auth/kerberos: Use talloc_stackframe to avoid memory and FD leak of event context
[kai/samba-autobuild/.git] / source4 / auth / kerberos / wscript_build
old mode 100644 (file)
new mode 100755 (executable)
index 4f0c8cc..ffcb54c
@@ -1,15 +1,26 @@
 #!/usr/bin/env python
 
-bld.SAMBA_SUBSYSTEM('KERBEROS',
-       source='kerberos.c clikrb5.c kerberos_heimdal.c kerberos_pac.c gssapi_parse.c krb5_init_context.c keytab_copy.c',
-       autoproto='proto.h',
-       public_deps='krb5 NDR_KRB5PAC samba_socket LIBCLI_RESOLVE com_err',
-       deps='ASN1_UTIL auth_sam_reply tevent LIBPACKET ndr'
-       )
+bld.SAMBA_SUBSYSTEM('KRB_INIT_CTX',
+                   source='krb5_init_context.c',
+                   deps='gssapi krb5samba'
+                  )
+
+bld.SAMBA_LIBRARY('authkrb5',
+                  source='kerberos_pac.c',
+                  autoproto='proto.h',
+                  public_deps='ndr-krb5pac krb5samba samba_socket LIBCLI_RESOLVE asn1',
+                  deps='auth_sam_reply tevent LIBPACKET ndr ldb krb5samba KRB_INIT_CTX KRB5_PAC errors',
+                  private_library=True
+                  )
 
 bld.SAMBA_SUBSYSTEM('KERBEROS_UTIL',
        autoproto='kerberos_util.h',
        source='kerberos_util.c',
-       deps='KERBEROS com_err ldb CREDENTIALS_KRB5 SECRETS',
+       deps='authkrb5 krb5samba com_err CREDENTIALS_KRB5',
        )
 
+bld.SAMBA_SUBSYSTEM('KERBEROS_SRV_KEYTAB',
+       autoproto='kerberos_srv_keytab.h',
+       source='srv_keytab.c',
+       deps='authkrb5',
+       )