vfs: add ceph_snapshots module
[Samba.git] / source3 / wscript
blobff72a173a4bfc78f2c2319d1236586ecd60d2207
1 #!/usr/bin/env python
3 srcdir = ".."
5 import sys, os
6 from optparse import SUPPRESS_HELP
7 sys.path.insert(0, srcdir + "/buildtools/wafsamba")
8 sys.path.insert(0, "source3")
10 from waflib import Options, Logs, Errors
11 import wafsamba
12 import build.charset
13 from wafsamba import samba_utils
14 from samba_utils import TO_LIST
15 import samba3
16 from waflib.Tools import bison
18 default_prefix = Options.default_prefix = '/usr/local/samba'
20 def options(opt):
22 opt.add_option('--with-static-modules',
23 help=("Comma-separated list of names of modules to statically link in. "+
24 "May include !module to disable 'module'. "+
25 "Can be '!FORCED' to disable all non-required static only modules. "+
26 "Can be '!DEFAULT' to disable all modules defaulting to a static build. "+
27 "Can be 'ALL' to build all default shared modules static. "+
28 "The most specific one wins, while the order is ignored "+
29 "and --with-static-modules is evaluated before "+
30 "--with-shared-modules"),
31 action="store", dest='static_modules', default=None)
32 opt.add_option('--with-shared-modules',
33 help=("Comma-separated list of names of modules to build shared. "+
34 "May include !module to disable 'module'. "+
35 "Can be '!FORCED' to disable all non-required shared only modules. "+
36 "Can be '!DEFAULT' to disable all modules defaulting to a shared build. "+
37 "Can be 'ALL' to build all default static modules shared. "+
38 "The most specific one wins, while the order is ignored "+
39 "and --with-static-modules is evaluated before "+
40 "--with-shared-modules"),
41 action="store", dest='shared_modules', default=None)
43 opt.samba_add_onoff_option('winbind')
44 opt.samba_add_onoff_option('ads')
45 opt.samba_add_onoff_option('ldap')
46 opt.samba_add_onoff_option('cups', with_name="enable", without_name="disable")
47 opt.samba_add_onoff_option('iprint', with_name="enable", without_name="disable")
48 opt.samba_add_onoff_option('pam')
49 opt.samba_add_onoff_option('quotas', default=None)
50 opt.samba_add_onoff_option('sendfile-support', default=None)
51 opt.samba_add_onoff_option('utmp')
52 opt.samba_add_onoff_option('avahi', with_name="enable", without_name="disable")
53 opt.samba_add_onoff_option('iconv')
54 opt.samba_add_onoff_option('acl-support')
55 opt.samba_add_onoff_option('dnsupdate')
56 opt.samba_add_onoff_option('syslog')
57 opt.samba_add_onoff_option('automount')
58 opt.samba_add_onoff_option('dmapi', default=None) # None means autodetection
59 opt.samba_add_onoff_option('fam', default=None) # None means autodetection
60 opt.samba_add_onoff_option('profiling-data', default=False)
61 opt.samba_add_onoff_option('libarchive', default=True)
63 opt.samba_add_onoff_option('cluster-support', default=False)
65 opt.samba_add_onoff_option('regedit', default=None)
67 opt.samba_add_onoff_option('fake-kaserver',
68 help=("Include AFS fake-kaserver support"), default=False)
70 opt.add_option('--with-libcephfs',
71 help=("Directory under which libcephfs is installed"),
72 action="store", dest='libcephfs_dir', default=None)
74 opt.samba_add_onoff_option('glusterfs', with_name="enable", without_name="disable", default=True)
75 opt.samba_add_onoff_option('cephfs', with_name="enable", without_name="disable", default=True)
77 opt.add_option('--enable-vxfs',
78 help=("enable support for VxFS (default=no)"),
79 action="store_true", dest='enable_vxfs', default=False)
81 opt.samba_add_onoff_option('spotlight', with_name="enable", without_name="disable", default=False)
83 def configure(conf):
84 default_static_modules = []
85 default_shared_modules = []
86 required_static_modules = []
87 forced_static_modules = []
88 forced_shared_modules = []
90 if Options.options.developer:
91 conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD')
92 conf.env.developer = True
94 if sys.platform != 'openbsd5':
95 conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
97 # We crash without vfs_default
98 # and vfs_not_implemented provides helper function
99 # for other modules
100 required_static_modules.extend(TO_LIST('vfs_default vfs_not_implemented'))
102 conf.CHECK_HEADERS('netdb.h')
103 conf.CHECK_HEADERS('linux/falloc.h linux/ioctl.h')
105 conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod')
106 conf.CHECK_FUNCS('strtol strchr strupr chflags')
107 conf.CHECK_FUNCS('getrlimit fsync fdatasync setpgid')
108 conf.CHECK_FUNCS('setsid glob strpbrk crypt16 getauthuid')
109 conf.CHECK_FUNCS('innetgr')
110 conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf')
111 conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups syscall sysconf')
112 conf.CHECK_FUNCS('atexit grantpt posix_openpt fallocate')
113 conf.CHECK_FUNCS('fseeko setluid')
114 conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
115 conf.CHECK_FUNCS('fdopendir')
116 conf.CHECK_FUNCS('fstatat')
117 conf.CHECK_FUNCS('getpwent_r setenv clearenv strcasecmp fcvt fcvtl')
118 conf.CHECK_FUNCS('syslog vsyslog timegm setlocale')
119 conf.CHECK_FUNCS_IN('nanosleep', 'rt')
120 conf.CHECK_FUNCS('lutimes futimes utimensat futimens')
121 conf.CHECK_FUNCS('mlock munlock mlockall munlockall')
122 conf.CHECK_FUNCS('memalign posix_memalign hstrerror')
123 conf.CHECK_FUNCS_IN('yp_get_default_domain', 'nsl')
124 conf.CHECK_FUNCS_IN('dn_expand _dn_expand __dn_expand', 'resolv')
125 conf.CHECK_FUNCS_IN('dn_expand', 'inet')
126 conf.CHECK_DECLS('fdatasync', reverse=True)
127 conf.CHECK_DECLS('readahead', reverse=True, headers='fcntl.h')
129 if conf.CHECK_CODE('''
130 #if defined(HAVE_UNISTD_H)
131 #include <unistd.h>
132 #endif
133 long ret = splice(0,0,1,0,400,SPLICE_F_MOVE);
134 ''',
135 'HAVE_LINUX_SPLICE',
136 headers='fcntl.h'):
137 conf.CHECK_DECLS('splice', reverse=True, headers='fcntl.h')
139 # Check for inotify support (Skip if we are SunOS)
140 #NOTE: illumos provides sys/inotify.h but is not an exact match for linux
141 host_os = sys.platform
142 if host_os.rfind('sunos') == -1:
143 conf.CHECK_HEADERS('sys/inotify.h')
144 if conf.env.HAVE_SYS_INOTIFY_H:
145 conf.DEFINE('HAVE_INOTIFY', 1)
147 # Check for kernel change notify support
148 conf.CHECK_CODE('''
149 #ifndef F_NOTIFY
150 #define F_NOTIFY 1026
151 #endif
152 main() {
153 exit(fcntl(open("/tmp", O_RDONLY), F_NOTIFY, 0) == -1 ? 1 : 0);
154 }''', 'HAVE_KERNEL_CHANGE_NOTIFY', addmain=False, execute=True,
155 headers='fcntl.h signal.h',
156 msg="Checking for kernel change notify support")
158 # Check for Linux kernel oplocks
159 conf.CHECK_CODE('''
160 #include <sys/types.h>
161 #include <fcntl.h>
162 #include <signal.h>
163 #ifndef F_GETLEASE
164 #define F_GETLEASE 1025
165 #endif
166 main() {
167 exit(fcntl(open("/tmp", O_RDONLY), F_GETLEASE, 0) == -1 ? 1 : 0);
168 }''', 'HAVE_KERNEL_OPLOCKS_LINUX', addmain=False, execute=True,
169 msg="Checking for Linux kernel oplocks")
171 # Check for kernel share modes
172 conf.CHECK_CODE('''
173 #include <sys/types.h>
174 #include <fcntl.h>
175 #include <signal.h>
176 #include <sys/file.h>
177 #ifndef LOCK_MAND
178 #define LOCK_MAND 32
179 #define LOCK_READ 64
180 #endif
181 main() {
182 exit(flock(open("/dev/null", O_RDWR), LOCK_MAND|LOCK_READ) != 0);
183 }''', 'HAVE_KERNEL_SHARE_MODES', addmain=False, execute=True,
184 msg="Checking for kernel share modes")
186 # check for fam libs
187 samba_fam_libs=None
188 check_for_fam=False
189 if Options.options.with_fam is None:
190 check_for_fam=True
191 elif Options.options.with_fam == True:
192 check_for_fam=True
194 if check_for_fam and conf.CHECK_HEADERS('fam.h'):
195 if conf.CHECK_FUNCS_IN('FAMOpen2', 'fam'):
196 samba_fam_libs='fam'
197 elif conf.CHECK_FUNCS_IN('FAMOpen2', 'fam C'):
198 samba_fam_libs='fam C'
199 conf.CHECK_TYPE('enum FAMCodes', headers='fam.h',
200 define='HAVE_FAM_H_FAMCODES_TYPEDEF',
201 msg='Checking whether enum FAMCodes is available')
202 conf.CHECK_FUNCS_IN('FAMNoExists', 'fam')
204 if samba_fam_libs is not None:
205 conf.DEFINE('SAMBA_FAM_LIBS', samba_fam_libs)
206 conf.DEFINE('HAVE_FAM', 1)
207 else:
208 if Options.options.with_fam == True:
209 conf.fatal('FAM support requested, but no suitable FAM library found')
210 elif check_for_fam:
211 Logs.warn('no suitable FAM library found')
213 # check for libarchive (tar command in smbclient)
214 # None means autodetect, True/False means enable/disable
215 conf.SET_TARGET_TYPE('archive', 'EMPTY')
216 if Options.options.with_libarchive is not False:
217 Logs.info("Checking for libarchive existence")
218 if conf.CHECK_HEADERS('archive.h') and conf.CHECK_LIB('archive', shlib=True):
219 conf.CHECK_FUNCS_IN('archive_read_support_filter_all archive_read_free', 'archive')
220 else:
221 conf.fatal("libarchive support not found. "
222 "Try installing libarchive-dev or libarchive-devel. "
223 "Otherwise, use --without-libarchive to "
224 "build without libarchive support. "
225 "libarchive support is required for the smbclient "
226 "tar-file mode")
227 elif conf.CONFIG_GET('ENABLE_SELFTEST'):
228 raise Errors.WafError('libarchive library required for '
229 '--enable-selftest')
232 # check for DMAPI libs
233 if Options.options.with_dmapi == False:
234 have_dmapi = False
235 else:
236 have_dmapi = True
237 Logs.info("Checking for DMAPI library existence")
238 samba_dmapi_lib = ''
239 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dm'):
240 samba_dmapi_lib = 'dm'
241 else:
242 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'jfsdm'):
243 samba_dmapi_lib = 'jfsdm'
244 else:
245 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dmapi'):
246 samba_dmapi_lib = 'dmapi'
247 else:
248 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'xdsm'):
249 samba_dmapi_lib = 'xdsm'
250 # only bother to test headers and compilation when a candidate
251 # library has been found
252 if samba_dmapi_lib == '':
253 have_dmapi = False
254 broken_dmapi = "no suitable DMAPI library found"
256 if have_dmapi:
257 conf.CHECK_HEADERS('sys/dmi.h xfs/dmapi.h sys/jfsdmapi.h sys/dmapi.h dmapi.h')
258 conf.CHECK_CODE('''
259 #include <time.h> /* needed by Tru64 */
260 #include <sys/types.h> /* needed by AIX */
261 #ifdef HAVE_XFS_DMAPI_H
262 #include <xfs/dmapi.h>
263 #elif defined(HAVE_SYS_DMI_H)
264 #include <sys/dmi.h>
265 #elif defined(HAVE_SYS_JFSDMAPI_H)
266 #include <sys/jfsdmapi.h>
267 #elif defined(HAVE_SYS_DMAPI_H)
268 #include <sys/dmapi.h>
269 #elif defined(HAVE_DMAPI_H)
270 #include <dmapi.h>
271 #endif
273 /* This link test is designed to fail on IRI 6.4, but should
274 * succeed on Linux, IRIX 6.5 and AIX.
276 int main(int argc, char **argv)
278 char * version;
279 dm_eventset_t events;
280 /* This doesn't take an argument on IRIX 6.4. */
281 dm_init_service(&version);
282 /* IRIX 6.4 expects events to be a pointer. */
283 DMEV_ISSET(DM_EVENT_READ, events);
285 return 0;
287 ''',
288 'USEABLE_DMAPI_LIBRARY',
289 addmain=False,
290 execute=False,
291 lib=samba_dmapi_lib,
292 msg='Checking whether DMAPI lib '+samba_dmapi_lib+' can be used')
293 if not conf.CONFIG_SET('USEABLE_DMAPI_LIBRARY'):
294 have_dmapi = False
295 broken_dmapi = "no usable DMAPI library found"
297 if have_dmapi:
298 Logs.info("Building with DMAPI support.")
299 conf.env['dmapi_lib'] = samba_dmapi_lib
300 conf.DEFINE('USE_DMAPI', 1)
301 else:
302 if Options.options.with_dmapi == False:
303 Logs.info("Building without DMAPI support (--without-dmapi).")
304 elif Options.options.with_dmapi == True:
305 Logs.error("DMAPI support not available: " + broken_dmapi)
306 conf.fatal('DMAPI support requested but not found.');
307 else:
308 Logs.warn("Building without DMAPI support: " + broken_dmapi)
309 conf.env['dmapi_lib'] = ''
311 # Check for various members of the stat structure
312 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blocks', define='HAVE_STAT_ST_BLOCKS',
313 headers='sys/stat.h')
314 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blksize', define='HAVE_STAT_ST_BLKSIZE',
315 headers='sys/stat.h')
316 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_flags', define='HAVE_STAT_ST_FLAGS',
317 headers='sys/types.h sys/stat.h unistd.h')
319 if conf.env.HAVE_BLKCNT_T:
320 conf.CHECK_CODE('''
321 static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 4)];''',
322 'SIZEOF_BLKCNT_T_4',
323 headers='replace.h sys/types.h sys/stat.h unistd.h',
324 msg="Checking whether blkcnt_t is 32 bit")
326 # If sizeof is 4 it can't be 8
327 if conf.env.HAVE_BLKCNT_T:
328 if not conf.CONFIG_SET('SIZEOF_BLKCNT_T_4'):
329 conf.CHECK_CODE('''
330 static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 8)];''',
331 'SIZEOF_BLKCNT_T_8',
332 headers='replace.h sys/types.h sys/stat.h unistd.h',
333 msg="Checking whether blkcnt_t is 64 bit")
335 # Check for POSIX capability support
336 conf.CHECK_FUNCS_IN('cap_get_proc', 'cap', headers='sys/capability.h')
338 if conf.env.HAVE_SYS_CAPABILITY_H:
339 conf.CHECK_CODE('''
340 cap_t cap;
341 cap_value_t vals[1];
342 if (!(cap = cap_get_proc())) exit(1);
343 vals[0] = CAP_CHOWN;
344 cap_set_flag(cap, CAP_INHERITABLE, 1, vals, CAP_CLEAR);
345 cap_set_proc(cap);''',
346 'HAVE_POSIX_CAPABILITIES', execute=True, lib="cap",
347 headers='sys/capability.h',
348 msg="Checking whether POSIX capabilities are available")
350 conf.CHECK_CODE('int i;', 'BROKEN_NISPLUS_INCLUDE_FILES',
351 headers='sys/types.h sys/acl.h rpcsvc/nis.h',
352 msg="Checking for broken nisplus include files")
354 # Check if the compiler will optimize out functions
355 conf.CHECK_CODE('''
356 #include <sys/types.h>
357 size_t __unsafe_string_function_usage_here_size_t__(void);
358 #define CHECK_STRING_SIZE(d, len) (sizeof(d) != (len) && sizeof(d) != sizeof(char *))
359 static size_t push_string_check_fn(void *dest, const char *src, size_t dest_len) {
360 return 0;
363 #define push_string_check(dest, src, dest_len) \
364 (CHECK_STRING_SIZE(dest, dest_len) \
365 ? __unsafe_string_function_usage_here_size_t__() \
366 : push_string_check_fn(dest, src, dest_len))
368 int main(int argc, char **argv) {
369 char outbuf[1024];
370 char *p = outbuf;
371 const char *foo = "bar";
372 p += 31 + push_string_check(p + 31, foo, sizeof(outbuf) - (p + 31 - outbuf));
373 return 0;
374 }''', 'HAVE_COMPILER_WILL_OPTIMIZE_OUT_FNS',
375 addmain=False,
376 add_headers=False,
377 msg="Checking if the compiler will optimize out functions")
379 # Check if the compiler supports the LL suffix on long long integers
380 # AIX needs this
381 conf.CHECK_CODE('long long i = 0x8000000000LL', 'COMPILER_SUPPORTS_LL',
382 headers='stdio.h',
383 msg="Checking for LL suffix on long long integers")
385 conf.CHECK_FUNCS('''
386 _acl __acl atexit
387 _chdir __chdir chflags chmod _close __close _closedir
388 __closedir crypt16 devnm dirfd
389 DNSServiceRegister _dup __dup _dup2 __dup2 endmntent execl
390 _facl __facl _fchdir
391 __fchdir fchmod fchown _fcntl __fcntl fcvt fcvtl fdatasync
392 _fork __fork fseeko
393 _fstat __fstat fsync
394 futimens futimes __fxstat getauthuid
395 getcwd _getcwd __getcwd getdents __getdents getdirentries
396 getgrent getgrnam getgrouplist getgrset getmntent getpagesize
397 getpwanam getpwent_r getrlimit
398 glob grantpt hstrerror initgroups innetgr
399 llseek _llseek __llseek _lseek __lseek
400 _lstat __lstat lutimes
401 __lxstat memalign mknod mlock mlockall munlock munlockall
402 _open __open _opendir __opendir
403 pathconf poll
404 posix_memalign pread _pread __pread
405 pwrite _pwrite __pwrite
406 rdchk _read __read _readdir __readdir
407 _seekdir __seekdir
408 select setenv setgidx setgroups setlocale setluid
409 setmntent setpgid setpriv setsid setuidx
410 _stat __stat statvfs
411 strcasecmp strchr strpbrk strsignal strtol strupr sysconf sysctl sysctlbyname
412 __sys_llseek syslog _telldir __telldir timegm
413 utimensat vsyslog _write __write __xstat
414 ''')
416 conf.CHECK_SAMBA3_CHARSET() # see build/charset.py
418 # FIXME: these should be tests for features, but the old build system just
419 # checks for OSes.
420 host_os = sys.platform
421 Logs.info("building on %s" % host_os)
423 # Python doesn't have case switches... :/
424 # FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
425 # the search for .rfind('gnu') covers gnu* and *-gnu is that too broad?
427 conf.SET_TARGET_TYPE('sunacl', 'EMPTY')
428 if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('qnx') > -1):
429 if host_os.rfind('linux') > -1:
430 conf.DEFINE('LINUX', '1')
431 elif host_os.rfind('qnx') > -1:
432 conf.DEFINE('QNX', '1')
433 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
434 elif (host_os.rfind('darwin') > -1):
435 conf.DEFINE('DARWINOS', 1)
436 conf.ADD_CFLAGS('-fno-common')
437 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
438 elif (host_os.rfind('freebsd') > -1):
439 conf.DEFINE('FREEBSD', 1)
440 if conf.CHECK_HEADERS('sunacl.h'):
441 conf.DEFINE('HAVE_FREEBSD_SUNACL_H', '1')
442 conf.CHECK_FUNCS_IN(['acl'], 'sunacl')
443 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
444 elif (host_os.rfind('irix') > -1):
445 conf.DEFINE('IRIX', 1)
446 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
447 elif (host_os.rfind('aix') > -1):
448 conf.DEFINE('AIX', 1)
449 conf.DEFINE('STAT_ST_BLOCKSIZE', 'DEV_BSIZE')
450 elif (host_os.rfind('hpux') > -1):
451 conf.DEFINE('HPUX', 1)
452 conf.DEFINE('STAT_ST_BLOCKSIZE', '8192')
453 elif (host_os.rfind('osf') > -1):
454 conf.DEFINE('OSF1', 1)
455 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
457 # FIXME: Add more checks here.
458 else:
459 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
461 if Options.options.with_acl_support:
462 if (host_os.rfind('hpux') > -1):
463 Logs.info('Using HPUX ACLs')
464 conf.DEFINE('HAVE_HPUX_ACLS',1)
465 conf.DEFINE('POSIX_ACL_NEEDS_MASK',1)
466 default_static_modules.extend(TO_LIST('vfs_hpuxacl'))
467 elif (host_os.rfind('aix') > -1):
468 Logs.info('Using AIX ACLs')
469 conf.DEFINE('HAVE_AIX_ACLS',1)
470 default_static_modules.extend(TO_LIST('vfs_aixacl vfs_aixacl2'))
471 elif (host_os.rfind('darwin') > -1):
472 Logs.warn('ACLs on Darwin currently not supported')
473 conf.fatal("ACL support not available on Darwin/MacOS. "
474 "Use --without-acl-support for building without "
475 "ACL support. "
476 "ACL support is required to change permissions "
477 "from Windows clients.")
478 else:
479 conf.CHECK_FUNCS_IN(['acl_get_file'], 'acl')
480 if conf.CHECK_CODE('''
481 acl_t acl;
482 int entry_id;
483 acl_entry_t *entry_p;
484 return acl_get_entry(acl, entry_id, entry_p);
485 ''',
486 'HAVE_POSIX_ACLS',
487 headers='sys/types.h sys/acl.h', link=False,
488 msg="Checking for POSIX ACL support") :
489 conf.CHECK_CODE('''
490 acl_permset_t permset_d;
491 acl_perm_t perm;
492 return acl_get_perm_np(permset_d, perm);
493 ''',
494 'HAVE_ACL_GET_PERM_NP',
495 headers='sys/types.h sys/acl.h', link=True,
496 msg="Checking whether acl_get_perm_np() is available")
497 # source3/lib/sysacls.c calls posixacl_sys_acl_get_file()
498 required_static_modules.extend(TO_LIST('vfs_posixacl'))
499 conf.CHECK_VARIABLE('ACL_EVERYONE', headers='sys/acl.h')
500 elif conf.CHECK_FUNCS_IN(['facl'], 'sec'):
501 Logs.info('Using solaris or UnixWare ACLs')
502 conf.DEFINE('HAVE_SOLARIS_UNIXWARE_ACLS',1)
503 default_static_modules.extend(TO_LIST('vfs_solarisacl'))
504 elif conf.CHECK_FUNCS_IN(['acl_get_fd'], 'pacl'):
505 Logs.info('Using Tru64 ACLs')
506 conf.DEFINE('HAVE_TRU64_ACLS',1)
507 default_static_modules.extend(TO_LIST('vfs_tru64acl'))
508 else:
509 conf.fatal("ACL support not found. Try installing libacl1-dev "
510 "or libacl-devel. "
511 "Otherwise, use --without-acl-support to build "
512 "without ACL support. "
513 "ACL support is required to change permissions from "
514 "Windows clients.")
516 if conf.CHECK_FUNCS('dirfd'):
517 conf.DEFINE('HAVE_DIRFD_DECL', 1)
519 conf.CHECK_CODE('struct statfs fsd; fsid_t fsid = fsd.f_fsid; return statfs(".", &fsd);',
520 'HAVE_STATFS_F_FSID',
521 msg="vfs_fileid checking for statfs() and struct statfs.f_fsid",
522 headers='sys/types.h sys/statfs.h',
523 execute=True)
525 if conf.CONFIG_SET('HAVE_FALLOCATE'):
526 conf.CHECK_CODE('''
527 int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''',
528 'HAVE_LINUX_FALLOCATE',
529 msg="Checking whether the Linux 'fallocate' function is available",
530 headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
531 conf.CHECK_CODE('''
532 int ret = fallocate(0, FALLOC_FL_PUNCH_HOLE, 0, 10);''',
533 'HAVE_FALLOC_FL_PUNCH_HOLE',
534 msg="Checking whether Linux 'fallocate' supports hole-punching",
535 headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
537 conf.CHECK_CODE('''
538 int ret = lseek(0, 0, SEEK_HOLE);
539 ret = lseek(0, 0, SEEK_DATA);''',
540 'HAVE_LSEEK_HOLE_DATA',
541 msg="Checking whether lseek supports hole/data seeking",
542 headers='unistd.h sys/types.h')
544 conf.CHECK_CODE('''
545 ssize_t err = readahead(0,0,0x80000);''',
546 'HAVE_LINUX_READAHEAD',
547 msg="Checking whether Linux readahead is available",
548 headers='unistd.h fcntl.h')
549 conf.CHECK_DECLS('readahead', headers='fcntl.h', always=True)
551 conf.CHECK_CODE('int fd = openat(AT_FDCWD, ".", O_RDONLY);',
552 'HAVE_OPENAT',
553 msg='Checking for openat',
554 headers='fcntl.h')
556 conf.CHECK_CODE('''
557 struct msghdr msg;
558 union {
559 struct cmsghdr cm;
560 char control[CMSG_SPACE(sizeof(int))];
561 } control_un;
562 msg.msg_control = control_un.control;
563 msg.msg_controllen = sizeof(control_un.control);
564 ''',
565 'HAVE_STRUCT_MSGHDR_MSG_CONTROL',
566 msg='Checking if we can use msg_control for passing file descriptors',
567 headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
568 conf.CHECK_CODE('''
569 struct msghdr msg;
570 int fd;
571 msg.msg_accrights = (caddr_t) &fd;
572 msg.msg_accrightslen = sizeof(fd);
573 ''',
574 'HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS',
575 msg='Checking if we can use msg_accrights for passing file descriptors',
576 headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
578 if Options.options.with_winbind:
579 conf.env.build_winbind = True
580 conf.DEFINE('WITH_WINBIND', '1')
582 conf.find_program('awk', var='AWK')
584 conf.CHECK_HEADERS('asm/types.h')
586 conf.CHECK_CODE('dev_t dev; int i = major(dev); return 0', "HAVE_DEVICE_MAJOR_FN",
587 headers='unistd.h sys/types.h',
588 msg="Checking for major macro")
590 conf.CHECK_CODE('dev_t dev; int i = minor(dev); return 0', "HAVE_DEVICE_MINOR_FN",
591 headers='unistd.h sys/types.h',
592 msg="Checking for minor macro")
594 conf.CHECK_STRUCTURE_MEMBER('struct dirent', 'd_off',
595 headers='unistd.h sys/types.h dirent.h',
596 define='HAVE_DIRENT_D_OFF')
598 if (conf.CONFIG_SET('HAVE_YP_GET_DEFAULT_DOMAIN')):
599 conf.DEFINE('HAVE_NETGROUP', '1')
601 # Look for CUPS
602 if Options.options.with_cups:
603 conf.find_program('cups-config', var='CUPS_CONFIG')
604 if conf.env.CUPS_CONFIG:
605 # we would normally use --libs here, but cups-config incorrectly adds
606 # gssapi_krb5 and other libraries to its --libs output. That breaks the use
607 # of an in-tree heimdal kerberos
608 conf.CHECK_CFG(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags",
609 package="", uselib_store="CUPS")
610 conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups')
611 conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', 'cups')
612 if conf.CONFIG_SET('HAVE_CUPS_CUPS_H') and conf.CONFIG_SET('HAVE_CUPS_LANGUAGE_H'):
613 conf.DEFINE('HAVE_CUPS', '1')
614 else:
615 conf.undefine('HAVE_CUPS')
616 conf.SET_TARGET_TYPE('cups', 'EMPTY')
617 else:
618 # define an empty subsystem for cups, to allow it to be used as an empty dependency
619 conf.SET_TARGET_TYPE('cups', 'EMPTY')
621 if Options.options.with_iprint:
622 if conf.CONFIG_SET('HAVE_CUPS'):
623 conf.DEFINE('HAVE_IPRINT', '1')
624 else:
625 Logs.warn("--enable-iprint=yes but cups support not sufficient")
626 if Options.options.with_syslog:
627 conf.DEFINE('WITH_SYSLOG', '1')
628 if Options.options.with_automount:
629 conf.DEFINE('WITH_AUTOMOUNT', '1')
631 # Check for LDAP
632 if Options.options.with_ldap:
633 conf.CHECK_HEADERS('ldap.h lber.h ldap_pvt.h')
634 conf.CHECK_TYPE('ber_tag_t', 'unsigned int', headers='ldap.h lber.h')
635 conf.CHECK_FUNCS_IN('ber_scanf ber_sockbuf_add_io', 'lber')
636 conf.CHECK_VARIABLE('LDAP_OPT_SOCKBUF', headers='ldap.h')
638 # if we LBER_OPT_LOG_PRINT_FN we can intercept ldap logging and print it out
639 # for the samba logs
640 conf.CHECK_VARIABLE('LBER_OPT_LOG_PRINT_FN',
641 define='HAVE_LBER_LOG_PRINT_FN', headers='lber.h')
643 conf.CHECK_FUNCS_IN('ldap_init ldap_init_fd ldap_initialize ldap_set_rebind_proc', 'ldap')
644 conf.CHECK_FUNCS_IN('ldap_add_result_entry', 'ldap')
646 # Check if ldap_set_rebind_proc() takes three arguments
647 if conf.CHECK_CODE('ldap_set_rebind_proc(0, 0, 0)',
648 'LDAP_SET_REBIND_PROC_ARGS',
649 msg="Checking whether ldap_set_rebind_proc takes 3 arguments",
650 headers='ldap.h lber.h', link=False):
651 conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '3')
652 else:
653 conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '2')
655 # last but not least, if ldap_init() exists, we want to use ldap
656 if conf.CONFIG_SET('HAVE_LDAP_INIT') and conf.CONFIG_SET('HAVE_LDAP_H'):
657 conf.DEFINE('HAVE_LDAP', '1')
658 conf.DEFINE('LDAP_DEPRECATED', '1')
659 conf.env['HAVE_LDAP'] = '1'
660 # if ber_sockbuf_add_io() and LDAP_OPT_SOCKBUF are available, we can add
661 # SASL wrapping hooks
662 if conf.CONFIG_SET('HAVE_BER_SOCKBUF_ADD_IO') and \
663 conf.CONFIG_SET('HAVE_LDAP_OPT_SOCKBUF'):
664 conf.DEFINE('HAVE_LDAP_SASL_WRAPPING', '1')
665 else:
666 conf.fatal("LDAP support not found. "
667 "Try installing libldap2-dev or openldap-devel. "
668 "Otherwise, use --without-ldap to build without "
669 "LDAP support. "
670 "LDAP support is required for the LDAP passdb backend, "
671 "LDAP idmap backends and ADS. "
672 "ADS support improves communication with "
673 "Active Directory domain controllers.")
674 else:
675 conf.SET_TARGET_TYPE('ldap', 'EMPTY')
676 conf.SET_TARGET_TYPE('lber', 'EMPTY')
678 if Options.options.with_ads == False:
679 use_ads = False
680 use_ads_krb5 = False
681 use_ads_ldap = False
682 else:
683 use_ads = True
684 use_ads_krb5 = True
685 use_ads_ldap = True
686 if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
687 not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
688 Logs.warn("arcfour-hmac-md5 encryption type not found in -lkrb5")
689 use_ads_krb5 = False
690 if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
691 Logs.warn("krb5_mk_req_extended not found in -lkrb5")
692 use_ads_krb5 = False
693 if not conf.CONFIG_SET('HAVE_KRB5_GET_HOST_REALM'):
694 Logs.warn("krb5_get_host_realm not found in -lkrb5")
695 use_ads_krb5 = False
696 if not conf.CONFIG_SET('HAVE_KRB5_FREE_HOST_REALM'):
697 Logs.warn("krb5_free_host_realm not found in -lkrb5")
698 use_ads_krb5 = False
699 if not conf.CONFIG_SET('HAVE_KRB5_FWD_TGT_CREDS'):
700 Logs.warn("krb5_fwd_tgt_creds found in -lkrb5")
701 use_ads_krb5 = False
702 if not conf.CONFIG_SET('HAVE_KRB5_GET_INIT_CREDS_OPT_ALLOC'):
703 Logs.warn("krb5_get_init_creds_opt_alloc not found in -lkrb5")
704 use_ads_krb5 = False
705 if not conf.CONFIG_SET('KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT'):
706 Logs.warn("krb5_get_init_creds_opt_free was not found or was too old in -lkrb5")
707 use_ads_krb5 = False
708 if not conf.CONFIG_SET('HAVE_KRB5_GET_RENEWED_CREDS'):
709 Logs.warn("krb5_get_renewed_creds not found in -lkrb5")
710 use_ads_krb5 = False
711 if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL_COMPARE_ANY_REALM'):
712 Logs.warn("krb5_principal_compare_any_realm not found in -lkrb5")
713 use_ads_krb5 = False
714 if not conf.CONFIG_SET('HAVE_KRB5_C_STRING_TO_KEY') and \
715 not conf.CONFIG_SET('HAVE_KRB5_STRING_TO_KEY_SALT'):
716 Logs.warn("krb5_c_string_to_key not found in -lkrb5")
717 use_ads_krb5 = False
718 if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
719 not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
720 Logs.warn("no CREATE_KEY_FUNCTIONS detected")
721 use_ads_krb5 = False
722 if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
723 not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
724 Logs.warn("no GET_ENCTYPES_FUNCTIONS detected")
725 use_ads_krb5 = False
726 if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
727 not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
728 Logs.warn("no KT_FREE_FUNCTION detected")
729 use_ads_krb5 = False
730 if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM'):
731 Logs.warn("krb5_c_verify_checksum_compare not found in -lkrb5")
732 use_ads_krb5 = False
734 # We don't actually use
735 # gsskrb5_extract_authz_data_from_sec_context, but it is a
736 # clue that this Heimdal, which does the PAC processing we
737 # need on the standard gss_inquire_sec_context_by_oid
738 if not conf.CONFIG_SET('HAVE_GSS_GET_NAME_ATTRIBUTE') and \
739 not (conf.CONFIG_SET('HAVE_GSSKRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT') and \
740 conf.CONFIG_SET('HAVE_GSS_INQUIRE_SEC_CONTEXT_BY_OID')):
741 Logs.warn("need either gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support")
742 use_ads_krb5 = False
744 if not conf.CONFIG_SET('HAVE_GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT'):
745 Logs.warn("need gss_krb5_export_lucid_sec_context for SPNEGO and gss_wrap support")
746 use_ads_krb5 = False
748 if use_ads_krb5:
749 conf.DEFINE('HAVE_KRB5', '1')
750 conf.env['HAVE_KRB5'] = '1'
751 else:
752 conf.undefine('HAVE_KRB5_H')
753 conf.undefine('HAVE_GSSAPI_H')
754 conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
755 conf.undefine('HAVE_GSSAPI_GSSAPI_H')
756 use_ads = False
758 if not conf.CONFIG_SET('HAVE_LDAP'):
759 use_ads = False
760 use_ads_ldap = False
762 if use_ads:
763 conf.DEFINE('WITH_ADS', '1')
764 conf.env['HAVE_ADS'] = '1'
765 Logs.info("Building with Active Directory support.")
766 # these have broken dependencies
767 forced_shared_modules.extend(TO_LIST('idmap_ad idmap_rfc2307'))
768 elif Options.options.with_ads == False:
769 Logs.info("Building without Active Directory support (--without-ads).")
770 else:
771 if not use_ads_krb5:
772 Logs.warn("Active Directory support not available: krb5 libs don't have all required features")
773 if not use_ads_ldap:
774 Logs.warn("Active Directory support not available: LDAP support is not available.")
775 if Options.options.with_ads:
776 conf.fatal("Active Directory support not found. Use --without-ads "
777 "for building without Active Directory support. "
778 "ADS support improves communication with "
779 "Active Directory domain controllers.")
780 else:
781 # this is the auto-mode case
782 Logs.warn("Building without Active Directory support.")
785 if Options.options.with_utmp:
786 conf.env.with_utmp = True
787 if not conf.CHECK_HEADERS('utmp.h'): conf.env.with_utmp = False
788 conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent')
789 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_name', headers='utmp.h',
790 define='HAVE_UT_UT_NAME')
791 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_user', headers='utmp.h',
792 define='HAVE_UT_UT_USER')
793 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_id', headers='utmp.h',
794 define='HAVE_UT_UT_ID')
795 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_host', headers='utmp.h',
796 define='HAVE_UT_UT_HOST')
797 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_time', headers='utmp.h',
798 define='HAVE_UT_UT_TIME')
799 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_tv', headers='utmp.h',
800 define='HAVE_UT_UT_TV')
801 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_type', headers='utmp.h',
802 define='HAVE_UT_UT_TYPE')
803 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_pid', headers='utmp.h',
804 define='HAVE_UT_UT_PID')
805 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_exit.e_exit', headers='utmp.h',
806 define='HAVE_UT_UT_EXIT')
807 conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_syslen', headers='utmpx.h',
808 define='HAVE_UX_UT_SYSLEN')
809 conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_host', headers='utmpx.h',
810 define='HAVE_UX_UT_HOST')
811 conf.CHECK_CODE('struct utmp utarg; struct utmp *utreturn; utreturn = pututline(&utarg);',
812 'PUTUTLINE_RETURNS_UTMP', headers='utmp.h',
813 msg="Checking whether pututline returns pointer")
814 conf.CHECK_SIZEOF(['((struct utmp *)NULL)->ut_line'], headers='utmp.h',
815 define='SIZEOF_UTMP_UT_LINE', critical=False)
816 if not conf.CONFIG_SET('SIZEOF_UTMP_UT_LINE'):
817 conf.env.with_utmp = False
818 elif int(conf.env.SIZEOF_UTMP_UT_LINE) < 15:
819 conf.env.with_utmp = False
820 if conf.env.with_utmp:
821 conf.DEFINE('WITH_UTMP', 1)
822 else:
823 Logs.warn("--with-utmp but utmp support not sufficient")
825 if Options.options.with_avahi:
826 conf.env.with_avahi = True
827 if not conf.CHECK_HEADERS('avahi-common/watch.h avahi-client/client.h'): conf.env.with_avahi = False
828 if not conf.CHECK_FUNCS_IN('avahi_client_new', 'avahi-client'): conf.env.with_avahi = False
829 if not conf.CHECK_FUNCS_IN('avahi_strerror', 'avahi-common'): conf.env.with_avahi = False
830 if conf.env.with_avahi:
831 conf.DEFINE('WITH_AVAHI_SUPPORT', 1)
832 else:
833 conf.SET_TARGET_TYPE('avahi-common', 'EMPTY')
834 conf.SET_TARGET_TYPE('avahi-client', 'EMPTY')
836 if Options.options.with_iconv:
837 conf.env.with_iconv = True
838 if not conf.CHECK_FUNCS_IN('iconv_open', 'iconv', headers='iconv.h'):
839 conf.env.with_iconv = False
840 if conf.env.with_iconv:
841 conf.DEFINE('HAVE_ICONV', 1)
843 if Options.options.with_pam:
844 use_pam=True
845 conf.CHECK_HEADERS('security/pam_appl.h pam/pam_appl.h')
846 if not conf.CONFIG_SET('HAVE_SECURITY_PAM_APPL_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_APPL_H'):
847 Logs.warn("--with-pam=yes but pam_appl.h not found")
848 use_pam=False
849 conf.CHECK_FUNCS_IN('pam_get_data', 'pam')
850 conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
851 if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
852 Logs.warn("--with-pam=yes but pam_modules.h not found")
853 use_pam=False
854 conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h')
855 conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h')
856 conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam')
857 conf.CHECK_CODE('''
858 #if defined(HAVE_SECURITY_PAM_APPL_H)
859 #include <security/pam_appl.h>
860 #elif defined(HAVE_PAM_PAM_APPL_H)
861 #include <pam/pam_appl.h>
862 #endif
863 pam_set_item(0, PAM_RHOST, 0);
864 ''',
865 'HAVE_PAM_RHOST',
866 lib='pam',
867 msg="Checking whether PAM_RHOST is available");
868 conf.CHECK_CODE('''
869 #if defined(HAVE_SECURITY_PAM_APPL_H)
870 #include <security/pam_appl.h>
871 #elif defined(HAVE_PAM_PAM_APPL_H)
872 #include <pam/pam_appl.h>
873 #endif
874 pam_set_item(0, PAM_TTY, 0);
875 ''',
876 'HAVE_PAM_TTY',
877 lib='pam',
878 msg="Checking whether PAM_TTY is available");
879 conf.CHECK_CODE('''
880 #if (!defined(LINUX))
882 #define PAM_EXTERN extern
883 #if defined(HAVE_SECURITY_PAM_APPL_H)
884 #include <security/pam_appl.h>
885 #elif defined(HAVE_PAM_PAM_APPL_H)
886 #include <pam/pam_appl.h>
887 #endif
889 #endif
891 #if defined(HAVE_SECURITY_PAM_MODULES_H)
892 #include <security/pam_modules.h>
893 #elif defined(HAVE_PAM_PAM_MODULES_H)
894 #include <pam/pam_modules.h>
895 #endif
897 #if defined(HAVE_SECURITY__PAM_MACROS_H)
898 #include <security/_pam_macros.h>
899 #elif defined(HAVE_PAM__PAM_MACROS_H)
900 #include <pam/_pam_macros.h>
901 #endif
903 #ifdef HAVE_SECURITY_PAM_EXT_H
904 #include <security/pam_ext.h>
905 #endif
907 int i; i = PAM_RADIO_TYPE;
908 ''',
909 'HAVE_PAM_RADIO_TYPE',
910 lib='pam',
911 msg="Checking whether PAM_RADIO_TYPE is available");
912 if use_pam:
913 conf.DEFINE('WITH_PAM', 1)
914 conf.DEFINE('WITH_PAM_MODULES', 1)
915 else:
916 conf.fatal("PAM support is enabled but prerequisite libraries "
917 "or headers not found. Use --without-pam to disable "
918 "PAM support.");
920 seteuid = False
923 # Ensure we select the correct set of system calls on Linux.
925 if (host_os.rfind('linux') > -1):
926 conf.CHECK_CODE('''
927 #if defined(HAVE_UNISTD_H)
928 #include <unistd.h>
929 #endif
930 #include <stdlib.h>
931 #include <stdio.h>
932 #include <sys/types.h>
933 #include <errno.h>
935 #ifdef HAVE_SYS_PRIV_H
936 #include <sys/priv.h>
937 #endif
938 #ifdef HAVE_SYS_ID_H
939 #include <sys/id.h>
940 #endif
942 #if defined(HAVE_SYSCALL_H)
943 #include <syscall.h>
944 #endif
946 #if defined(HAVE_SYS_SYSCALL_H)
947 #include <sys/syscall.h>
948 #endif
950 syscall(SYS_setresuid32, -1, -1, -1);
951 syscall(SYS_setresgid32, -1, -1, -1);
952 syscall(SYS_setreuid32, -1, -1);
953 syscall(SYS_setregid32, -1, -1);
954 syscall(SYS_setuid32, -1);
955 syscall(SYS_setgid32, -1);
956 syscall(SYS_setgroups32, 0, NULL);
957 ''',
958 'USE_LINUX_32BIT_SYSCALLS',
959 msg="Checking whether Linux should use 32-bit credential calls");
961 if (conf.CONFIG_SET('USE_LINUX_32BIT_SYSCALLS')):
962 seteuid = conf.CHECK_CODE('''
963 #define AUTOCONF_TEST 1
964 #define HAVE_LINUX_THREAD_CREDENTIALS 1
965 #define USE_LINUX_32BIT_SYSCALLS 1
966 #include "../lib/util/setid.c"
967 #include "./lib/util_sec.c"
968 ''',
969 'HAVE_LINUX_THREAD_CREDENTIALS',
970 addmain=False,
971 execute=True,
972 msg="Checking whether we can use Linux thread-specific credentials with 32-bit system calls")
973 else:
974 seteuid = conf.CHECK_CODE('''
975 #define AUTOCONF_TEST 1
976 #define HAVE_LINUX_THREAD_CREDENTIALS 1
977 #include "../lib/util/setid.c"
978 #include "./lib/util_sec.c"
979 ''',
980 'HAVE_LINUX_THREAD_CREDENTIALS',
981 addmain=False,
982 execute=True,
983 msg="Checking whether we can use Linux thread-specific credentials")
984 if not seteuid:
985 seteuid = conf.CHECK_CODE('''
986 #define AUTOCONF_TEST 1
987 #define USE_SETREUID 1
988 #include "../lib/util/setid.c"
989 #include "./lib/util_sec.c"
990 ''',
991 'USE_SETREUID',
992 addmain=False,
993 execute=True,
994 msg="Checking whether setreuid is available")
995 if not seteuid:
996 seteuid = conf.CHECK_CODE('''
997 #define AUTOCONF_TEST 1
998 #define USE_SETRESUID 1
999 #include "../lib/util/setid.c"
1000 #include "./lib/util_sec.c"
1001 ''',
1002 'USE_SETRESUID',
1003 addmain=False,
1004 execute=True,
1005 msg="Checking whether setresuid is available")
1006 if not seteuid:
1007 seteuid = conf.CHECK_CODE('''
1008 #define AUTOCONF_TEST 1
1009 #define USE_SETEUID 1
1010 #include "../lib/util/setid.c"
1011 #include "./lib/util_sec.c"
1012 ''',
1013 'USE_SETEUID',
1014 addmain=False,
1015 execute=True,
1016 msg="Checking whether seteuid is available")
1017 if not seteuid:
1018 seteuid = conf.CHECK_CODE('''
1019 #define AUTOCONF_TEST 1
1020 #define USE_SETUIDX 1
1021 #include "../lib/util/setid.c"
1022 #include "./lib/util_sec.c"
1023 ''',
1024 'USE_SETUIDX',
1025 addmain=False,
1026 execute=True,
1027 mandatory=True,
1028 msg="Checking whether setuidx is available")
1029 if Options.options.with_dnsupdate:
1030 if not conf.CONFIG_SET('HAVE_KRB5'):
1031 Logs.warn("--with-dnsupdate=yes but gssapi support not sufficient")
1032 else:
1033 conf.DEFINE('WITH_DNS_UPDATES', 1)
1034 # valgrind.h or valgrind/valgrind.h is checked in lib/replace/wscript
1035 if Options.options.developer:
1036 if conf.CONFIG_SET('HAVE_VALGRIND_H') or conf.CONFIG_SET('HAVE_VALGRIND_VALGRIND_H'):
1037 conf.DEFINE('VALGRIND', '1')
1039 if conf.CHECK_CODE('''
1040 #include <bits/sockaddr.h>
1041 #include <linux/netlink.h>
1042 ''',
1043 'HAVE_LINUX_NETLINK_H',
1044 msg="Checking whether Linux netlink is available"):
1046 conf.CHECK_CODE('''
1047 #include <bits/sockaddr.h>
1048 #include <linux/netlink.h>
1049 #include <linux/rtnetlink.h>
1050 ''',
1051 'HAVE_LINUX_RTNETLINK_H',
1052 msg='Checking whether Linux rtnetlink is available')
1054 conf.CHECK_CODE('''
1055 #include "../tests/fcntl_lock.c"
1056 ''',
1057 'HAVE_FCNTL_LOCK',
1058 addmain=False,
1059 execute=True,
1060 msg='Checking whether fcntl locking is available')
1062 conf.CHECK_CODE('''
1063 #include <unistd.h>
1064 #include <sys/types.h>
1065 #include <sys/stat.h>
1066 #include <fcntl.h>
1067 #include <errno.h>
1069 #define DATA "ofdtest.fcntl"
1071 int main() {
1072 struct flock lck = {
1073 .l_whence = SEEK_SET,
1074 .l_type = F_WRLCK,
1075 .l_start = 0,
1076 .l_len = 1,
1077 .l_pid = 0,
1079 int ret;
1080 int fd1;
1081 int fd2;
1082 char *testdir = getenv("TESTDIR");
1084 if (testdir) {
1085 if (chdir(testdir) != 0) {
1086 goto err;
1090 unlink(DATA);
1091 fd1 = open(DATA, O_RDWR|O_CREAT|O_EXCL, 0600);
1092 fd2 = open(DATA, O_RDWR);
1093 if (fd1 == -1 || fd2 == -1) {
1094 goto err;
1096 ret = fcntl(fd1,F_OFD_SETLKW,&lck);
1097 if (ret == -1) {
1098 goto err;
1100 ret = fcntl(fd2,F_OFD_SETLK,&lck);
1101 if (ret != -1) {
1102 goto err;
1104 if (errno != EAGAIN) {
1105 goto err;
1107 ret = fcntl(fd2,F_OFD_GETLK,&lck);
1108 if (ret == -1) {
1109 goto err;
1111 unlink(DATA);
1112 exit(0);
1113 err:
1114 unlink(DATA);
1115 exit(1);
1116 }''',
1117 'HAVE_OFD_LOCKS',
1118 addmain=False,
1119 execute=True,
1120 msg="Checking whether fcntl lock supports open file description locks")
1122 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtim.tv_nsec',
1123 define='HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') # Linux, Solaris
1124 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimensec',
1125 define='HAVE_STRUCT_STAT_ST_MTIMENSEC') # BSD, if defined _POSIX_SOURCE
1126 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimespec.tv_nsec',
1127 define='HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') # BSD, if not defined _POSIX_SOURCE
1128 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtime_n',
1129 define='HAVE_STRUCT_STAT_ST_MTIME_N') # AIX
1130 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_umtime',
1131 define='HAVE_STRUCT_STAT_ST_UMTIME') # Tru64
1132 if conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') or \
1133 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMENSEC') or \
1134 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') or \
1135 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIME_N') or \
1136 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_UMTIME'):
1137 conf.DEFINE('HAVE_STAT_HIRES_TIMESTAMPS', '1')
1139 # recent FreeBSD, NetBSD have creation timestamps called birthtime:
1140 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtime',
1141 define='HAVE_STRUCT_STAT_ST_BIRTHTIME')
1142 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimespec.tv_nsec',
1143 define='HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC')
1144 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimensec',
1145 define='HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC')
1147 conf.CHECK_CODE('''
1148 ssize_t err = posix_fadvise(0,0,0x80000,POSIX_FADV_WILLNEED);
1149 ''',
1150 'HAVE_POSIX_FADVISE',
1151 msg='Checking whether posix_fadvise is available',
1152 headers='unistd.h fcntl.h')
1154 for v in ['_SC_NGROUPS_MAX', '_SC_NPROC_ONLN', '_SC_NPROCESSORS_ONLN', '_SC_PAGESIZE' ]:
1155 conf.CHECK_CODE('''
1156 #include <unistd.h>
1157 return sysconf(%s) == -1 ? 1 : 0;
1158 ''' % v,
1159 'SYSCONF%s' % v,
1160 msg='Checking whether sysconf(%s) is available' % v)
1162 conf.CHECK_CODE('''
1163 #include <sys/syscall.h>
1164 #include <unistd.h>
1165 syscall(SYS_initgroups, 16, NULL, NULL, 0);
1166 ''',
1167 'HAVE_DARWIN_INITGROUPS',
1168 msg='Checking whether to use the Darwin-specific initgroups system call')
1170 conf.CHECK_CODE('''struct utimbuf tbuf; tbuf.actime = 0; tbuf.modtime = 1; exit(utime("foo.c",&tbuf));''',
1171 'HAVE_UTIMBUF',
1172 headers='sys/types.h utime.h',
1173 msg='Checking whether struct utimbuf is available')
1175 if conf.CHECK_CODE('''struct sigevent s;''',
1176 'HAVE_STRUCT_SIGEVENT',
1177 headers='sys/types.h stdlib.h stddef.h signal.h',
1178 msg='Checking whether we have the struct sigevent'):
1179 conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sival_ptr',
1180 define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIVAL_PTR',
1181 headers='signal.h');
1182 conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sigval_ptr',
1183 define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIGVAL_PTR',
1184 headers='signal.h');
1186 if os.path.exists('/proc/sys/kernel/core_pattern'):
1187 conf.DEFINE('HAVE_SYS_KERNEL_PROC_CORE_PATTERN', '1')
1189 if conf.CHECK_CODE('''
1190 #include <time.h>
1191 main() {
1192 struct tm *tm;
1193 if (sizeof(time_t) == 8) {
1194 time_t max_time = 0x7fffffffffffffffll;
1195 tm = gmtime(&max_time);
1196 /* This should fail with 32-bit tm_year. */
1197 if (tm == NULL) {
1198 /* Max time_t that works with 32-bit int tm_year in struct tm. */
1199 max_time = 67768036191676799ll;
1200 tm = gmtime(&max_time);
1201 if (tm) {
1202 exit(0);
1206 exit(1);
1207 }''',
1208 '__TIME_T_MAX',
1209 addmain=False,
1210 execute=True,
1211 msg="Checking for the maximum value of the 'time_t' type"):
1212 conf.DEFINE('TIME_T_MAX', '67768036191676799ll')
1214 conf.CHECK_CODE('''
1215 #if defined(HAVE_UNISTD_H)
1216 #include <unistd.h>
1217 #endif
1218 #include <sys/types.h>
1219 #if defined(HAVE_SYS_SYSMACROS_H)
1220 #include <sys/sysmacros.h>
1221 #endif
1222 main() { dev_t dev = makedev(1,2); return 0; }
1223 ''',
1224 'HAVE_MAKEDEV',
1225 addmain=False,
1226 msg='Checking whether the macro for makedev is available')
1228 conf.CHECK_CODE('''
1229 #include <stdio.h>
1230 #include <limits.h>
1231 #include <signal.h>
1233 void exit_on_core(int ignored) {
1234 exit(1);
1237 main() {
1238 char *newpath;
1239 signal(SIGSEGV, exit_on_core);
1240 newpath = realpath("/tmp", NULL);
1241 exit((newpath != NULL) ? 0 : 1);
1243 ''',
1244 'REALPATH_TAKES_NULL',
1245 addmain=False,
1246 execute=True,
1247 msg='Checking whether the realpath function allows a NULL argument')
1249 conf.CHECK_CODE('''#include "../tests/ftruncate.c"''',
1250 'HAVE_FTRUNCATE_EXTEND',
1251 msg='Checking for ftruncate extend',
1252 addmain=False,
1253 execute=True)
1255 conf.SET_TARGET_TYPE('sendfile', 'EMPTY')
1256 conf.CHECK_LIB('sendfile')
1257 if not Options.options.with_sendfile_support == False:
1258 if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('k*bsd*-gnu') > -1) or (host_os.rfind('kopensolaris*-gnu') > -1):
1259 conf.CHECK_CODE('''
1260 int tofd, fromfd;
1261 off_t offset;
1262 size_t total;
1263 ssize_t nwritten = sendfile(tofd, fromfd, &offset, total);
1264 ''',
1265 '_HAVE_SENDFILE',
1266 headers='sys/sendfile.h',
1267 msg='Checking for linux sendfile support')
1269 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1270 conf.DEFINE('HAVE_SENDFILE', '1')
1271 conf.DEFINE('LINUX_SENDFILE_API', '1')
1272 elif (host_os.rfind('freebsd') > -1) or (host_os.rfind('dragonfly') > -1):
1273 conf.CHECK_CODE('''
1274 #include <sys/types.h>
1275 #include <unistd.h>
1276 #include <sys/socket.h>
1277 #include <sys/uio.h>
1278 int fromfd, tofd, ret, total=0;
1279 off_t offset, nwritten;
1280 struct sf_hdtr hdr;
1281 struct iovec hdtrl;
1282 hdr.headers = &hdtrl;
1283 hdr.hdr_cnt = 1;
1284 hdr.trailers = NULL;
1285 hdr.trl_cnt = 0;
1286 hdtrl.iov_base = NULL;
1287 hdtrl.iov_len = 0;
1288 ret = sendfile(fromfd, tofd, offset, total, &hdr, &nwritten, 0)
1289 ''',
1290 '_HAVE_SENDFILE',
1291 msg='Checking for freebsd sendfile support')
1292 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1293 conf.DEFINE('HAVE_SENDFILE', '1')
1294 conf.DEFINE('FREEBSD_SENDFILE_API', '1')
1295 elif (host_os.rfind('darwin') > -1):
1296 conf.CHECK_CODE('''
1297 #include <sys/types.h>
1298 #include <sys/socket.h>
1299 #include <sys/uio.h>
1300 int fromfd, tofd, ret;
1301 off_t offset, nwritten;
1302 struct sf_hdtr hdr;
1303 struct iovec hdtrl;
1304 hdr.headers = &hdtrl;
1305 hdr.hdr_cnt = 1;
1306 hdr.trailers = (void *)0;
1307 hdr.trl_cnt = 0;
1308 hdtrl.iov_base = (void *)0;
1309 hdtrl.iov_len = 0;
1310 ret = sendfile(fromfd, tofd, offset, &nwritten, &hdr, 0);
1311 ''',
1312 '_HAVE_SENDFILE',
1313 msg='Checking for darwin sendfile support')
1314 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1315 conf.DEFINE('HAVE_SENDFILE', '1')
1316 conf.DEFINE('DARWIN_SENDFILE_API', '1')
1317 elif (host_os.rfind('hpux') > -1) or (host_os.rfind('osf') > -1):
1318 conf.CHECK_CODE('''
1319 #include <sys/socket.h>
1320 #include <sys/uio.h>
1321 int fromfd, tofd;
1322 size_t total=0;
1323 struct iovec hdtrl[2];
1324 ssize_t nwritten;
1325 off_t offset;
1326 hdtrl[0].iov_base = 0;
1327 hdtrl[0].iov_len = 0;
1328 nwritten = sendfile(tofd, fromfd, offset, total, &hdtrl[0], 0);
1329 ''',
1330 '_HAVE_SENDFILE',
1331 msg='Checking for osf/hpux sendfile support')
1332 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1333 conf.DEFINE('HAVE_SENDFILE', '1')
1334 conf.DEFINE('HPUX_SENDFILE_API', '1')
1335 elif (host_os.rfind('sunos') > -1):
1336 conf.CHECK_FUNCS_IN('sendfilev', 'sendfile')
1337 conf.CHECK_CODE('''
1338 #include <sys/sendfile.h>,
1339 int sfvcnt;
1340 size_t xferred;
1341 struct sendfilevec vec[2];
1342 ssize_t nwritten;
1343 int tofd;
1344 sfvcnt = 2;
1345 vec[0].sfv_fd = SFV_FD_SELF;
1346 vec[0].sfv_flag = 0;
1347 vec[0].sfv_off = 0;
1348 vec[0].sfv_len = 0;
1349 vec[1].sfv_fd = 0;
1350 vec[1].sfv_flag = 0;
1351 vec[1].sfv_off = 0;
1352 vec[1].sfv_len = 0;
1353 nwritten = sendfilev(tofd, vec, sfvcnt, &xferred);
1354 ''',
1355 '_HAVE_SENDFILEV',
1356 msg='Checking for solaris sendfilev support',
1357 lib='sendfile')
1358 if conf.CONFIG_SET('_HAVE_SENDFILEV'):
1359 conf.DEFINE('HAVE_SENDFILEV', '1')
1360 conf.DEFINE('SOLARIS_SENDFILE_API', '1')
1361 elif (host_os.rfind('aix') > -1):
1362 conf.CHECK_CODE('''
1363 #include <sys/socket.h>
1364 int fromfd, tofd;
1365 size_t total=0;
1366 struct sf_parms hdtrl;
1367 ssize_t nwritten;
1368 hdtrl.header_data = 0;
1369 hdtrl.header_length = 0;
1370 hdtrl.file_descriptor = fromfd;
1371 hdtrl.file_offset = 0;
1372 hdtrl.file_bytes = 0;
1373 hdtrl.trailer_data = 0;
1374 hdtrl.trailer_length = 0;
1375 nwritten = send_file(&tofd, &hdtrl, 0);
1376 ''',
1377 '_HAVE_SENDFILE',
1378 msg='Checking for AIX send_file support')
1379 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1380 conf.DEFINE('HAVE_SENDFILE', '1')
1381 conf.DEFINE('AIX_SENDFILE_API', '1')
1383 if Options.options.with_sendfile_support == True and not conf.CONFIG_SET('HAVE_SENDFILE'):
1384 conf.fatal('sendfile support not found but it was requested !')
1385 # Check for getcwd allowing a NULL arg.
1386 conf.CHECK_CODE('''
1387 #include <unistd.h>
1388 main() {
1389 char *s = getcwd(NULL,0);
1390 exit(s != NULL ? 0 : 1);
1391 }''', 'GETCWD_TAKES_NULL', addmain=False, execute=True,
1392 msg="getcwd takes a NULL argument")
1395 # UnixWare 7.x has its getspnam in -lgen
1396 conf.CHECK_FUNCS_IN('getspnam', 'gen')
1397 conf.CHECK_FUNCS_IN('getspnam', 'security')
1398 conf.CHECK_FUNCS_IN('getspnam', 'sec')
1400 legacy_quota_libs = ''
1401 if not Options.options.with_quotas == False:
1402 # For quotas on Veritas VxFS filesystems
1403 conf.CHECK_HEADERS('sys/fs/vx_quota.h')
1404 # For sys/quota.h and linux/quota.h
1405 conf.CHECK_HEADERS('sys/quota.h')
1406 # For quotas on BSD systems
1407 conf.CHECK_HEADERS('ufs/ufs/quota.h')
1408 # For quotas on AIX systems
1409 conf.CHECK_HEADERS('jfs/quota.h')
1410 # For quotas on Linux XFS filesystems
1411 if conf.CHECK_HEADERS('xfs/xqm.h'):
1412 conf.DEFINE('HAVE_XFS_QUOTAS', '1')
1413 else:
1414 # For Irix XFS
1415 conf.CHECK_CODE('''
1416 #include "confdefs.h"
1417 #ifdef HAVE_SYS_TYPES_H
1418 #include <sys/types.h>
1419 #endif
1420 #ifdef HAVE_ASM_TYPES_H
1421 #include <asm/types.h>
1422 #endif
1423 #include <sys/quota.h>
1424 int i = Q_XGETQUOTA;''',
1425 define='HAVE_XFS_QUOTAS',
1426 msg='for XFS QUOTA in <sys/quota.h>',
1427 execute=False,
1428 local_include=False)
1430 # For IRIX like dqb_isoftlimit instead of dqb_fsoftlimit in struc dqblk
1431 conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_fsoftlimit', define='HAVE_DQB_FSOFTLIMIT',
1432 headers='sys/quota.h')
1433 #darwin style quota bytecount
1434 conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_curbytes', define='HAVE_STRUCT_DQBLK_DQB_CURBYTES',
1435 headers='sys/quota.h')
1436 if conf.CHECK_HEADERS('rpcsvc/rquota.h', lib='tirpc'):
1437 # Optional structure member
1438 conf.CHECK_STRUCTURE_MEMBER('struct getquota_rslt', 'getquota_rslt_u',
1439 define='HAVE_GETQUOTA_RSLT_GETQUOTA_RSLT_U',
1440 headers='rpcsvc/rquota.h',
1441 lib='tirpc')
1443 # Required function for NFS quote support
1444 conf.CHECK_CODE('''
1445 clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
1446 ''',
1447 headers="rpc/rpc.h rpc/types.h rpcsvc/rquota.h rpc/nettype.h rpc/xdr.h",
1448 define='HAVE_NFS_QUOTAS',
1449 msg='checking for clnt_create()',
1450 execute=True,
1451 local_include=False,
1452 lib='tirpc')
1454 if (host_os.rfind('linux') > -1):
1455 conf.DEFINE('HAVE_QUOTACTL_LINUX', '1')
1456 elif not conf.CONFIG_SET("HAVE_XFS_QUOTAS"):
1457 if not conf.CHECK_CODE('''
1458 #define HAVE_QUOTACTL_4A 1
1459 #define AUTOCONF_TEST 1
1460 #include "../tests/sysquotas.c"
1461 ''',
1462 cflags=conf.env['WERROR_CFLAGS'],
1463 define='HAVE_QUOTACTL_4A',
1464 msg='for QUOTACTL_4A: long quotactl(int cmd, char *special, qid_t id, caddr_t addr)',
1465 execute=True,
1466 addmain=False):
1468 conf.CHECK_CODE('''
1469 #define HAVE_QUOTACTL_4B 1
1470 #define AUTOCONF_TEST 1
1471 #include "../tests/sysquotas.c"
1472 ''',
1473 cflags=conf.env['WERROR_CFLAGS'],
1474 define='HAVE_QUOTACTL_4B',
1475 msg='for QUOTACTL_4B: int quotactl(const char *path, int cmd, int id, char *addr)',
1476 execute=True,
1477 addmain=False)
1479 if conf.CONFIG_SET('HAVE_QUOTACTL_LINUX') or \
1480 conf.CONFIG_SET('HAVE_QUOTACTL_4A') or \
1481 conf.CONFIG_SET('HAVE_QUOTACTL_4B') or \
1482 conf.CONFIG_SET('HAVE_XFS_QUOTAS'):
1483 conf.DEFINE('HAVE_SYS_QUOTAS', '1')
1484 conf.DEFINE('WITH_QUOTAS', '1')
1487 # check if Legacy quota code can be brought in
1488 # if standard interfaces are not supported
1490 if not conf.CONFIG_SET('WITH_QUOTAS'):
1491 if host_os.rfind('sunos5') > -1:
1492 conf.DEFINE('SUNOS5', '1')
1493 legacy_quota_libs = 'nsl'
1494 conf.CHECK_CODE('''
1495 #define WITH_QUOTAS 1
1496 #define AUTOCONF_TEST 1
1497 #include "../tests/oldquotas.c"
1498 ''',
1499 cflags=conf.env['WERROR_CFLAGS'],
1500 define='WITH_QUOTAS',
1501 lib=legacy_quota_libs,
1502 msg='Checking whether legacy quota code can be used',
1503 execute=False,
1504 addmain=False)
1505 if not conf.CONFIG_SET('WITH_QUOTAS'):
1506 legacy_quota_libs = ''
1507 conf.env['legacy_quota_libs'] = legacy_quota_libs
1509 if Options.options.with_quotas == True and not conf.CONFIG_SET('WITH_QUOTAS'):
1510 conf.fatal('quota support not found but it was equested !')
1512 conf.CHECK_CODE('(void)unshare(CLONE_FS);',
1513 headers='sched.h',
1514 define='HAVE_UNSHARE_CLONE_FS',
1515 msg='for Linux unshare(CLONE_FS)')
1517 # Check for mallinfo
1518 conf.CHECK_CODE('''
1519 struct mallinfo mi;
1520 int tmp;
1522 mi = mallinfo();
1523 tmp = mi.arena + mi.ordblks + mi.smblks + mi.hblks +
1524 mi.hblkhd + mi.usmblks + mi.fsmblks + mi.uordblks +
1525 mi.fordblks + mi.keepcost;
1526 return tmp;
1527 ''', 'HAVE_MALLINFO', msg="Checking for mallinfo()", headers='malloc.h')
1530 # cluster support (CTDB)
1532 if not Options.options.with_cluster_support:
1533 Logs.info("building without cluster support (--without-cluster-support)")
1534 conf.env.with_ctdb = False
1535 else:
1536 Logs.info("building with cluster support")
1537 conf.env.with_ctdb = True
1538 conf.DEFINE('CLUSTER_SUPPORT', 1)
1540 conf.CHECK_CODE('void seekdir(DIR *d, long loc) { return; }',
1541 'SEEKDIR_RETURNS_VOID',
1542 headers='sys/types.h dirent.h',
1543 msg='Checking whether seekdir returns void')
1545 if Options.options.with_profiling_data:
1546 conf.DEFINE('WITH_PROFILE', 1);
1547 conf.CHECK_FUNCS('getrusage', headers="sys/time.h sys/resource.h")
1549 if (conf.CHECK_HEADERS('linux/ioctl.h sys/ioctl.h linux/fs.h') and
1550 conf.CHECK_DECLS('FS_IOC_GETFLAGS FS_COMPR_FL', headers='linux/fs.h')):
1551 conf.DEFINE('HAVE_LINUX_IOCTL', '1')
1553 conf.env['CFLAGS_CEPHFS'] = "-D_FILE_OFFSET_BITS=64"
1554 if Options.options.libcephfs_dir:
1555 conf.env['CPPPATH_CEPHFS'] = Options.options.libcephfs_dir + '/include'
1556 conf.env['LIBPATH_CEPHFS'] = Options.options.libcephfs_dir + '/lib'
1557 conf.env['LIBPATH_CEPH-COMMON'] = Options.options.libcephfs_dir + '/lib/ceph'
1558 else:
1559 conf.env['LIBPATH_CEPH-COMMON'] = Options.options.LIBDIR + '/ceph'
1561 if (Options.options.with_cephfs and
1562 conf.CHECK_HEADERS('cephfs/libcephfs.h', False, False, 'cephfs') and
1563 conf.CHECK_LIB('cephfs', shlib=True)):
1564 conf.CHECK_LIB('ceph-common', shlib=True)
1565 if Options.options.with_acl_support:
1566 conf.DEFINE('HAVE_CEPH', '1')
1567 if conf.CHECK_FUNCS_IN('ceph_statx', 'cephfs ceph-common',
1568 headers='cephfs/libcephfs.h'):
1569 conf.DEFINE('HAVE_CEPH_STATX', '1')
1570 else:
1571 Logs.warn("ceph support disabled due to --without-acl-support")
1572 conf.undefine('HAVE_CEPH')
1574 if Options.options.with_glusterfs:
1575 conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 4" --cflags --libs',
1576 msg='Checking for glusterfs-api >= 4', uselib_store="GFAPI")
1577 conf.CHECK_HEADERS('glusterfs/api/glfs.h', lib='gfapi')
1578 conf.CHECK_LIB('gfapi', shlib=True)
1580 if conf.CONFIG_SET('HAVE_GLUSTERFS_API_GLFS_H'):
1581 if Options.options.with_acl_support:
1582 conf.DEFINE('HAVE_GLUSTERFS', '1')
1583 else:
1584 Logs.warn("GlusterFS support disabled due to --without-acl-support")
1585 conf.undefine('HAVE_GLUSTERFS')
1586 else:
1587 conf.undefine('HAVE_GLUSTERFS')
1589 conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 6" --cflags --libs',
1590 msg='Checking for glusterfs-api >= 6',
1591 uselib_store="GFAPI_VER_6")
1592 conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 7.6" --cflags --libs',
1593 msg='Checking for glusterfs-api >= 7.6',
1594 uselib_store="GFAPI_VER_7_6")
1595 else:
1596 conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
1597 conf.undefine('HAVE_GLUSTERFS')
1599 if Options.options.enable_vxfs:
1600 conf.DEFINE('HAVE_VXFS', '1')
1602 if conf.CHECK_CFG(package='dbus-1', args='--cflags --libs',
1603 msg='Checking for dbus', uselib_store="DBUS-1"):
1604 if (conf.CHECK_HEADERS('dbus/dbus.h', lib='dbus-1')
1605 and conf.CHECK_LIB('dbus-1', shlib=True)):
1606 conf.DEFINE('HAVE_DBUS', '1')
1608 conf.env.build_regedit = False
1609 if not Options.options.with_regedit == False:
1610 conf.PROCESS_SEPARATE_RULE('system_ncurses')
1611 if conf.CONFIG_SET('HAVE_NCURSES'):
1612 conf.env.build_regedit = True
1614 if conf.env.build_regedit:
1615 Logs.info("building regedit")
1616 else:
1617 if Options.options.with_regedit == False:
1618 Logs.info("not building regedit (--without-regedit)")
1619 elif Options.options.with_regedit == True:
1620 Logs.error("ncurses not available, cannot build regedit")
1621 conf.fatal("ncurses not available, but --with-regedit was specified")
1622 else:
1623 Logs.info("ncurses not available, not building regedit")
1625 if conf.CHECK_HEADERS('ftw.h') and conf.CHECK_FUNCS('nftw'):
1626 conf.env.build_mvxattr = True
1628 conf.CHECK_FUNCS_IN('DES_pcbc_encrypt', 'crypto')
1629 if Options.options.with_fake_kaserver == True:
1630 conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
1631 conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
1632 if (conf.CONFIG_SET('HAVE_AFS_PARAM_H') and conf.CONFIG_SET('HAVE_AFS_STDS_H') and conf.CONFIG_SET('HAVE_DES_PCBC_ENCRYPT')):
1633 conf.DEFINE('WITH_FAKE_KASERVER', '1')
1634 else:
1635 conf.fatal('AFS headers not available, but --with-fake-kaserver was specified')
1637 if conf.CHECK_CFG(package='glib-2.0',
1638 args='--cflags --libs',
1639 msg='Checking for glib-2.0',
1640 uselib_store="GLIB-2.0"):
1641 if (conf.CHECK_HEADERS('glib.h', lib='glib-2.0') and conf.CHECK_LIB('glib-2.0', shlib=True)):
1642 conf.DEFINE('HAVE_GLIB', 1)
1644 if conf.CONFIG_SET('HAVE_GLIB'):
1645 conf.DEFINE('WITH_TEVENT_GLIB_GLUE', '1')
1647 conf.env['libtracker']=''
1648 tracker_versions = ['2.0', '1.0', '0.16', '0.14']
1650 for version in tracker_versions:
1651 testlib = 'tracker-sparql-' + version
1652 if conf.CHECK_CFG(package=testlib,
1653 args='--cflags --libs',
1654 mandatory=False):
1655 conf.SET_TARGET_TYPE(testlib, 'SYSLIB')
1656 conf.env['libtracker'] = testlib
1657 conf.DEFINE('HAVE_TRACKER', '1')
1658 break
1660 Logs.info("Checking for bison")
1661 bison.configure(conf)
1662 if conf.env['BISON']:
1663 conf.CHECK_COMMAND('%s --version | head -n1' % conf.env.BISON[0],
1664 msg='Using bison version',
1665 define=None,
1666 on_target=False)
1668 Logs.info("Checking for flex")
1669 conf.find_program('flex', var='FLEX')
1670 if conf.env['FLEX']:
1671 conf.env.FLEXFLAGS = ['-t']
1672 conf.CHECK_COMMAND('%s --version' % conf.env.FLEX[0],
1673 msg='Using flex version',
1674 define=None,
1675 on_target=False)
1677 conf.env.with_spotlight = False
1678 if Options.options.with_spotlight:
1679 if not conf.env['BISON']:
1680 conf.fatal("Spotlight support requested but bison missing")
1681 if not conf.env['FLEX']:
1682 conf.fatal("Spotlight support requested but flex missing")
1684 if not conf.CONFIG_SET('HAVE_TRACKER'):
1685 conf.fatal('Missing Gnome Tracker development files')
1687 if not conf.CONFIG_SET('HAVE_GLIB'):
1688 conf.fatal('Missing glib-2.0 development files')
1690 Logs.info("building with Spotlight support")
1691 default_static_modules.extend(TO_LIST('rpc_mdssvc_module'))
1692 conf.DEFINE('WITH_SPOTLIGHT', '1')
1693 conf.env.with_spotlight = True
1695 conf.CHECK_HEADERS('rpc/xdr.h', lib='tirpc')
1697 if conf.CHECK_FUNCS_IN('nscd_flush_cache', 'nscd', headers='libnscd.h'):
1698 conf.DEFINE('HAVE_NSCD_FLUSH_CACHE', '1')
1700 forced_static_modules.extend(TO_LIST('auth_builtin auth_sam auth_winbind'))
1701 default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam
1702 auth_unix
1703 nss_info_template idmap_tdb idmap_passdb
1704 idmap_nss'''))
1706 default_shared_modules.extend(TO_LIST('''
1707 vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk
1708 vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
1709 vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2
1710 vfs_readahead vfs_xattr_tdb
1711 vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
1712 vfs_preopen vfs_catia
1713 vfs_media_harmony vfs_unityed_media vfs_fruit vfs_shell_snap
1714 vfs_commit vfs_worm vfs_crossrename vfs_linux_xfs_sgid
1715 vfs_time_audit vfs_offline vfs_virusfilter
1716 vfs_glusterfs_fuse
1717 '''))
1718 default_shared_modules.extend(TO_LIST('auth_script idmap_tdb2 idmap_script'))
1719 # these have broken dependencies
1720 forced_shared_modules.extend(TO_LIST('idmap_autorid idmap_rid idmap_hash'))
1722 if Options.options.developer:
1723 default_static_modules.extend(TO_LIST('charset_weird'))
1724 default_shared_modules.extend(TO_LIST('perfcount_test'))
1725 default_shared_modules.extend(TO_LIST('vfs_skel_opaque vfs_skel_transparent vfs_shadow_copy_test'))
1726 default_shared_modules.extend(TO_LIST('auth_skel pdb_test'))
1727 default_shared_modules.extend(TO_LIST('vfs_fake_dfq'))
1728 default_shared_modules.extend(TO_LIST('gpext_security gpext_registry gpext_scripts'))
1730 if Options.options.enable_selftest or Options.options.developer:
1731 default_shared_modules.extend(TO_LIST('vfs_fake_acls vfs_nfs4acl_xattr'))
1732 default_shared_modules.extend(TO_LIST('vfs_error_inject'))
1733 default_shared_modules.extend(TO_LIST('vfs_delay_inject'))
1735 if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
1736 default_static_modules.extend(TO_LIST('pdb_samba_dsdb auth_samba4 vfs_dfs_samba4'))
1737 default_shared_modules.extend(TO_LIST('vfs_posix_eadb'))
1739 if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
1740 default_shared_modules.extend(TO_LIST('vfs_zfsacl'))
1742 if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
1743 default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort'))
1745 if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
1746 default_shared_modules.extend(TO_LIST('vfs_fileid'))
1748 if (conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS')):
1749 default_shared_modules.extend(TO_LIST('vfs_aio_fork'))
1751 if Options.options.with_pthreadpool:
1752 default_shared_modules.extend(TO_LIST('vfs_aio_pthread'))
1754 if conf.CONFIG_SET('HAVE_LDAP'):
1755 default_static_modules.extend(TO_LIST('pdb_ldapsam idmap_ldap'))
1757 if conf.CONFIG_SET('DARWINOS'):
1758 default_static_modules.extend(TO_LIST('charset_macosxfs'))
1760 if conf.CONFIG_SET('HAVE_GPFS'):
1761 default_shared_modules.extend(TO_LIST('vfs_gpfs'))
1763 if (conf.CONFIG_SET('HAVE_LINUX_IOCTL')
1764 and conf.CONFIG_SET('HAVE_BASENAME') and conf.CONFIG_SET('HAVE_DIRNAME')):
1765 default_shared_modules.extend(TO_LIST('vfs_btrfs'))
1767 if conf.CONFIG_SET("HAVE_CEPH"):
1768 default_shared_modules.extend(TO_LIST('vfs_ceph'))
1769 # Unlike vfs_ceph, vfs_ceph_snapshots doesn't depend on libcephfs, so
1770 # can be enabled atop a kernel CephFS share (with vfs_default) in
1771 # addition to vfs_ceph. Still, only enable vfs_ceph_snapshots builds
1772 # if we're building with libcephfs for now.
1773 default_shared_modules.extend(TO_LIST('vfs_ceph_snapshots'))
1775 if conf.CONFIG_SET('HAVE_GLUSTERFS'):
1776 default_shared_modules.extend(TO_LIST('vfs_glusterfs'))
1778 if conf.CONFIG_SET('HAVE_VXFS'):
1779 default_shared_modules.extend(TO_LIST('vfs_vxfs'))
1781 if conf.CONFIG_SET('HAVE_DBUS'):
1782 default_shared_modules.extend(TO_LIST('vfs_snapper'))
1784 explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
1785 explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
1787 def replace_list_item(lst, item, value):
1788 try:
1789 idx = lst.index(item)
1790 lst[idx] = value
1791 except:
1792 pass
1793 # PDB module file name should have the same name as module registers itself
1794 # In Autoconf build we export LDAP passdb module as ldapsam but WAF build
1795 # was always exporting pdb_ldap. In order to support existing packages
1796 # allow referring to pdb_ldapsam as pdb_ldap but use proper name internally.
1797 replace_list_item(explicit_shared_modules, 'pdb_ldap', 'pdb_ldapsam')
1798 replace_list_item(explicit_static_modules, 'pdb_ldap', 'pdb_ldapsam')
1800 final_static_modules = []
1801 final_static_modules.extend(TO_LIST(required_static_modules))
1802 final_shared_modules = []
1804 if '!FORCED' not in explicit_static_modules:
1805 final_static_modules.extend(TO_LIST(forced_static_modules))
1806 if '!FORCED' not in explicit_shared_modules:
1807 final_shared_modules.extend(TO_LIST(forced_shared_modules))
1808 if '!DEFAULT' not in explicit_static_modules:
1809 final_static_modules.extend(TO_LIST(default_static_modules))
1810 if '!DEFAULT' not in explicit_shared_modules:
1811 final_shared_modules.extend(TO_LIST(default_shared_modules))
1813 if 'ALL' in explicit_static_modules:
1814 for m in default_shared_modules:
1815 if m in final_shared_modules:
1816 final_shared_modules.remove(m)
1817 final_static_modules.append(m)
1818 if 'ALL' in explicit_shared_modules:
1819 for m in default_static_modules:
1820 if m in final_static_modules:
1821 final_static_modules.remove(m)
1822 final_shared_modules.append(m)
1824 for m in explicit_static_modules:
1825 if m in ['ALL','!DEFAULT','!FORCED']:
1826 continue
1827 if m.startswith('!'):
1828 m = m[1:]
1829 if m in required_static_modules:
1830 raise Errors.WafError('These modules are REQUIRED as static modules: %s' %
1831 ' '.join(required_static_modules))
1832 if m in final_static_modules:
1833 final_static_modules.remove(m)
1834 continue
1835 if m in forced_shared_modules:
1836 raise Errors.WafError('These modules MUST be configured as shared modules: %s' %
1837 ' '.join(forced_shared_modules))
1838 if m in final_shared_modules:
1839 final_shared_modules.remove(m)
1840 if m not in final_static_modules:
1841 final_static_modules.append(m)
1842 for m in explicit_shared_modules:
1843 if m in ['ALL','!DEFAULT','!FORCED']:
1844 continue
1845 if m.startswith('!'):
1846 m = m[1:]
1847 if m in final_shared_modules:
1848 final_shared_modules.remove(m)
1849 continue
1850 if m in required_static_modules:
1851 raise Errors.WafError('These modules are REQUIRED as static modules: %s' %
1852 ' '.join(required_static_modules))
1853 if m in forced_static_modules:
1854 raise Errors.WafError('These module MUST be configured as static modules: %s' %
1855 ' '.join(forced_static_modules))
1856 if m in final_static_modules:
1857 final_static_modules.remove(m)
1858 if m not in final_shared_modules:
1859 final_shared_modules.append(m)
1861 conf.env['static_modules'] = final_static_modules
1862 conf.env['shared_modules'] = final_shared_modules
1864 conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
1866 static_list = {}
1867 shared_list = {}
1869 prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount', 'rpc']
1870 conf.env['MODULE_PREFIXES'] = prefixes
1871 for p in prefixes:
1872 for m in final_static_modules:
1873 if m.find(p) == 0:
1874 if not p in static_list:
1875 static_list[p] = []
1876 static_list[p].append(m)
1877 for m in final_shared_modules:
1878 if m.find(p) == 0:
1879 if not p in shared_list:
1880 shared_list[p] = []
1881 shared_list[p].append(m)
1883 for p in prefixes:
1884 static_env = "%s_STATIC" % p.upper()
1885 shared_env = "%s_SHARED" % p.upper()
1886 conf.env[static_env] = []
1887 conf.env[shared_env] = []
1888 if p in static_list:
1889 decl_list=""
1890 for entry in static_list[p]:
1891 decl_list += "extern NTSTATUS %s_init(TALLOC_CTX *mem_ctx); " % entry
1892 conf.env[static_env].append('%s' % entry)
1893 decl_list = decl_list.rstrip()
1894 conf.DEFINE('static_decl_%s' % p, decl_list)
1895 conf.DEFINE('static_init_%s(mem_ctx)' % p, '{ %s_init((mem_ctx)); }' % '_init((mem_ctx)); '.join(static_list[p]))
1896 else:
1897 conf.DEFINE('static_decl_%s' % p, '')
1898 conf.DEFINE('static_init_%s(mem_ctx)' % p, '{}')
1899 if p in shared_list:
1900 for entry in shared_list[p]:
1901 conf.DEFINE('%s_init' % entry, 'samba_init_module')
1902 conf.env[shared_env].append('%s' % entry)
1903 Logs.info("%s: %s" % (static_env, ','.join(conf.env[static_env])))
1904 Logs.info("%s: %s" % (shared_env, ','.join(conf.env[shared_env])))
1906 conf.SAMBA_CONFIG_H('include/config.h')