s3-waf: add check for fcntl locking.
[ira/wip.git] / source3 / wscript
index 6c8c38f0ae1bd26cda19bdf2cda8638bba518200..8ce2a129ce487ab5617fa17978a36a673fa64a9a 100644 (file)
@@ -54,6 +54,7 @@ def set_options(opt):
     opt.SAMBA3_ADD_OPTION('acl-support')
     opt.SAMBA3_ADD_OPTION('dnsupdate')
     opt.SAMBA3_ADD_OPTION('syslog')
+    opt.SAMBA3_ADD_OPTION('automount')
     opt.SAMBA3_ADD_OPTION('aio-support')
 
 
@@ -105,6 +106,7 @@ def configure(conf):
     conf.CHECK_FUNCS('fseek64 fseeko64 ftell64 ftello64 setluid')
     conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
     conf.CHECK_FUNCS('opendir64 readdir64 seekdir64 telldir64 rewinddir64 closedir64')
+    conf.CHECK_FUNCS('fdopendir fdopendir64')
     conf.CHECK_FUNCS('getpwent_r getdents64 setenv strcasecmp fcvt fcvtl')
     conf.CHECK_FUNCS('syslog vsyslog timegm setlocale nl_langinfo')
     conf.CHECK_FUNCS_IN('nanosleep', 'rt')
@@ -285,6 +287,7 @@ utimensat vsyslog _write __write __xstat
     # checks for OSes.
     import sys
     host_os = sys.platform
+    print "building on %s" % host_os
 
     # Python doesn't have case switches... :/
     # FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
@@ -305,6 +308,11 @@ utimensat vsyslog _write __write __xstat
         if conf.CHECK_HEADERS('sunacl.h'):
             conf.define('HAVE_FREEBSD_SUNACL_H', '1')
             conf.CHECK_FUNCS_IN('acl', 'sunacl')
+        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
+    elif (host_os.rfind('netbsd') > -1):
+        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
+    elif (host_os.rfind('openbsd') > -1):
+        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
     # FIXME: Add more checks here.
     else:
         print "Unknown host_os '%s', please report this to samba-technical@samba.org" % host_os
@@ -334,11 +342,9 @@ return acl_get_perm_np(permset_d, perm);
         else:
             conf.DEFINE('HAVE_NO_ACLS', 1)
             conf.SET_TARGET_TYPE('acl', 'EMPTY')
-            conf.SET_TARGET_TYPE('attr', 'EMPTY')
     else:
         conf.DEFINE('HAVE_NO_ACLS', 1)
         conf.SET_TARGET_TYPE('acl', 'EMPTY')
-        conf.SET_TARGET_TYPE('attr', 'EMPTY')
 
     if conf.CHECK_FUNCS('dirfd'):
         conf.DEFINE('HAVE_DIRFD_DECL', 1)
@@ -465,98 +471,6 @@ msg.msg_acctrightslen = sizeof(fd);
        msg='Checking if we can use msg_acctrights for passing file descriptors',
        headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
 
-    default_static_modules=TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam pdb_ldap
-                                      auth_sam auth_unix auth_winbind auth_wbc auth_server
-                                      auth_domain auth_builtin vfs_default
-                                      nss_info_template idmap_ldap idmap_tdb idmap_passdb
-                                      idmap_nss''')
-
-    default_shared_modules=TO_LIST('''vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk
-                                      vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
-                                      vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2 charset_CP850
-                                      charset_CP437 auth_script vfs_readahead vfs_xattr_tdb
-                                      vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
-                                      vfs_smb_traffic_analyzer vfs_preopen vfs_catia vfs_scannedonly
-                                      vfs_crossrename vfs_linux_xfs_sgid
-                                      vfs_time_audit idmap_autorid''')
-
-    if Options.options.developer:
-        default_static_modules.extend(TO_LIST('pdb_ads auth_netlogond'))
-        default_shared_modules.extend(TO_LIST('charset_weird perfcount_test'))
-
-    if Options.options.with_acl_support and conf.CONFIG_SET('HAVE_POSIX_ACLS'):
-        default_static_modules.extend(TO_LIST('vfs_posixacl'))
-
-    if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
-       default_shared_modules.extend(TO_LIST('vfs_zfsacl'))
-
-    if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
-       default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort'))
-
-    if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
-       default_shared_modules.extend(TO_LIST('vfs_fileid'))
-
-    if conf.CONFIG_SET('HAVE_AIO') and (conf.CONFIG_SET('HAVE_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_MSGHDR_MSG_ACCTRIGHTS')):
-       default_shared_modules.extend(TO_LIST('vfs_aio_fork'))
-
-    explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
-    explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
-
-    final_static_modules = default_static_modules
-    final_shared_modules = default_shared_modules
-
-    for m in explicit_static_modules:
-        if m in final_shared_modules:
-            final_shared_modules.remove(m)
-        final_static_modules.append(m)
-    for m in explicit_shared_modules:
-        if m in final_static_modules:
-            final_static_modules.remove(m)
-        final_shared_modules.append(m)
-
-    conf.env['static_modules'] = final_static_modules
-    conf.env['shared_modules'] = final_shared_modules
-
-    conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
-
-    static_list = {}
-    shared_list = {}
-
-    prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount']
-    conf.env['MODULE_PREFIXES'] = prefixes
-    for p in prefixes:
-        for m in final_static_modules:
-            if m.find(p) == 0:
-                if not p in static_list:
-                    static_list[p] = []
-                static_list[p].append(m)
-        for m in final_shared_modules:
-            if m.find(p) == 0:
-                if not p in shared_list:
-                    shared_list[p] = []
-                shared_list[p].append(m)
-
-    for p in prefixes:
-        static_env = "%s_STATIC" % p.upper()
-        shared_env = "%s_SHARED" % p.upper()
-        conf.env[static_env] = []
-        conf.env[shared_env] = []
-        if p in static_list:
-            decl_list=""
-            for entry in static_list[p]:
-                decl_list += "extern NTSTATUS %s_init(void); " % entry
-                conf.env[static_env].append('%s' % entry)
-            decl_list = decl_list.rstrip()
-            conf.DEFINE('static_decl_%s' % p, decl_list)
-            conf.DEFINE('static_init_%s' % p, '{ %s_init(); }' % '_init();  '.join(static_list[p]))
-        else:
-            conf.DEFINE('static_decl_%s' % p, '')
-            conf.DEFINE('static_init_%s' % p, '{}')
-        if p in shared_list:
-            for entry in shared_list[p]:
-                conf.DEFINE('%s_init' % entry, 'init_samba_module')
-                conf.env[shared_env].append('%s' % entry)
-
     if Options.options.with_winbind:
         conf.env.build_winbind = True
         conf.DEFINE('WITH_WINBIND', '1')
@@ -598,18 +512,20 @@ msg.msg_acctrightslen = sizeof(fd);
                     headers='netdb.h netgroup.h',
                     cflags="-Werror-implicit-function-declaration")
 
-    #FIXME: Should just be set when krb5 and ldap requirements are fulfilled
-    if Options.options.with_ads:
-        conf.DEFINE('WITH_ADS', '1')
 
     # Look for CUPS
-    conf.find_program('cups-config', var='CUPS_CONFIG')
-    if conf.env.CUPS_CONFIG and Options.options.with_cups:
-        conf.check_cfg(path="cups-config", args="--cflags --ldflags --libs",
-                       package="", uselib_store="cups")
+    if Options.options.with_cups:
+        conf.find_program('cups-config', var='CUPS_CONFIG')
+        if conf.env.CUPS_CONFIG:
+           conf.check_cfg(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags --libs",
+                           package="", uselib_store="cups")
         conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups')
-        conf.CHECK_LIB('cups')
-        conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', 'cups')
+        conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', conf.env.LIB_cups)
+        if conf.CONFIG_SET('HAVE_CUPS_CUPS_H') and conf.CONFIG_SET('HAVE_CUPS_LANGUAGE_H'):
+            conf.DEFINE('HAVE_CUPS', '1')
+        else:
+            conf.undefine('HAVE_CUPS')
+            conf.SET_TARGET_TYPE('cups', 'EMPTY')
     else:
         # define an empty subsystem for cups, to allow it to be used as an empty dependency
         conf.SET_TARGET_TYPE('cups', 'EMPTY')
@@ -619,9 +535,10 @@ msg.msg_acctrightslen = sizeof(fd);
             conf.DEFINE('HAVE_IPRINT', '1')
         else:
             print "--enable-iprint=yes but cups support not sufficient"
-            sys.exit(1)
     if Options.options.with_syslog:
         conf.DEFINE('WITH_SYSLOG', '1')
+    if Options.options.with_automount:
+        conf.DEFINE('WITH_AUTOMOUNT', '1')
 
     # Check for LDAP
     if Options.options.with_ldap:
@@ -656,16 +573,17 @@ msg.msg_acctrightslen = sizeof(fd);
         if conf.CONFIG_SET('HAVE_LDAP_INIT'):
             conf.DEFINE('HAVE_LDAP', '1')
             conf.DEFINE('LDAP_DEPRECATED', '1')
-            conf.env['SMBLDAP'] = 'lib/smbldap.c'
-            conf.env['SMBLDAPUTIL'] = 'lib/smbldap_util.c'
+            conf.env['HAVE_LDAP'] = '1'
     else:
         conf.SET_TARGET_TYPE('ldap', 'EMPTY')
         conf.SET_TARGET_TYPE('lber', 'EMPTY')
 
     # Check for kerberos
-    conf.find_program('krb5-config', var='KRB5_CONFIG')
-    if conf.env.KRB5_CONFIG and Options.options.with_krb5:
-        conf.check_cfg(path="krb5-config", args="--cflags --libs",
+    have_gssapi=False
+    if Options.options.with_krb5:
+        conf.find_program('krb5-config', var='KRB5_CONFIG')
+        if conf.env.KRB5_CONFIG:
+            conf.check_cfg(path="krb5-config", args="--cflags --libs",
                        package="gssapi", uselib_store="krb5")
         conf.CHECK_HEADERS('krb5.h krb5/locate_plugin.h', lib='krb5')
         conf.CHECK_HEADERS('gssapi.h gssapi/gssapi_generic.h gssapi/gssapi.h gssapi/gssapi_ext.h com_err.h', lib='krb5')
@@ -678,8 +596,9 @@ msg.msg_acctrightslen = sizeof(fd);
         conf.CHECK_FUNCS_IN('crypto', 'des_set_key')
         conf.CHECK_FUNCS_IN('copy_Authenticator', 'asn1')
         conf.CHECK_FUNCS_IN('roken_getaddrinfo_hostspec', 'roken')
-        if conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi gssapi_krb5'):
-            conf.DEFINE('HAVE_GSSAPI', '1')
+        if conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi') or \
+           conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi_krb5'):
+            have_gssapi=True
         conf.CHECK_FUNCS_IN('gss_wrap_iov', 'gssapi gssapi_krb5 krb5')
         conf.CHECK_FUNCS_IN('krb5_mk_req_extended krb5_kt_compare', 'krb5')
         conf.CHECK_FUNCS('''
@@ -700,7 +619,7 @@ krb5_get_init_creds_opt_free krb5_get_init_creds_opt_get_error
 krb5_enctype_to_string krb5_fwd_tgt_creds krb5_auth_con_set_req_cksumtype
 krb5_get_creds_opt_alloc krb5_get_creds_opt_set_impersonate krb5_get_creds
 krb5_get_credentials_for_user krb5_get_host_realm krb5_free_host_realm''',
-                         lib='krb5')
+                         lib='krb5 k5crypto')
         conf.CHECK_DECLS('''krb5_get_credentials_for_user
                             krb5_auth_con_set_req_cksumtype''',
                             headers='krb5.h', always=True)
@@ -766,7 +685,7 @@ krb5_enctype_to_string(1, buf, 256);
 return 0;
 }''',
                         'HAVE_KRB5_ENCTYPE_TO_STRING_WITH_SIZE_T_ARG',
-                        headers='krb5.h', lib='krb5',
+                        headers='krb5.h', lib='krb5 k5crypto',
                         addmain=False, cflags='-Werror',
                         msg="Checking whether krb5_enctype_to_string takes size_t argument")
 
@@ -836,8 +755,6 @@ return krb5_kt_resolve(context, "WRFILE:api", &keytab);
             headers='krb5.h', lib='krb5', execute=True,
             msg="Checking whether the WRFILE:-keytab is supported");
 
-        conf.DEFINE('HAVE_KRB5', '1')
-
     else:
         conf.SET_TARGET_TYPE('krb5', 'EMPTY')
         conf.SET_TARGET_TYPE('gssapi', 'EMPTY')
@@ -845,6 +762,52 @@ return krb5_kt_resolve(context, "WRFILE:api", &keytab);
         conf.SET_TARGET_TYPE('com_err', 'EMPTY')
         conf.SET_TARGET_TYPE('k5crypto', 'EMPTY')
 
+    if Options.options.with_ads:
+        use_ads=True
+        if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
+           not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
+            print "arcfour-hmac-md5 encryption type not found in -lkrb5"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
+            print "krb5_mk_req_extended not found in -lkrb5"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
+           not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
+            print "no CREATE_KEY_FUNCTIONS detected"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
+           not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
+            print "no GET_ENCTYPES_FUNCTIONS detected"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
+           not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
+            print "no KT_FREE_FUNCTION detected"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM') and \
+           not conf.CONFIG_SET('HAVE_KRB5_VERIFY_CHECKSUM'):
+            print "no KRB5_VERIFY_CHECKSUM_FUNCTION detected"
+            use_ads=False
+        if not conf.CONFIG_SET('KRB5_TICKET_HAS_KEYINFO'):
+            # We only need the following functions if we can't get the enctype
+            # and kvno out of the ticket directly (ie. on Heimdal).
+            if not conf.CONFIG_SET('free_AP_REQ'):
+                print "no KRB5_AP_REQ_FREE_FUNCTION detected"
+                use_ads=False
+            if not conf.CONFIG_SET('HAVE_KRB5_DECODE_AP_REQ'):
+                print "no KRB5_AP_REQ_DECODING_FUNCTION detected"
+                use_ads=False
+        if use_ads:
+            conf.DEFINE('WITH_ADS', '1')
+            conf.DEFINE('HAVE_KRB5', '1')
+            if have_gssapi:
+                conf.DEFINE('HAVE_GSSAPI', '1')
+        else:
+            print "krb5 libs don't have all features required for Active Directory support"
+            conf.undefine('HAVE_KRB5_H')
+            conf.undefine('HAVE_GSSAPI_H')
+            conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
+            conf.undefine('HAVE_GSSAPI_GSSAPI_H')
+
     if Options.options.with_utmp:
         conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent')
         conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_name', headers='utmp.h',
@@ -895,15 +858,16 @@ return krb5_kt_resolve(context, "WRFILE:api", &keytab);
             conf.DEFINE('HAVE_ICONV', 1)
 
     if Options.options.with_pam:
+        use_pam=True
         conf.CHECK_HEADERS('security/pam_appl.h pam/pam_appl.h')
         if not conf.CONFIG_SET('HAVE_SECURITY_PAM_APPL_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_APPL_H'):
             print "--with-pam=yes but pam_appl.h not found"
-            sys.exit(1)
-        conf.CHECK_FUNCS_IN('pam_get_data', 'pam', mandatory=True)
-       conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
-       if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
+            use_pam=False
+        conf.CHECK_FUNCS_IN('pam_get_data', 'pam')
+        conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
+        if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
             print "--with-pam=yes but pam_modules.h not found"
-            sys.exit(1)
+            use_pam=False
         conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h')
         conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h')
         conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam')
@@ -962,8 +926,9 @@ int i; i = PAM_RADIO_TYPE;
             'HAVE_PAM_RADIO_TYPE',
             lib='pam',
             msg="Checking whether PAM_RADIO_TYPE is available");
-        conf.DEFINE('WITH_PAM', 1)
-        conf.DEFINE('WITH_PAM_MODULES', 1)
+        if use_pam:
+            conf.DEFINE('WITH_PAM', 1)
+            conf.DEFINE('WITH_PAM_MODULES', 1)
 
     seteuid = False
     if not seteuid:
@@ -1012,8 +977,10 @@ int i; i = PAM_RADIO_TYPE;
         conf.CHECK_FUNCS_IN('uuid_generate', 'uuid')
         if not conf.CONFIG_SET('HAVE_UUID_UUID_H') and not conf.CONFIG_SET('HAVE_UUID_GENERATE'):
             print "--with-dnsupdate=yes but uuid support not sufficient"
-            sys.exit(1)
-        conf.DEFINE('WITH_DNS_UPDATES', 1)
+        elif not conf.CONFIG_SET('HAVE_GSSAPI'):
+            print "--with-dnsupdate=yes but gssapi support not sufficient"
+        else:
+            conf.DEFINE('WITH_DNS_UPDATES', 1)
     else:
         conf.SET_TARGET_TYPE('uuid', 'EMPTY')
     conf.CHECK_HEADERS('valgrind.h valgrind/valgrind.h valgrind/memcheck.h')
@@ -1034,6 +1001,113 @@ int i; i = PAM_RADIO_TYPE;
 ''',
                'HAVE_LINUX_RTNETLINK_H',
                msg='Checking whether Linux rtnetlink is available')
+    if conf.CHECK_TYPE('struct dirent64', headers='sys/types.h dirent.h') and conf.CONFIG_SET('HAVE_READDIR64'):
+        conf.DEFINE('HAVE_STRUCT_DIRENT64', '1')
+    else:
+        conf.undefine('HAVE_STRUCT_DIRENT64')
+
+    conf.CHECK_CODE('''
+#include "../tests/fcntl_lock.c"
+''',
+               'HAVE_FCNTL_LOCK',
+               addmain=False,
+               execute=True,
+               msg='Checking whether fcntl locking is available')
+
+    default_static_modules=TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam
+                                      auth_sam auth_unix auth_winbind auth_wbc auth_server
+                                      auth_domain auth_builtin vfs_default
+                                      nss_info_template idmap_tdb idmap_passdb
+                                      idmap_nss''')
+
+    default_shared_modules=TO_LIST('''vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk
+                                      vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
+                                      vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2 charset_CP850
+                                      charset_CP437 auth_script vfs_readahead vfs_xattr_tdb
+                                      vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
+                                      vfs_smb_traffic_analyzer vfs_preopen vfs_catia vfs_scannedonly
+                                      vfs_crossrename vfs_linux_xfs_sgid
+                                      vfs_time_audit idmap_autorid''')
+
+    if Options.options.developer:
+        default_static_modules.extend(TO_LIST('pdb_ads auth_netlogond'))
+        default_shared_modules.extend(TO_LIST('charset_weird perfcount_test'))
+
+    if Options.options.with_acl_support and conf.CONFIG_SET('HAVE_POSIX_ACLS'):
+        default_static_modules.extend(TO_LIST('vfs_posixacl'))
+
+    if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
+       default_shared_modules.extend(TO_LIST('vfs_zfsacl'))
+
+    if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
+       default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort'))
+
+    if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
+       default_shared_modules.extend(TO_LIST('vfs_fileid'))
+
+    if conf.CONFIG_SET('HAVE_AIO') and (conf.CONFIG_SET('HAVE_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_MSGHDR_MSG_ACCTRIGHTS')):
+       default_shared_modules.extend(TO_LIST('vfs_aio_fork'))
+
+    if conf.CONFIG_SET('HAVE_LDAP'):
+        default_static_modules.extend(TO_LIST('pdb_ldap idmap_ldap'))
+
+    explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
+    explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
+
+    final_static_modules = default_static_modules
+    final_shared_modules = default_shared_modules
+
+    for m in explicit_static_modules:
+        if m in final_shared_modules:
+            final_shared_modules.remove(m)
+        final_static_modules.append(m)
+    for m in explicit_shared_modules:
+        if m in final_static_modules:
+            final_static_modules.remove(m)
+        final_shared_modules.append(m)
+
+    conf.env['static_modules'] = final_static_modules
+    conf.env['shared_modules'] = final_shared_modules
+
+    conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
+
+    static_list = {}
+    shared_list = {}
+
+    prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount']
+    conf.env['MODULE_PREFIXES'] = prefixes
+    for p in prefixes:
+        for m in final_static_modules:
+            if m.find(p) == 0:
+                if not p in static_list:
+                    static_list[p] = []
+                static_list[p].append(m)
+        for m in final_shared_modules:
+            if m.find(p) == 0:
+                if not p in shared_list:
+                    shared_list[p] = []
+                shared_list[p].append(m)
+
+    for p in prefixes:
+        static_env = "%s_STATIC" % p.upper()
+        shared_env = "%s_SHARED" % p.upper()
+        conf.env[static_env] = []
+        conf.env[shared_env] = []
+        if p in static_list:
+            decl_list=""
+            for entry in static_list[p]:
+                decl_list += "extern NTSTATUS %s_init(void); " % entry
+                conf.env[static_env].append('%s' % entry)
+            decl_list = decl_list.rstrip()
+            conf.DEFINE('static_decl_%s' % p, decl_list)
+            conf.DEFINE('static_init_%s' % p, '{ %s_init(); }' % '_init();  '.join(static_list[p]))
+        else:
+            conf.DEFINE('static_decl_%s' % p, '')
+            conf.DEFINE('static_init_%s' % p, '{}')
+        if p in shared_list:
+            for entry in shared_list[p]:
+                conf.DEFINE('%s_init' % entry, 'init_samba_module')
+                conf.env[shared_env].append('%s' % entry)
 
     conf.SAMBA_CONFIG_H('include/config.h')