auth/kerberos: Use talloc_stackframe to avoid memory and FD leak of event context
[kai/samba-autobuild/.git] / source4 / auth / kerberos / wscript_build
old mode 100644 (file)
new mode 100755 (executable)
index 989614e..ffcb54c
@@ -1,16 +1,26 @@
 #!/usr/bin/env python
 
+bld.SAMBA_SUBSYSTEM('KRB_INIT_CTX',
+                   source='krb5_init_context.c',
+                   deps='gssapi krb5samba'
+                  )
+
 bld.SAMBA_LIBRARY('authkrb5',
-                  source='kerberos.c kerberos_heimdal.c kerberos_pac.c krb5_init_context.c keytab_copy.c',
+                  source='kerberos_pac.c',
                   autoproto='proto.h',
-                  public_deps='krb5 ndr-krb5pac samba_socket LIBCLI_RESOLVE com_err asn1',
-                  deps='auth_sam_reply tevent LIBPACKET ndr ldb KRB5_WRAP errors',
+                  public_deps='ndr-krb5pac krb5samba samba_socket LIBCLI_RESOLVE asn1',
+                  deps='auth_sam_reply tevent LIBPACKET ndr ldb krb5samba KRB_INIT_CTX KRB5_PAC errors',
                   private_library=True
                   )
 
 bld.SAMBA_SUBSYSTEM('KERBEROS_UTIL',
        autoproto='kerberos_util.h',
        source='kerberos_util.c',
-       deps='authkrb5 com_err ldb CREDENTIALS_KRB5 SECRETS',
+       deps='authkrb5 krb5samba com_err CREDENTIALS_KRB5',
        )
 
+bld.SAMBA_SUBSYSTEM('KERBEROS_SRV_KEYTAB',
+       autoproto='kerberos_srv_keytab.h',
+       source='srv_keytab.c',
+       deps='authkrb5',
+       )