,0); + char *s = getcwd(NULL,0); exit(s != NULL ? 0 : 1); }''', 'GETCWD_TAKES_NULL', addmain=False, execute=True, msg="getcwd takes a NULL argument") @@ -1366,22 +1351,96 @@ main() { if Options.options.with_quotas: # For quotas on Veritas VxFS filesystems conf.CHECK_HEADERS('sys/fs/vx_quota.h') - # For quotas on Linux XFS filesystems - conf.CHECK_HEADERS('linux/dqblk_xfs.h') # For sys/quota.h and linux/quota.h conf.CHECK_HEADERS('sys/quota.h') + # For quotas on BSD systems + conf.CHECK_HEADERS('ufs/ufs/quota.h') + # For quotas on Linux XFS filesystems + if conf.CHECK_HEADERS('xfs/xqm.h'): + conf.DEFINE('HAVE_XFS_QUOTAS', '1') + else: + # For Irix XFS + conf.CHECK_CODE(''' + #include "confdefs.h" + #ifdef HAVE_SYS_TYPES_H + #include + #endif + #ifdef HAVE_ASM_TYPES_H + #include + #endif + #include + int i = Q_XGETQUOTA;''', + define='HAVE_XFS_QUOTAS', + msg='for XFS QUOTA in ', + execute=False, + local_include=False) + + # For IRIX like dqb_isoftlimit instead of dqb_fsoftlimit in struc dqblk + conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_fsoftlimit', define='HAVE_DQB_FSOFTLIMIT', + headers='sys/quota.h') + #darwin style quota bytecount + conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_curbytes', define='HAVE_STRUCT_DQBLK_DQB_CURBYTES', + headers='sys/quota.h') + if conf.CHECK_HEADERS('rpcsvc/rquota.h'): + conf.DEFINE('HAVE_NFS_QUOTAS', '1') + conf.CHECK_STRUCTURE_MEMBER('struct getquota_rslt', 'getquota_rslt_u', + define='HAVE_GETQUOTA_RSLT_GETQUOTA_RSLT_U', + headers='rpcsvc/rquota.h') + + if (host_os.rfind('linux') > -1): + conf.DEFINE('HAVE_QUOTACTL_LINUX', '1') + elif not conf.CONFIG_SET("HAVE_XFS_QUOTAS"): + if not conf.CHECK_CODE(''' + #define HAVE_QUOTACTL_4A 1 + #define AUTOCONF_TEST 1 + #include "../tests/sysquotas.c" + ''', + cflags=conf.env['WERROR_CFLAGS'], + define='HAVE_QUOTACTL_4A', + msg='for QUOTACTL_4A: long quotactl(int cmd, char *special, qid_t id, caddr_t addr)', + execute=True, + addmain=False): + + conf.CHECK_CODE(''' + #define HAVE_QUOTACTL_4B 1 + #define AUTOCONF_TEST 1 + #include "../tests/sysquotas.c" + ''', + cflags=conf.env['WERROR_CFLAGS'], + define='HAVE_QUOTACTL_4B', + msg='for QUOTACTL_4B: int quotactl(const char *path, int cmd, int id, char *addr)', + execute=True, + addmain=False) + conf.CHECK_CODE(''' + clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp"); +''', + headers="rpc/rpc.h rpc/types.h rpcsvc/rquota.h rpc/nettype.h rpc/xdr.h", + define='HAVE_NFS_QUOTAS', + msg='for NFS QUOTAS', + execute=True, + local_include=False) + + if conf.CONFIG_SET('HAVE_QUOTACTL_LINUX') or \ + conf.CONFIG_SET('HAVE_QUOTACTL_4A') or \ + conf.CONFIG_SET('HAVE_QUOTACTL_4B') or \ + conf.CONFIG_SET('HAVE_XFS_QUOTAS'): + conf.DEFINE('HAVE_SYS_QUOTAS', '1') + conf.DEFINE('WITH_QUOTAS', '1') # # checking for clustering extensions (CTDB) # - if not Options.options.with_cluster_support: + if Options.options.with_cluster_support == False: + # configure is called with --without-cluster-support, + # so don't check for and build w/o ctdb support. have_cluster_support = False else: - if Options.options.ctdb_dir: - conf.ADD_EXTRA_INCLUDES(Options.options.ctdb_dir + '/include') + have_cluster_support = True + ctdb_broken = "" + CTDB_CFLAGS = "" srcdir = os.path.realpath(conf.srcdir) if 'EXTRA_INCLUDES' in conf.env: @@ -1389,8 +1448,15 @@ main() { else: includes = '' - have_cluster_support = True - ctdb_broken = "" + if Options.options.ctdb_dir: + CTDB_CFLAGS = '-I' + Options.options.ctdb_dir + '/include' + includes = includes + ' ' + Options.options.ctdb_dir + '/include' + + if not conf.env.USING_SYSTEM_TDB: + includes = includes + ' ' + srcdir + '/lib/tdb/include' + + if not conf.env.USING_SYSTEM_TALLOC: + includes = includes + ' ' + srcdir + '/lib/talloc' conf.CHECK_CODE(''' #define NO_CONFIG_H @@ -1442,6 +1508,28 @@ main() { have_cluster_support = False ctdb_broken = "ctdb_private.h is required for cluster support" + if have_cluster_support: + conf.CHECK_CODE(''' + #define NO_CONFIG_H + #include "replace.h" + #include "system/wait.h" + #include "system/network.h" + #define private #error __USED_RESERVED_WORD_private__ + #include + #include + #include + #include + + int main(void) + { + return 0; + } + ''', + 'HAVE_CTDB_PROTOCOL_H', + addmain=False, + includes=includes, + msg='Checking for header ctdb_protocol.h') + if have_cluster_support: conf.CHECK_CODE(''' #define NO_CONFIG_H @@ -1497,6 +1585,34 @@ main() { else: Logs.warn("ignoring missing SCHEDULE_FOR_DELETION control (--enable-old-ctdb)") + if have_cluster_support: + conf.CHECK_CODE(''' + #define NO_CONFIG_H + #include "replace.h" + #include "system/wait.h" + #include "system/network.h" + #include + #include + #include + + int main(void) + { + int i = (int)CTDB_WANT_READONLY; + return 0; + } + ''', + 'HAVE_CTDB_WANT_READONLY_DECL', + addmain=False, + includes=includes, + msg='Checking for CTDB readonly records support') + + if not conf.CONFIG_SET('HAVE_CTDB_WANT_READONLY_DECL'): + if not Options.options.enable_old_ctdb: + have_cluster_support = False + ctdb_broken = "support for CTDB readonly records missing" + else: + Logs.warn("ignoring missing READONLY support (--enable-old-ctdb)") + if have_cluster_support: conf.CHECK_CODE(''' #define NO_CONFIG_H @@ -1565,7 +1681,7 @@ main() { 'HAVE_CTDB_CONTROL_CHECK_SRVIDS_DECL', addmain=False, includes=includes, - msg='Checking for CHECK_SRVIDS control') + msg='Checking for CHECK_SRVIDS control') if not conf.CONFIG_SET('HAVE_CTDB_CONTROL_CHECK_SRVIDS_DECL'): if not Options.options.enable_old_ctdb: @@ -1577,25 +1693,29 @@ main() { if have_cluster_support: Logs.info("building with cluster support") conf.DEFINE('CLUSTER_SUPPORT', 1); + conf.env['CTDB_CFLAGS'] = CTDB_CFLAGS else: - if not Options.options.with_cluster_support: - Logs.info("building without cluster support") + if Options.options.with_cluster_support == False: + Logs.info("building without cluster support (--without-cluster-support)") + elif Options.options.with_cluster_support == True: + Logs.error("Cluster support not available: " + ctdb_broken) + conf.fatal("Cluster support not found, but --with-cluster-support was specified") else: - Logs.warn("building without cluster support: " + ctdb_broken) + Logs.info("building without cluster support: " + ctdb_broken) + conf.env['CTDB_CFLAGS'] = '' conf.undefine('CLUSTER_SUPPORT') - conf.CHECK_CODE('__attribute__((destructor)) static void cleanup(void) { }', - 'HAVE_FUNCTION_ATTRIBUTE_DESTRUCTOR', - addmain=False, - link=False, - msg='Checking whether we can compile with __attribute__((destructor))') + 'HAVE_FUNCTION_ATTRIBUTE_DESTRUCTOR', + addmain=False, + link=False, + msg='Checking whether we can compile with __attribute__((destructor))') conf.CHECK_CODE('void seekdir(DIR *d, long loc) { return; }', - 'SEEKDIR_RETURNS_VOID', - headers='sys/types.h dirent.h', - msg='Checking whether seekdir returns void') + 'SEEKDIR_RETURNS_VOID', + headers='sys/types.h dirent.h', + msg='Checking whether seekdir returns void') if Options.options.with_profiling_data: conf.DEFINE('WITH_PROFILE', 1); @@ -1616,7 +1736,7 @@ main() { PTHREAD_CFLAGS='-D_THREAD_SAFE -pthread' PTHREAD_LDFLAGS='-pthread' if PTHREAD_LDFLAGS == 'error': - if conf.CHECK_FUNC('pthread_attr_init'): + if conf.CHECK_FUNCS('pthread_attr_init'): PTHREAD_CFLAGS='-D_REENTRANT' PTHREAD_LDFLAGS='-lpthread' # especially for HP-UX, where the CHECK_FUNC macro fails to test for @@ -1642,62 +1762,142 @@ main() { if conf.CHECK_HEADERS('gpfs_gpl.h'): conf.DEFINE('HAVE_GPFS', '1') - # Note that all charset 'modules' must actually be static, due to dependency loop issues - # if we include the module loader in iconv + if (conf.CHECK_HEADERS('linux/ioctl.h sys/ioctl.h linux/fs.h') and + conf.CHECK_DECLS('FS_IOC_GETFLAGS FS_COMPR_FL', headers='linux/fs.h')): + conf.DEFINE('HAVE_LINUX_IOCTL', '1') + + conf.env['CCFLAGS_CEPHFS'] = "-D_FILE_OFFSET_BITS=64" + if Options.options.libcephfs_dir: + conf.env['CPPPATH_CEPHFS'] = Options.options.libcephfs_dir + '/include' + conf.env['LIBPATH_CEPHFS'] = Options.options.libcephfs_dir + '/lib' + + if conf.CHECK_HEADERS('cephfs/libcephfs.h', False, False, 'cephfs') and conf.CHECK_LIB('cephfs'): + conf.DEFINE('HAVE_CEPH', '1') + + if Options.options.with_glusterfs: + conf.check_cfg(package='glusterfs-api', args='"glusterfs-api >= 4" --cflags --libs', + msg='Checking for glusterfs-api >= 4', uselib_store="GFAPI") + conf.CHECK_HEADERS('api/glfs.h', lib='gfapi') + conf.CHECK_LIB('gfapi', shlib=True) + + if conf.CONFIG_SET('HAVE_API_GLFS_H'): + conf.DEFINE('HAVE_GLUSTERFS', '1') + else: + conf.SET_TARGET_TYPE('gfapi', 'EMPTY') + conf.undefine('HAVE_GLUSTERFS') + else: + conf.SET_TARGET_TYPE('gfapi', 'EMPTY') + conf.undefine('HAVE_GLUSTERFS') + + conf.env.build_regedit = False + if not Options.options.with_regedit == False: + conf.PROCESS_SEPARATE_RULE('system_ncurses') + if conf.CONFIG_SET('HAVE_NCURSES'): + conf.env.build_regedit = True + + if conf.env.build_regedit: + Logs.info("building regedit") + else: + if Options.options.with_regedit == False: + Logs.info("not building regedit (--without-regedit)") + elif Options.options.with_regedit == True: + Logs.error("ncurses not available, cannot build regedit") + conf.fatal("ncurses not available, but --with-regedit was specified") + else: + Logs.info("ncurses not available, not building regedit") + - default_static_modules=TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam - auth_sam auth_unix auth_winbind auth_wbc auth_server + default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam + auth_sam auth_unix auth_winbind auth_wbc auth_domain auth_builtin vfs_default nss_info_template idmap_tdb idmap_passdb - idmap_nss''') + idmap_nss''')) - default_shared_modules=TO_LIST('''vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk + default_shared_modules.extend(TO_LIST('''vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2 - auth_script vfs_readahead vfs_xattr_tdb + auth_script vfs_readahead vfs_xattr_tdb vfs_posix_eadb vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb vfs_smb_traffic_analyzer vfs_preopen vfs_catia vfs_scannedonly + vfs_media_harmony + vfs_commit + vfs_worm vfs_crossrename vfs_linux_xfs_sgid - vfs_time_audit idmap_autorid''') + vfs_time_audit idmap_autorid idmap_tdb2 + idmap_ad + idmap_rid idmap_hash idmap_rfc2307''')) if Options.options.developer: - default_static_modules.extend(TO_LIST('pdb_ads auth_netlogond charset_weird')) + default_static_modules.extend(TO_LIST('charset_weird')) default_shared_modules.extend(TO_LIST('perfcount_test')) default_shared_modules.extend(TO_LIST('vfs_skel_opaque vfs_skel_transparent vfs_shadow_copy_test')) default_shared_modules.extend(TO_LIST('auth_skel pdb_test')) - default_static_modules.extend(TO_LIST('pdb_samba4 auth_samba4 vfs_dfs_samba4')) + if Options.options.enable_selftest or Options.options.developer: + default_shared_modules.extend(TO_LIST('vfs_fake_acls vfs_nfs4acl_xattr')) + - if Options.options.with_acl_support and conf.CONFIG_SET('HAVE_POSIX_ACLS'): - default_static_modules.extend(TO_LIST('vfs_posixacl')) + if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'): + default_static_modules.extend(TO_LIST('pdb_samba_dsdb auth_samba4 vfs_dfs_samba4')) if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'): - default_shared_modules.extend(TO_LIST('vfs_zfsacl')) + default_shared_modules.extend(TO_LIST('vfs_zfsacl')) if conf.CONFIG_SET('HAVE_DIRFD_DECL'): - default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort')) + default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort')) if conf.CONFIG_SET('HAVE_STATFS_F_FSID'): - default_shared_modules.extend(TO_LIST('vfs_fileid')) + default_shared_modules.extend(TO_LIST('vfs_fileid')) + + if (conf.CONFIG_SET('HAVE_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_MSGHDR_MSG_ACCTRIGHTS')): + default_shared_modules.extend(TO_LIST('vfs_aio_fork')) + + if Options.options.with_pthreadpool: + default_shared_modules.extend(TO_LIST('vfs_aio_pthread')) - if conf.CONFIG_SET('HAVE_AIO') and (conf.CONFIG_SET('HAVE_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_MSGHDR_MSG_ACCTRIGHTS')): - default_shared_modules.extend(TO_LIST('vfs_aio_fork')) + if conf.CONFIG_SET('HAVE_AIO'): + default_shared_modules.extend(TO_LIST('vfs_aio_posix')) - if conf.CONFIG_SET('HAVE_AIO') and Options.options.with_pthreadpool: - default_shared_modules.extend(TO_LIST('vfs_aio_pthread')) + if conf.CONFIG_SET('HAVE_LINUX_KERNEL_AIO'): + default_shared_modules.extend(TO_LIST('vfs_aio_linux')) if conf.CONFIG_SET('HAVE_LDAP'): - default_static_modules.extend(TO_LIST('pdb_ldap idmap_ldap')) + default_static_modules.extend(TO_LIST('pdb_ldapsam idmap_ldap')) if conf.CONFIG_SET('DARWINOS'): - default_static_modules.extend(TO_LIST('charset_macosxfs')) + default_static_modules.extend(TO_LIST('charset_macosxfs')) if conf.CONFIG_SET('HAVE_GPFS'): - default_shared_modules.extend(TO_LIST('vfs_gpfs vfs_gpfs_hsm_notify')) + default_shared_modules.extend(TO_LIST('vfs_gpfs')) + + if conf.CONFIG_SET('HAVE_LINUX_IOCTL'): + default_shared_modules.extend(TO_LIST('vfs_btrfs')) + + if conf.CONFIG_SET('SAMBA_FAM_LIBS'): + default_shared_modules.extend(TO_LIST('vfs_notify_fam')) + + if conf.CONFIG_SET("HAVE_CEPH"): + default_shared_modules.extend(TO_LIST('vfs_ceph')) + + if conf.CONFIG_SET('HAVE_GLUSTERFS'): + default_shared_modules.extend(TO_LIST('vfs_glusterfs')) explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',') explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',') + def replace_list_item(lst, item, value): + try: + idx = lst.index(item) + lst[idx] = value + except: + pass + # PDB module file name should have the same name as module registers itself + # In Autoconf build we export LDAP passdb module as ldapsam but WAF build + # was always exporting pdb_ldap. In order to support existing packages + # allow referring to pdb_ldapsam as pdb_ldap but use proper name internally. + replace_list_item(explicit_shared_modules, 'pdb_ldap', 'pdb_ldapsam') + replace_list_item(explicit_static_modules, 'pdb_ldap', 'pdb_ldapsam') + final_static_modules = default_static_modules final_shared_modules = default_shared_modules @@ -1710,6 +1910,12 @@ main() { final_static_modules.remove(m) final_shared_modules.append(m) + if ("auth_domain" not in final_static_modules) or \ + ("auth_builtin" not in final_static_modules) or \ + ("auth_sam" not in final_static_modules) or \ + ("auth_winbind" not in final_static_modules): + raise Utils.WafError('These auth modules MUST be configured as static modules: auth_domain, auth_builtin, auth_sam, auth_winbind') + conf.env['static_modules'] = final_static_modules conf.env['shared_modules'] = final_shared_modules