s3-waf: add check for fcntl locking.
[ira/wip.git] / source3 / wscript
index 7472c7d9292c86a2cb643ce17cb4877ba629f98c..8ce2a129ce487ab5617fa17978a36a673fa64a9a 100644 (file)
@@ -3,23 +3,23 @@
 srcdir = '..'
 blddir = 'bin'
 
+APPNAME='samba'
+VERSION=None
+
 import sys, os
 from optparse import SUPPRESS_HELP
 sys.path.insert(0, srcdir+"/buildtools/wafsamba")
 import wafsamba, Options
 import build.charset
-import samba_utils
+import samba_utils, samba_version
 import samba3
 
-version = wafsamba.samba_version_file("./VERSION")
-
-VERSION=version.STRING
-
 def set_options(opt):
     opt.BUILTIN_DEFAULT('NONE')
-    opt.BUNDLED_EXTENSION_DEFAULT('s3')
+    opt.PRIVATE_EXTENSION_DEFAULT('s3')
     opt.RECURSE('../lib/replace')
     opt.RECURSE('build')
+    opt.RECURSE('selftest')
     opt.RECURSE('../lib/nss_wrapper')
     opt.RECURSE('../lib/socket_wrapper')
     opt.RECURSE('../lib/tevent')
@@ -27,10 +27,10 @@ def set_options(opt):
 
     opt.add_option('--with-static-modules',
                    help=("Comma-separated list of names of modules to statically link in"),
-                   action="store", dest='static_modules', default='')
+                   action="store", dest='static_modules', default=None)
     opt.add_option('--with-shared-modules',
                    help=("Comma-separated list of names of modules to build shared"),
-                   action="store", dest='shared_modules', default='')
+                   action="store", dest='shared_modules', default=None)
     opt.add_option('--enable-selftest',
                   help=("enable options necessary for selftest"),
                   action="store_true", dest='enable_selftest', default=False)
@@ -41,6 +41,7 @@ def set_options(opt):
     opt.SAMBA3_ADD_OPTION('krb5')
     opt.SAMBA3_ADD_OPTION('ldap')
     opt.SAMBA3_ADD_OPTION('cups', with_name="enable", without_name="disable")
+    opt.SAMBA3_ADD_OPTION('iprint', with_name="enable", without_name="disable")
     opt.SAMBA3_ADD_OPTION('merged-build', with_name="enable", without_name="disable")
     opt.SAMBA3_ADD_OPTION('pam')
     opt.SAMBA3_ADD_OPTION('quotas')
@@ -48,21 +49,24 @@ def set_options(opt):
     opt.SAMBA3_ADD_OPTION('sendfile-support')
     opt.SAMBA3_ADD_OPTION('utmp')
     opt.SAMBA3_ADD_OPTION('pthreadpool', with_name="enable", without_name="disable")
+    opt.SAMBA3_ADD_OPTION('avahi', with_name="enable", without_name="disable")
+    opt.SAMBA3_ADD_OPTION('iconv')
+    opt.SAMBA3_ADD_OPTION('acl-support')
+    opt.SAMBA3_ADD_OPTION('dnsupdate')
+    opt.SAMBA3_ADD_OPTION('syslog')
+    opt.SAMBA3_ADD_OPTION('automount')
+    opt.SAMBA3_ADD_OPTION('aio-support')
 
 
 def configure(conf):
     from samba_utils import TO_LIST
 
-    conf.DEFINE('PACKAGE_NAME', 'Samba', quote=True)
-    conf.DEFINE('PACKAGE_STRING', 'Samba %s' % version.MAJOR, quote=True)
-    conf.DEFINE('PACKAGE_TARNAME',  'samba', quote=True)
-    conf.DEFINE('PACKAGE_URL', "", quote=True)
-    conf.DEFINE('PACKAGE_VERSION', "%s" % version.MAJOR, quote=True)
-    conf.DEFINE('PACKAGE_BUGREPORT', 'samba-technical@samba.org', quote=True)
+    version = samba_version.load_version(env=conf.env)
 
     conf.DEFINE('CONFIG_H_IS_FROM_SAMBA', 1)
     conf.DEFINE('_SAMBA_BUILD_', version.MAJOR, add_to_cflags=True)
     conf.DEFINE('HAVE_CONFIG_H', 1, add_to_cflags=True)
+
     if Options.options.developer:
         conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD')
         conf.env['developer'] = True
@@ -70,12 +74,9 @@ def configure(conf):
     if Options.options.with_swat:
         conf.env['build_swat'] = True
 
-    # set a limit on recursing in the waf preprocessor
-    conf.env.preprocessor_recursion_limit = 10
-
     conf.ADD_EXTRA_INCLUDES('''#source3 #source3/include #lib/replace #lib/talloc
-                               #lib/tevent #source3/libaddns #source3/librpc
-                               #source3/lib #lib/tdb/include #lib/popt #source4''')
+                               #lib/tevent #lib/addns #source3/librpc
+                               #source3/lib #lib/tdb/include #lib/popt''')
 
     conf.RECURSE('../lib/replace')
     conf.RECURSE('build')
@@ -86,20 +87,26 @@ def configure(conf):
     conf.RECURSE('../lib/nss_wrapper')
     conf.RECURSE('../lib/socket_wrapper')
     conf.RECURSE('../lib/zlib')
+    conf.RECURSE('../libcli/smbreadline')
+    conf.RECURSE('../lib/util')
+
+    conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
 
-    conf.CHECK_HEADERS('execinfo.h libexc.h libunwind.h')
+    conf.CHECK_HEADERS('execinfo.h libexc.h libunwind.h netdb.h')
+    conf.CHECK_HEADERS('linux/falloc.h')
 
     conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod mknod64')
     conf.CHECK_FUNCS('strtol strchr strupr chflags')
     conf.CHECK_FUNCS('getrlimit fsync fdatasync setpgid')
     conf.CHECK_FUNCS('setsid glob strpbrk crypt16 getauthuid')
-    conf.CHECK_FUNCS('sigprocmask sigblock sigaction sigset innetgr setnetgrent getnetgrent endnetgrent')
+    conf.CHECK_FUNCS('sigprocmask sigblock sigaction sigset innetgr')
     conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf')
     conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups sysconf stat64 fstat64')
-    conf.CHECK_FUNCS('lstat64 fopen64 atexit grantpt lseek64 ftruncate64 posix_fallocate posix_fallocate64')
+    conf.CHECK_FUNCS('lstat64 fopen64 atexit grantpt lseek64 ftruncate64 fallocate fallocate64 posix_fallocate posix_fallocate64')
     conf.CHECK_FUNCS('fseek64 fseeko64 ftell64 ftello64 setluid')
     conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
     conf.CHECK_FUNCS('opendir64 readdir64 seekdir64 telldir64 rewinddir64 closedir64')
+    conf.CHECK_FUNCS('fdopendir fdopendir64')
     conf.CHECK_FUNCS('getpwent_r getdents64 setenv strcasecmp fcvt fcvtl')
     conf.CHECK_FUNCS('syslog vsyslog timegm setlocale nl_langinfo')
     conf.CHECK_FUNCS_IN('nanosleep', 'rt')
@@ -112,6 +119,21 @@ def configure(conf):
     #FIXME: for some reason this one still fails
     conf.CHECK_FUNCS_IN('yp_get_default_domain', 'nsl')
     conf.CHECK_FUNCS_IN('dn_expand _dn_expand __dn_expand', 'resolv')
+    conf.CHECK_DECLS('fdatasync', reverse=True)
+    conf.CHECK_DECLS('readahead', reverse=True, headers='fcntl.h')
+
+    if conf.CONFIG_SET('HAVE_LONG_LONG'):
+        conf.DEFINE('HAVE_LONGLONG', 1)
+
+    if conf.CHECK_CODE('''
+#if defined(HAVE_UNISTD_H)
+#include <unistd.h>
+#endif
+long ret = splice(0,0,1,0,400,0);
+''',
+        'HAVE_LINUX_SPLICE',
+        headers='fcntl.h'):
+        conf.CHECK_DECLS('splice', reverse=True, headers='fcntl.h')
 
     # Check for inotify support
     conf.CHECK_HEADERS('linux/inotify.h asm/unistd.h sys/inotify.h')
@@ -201,6 +223,9 @@ main() {
         conf.CHECK_CODE('uint32 testvar;', 'HAVE_INT16_FROM_RPC_RPC_H',
                         headers='sys/types.h rpc/rpc.h',
                         msg="Checking for uint32 typedef included by rpc/rpc.h")
+    conf.CHECK_CODE('int i;', 'BROKEN_NISPLUS_INCLUDE_FILES',
+                    headers='sys/types.h sys/acl.h rpcsvc/nis.h',
+                    msg="Checking for broken nisplus include files")
 
     # Check if the compiler will optimize out functions
     conf.CHECK_CODE('''
@@ -211,12 +236,18 @@ if (0) {
 }''', 'HAVE_COMPILER_WILL_OPTIMIZE_OUT_FNS',
         msg="Checking if the compiler will optimize out functions")
 
+    # Check if the compiler supports the LL suffix on long long integers
+    # AIX needs this
+    conf.CHECK_CODE('long long i = 0x8000000000LL', 'COMPILER_SUPPORTS_LL',
+                    headers='stdio.h',
+                    msg="Checking for LL suffix on long long integers")
+
     conf.CHECK_FUNCS('''
 _acl __acl add_proplist_entry atexit attr_getf attr_list attr_listf
 attropen attr_remove attr_removef attr_set attr_setf backtrace_symbols
 bindtextdomain _chdir __chdir chflags chmod _close __close _closedir
 __closedir closedir64 creat64 crypt16 delproplist devnm dgettext dirfd
-DNSServiceRegister _dup __dup _dup2 __dup2 endmntent endnetgrent execl
+DNSServiceRegister _dup __dup _dup2 __dup2 endmntent execl
 extattr_delete_fd extattr_delete_link extattr_get_fd extattr_get_file
 extattr_get_link extattr_list_fd extattr_list_file extattr_list_link
 extattr_set_fd extattr_set_file extattr_set_link _facl __facl _fchdir
@@ -226,7 +257,7 @@ _fork __fork fremoveea fremovexattr fseek64 fseeko64 fsetea
 fsetproplist fsetxattr _fstat __fstat fstat64 _fstat64 __fstat64 fsync
 ftell64 ftello64 ftruncate64 futimens futimes __fxstat getauthuid
 getcwd _getcwd __getcwd getdents __getdents getdents64 getdirentries
-getgrent getgrnam getgrouplist getmntent getnetgrent getpagesize
+getgrent getgrnam getgrouplist getmntent getpagesize
 getproplist get_proplist_entry getpwanam getpwent_r getrlimit gettext
 glob grantpt hstrerror initgroups innetgr
 inotify_init lgetea lgetxattr listea listxattr llistea llistxattr
@@ -240,7 +271,7 @@ pwrite _pwrite __pwrite pwrite64 _pwrite64
 __pwrite64 rdchk _read __read _readdir __readdir readdir64 _readdir64
 __readdir64 removeea removexattr rewinddir64 _seekdir __seekdir
 seekdir64 select setea setenv setgidx setgroups setlocale setluid
-setmntent setnetgrent setpgid setpriv setproplist setsid setuidx
+setmntent setpgid setpriv setproplist setsid setuidx
 setxattr shmget shm_open sigaction sigblock sigprocmask sigset
 sizeof_proplist_entry _stat __stat stat64 _stat64 __stat64 statvfs
 strcasecmp strchr strpbrk strsignal strtol strupr sysconf sysctlbyname
@@ -252,83 +283,200 @@ utimensat vsyslog _write __write __xstat
 
     conf.CHECK_SAMBA3_CHARSET() # see build/charset.py
 
+    # FIXME: these should be tests for features, but the old build system just
+    # checks for OSes.
+    import sys
+    host_os = sys.platform
+    print "building on %s" % host_os
 
-    default_static_modules=TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam rpc_lsarpc rpc_samr
-                                      rpc_winreg rpc_initshutdown rpc_dssetup rpc_wkssvc rpc_svcctl
-                                      rpc_ntsvcs rpc_netlogon rpc_netdfs rpc_srvsvc rpc_spoolss
-                                      rpc_eventlog auth_sam auth_unix auth_winbind auth_wbc auth_server
-                                      auth_domain auth_builtin auth_netlogond vfs_default
-                                      nss_info_template''')
+    # Python doesn't have case switches... :/
+    # FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
+    # the search for .rfind('gnu') covers gnu* and *-gnu is that too broad?
 
-    default_shared_modules=TO_LIST('''vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk
-                                      vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
-                                      vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2 charset_CP850
-                                      charset_CP437 auth_script vfs_readahead vfs_xattr_tdb
-                                      vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
-                                      vfs_smb_traffic_analyzer vfs_preopen vfs_catia vfs_scannedonly
-                                      vfs_crossrename''')
+    conf.SET_TARGET_TYPE('sunacl', 'EMPTY')
+    if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('qnx') > -1):
+        if host_os.rfind('linux') > -1:
+            conf.DEFINE('LINUX', '1')
+        elif host_os.rfind('qnx') > -1:
+            conf.DEFINE('QNX', '1')
+        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
+    elif (host_os.rfind('darwin') > -1):
+        conf.DEFINE('DARWINOS', 1)
+        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
+        conf.ADD_CFLAGS('-fno-common')
+    elif (host_os.rfind('freebsd') > -1):
+        if conf.CHECK_HEADERS('sunacl.h'):
+            conf.define('HAVE_FREEBSD_SUNACL_H', '1')
+            conf.CHECK_FUNCS_IN('acl', 'sunacl')
+        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
+    elif (host_os.rfind('netbsd') > -1):
+        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
+    elif (host_os.rfind('openbsd') > -1):
+        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
+    # FIXME: Add more checks here.
+    else:
+        print "Unknown host_os '%s', please report this to samba-technical@samba.org" % host_os
 
-    if Options.options.developer:
-        default_static_modules.extend(TO_LIST('rpc_rpcecho pdb_ads'))
-        default_shared_modules.extend(TO_LIST('charset_weird perfcount_test'))
+    #FIXME: add more checks
+    if Options.options.with_acl_support:
+        if host_os.rfind('linux') > -1:
+           conf.CHECK_FUNCS_IN('acl_get_file', 'acl')
+           conf.CHECK_FUNCS_IN('getxattr', 'attr')
+            if conf.CHECK_CODE('''
+acl_t acl;
+int entry_id;
+acl_entry_t *entry_p;
+return acl_get_entry(acl, entry_id, entry_p);
+''',
+                        'HAVE_POSIX_ACLS',
+                        headers='sys/types.h sys/acl.h', link=False,
+                       msg="Checking for POSIX ACL support") :
+                conf.CHECK_CODE('''
+acl_permset_t permset_d;
+acl_perm_t perm;
+return acl_get_perm_np(permset_d, perm);
+''',
+                        'HAVE_ACL_GET_PERM_NP',
+                        headers='sys/types.h sys/acl.h', link=True,
+                        msg="Checking whether acl_get_perm_np() is available")
+        else:
+            conf.DEFINE('HAVE_NO_ACLS', 1)
+            conf.SET_TARGET_TYPE('acl', 'EMPTY')
+    else:
+        conf.DEFINE('HAVE_NO_ACLS', 1)
+        conf.SET_TARGET_TYPE('acl', 'EMPTY')
 
-    move_to_shared = TO_LIST(Options.options.shared_modules)
-    move_to_static = TO_LIST(Options.options.static_modules)
+    if conf.CHECK_FUNCS('dirfd'):
+        conf.DEFINE('HAVE_DIRFD_DECL', 1)
 
-    for m in move_to_static:
-        if m in default_shared_modules:
-            default_shared_modules.remove(m)
-            default_static_modules.append(m)
-    for m in move_to_shared:
-        if m in default_static_modules:
-            default_static_modules.remove(m)
-            default_shared_modules.append(m)
+    conf.CHECK_CODE('struct statfs fsd; fsid_t fsid = fsd.f_fsid; return statfs(".", &fsd);',
+                    'HAVE_STATFS_F_FSID',
+                    msg="vfs_fileid: checking for statfs() and struct statfs.f_fsid",
+                    headers='sys/types.h sys/statfs.h',
+                    execute=True)
 
-    conf.DEFINE('STRING_STATIC_MODULES', ' '.join(default_static_modules), quote=True)
+    if conf.CONFIG_SET('HAVE_FALLOCATE'):
+        conf.CHECK_CODE('''
+               #if defined(HAVE_UNISTD_H)
+               #include <unistd.h>
+               #endif
+               #include <sys/types.h>
+               #define _GNU_SOURCE
+               #include <fcntl.h>
+               #if defined(HAVE_LINUX_FALLOC_H)
+               #include <linux/falloc.h>
+               #endif
+               int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''',
+               'HAVE_LINUX_FALLOCATE',
+               msg="Checking whether the Linux 'fallocate' function is available")
+    if conf.CONFIG_SET('HAVE_FALLOCATE64'):
+        conf.CHECK_CODE('''
+               #if defined(HAVE_UNISTD_H)
+               #include <unistd.h>
+               #endif
+               #include <sys/types.h>
+               #define _GNU_SOURCE
+               #include <fcntl.h>
+               #if defined(HAVE_LINUX_FALLOC_H)
+               #include <linux/falloc.h>
+               #endif
+               int ret = fallocate64(0, FALLOC_FL_KEEP_SIZE, 0, 10);''',
+               'HAVE_LINUX_FALLOCATE64',
+               msg="Checking whether the Linux 'fallocate64' function is available")
+    conf.CHECK_CODE('''
+               #if defined(HAVE_UNISTD_H)
+               #include <unistd.h>
+               #endif
+               #include <fcntl.h>
+               ssize_t err = readahead(0,0,0x80000);''',
+               'HAVE_LINUX_READAHEAD',
+               msg="Checking whether Linux readahead is available")
+    conf.CHECK_DECLS('readahead', headers='fcntl.h', always=True)
 
-    static_list = {}
-    shared_list = {}
+    conf.CHECK_CODE('''
+               #include <sys/types.h>
+               #include <sys/socket.h>],
+               struct ucred cred;
+               socklen_t cred_len;
+               int ret = getsockopt(0, SOL_SOCKET, SO_PEERCRED, &cred, &cred_len);''',
+               'HAVE_PEERCRED',
+               msg="Checking whether we can use SO_PEERCRED to get socket credentials")
 
-    prefixes = ['vfs', 'pdb', 'rpc', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount']
-    conf.env['MODULE_PREFIXES'] = prefixes
-    for p in prefixes:
-        for m in default_static_modules:
-            if m.find(p) == 0:
-                if not p in static_list:
-                    static_list[p] = []
-                static_list[p].append(m)
-        for m in default_shared_modules:
-            if m.find(p) == 0:
-                if not p in shared_list:
-                    shared_list[p] = []
-                shared_list[p].append(m)
+    conf.CHECK_CODE('''
+               #if defined(HAVE_LONGLONG) && (defined(HAVE_OFF64_T) || (defined(SIZEOF_OFF_T) && (SIZEOF_OFF_T == 8)))
+               #include <sys/types.h>
+               #else
+               __COMPILE_ERROR_
+               #endif
+               int i;''',
+               'HAVE_EXPLICIT_LARGEFILE_SUPPORT',
+               msg="Checking whether large file support can be enabled")
 
-    for p in prefixes:
-        static_env = "%s_STATIC" % p.upper()
-        shared_env = "%s_SHARED" % p.upper()
-        conf.env[static_env] = []
-        conf.env[shared_env] = []
-        if p in static_list:
-            decl_list=""
-            for entry in static_list[p]:
-                decl_list += "extern NTSTATUS %s_init(void); " % entry
-                conf.env[static_env].append('%s' % entry.upper())
-            decl_list = decl_list.rstrip()
-            conf.DEFINE('static_decl_%s' % p, decl_list)
-            conf.DEFINE('static_init_%s' % p, '{ %s_init(); }' % '_init();  '.join(static_list[p]))
-        else:
-            conf.DEFINE('static_decl_%s' % p, '')
-            conf.DEFINE('static_init_%s' % p, '{}')
-        if p in shared_list:
-            for entry in shared_list[p]:
-                conf.DEFINE('%s_init' % entry, 'init_samba_module')
-                conf.env[shared_env].append('%s' % entry.upper())
+    if Options.options.with_aio_support:
+       conf.CHECK_FUNCS_IN('aio_read', 'aio')
+       conf.CHECK_FUNCS_IN('aio_read', 'rt')
+        conf.CHECK_CODE('struct aiocb a; return aio_read(&a);',
+                       'HAVE_AIO',
+                       msg='Checking for asynchronous io support',
+                       headers='sys/types.h aio.h',
+                       lib='aio rt')
+        conf.CHECK_CODE('struct aiocb64 a; return aio_read64(&a);',
+                       'HAVE_AIO64',
+                       msg='Checking for 64-bit asynchronous io support',
+                       headers='sys/types.h aio.h',
+                       lib='aio rt')
+        if conf.CONFIG_SET('HAVE_AIO64'):
+            conf.DEFINE('HAVE_AIOCB64', '1')
+            conf.DEFINE('WITH_AIO', '1')
+        elif conf.CONFIG_SET('HAVE_AIO'):
+            conf.DEFINE('WITH_AIO', '1')
+        if conf.CONFIG_SET('HAVE_AIO'):
+            conf.CHECK_CODE('struct aiocb a; return aio_read(&a);', 'HAVE_AIO_READ', msg='Checking for aio_read', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_write(&a);', 'HAVE_AIO_WRITE', msg='Checking for aio_write', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_fsync(1, &a);', 'HAVE_AIO_FSYNC', msg='Checking for aio_fsync', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_return(&a);', 'HAVE_AIO_RETURN', msg='Checking for aio_return', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_error(&a);', 'HAVE_AIO_ERROR', msg='Checking for aio_error', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_cancel(1, &a);', 'HAVE_AIO_CANCEL', msg='Checking for aio_cancel', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_suspend(&a, 1, NULL);', 'HAVE_AIO_SUSPEND', msg='Checking for aio_suspend', headers='aio.h', lib='aio rt')
+        if conf.CONFIG_SET('HAVE_AIO64'):
+            conf.CHECK_CODE('struct aiocb a; return aio_read64(&a);', 'HAVE_AIO_READ64', msg='Checking for aio_read64', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_write64(&a);', 'HAVE_AIO_WRITE64', msg='Checking for aio_write64', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_fsync64(1, &a);', 'HAVE_AIO_FSYNC64', msg='Checking for aio_fsync64', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_return64(&a);', 'HAVE_AIO_RETURN64', msg='Checking for aio_return64', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_error64(&a);', 'HAVE_AIO_ERROR64', msg='Checking for aio_error64', headers='aio.h', lib='aio rt')
+            conf.CHECK_CODE('struct aiocb a; return aio_cancel64(1, &a);', 'HAVE_AIO_CANCEL64', msg='Checking for aio_cancel64', headers='aio.h', lib='aio rt')
+           conf.CHECK_CODE('struct aiocb a; return aio_suspend64(&a, 1, NULL);', 'HAVE_AIO_SUSPEND64', msg='Checking for aio_suspend64', headers='aio.h', lib='aio rt')
+    else:
+        conf.DEFINE('HAVE_NO_AIO', '1')
+
+    conf.CHECK_CODE('''
+struct msghdr msg;
+union {
+       struct cmsghdr cm;
+        char control[CMSG_SPACE(sizeof(int))];
+} control_un;
+msg.msg_control = control_un.control;
+msg.msg_controllen = sizeof(control_un.control);
+''',
+       'HAVE_MSGHDR_MSG_CONTROL',
+       msg='Checking if we can use msg_control for passing file descriptors',
+       headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
+    conf.CHECK_CODE('''
+struct msghdr msg;
+int fd;
+msg.msg_acctrights = (caddr_t) &fd;
+msg.msg_acctrightslen = sizeof(fd);
+''',
+       'HAVE_MSGHDR_MSG_ACCTRIGHTS',
+       msg='Checking if we can use msg_acctrights for passing file descriptors',
+       headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
 
     if Options.options.with_winbind:
         conf.env.build_winbind = True
         conf.DEFINE('WITH_WINBIND', '1')
 
     conf.find_program('awk', var='AWK')
+    conf.find_program('perl', var='PERL')
 
     # Darwin has extra options to xattr-family functions
     conf.CHECK_CODE('getxattr(0, 0, 0, 0, 0, 0);',
@@ -336,21 +484,62 @@ utimensat vsyslog _write __write __xstat
                     msg="Checking whether xattr interface takes additional options",
                     headers='sys/types.h attr/xattr.h sys/xattr.h')
 
-    #FIXME: Should just be set when krb5 and ldap requirements are fulfilled
-    if Options.options.with_ads:
-        conf.DEFINE('WITH_ADS', '1')
+    conf.CHECK_HEADERS('asm/types.h')
+
+    conf.CHECK_CODE('dev_t dev; int i = major(dev); return 0', "HAVE_DEVICE_MAJOR_FN",
+                    headers='unistd.h sys/types.h',
+                    msg="Checking for major macro")
+
+    conf.CHECK_CODE('dev_t dev; int i = minor(dev); return 0', "HAVE_DEVICE_MINOR_FN",
+                    headers='unistd.h sys/types.h',
+                    msg="Checking for minor macro")
+
+    conf.CHECK_STRUCTURE_MEMBER('struct dirent', 'd_off',
+                                headers='unistd.h sys/types.h dirent.h',
+                                define='HAVE_DIRENT_D_OFF')
+
+    conf.CHECK_FUNCS('setnetgrent getnetgrent endnetgrent')
+    conf.CHECK_CODE('setnetgrent("foo")', 'HAVE_SETNETGRENT_PROTOTYPE',
+                    msg="Checking for setnetgrent prototype",
+                    headers='netdb.h netgroup.h',
+                    cflags="-Werror-implicit-function-declaration")
+    conf.CHECK_CODE('getnetgrent', 'HAVE_GETNETGRENT_PROTOTYPE',
+                    msg="Checking for getnetgrent prototype",
+                    headers='netdb.h netgroup.h',
+                    cflags="-Werror-implicit-function-declaration")
+    conf.CHECK_CODE('endnetgrent', 'HAVE_ENDNETGRENT_PROTOTYPE',
+                    msg="Checking for endnetgrent prototype",
+                    headers='netdb.h netgroup.h',
+                    cflags="-Werror-implicit-function-declaration")
+
 
     # Look for CUPS
-    conf.find_program('cups-config', var='CUPS_CONFIG')
-    if conf.env.CUPS_CONFIG and Options.options.with_cups:
-        conf.check_cfg(path="cups-config", args="--cflags --ldflags --libs",
-                       package="", uselib_store="cups")
+    if Options.options.with_cups:
+        conf.find_program('cups-config', var='CUPS_CONFIG')
+        if conf.env.CUPS_CONFIG:
+           conf.check_cfg(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags --libs",
+                           package="", uselib_store="cups")
         conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups')
-        conf.CHECK_LIB('cups')
+        conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', conf.env.LIB_cups)
+        if conf.CONFIG_SET('HAVE_CUPS_CUPS_H') and conf.CONFIG_SET('HAVE_CUPS_LANGUAGE_H'):
+            conf.DEFINE('HAVE_CUPS', '1')
+        else:
+            conf.undefine('HAVE_CUPS')
+            conf.SET_TARGET_TYPE('cups', 'EMPTY')
     else:
         # define an empty subsystem for cups, to allow it to be used as an empty dependency
         conf.SET_TARGET_TYPE('cups', 'EMPTY')
 
+    if Options.options.with_iprint:
+       if conf.CONFIG_SET('HAVE_CUPS'):
+            conf.DEFINE('HAVE_IPRINT', '1')
+        else:
+            print "--enable-iprint=yes but cups support not sufficient"
+    if Options.options.with_syslog:
+        conf.DEFINE('WITH_SYSLOG', '1')
+    if Options.options.with_automount:
+        conf.DEFINE('WITH_AUTOMOUNT', '1')
+
     # Check for LDAP
     if Options.options.with_ldap:
         conf.CHECK_HEADERS('ldap.h lber.h')
@@ -384,19 +573,20 @@ utimensat vsyslog _write __write __xstat
         if conf.CONFIG_SET('HAVE_LDAP_INIT'):
             conf.DEFINE('HAVE_LDAP', '1')
             conf.DEFINE('LDAP_DEPRECATED', '1')
-            conf.env['SMBLDAP'] = 'lib/smbldap.c'
-            conf.env['SMBLDAPUTIL'] = 'lib/smbldap_util.c'
+            conf.env['HAVE_LDAP'] = '1'
     else:
         conf.SET_TARGET_TYPE('ldap', 'EMPTY')
         conf.SET_TARGET_TYPE('lber', 'EMPTY')
 
     # Check for kerberos
-    conf.find_program('krb5-config', var='KRB5_CONFIG')
-    if conf.env.KRB5_CONFIG and Options.options.with_krb5:
-        conf.check_cfg(path="krb5-config", args="--cflags --libs",
+    have_gssapi=False
+    if Options.options.with_krb5:
+        conf.find_program('krb5-config', var='KRB5_CONFIG')
+        if conf.env.KRB5_CONFIG:
+            conf.check_cfg(path="krb5-config", args="--cflags --libs",
                        package="gssapi", uselib_store="krb5")
         conf.CHECK_HEADERS('krb5.h krb5/locate_plugin.h', lib='krb5')
-        conf.CHECK_HEADERS('gssapi.h gssapi/gssapi_generic.h gssapi/gssapi.h com_err.h', lib='krb5')
+        conf.CHECK_HEADERS('gssapi.h gssapi/gssapi_generic.h gssapi/gssapi.h gssapi/gssapi_ext.h com_err.h', lib='krb5')
 
         if conf.CONFIG_SET('HAVE_KRB5_LOCATE_PLUGIN_H'):
             conf.env['WINBIND_KRB5_LOCATOR'] = 'bin/winbind_krb5_locator.so'
@@ -406,7 +596,10 @@ utimensat vsyslog _write __write __xstat
         conf.CHECK_FUNCS_IN('crypto', 'des_set_key')
         conf.CHECK_FUNCS_IN('copy_Authenticator', 'asn1')
         conf.CHECK_FUNCS_IN('roken_getaddrinfo_hostspec', 'roken')
-        conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi gssapi_krb5')
+        if conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi') or \
+           conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi_krb5'):
+            have_gssapi=True
+        conf.CHECK_FUNCS_IN('gss_wrap_iov', 'gssapi gssapi_krb5 krb5')
         conf.CHECK_FUNCS_IN('krb5_mk_req_extended krb5_kt_compare', 'krb5')
         conf.CHECK_FUNCS('''
 krb5_set_real_time krb5_set_default_in_tkt_etypes krb5_set_default_tgs_enctypes
@@ -426,7 +619,7 @@ krb5_get_init_creds_opt_free krb5_get_init_creds_opt_get_error
 krb5_enctype_to_string krb5_fwd_tgt_creds krb5_auth_con_set_req_cksumtype
 krb5_get_creds_opt_alloc krb5_get_creds_opt_set_impersonate krb5_get_creds
 krb5_get_credentials_for_user krb5_get_host_realm krb5_free_host_realm''',
-                         lib='krb5')
+                         lib='krb5 k5crypto')
         conf.CHECK_DECLS('''krb5_get_credentials_for_user
                             krb5_auth_con_set_req_cksumtype''',
                             headers='krb5.h', always=True)
@@ -448,7 +641,21 @@ krb5_get_credentials_for_user krb5_get_host_realm krb5_free_host_realm''',
                                     define='HAVE_KRB5_KEYBLOCK_IN_CREDS')
         conf.CHECK_STRUCTURE_MEMBER('krb5_creds', 'session', headers='krb5.h',
                                     define='HAVE_KRB5_SESSION_IN_CREDS')
+        conf.CHECK_STRUCTURE_MEMBER('krb5_ap_req', 'ticket', headers='krb5.h',
+                                    define='HAVE_TICKET_POINTER_IN_KRB5_AP_REQ')
+
         conf.CHECK_TYPE('krb5_encrypt_block', headers='krb5.h')
+
+        conf.CHECK_CODE('''
+krb5_ticket ticket;
+krb5_kvno kvno;
+krb5_enctype enctype;
+enctype = ticket.enc_part.enctype;
+kvno = ticket.enc_part.kvno;
+''',
+                        'KRB5_TICKET_HAS_KEYINFO',
+                        headers='krb5.h', link=False,
+                        msg="Checking whether the krb5_ticket structure contains the kvno and enctype")
         conf.CHECK_CODE('''
 krb5_context ctx;
 krb5_get_init_creds_opt *opt = NULL;
@@ -478,7 +685,7 @@ krb5_enctype_to_string(1, buf, 256);
 return 0;
 }''',
                         'HAVE_KRB5_ENCTYPE_TO_STRING_WITH_SIZE_T_ARG',
-                        headers='krb5.h', lib='krb5',
+                        headers='krb5.h', lib='krb5 k5crypto',
                         addmain=False, cflags='-Werror',
                         msg="Checking whether krb5_enctype_to_string takes size_t argument")
 
@@ -494,11 +701,112 @@ return 0;
                         headers='krb5.h stdlib.h', lib='krb5',
                         addmain=False, cflags='-Werror',
                         msg="Checking whether krb5_enctype_to_string takes krb5_context argument")
+        conf.CHECK_CODE('''
+int main(void) {
+krb5_context ctx = NULL;
+krb5_principal princ = NULL;
+const char *str = krb5_princ_realm(ctx, princ)->data;
+return 0;
+}''',
+                        'HAVE_KRB5_PRINC_REALM',
+                        headers='krb5.h', lib='krb5',
+                        addmain=False,
+                        msg="Checking whether the macro krb5_princ_realm is defined")
+        if conf.CHECK_CODE('''krb5_verify_checksum(0, 0, 0, 0, 0, 0, 0);''',
+                        'KRB5_VERIFY_CHECKSUM_ARGS',
+                        headers='krb5.h', lib='krb5',
+                       msg="Checking whether krb5_verify_checksum takes 7 arguments"):
+            conf.DEFINE('KRB5_VERIFY_CHECKSUM_ARGS', '7')
+       else:
+            conf.DEFINE('KRB5_VERIFY_CHECKSUM_ARGS', '6')
+
+       conf.CHECK_CODE('''
+krb5_enctype enctype;
+enctype = ENCTYPE_ARCFOUR_HMAC_MD5;
+''',
+            '_HAVE_ENCTYPE_ARCFOUR_HMAC_MD5',
+            headers='krb5.h', lib='krb5',
+            msg="Checking whether the ENCTYPE_ARCFOUR_HMAC_MD5 key type definition is available");
+       conf.CHECK_CODE('''
+krb5_keytype keytype;
+keytype = KEYTYPE_ARCFOUR_56;
+''',
+            '_HAVE_KEYTYPE_ARCFOUR_56',
+            headers='krb5.h', lib='krb5',
+            msg="Checking whether the HAVE_KEYTYPE_ARCFOUR_56 key type definition is available");
+       if conf.CONFIG_SET('_HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and conf.CONFIG_SET('_HAVE_KEYTYPE_ARCFOUR_56'):
+            conf.DEFINE('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5', '1')
+
+       conf.CHECK_CODE('''
+krb5_enctype enctype;
+enctype = ENCTYPE_ARCFOUR_HMAC;
+''',
+            'HAVE_ENCTYPE_ARCFOUR_HMAC',
+            headers='krb5.h', lib='krb5',
+            msg="Checking whether the ENCTYPE_ARCFOUR_HMAC key type definition is available");
+
+       conf.CHECK_CODE('''
+krb5_context context;
+krb5_keytab keytab;
+krb5_init_context(&context);
+return krb5_kt_resolve(context, "WRFILE:api", &keytab);
+''',
+            'HAVE_WRFILE_KEYTAB',
+            headers='krb5.h', lib='krb5', execute=True,
+            msg="Checking whether the WRFILE:-keytab is supported");
 
     else:
         conf.SET_TARGET_TYPE('krb5', 'EMPTY')
         conf.SET_TARGET_TYPE('gssapi', 'EMPTY')
         conf.SET_TARGET_TYPE('gssapi_krb5', 'EMPTY')
+        conf.SET_TARGET_TYPE('com_err', 'EMPTY')
+        conf.SET_TARGET_TYPE('k5crypto', 'EMPTY')
+
+    if Options.options.with_ads:
+        use_ads=True
+        if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
+           not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
+            print "arcfour-hmac-md5 encryption type not found in -lkrb5"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
+            print "krb5_mk_req_extended not found in -lkrb5"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
+           not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
+            print "no CREATE_KEY_FUNCTIONS detected"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
+           not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
+            print "no GET_ENCTYPES_FUNCTIONS detected"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
+           not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
+            print "no KT_FREE_FUNCTION detected"
+            use_ads=False
+        if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM') and \
+           not conf.CONFIG_SET('HAVE_KRB5_VERIFY_CHECKSUM'):
+            print "no KRB5_VERIFY_CHECKSUM_FUNCTION detected"
+            use_ads=False
+        if not conf.CONFIG_SET('KRB5_TICKET_HAS_KEYINFO'):
+            # We only need the following functions if we can't get the enctype
+            # and kvno out of the ticket directly (ie. on Heimdal).
+            if not conf.CONFIG_SET('free_AP_REQ'):
+                print "no KRB5_AP_REQ_FREE_FUNCTION detected"
+                use_ads=False
+            if not conf.CONFIG_SET('HAVE_KRB5_DECODE_AP_REQ'):
+                print "no KRB5_AP_REQ_DECODING_FUNCTION detected"
+                use_ads=False
+        if use_ads:
+            conf.DEFINE('WITH_ADS', '1')
+            conf.DEFINE('HAVE_KRB5', '1')
+            if have_gssapi:
+                conf.DEFINE('HAVE_GSSAPI', '1')
+        else:
+            print "krb5 libs don't have all features required for Active Directory support"
+            conf.undefine('HAVE_KRB5_H')
+            conf.undefine('HAVE_GSSAPI_H')
+            conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
+            conf.undefine('HAVE_GSSAPI_GSSAPI_H')
 
     if Options.options.with_utmp:
         conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent')
@@ -531,25 +839,275 @@ return 0;
                         msg="Checking whether pututline returns pointer")
         conf.DEFINE('WITH_UTMP', 1)
 
-    # FIXME: these should be tests for features, but the old build system just
-    # checks for OSes.
-    import sys
-    host_os = sys.platform
+    if Options.options.with_avahi:
+        conf.env.with_avahi = True
+        if not conf.CHECK_HEADERS('avahi-common/watch.h avahi-client/client.h'): conf.env.with_avahi = False
+        if not conf.CHECK_FUNCS_IN('avahi_client_new', 'avahi-client'): conf.env.with_avahi = False
+        if not conf.CHECK_FUNCS_IN('avahi_strerror', 'avahi-common'): conf.env.with_avahi = False
+        if conf.env.with_avahi:
+            conf.DEFINE('WITH_AVAHI_SUPPORT', 1)
+    else:
+        conf.SET_TARGET_TYPE('avahi-common', 'EMPTY')
+        conf.SET_TARGET_TYPE('avahi-client', 'EMPTY')
 
-    # Python doesn't have case switches... :/
-    # FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
-    # the search for .rfind('gnu') covers gnu* and *-gnu is that too broad?
-    if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('qnx') > -1):
-        if host_os.rfind('linux') > -1:
-            conf.DEFINE('LINUX', '1')
-        elif host_os.rfind('qnx') > -1:
-            conf.DEFINE('QNX', '1')
-        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
-    elif (host_os.rfind('darwin') > -1):
-        conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
-    # FIXME: Add more checks here.
+    if Options.options.with_iconv:
+        conf.env.with_iconv = True
+        if not conf.CHECK_FUNCS_IN('iconv_open', 'iconv', headers='iconv.h'):
+            conf.env.with_iconv = False
+        if conf.env.with_iconv:
+            conf.DEFINE('HAVE_ICONV', 1)
+
+    if Options.options.with_pam:
+        use_pam=True
+        conf.CHECK_HEADERS('security/pam_appl.h pam/pam_appl.h')
+        if not conf.CONFIG_SET('HAVE_SECURITY_PAM_APPL_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_APPL_H'):
+            print "--with-pam=yes but pam_appl.h not found"
+            use_pam=False
+        conf.CHECK_FUNCS_IN('pam_get_data', 'pam')
+        conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
+        if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
+            print "--with-pam=yes but pam_modules.h not found"
+            use_pam=False
+        conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h')
+        conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h')
+        conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam')
+       conf.CHECK_CODE('''
+#if defined(HAVE_SECURITY_PAM_APPL_H)
+#include <security/pam_appl.h>
+#elif defined(HAVE_PAM_PAM_APPL_H)
+#include <pam/pam_appl.h>
+#endif
+pam_set_item(0, PAM_RHOST, 0);
+''',
+            'HAVE_PAM_RHOST',
+            lib='pam',
+            msg="Checking whether PAM_RHOST is available");
+       conf.CHECK_CODE('''
+#if defined(HAVE_SECURITY_PAM_APPL_H)
+#include <security/pam_appl.h>
+#elif defined(HAVE_PAM_PAM_APPL_H)
+#include <pam/pam_appl.h>
+#endif
+pam_set_item(0, PAM_TTY, 0);
+''',
+            'HAVE_PAM_TTY',
+            lib='pam',
+            msg="Checking whether PAM_TTY is available");
+       conf.CHECK_CODE('''
+#if (!defined(LINUX))
+
+#define PAM_EXTERN extern
+#if defined(HAVE_SECURITY_PAM_APPL_H)
+#include <security/pam_appl.h>
+#elif defined(HAVE_PAM_PAM_APPL_H)
+#include <pam/pam_appl.h>
+#endif
+
+#endif
+
+#if defined(HAVE_SECURITY_PAM_MODULES_H)
+#include <security/pam_modules.h>
+#elif defined(HAVE_PAM_PAM_MODULES_H)
+#include <pam/pam_modules.h>
+#endif
+
+#if defined(HAVE_SECURITY__PAM_MACROS_H)
+#include <security/_pam_macros.h>
+#elif defined(HAVE_PAM__PAM_MACROS_H)
+#include <pam/_pam_macros.h>
+#endif
+
+#ifdef HAVE_SECURITY_PAM_EXT_H
+#include <security/pam_ext.h>
+#endif
+
+int i; i = PAM_RADIO_TYPE;
+''',
+            'HAVE_PAM_RADIO_TYPE',
+            lib='pam',
+            msg="Checking whether PAM_RADIO_TYPE is available");
+        if use_pam:
+            conf.DEFINE('WITH_PAM', 1)
+            conf.DEFINE('WITH_PAM_MODULES', 1)
+
+    seteuid = False
+    if not seteuid:
+        seteuid = conf.CHECK_CODE('''
+                               #define AUTOCONF_TEST 1
+                               #define USE_SETREUID 1
+                               #include "./lib/util_sec.c"
+                               ''',
+                               'USE_SETREUID',
+                               addmain=False,
+                               execute=True,
+                               msg="Checking whether setreuid is available")
+    if not seteuid:
+        seteuid = conf.CHECK_CODE('''
+                               #define AUTOCONF_TEST 1
+                               #define USE_SETRESUID 1
+                               #include "./lib/util_sec.c"
+                               ''',
+                               'USE_SETRESUID',
+                               addmain=False,
+                               execute=True,
+                               msg="Checking whether setresuid is available")
+    if not seteuid:
+        seteuid = conf.CHECK_CODE('''
+                               #define AUTOCONF_TEST 1
+                               #define USE_SETEUID 1
+                               #include "./lib/util_sec.c"
+                               ''',
+                               'USE_SETEUID',
+                               addmain=False,
+                               execute=True,
+                               msg="Checking whether seteuid is available")
+    if not seteuid:
+        seteuid = conf.CHECK_CODE('''
+                               #define AUTOCONF_TEST 1
+                               #define USE_SETUIDX 1
+                               #include "./lib/util_sec.c"
+                               ''',
+                               'USE_SETUIDX',
+                               addmain=False,
+                               execute=True,
+                               mandatory=True,
+                               msg="Checking whether setuidx is available")
+    if Options.options.with_dnsupdate:
+        conf.CHECK_HEADERS('uuid/uuid.h')
+        conf.CHECK_FUNCS_IN('uuid_generate', 'uuid')
+        if not conf.CONFIG_SET('HAVE_UUID_UUID_H') and not conf.CONFIG_SET('HAVE_UUID_GENERATE'):
+            print "--with-dnsupdate=yes but uuid support not sufficient"
+        elif not conf.CONFIG_SET('HAVE_GSSAPI'):
+            print "--with-dnsupdate=yes but gssapi support not sufficient"
+        else:
+            conf.DEFINE('WITH_DNS_UPDATES', 1)
     else:
-        print "Unknown host_os '%s', please report this to samba-technical@samba.org" % host_os
+        conf.SET_TARGET_TYPE('uuid', 'EMPTY')
+    conf.CHECK_HEADERS('valgrind.h valgrind/valgrind.h valgrind/memcheck.h')
+    if Options.options.developer:
+        if conf.CONFIG_SET('HAVE_VALGRIND_H') or conf.CONFIG_SET('HAVE_VALGRIND_VALGRIND_H'):
+            conf.DEFINE('VALGRIND', '1')
+
+    if conf.CHECK_CODE('''
+#include <bits/sockaddr.h>
+#include <linux/netlink.h>
+''',
+               'HAVE_LINUX_NETLINK_H',
+                msg="Checking whether Linux netlink is available"):
+        conf.CHECK_CODE('''
+#include <bits/sockaddr.h>
+#include <linux/netlink.h>
+#include <linux/rtnetlink.h>
+''',
+               'HAVE_LINUX_RTNETLINK_H',
+               msg='Checking whether Linux rtnetlink is available')
+    if conf.CHECK_TYPE('struct dirent64', headers='sys/types.h dirent.h') and conf.CONFIG_SET('HAVE_READDIR64'):
+        conf.DEFINE('HAVE_STRUCT_DIRENT64', '1')
+    else:
+        conf.undefine('HAVE_STRUCT_DIRENT64')
+
+    conf.CHECK_CODE('''
+#include "../tests/fcntl_lock.c"
+''',
+               'HAVE_FCNTL_LOCK',
+               addmain=False,
+               execute=True,
+               msg='Checking whether fcntl locking is available')
+
+    default_static_modules=TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam
+                                      auth_sam auth_unix auth_winbind auth_wbc auth_server
+                                      auth_domain auth_builtin vfs_default
+                                      nss_info_template idmap_tdb idmap_passdb
+                                      idmap_nss''')
+
+    default_shared_modules=TO_LIST('''vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk
+                                      vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
+                                      vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2 charset_CP850
+                                      charset_CP437 auth_script vfs_readahead vfs_xattr_tdb
+                                      vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
+                                      vfs_smb_traffic_analyzer vfs_preopen vfs_catia vfs_scannedonly
+                                      vfs_crossrename vfs_linux_xfs_sgid
+                                      vfs_time_audit idmap_autorid''')
+
+    if Options.options.developer:
+        default_static_modules.extend(TO_LIST('pdb_ads auth_netlogond'))
+        default_shared_modules.extend(TO_LIST('charset_weird perfcount_test'))
+
+    if Options.options.with_acl_support and conf.CONFIG_SET('HAVE_POSIX_ACLS'):
+        default_static_modules.extend(TO_LIST('vfs_posixacl'))
+
+    if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
+       default_shared_modules.extend(TO_LIST('vfs_zfsacl'))
+
+    if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
+       default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort'))
+
+    if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
+       default_shared_modules.extend(TO_LIST('vfs_fileid'))
+
+    if conf.CONFIG_SET('HAVE_AIO') and (conf.CONFIG_SET('HAVE_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_MSGHDR_MSG_ACCTRIGHTS')):
+       default_shared_modules.extend(TO_LIST('vfs_aio_fork'))
+
+    if conf.CONFIG_SET('HAVE_LDAP'):
+        default_static_modules.extend(TO_LIST('pdb_ldap idmap_ldap'))
+
+    explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
+    explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
+
+    final_static_modules = default_static_modules
+    final_shared_modules = default_shared_modules
+
+    for m in explicit_static_modules:
+        if m in final_shared_modules:
+            final_shared_modules.remove(m)
+        final_static_modules.append(m)
+    for m in explicit_shared_modules:
+        if m in final_static_modules:
+            final_static_modules.remove(m)
+        final_shared_modules.append(m)
+
+    conf.env['static_modules'] = final_static_modules
+    conf.env['shared_modules'] = final_shared_modules
+
+    conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
+
+    static_list = {}
+    shared_list = {}
+
+    prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount']
+    conf.env['MODULE_PREFIXES'] = prefixes
+    for p in prefixes:
+        for m in final_static_modules:
+            if m.find(p) == 0:
+                if not p in static_list:
+                    static_list[p] = []
+                static_list[p].append(m)
+        for m in final_shared_modules:
+            if m.find(p) == 0:
+                if not p in shared_list:
+                    shared_list[p] = []
+                shared_list[p].append(m)
+
+    for p in prefixes:
+        static_env = "%s_STATIC" % p.upper()
+        shared_env = "%s_SHARED" % p.upper()
+        conf.env[static_env] = []
+        conf.env[shared_env] = []
+        if p in static_list:
+            decl_list=""
+            for entry in static_list[p]:
+                decl_list += "extern NTSTATUS %s_init(void); " % entry
+                conf.env[static_env].append('%s' % entry)
+            decl_list = decl_list.rstrip()
+            conf.DEFINE('static_decl_%s' % p, decl_list)
+            conf.DEFINE('static_init_%s' % p, '{ %s_init(); }' % '_init();  '.join(static_list[p]))
+        else:
+            conf.DEFINE('static_decl_%s' % p, '')
+            conf.DEFINE('static_init_%s' % p, '{}')
+        if p in shared_list:
+            for entry in shared_list[p]:
+                conf.DEFINE('%s_init' % entry, 'init_samba_module')
+                conf.env[shared_env].append('%s' % entry)
 
     conf.SAMBA_CONFIG_H('include/config.h')