negoex.idl: use DATA_BLOB for negoex_BYTE_VECTOR
[Samba.git] / source3 / wscript
blob8741d192ea915406467d4b6faf3350dfac63997b
1 #!/usr/bin/env python
3 srcdir=".."
5 import sys, os
6 from optparse import SUPPRESS_HELP
7 sys.path.insert(0, srcdir+"/buildtools/wafsamba")
8 sys.path.insert(0, "source3")
9 import wafsamba, Options, Logs, Utils, Scripting
10 import build.charset
11 import samba_utils, samba_version
12 import samba3
14 default_prefix = Options.default_prefix = '/usr/local/samba'
16 def set_options(opt):
18 opt.add_option('--with-static-modules',
19 help=("Comma-separated list of names of modules to statically link in. "+
20 "May include !module to disable 'module'. "+
21 "Can be '!FORCED' to disable all non-required static only modules. "+
22 "Can be '!DEFAULT' to disable all modules defaulting to a static build. "+
23 "Can be 'ALL' to build all default shared modules static. "+
24 "The most specific one wins, while the order is ignored "+
25 "and --with-static-modules is evaluated before "+
26 "--with-shared-modules"),
27 action="store", dest='static_modules', default=None)
28 opt.add_option('--with-shared-modules',
29 help=("Comma-separated list of names of modules to build shared. "+
30 "May include !module to disable 'module'. "+
31 "Can be '!FORCED' to disable all non-required shared only modules. "+
32 "Can be '!DEFAULT' to disable all modules defaulting to a shared build. "+
33 "Can be 'ALL' to build all default static modules shared. "+
34 "The most specific one wins, while the order is ignored "+
35 "and --with-static-modules is evaluated before "+
36 "--with-shared-modules"),
37 action="store", dest='shared_modules', default=None)
39 opt.SAMBA3_ADD_OPTION('winbind')
40 opt.SAMBA3_ADD_OPTION('ads')
41 opt.SAMBA3_ADD_OPTION('ldap')
42 opt.SAMBA3_ADD_OPTION('cups', with_name="enable", without_name="disable")
43 opt.SAMBA3_ADD_OPTION('iprint', with_name="enable", without_name="disable")
44 opt.SAMBA3_ADD_OPTION('pam')
45 opt.SAMBA3_ADD_OPTION('quotas')
46 opt.SAMBA3_ADD_OPTION('sendfile-support')
47 opt.SAMBA3_ADD_OPTION('utmp')
48 opt.SAMBA3_ADD_OPTION('pthreadpool', with_name="enable", without_name="disable", default=True)
49 opt.SAMBA3_ADD_OPTION('avahi', with_name="enable", without_name="disable")
50 opt.SAMBA3_ADD_OPTION('iconv')
51 opt.SAMBA3_ADD_OPTION('acl-support')
52 opt.SAMBA3_ADD_OPTION('dnsupdate')
53 opt.SAMBA3_ADD_OPTION('syslog')
54 opt.SAMBA3_ADD_OPTION('automount')
55 opt.SAMBA3_ADD_OPTION('dmapi', default=None) # None means autodetection
56 opt.SAMBA3_ADD_OPTION('fam', default=None) # None means autodetection
57 opt.SAMBA3_ADD_OPTION('profiling-data', default=False)
58 opt.SAMBA3_ADD_OPTION('libarchive', default=None)
60 opt.SAMBA3_ADD_OPTION('cluster-support', default=None)
62 opt.SAMBA3_ADD_OPTION('regedit', default=None)
64 opt.SAMBA3_ADD_OPTION('fake-kaserver',
65 help=("Include AFS fake-kaserver support"), default=False)
67 opt.add_option('--with-libcephfs',
68 help=("Directory under which libcephfs is installed"),
69 action="store", dest='libcephfs_dir', default=None)
71 opt.SAMBA3_ADD_OPTION('glusterfs', with_name="enable", without_name="disable", default=True)
73 opt.add_option('--enable-vxfs',
74 help=("enable support for VxFS (default=no)"),
75 action="store_true", dest='enable_vxfs', default=False)
77 opt.SAMBA3_ADD_OPTION('spotlight', with_name="enable", without_name="disable", default=False)
79 def configure(conf):
80 from samba_utils import TO_LIST
82 default_static_modules = []
83 default_shared_modules = []
84 required_static_modules = []
85 forced_static_modules = []
86 forced_shared_modules = []
88 if Options.options.developer:
89 conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD')
90 conf.env.developer = True
92 if sys.platform != 'openbsd5':
93 conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
95 # We crash without vfs_default
96 required_static_modules.extend(TO_LIST('vfs_default'))
98 conf.CHECK_HEADERS('execinfo.h libexc.h libunwind.h netdb.h')
99 conf.CHECK_HEADERS('linux/falloc.h linux/ioctl.h')
101 conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod')
102 conf.CHECK_FUNCS('strtol strchr strupr chflags')
103 conf.CHECK_FUNCS('getrlimit fsync fdatasync setpgid')
104 conf.CHECK_FUNCS('setsid glob strpbrk crypt16 getauthuid')
105 conf.CHECK_FUNCS('innetgr')
106 conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf')
107 conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups syscall sysconf')
108 conf.CHECK_FUNCS('atexit grantpt posix_openpt fallocate posix_fallocate')
109 conf.CHECK_FUNCS('fseeko setluid')
110 conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
111 conf.CHECK_FUNCS('fdopendir')
112 conf.CHECK_FUNCS('fstatat')
113 conf.CHECK_FUNCS('getpwent_r setenv strcasecmp fcvt fcvtl')
114 conf.CHECK_FUNCS('syslog vsyslog timegm setlocale')
115 conf.CHECK_FUNCS_IN('nanosleep', 'rt')
116 conf.CHECK_FUNCS('lutimes futimes utimensat futimens')
117 conf.CHECK_FUNCS('mlock munlock mlockall munlockall')
118 conf.CHECK_FUNCS('memalign posix_memalign hstrerror')
119 conf.CHECK_FUNCS('shmget')
120 conf.CHECK_FUNCS_IN('shm_open', 'rt', checklibc=True)
121 #FIXME: for some reason this one still fails
122 conf.CHECK_FUNCS_IN('yp_get_default_domain', 'nsl')
123 conf.CHECK_FUNCS_IN('dn_expand _dn_expand __dn_expand', 'resolv')
124 conf.CHECK_FUNCS_IN('dn_expand', 'inet')
125 conf.CHECK_DECLS('fdatasync', reverse=True)
126 conf.CHECK_DECLS('readahead', reverse=True, headers='fcntl.h')
128 if conf.CHECK_CODE('''
129 #if defined(HAVE_UNISTD_H)
130 #include <unistd.h>
131 #endif
132 long ret = splice(0,0,1,0,400,SPLICE_F_MOVE);
133 ''',
134 'HAVE_LINUX_SPLICE',
135 headers='fcntl.h'):
136 conf.CHECK_DECLS('splice', reverse=True, headers='fcntl.h')
138 # Check for inotify support
139 conf.CHECK_HEADERS('sys/inotify.h')
140 if "HAVE_SYS_INOTIFY_H" in conf.env:
141 conf.DEFINE('HAVE_INOTIFY', 1)
143 # Check for kernel change notify support
144 conf.CHECK_CODE('''
145 #ifndef F_NOTIFY
146 #define F_NOTIFY 1026
147 #endif
148 main() {
149 exit(fcntl(open("/tmp", O_RDONLY), F_NOTIFY, 0) == -1 ? 1 : 0);
150 }''', 'HAVE_KERNEL_CHANGE_NOTIFY', addmain=False, execute=True,
151 headers='fcntl.h signal.h',
152 msg="Checking for kernel change notify support")
154 # Check for Linux kernel oplocks
155 conf.CHECK_CODE('''
156 #include <sys/types.h>
157 #include <fcntl.h>
158 #include <signal.h>
159 #ifndef F_NOTIFY
160 #define F_NOTIFY 1026
161 #endif
162 main() {
163 exit(fcntl(open("/tmp", O_RDONLY), F_NOTIFY, 0) == -1 ? 1 : 0);
164 }''', 'HAVE_KERNEL_OPLOCKS_LINUX', addmain=False, execute=True,
165 msg="Checking for Linux kernel oplocks")
167 # Check for IRIX kernel oplock types
168 conf.CHECK_CODE('oplock_stat_t t; t.os_state = OP_REVOKE; t.os_dev = 1; t.os_ino = 1;',
169 'HAVE_KERNEL_OPLOCKS_IRIX', headers='fcntl.h',
170 msg="Checking for IRIX kernel oplock types")
172 # Check for kernel share modes
173 conf.CHECK_CODE('''
174 #include <sys/types.h>
175 #include <fcntl.h>
176 #include <signal.h>
177 #include <sys/file.h>
178 #ifndef LOCK_MAND
179 #define LOCK_MAND 32
180 #define LOCK_READ 64
181 #endif
182 main() {
183 exit(flock(open("/dev/null", O_RDWR), LOCK_MAND|LOCK_READ) != 0);
184 }''', 'HAVE_KERNEL_SHARE_MODES', addmain=False, execute=True,
185 msg="Checking for kernel share modes")
187 # check for fam libs
188 samba_fam_libs=None
189 check_for_fam=False
190 if Options.options.with_fam is None:
191 check_for_fam=True
192 elif Options.options.with_fam == True:
193 check_for_fam=True
195 if check_for_fam and conf.CHECK_HEADERS('fam.h'):
196 if conf.CHECK_FUNCS_IN('FAMOpen2', 'fam'):
197 samba_fam_libs='fam'
198 elif conf.CHECK_FUNCS_IN('FAMOpen2', 'fam C'):
199 samba_fam_libs='fam C'
200 conf.CHECK_TYPE('enum FAMCodes', headers='fam.h',
201 define='HAVE_FAM_H_FAMCODES_TYPEDEF',
202 msg='Checking whether enum FAMCodes is available')
203 conf.CHECK_FUNCS_IN('FAMNoExists', 'fam')
205 if samba_fam_libs is not None:
206 conf.DEFINE('SAMBA_FAM_LIBS', samba_fam_libs)
207 else:
208 if Options.options.with_fam == True:
209 conf.fatal('FAM support requested, but no suitable FAM library found')
210 elif check_for_fam:
211 Logs.warn('no suitable FAM library found')
213 # check for libarchive (tar command in smbclient)
214 # None means autodetect, True/False means enable/disable
215 conf.SET_TARGET_TYPE('archive', 'EMPTY')
216 if Options.options.with_libarchive is not False:
217 libarchive_mandatory = Options.options.with_libarchive == True
218 Logs.info("Checking for libarchive existence")
219 if conf.CHECK_HEADERS('archive.h') and conf.CHECK_LIB('archive', shlib=True):
220 conf.CHECK_FUNCS_IN('archive_read_support_filter_all archive_read_free', 'archive')
221 elif libarchive_mandatory:
222 conf.fatal('libarchive support requested, but not found')
224 # check for DMAPI libs
225 if Options.options.with_dmapi == False:
226 have_dmapi = False
227 else:
228 have_dmapi = True
229 Logs.info("Checking for DMAPI library existence")
230 samba_dmapi_lib = ''
231 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dm'):
232 samba_dmapi_lib = 'dm'
233 else:
234 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'jfsdm'):
235 samba_dmapi_lib = 'jfsdm'
236 else:
237 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dmapi'):
238 samba_dmapi_lib = 'dmapi'
239 else:
240 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'xdsm'):
241 samba_dmapi_lib = 'xdsm'
242 # only bother to test headers and compilation when a candidate
243 # library has been found
244 if samba_dmapi_lib == '':
245 have_dmapi = False
246 broken_dmapi = "no suitable DMAPI library found"
248 if have_dmapi:
249 conf.CHECK_HEADERS('sys/dmi.h xfs/dmapi.h sys/jfsdmapi.h sys/dmapi.h dmapi.h')
250 conf.CHECK_CODE('''
251 #include <time.h> /* needed by Tru64 */
252 #include <sys/types.h> /* needed by AIX */
253 #ifdef HAVE_XFS_DMAPI_H
254 #include <xfs/dmapi.h>
255 #elif defined(HAVE_SYS_DMI_H)
256 #include <sys/dmi.h>
257 #elif defined(HAVE_SYS_JFSDMAPI_H)
258 #include <sys/jfsdmapi.h>
259 #elif defined(HAVE_SYS_DMAPI_H)
260 #include <sys/dmapi.h>
261 #elif defined(HAVE_DMAPI_H)
262 #include <dmapi.h>
263 #endif
265 /* This link test is designed to fail on IRI 6.4, but should
266 * succeed on Linux, IRIX 6.5 and AIX.
268 int main(int argc, char **argv)
270 char * version;
271 dm_eventset_t events;
272 /* This doesn't take an argument on IRIX 6.4. */
273 dm_init_service(&version);
274 /* IRIX 6.4 expects events to be a pointer. */
275 DMEV_ISSET(DM_EVENT_READ, events);
277 return 0;
279 ''',
280 'USEABLE_DMAPI_LIBRARY',
281 addmain=False,
282 execute=False,
283 lib=samba_dmapi_lib,
284 msg='Checking whether DMAPI lib '+samba_dmapi_lib+' can be used')
285 if not conf.CONFIG_SET('USEABLE_DMAPI_LIBRARY'):
286 have_dmapi = False
287 broken_dmapi = "no usable DMAPI library found"
289 if have_dmapi:
290 Logs.info("Building with DMAPI support.")
291 conf.env['dmapi_lib'] = samba_dmapi_lib
292 conf.DEFINE('USE_DMAPI', 1)
293 else:
294 if Options.options.with_dmapi == False:
295 Logs.info("Building without DMAPI support (--without-dmapi).")
296 elif Options.options.with_dmapi == True:
297 Logs.error("DMAPI support not available: " + broken_dmapi)
298 conf.fatal('DMAPI support requested but not found.');
299 else:
300 Logs.warn("Building without DMAPI support: " + broken_dmapi)
301 conf.env['dmapi_lib'] = ''
303 # Check for various members of the stat structure
304 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blocks', define='HAVE_STAT_ST_BLOCKS',
305 headers='sys/stat.h')
306 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blksize', define='HAVE_STAT_ST_BLKSIZE',
307 headers='sys/stat.h')
308 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_flags', define='HAVE_STAT_ST_FLAGS',
309 headers='sys/types.h sys/stat.h unistd.h')
311 if "HAVE_BLKCNT_T" in conf.env:
312 conf.CHECK_CODE('''
313 static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 4)];''',
314 'SIZEOF_BLKCNT_T_4',
315 headers='replace.h sys/types.h sys/stat.h unistd.h',
316 msg="Checking whether blkcnt_t is 32 bit")
318 # If sizeof is 4 it can't be 8
319 if "HAVE_BLKCNT_T" in conf.env:
320 if not conf.CONFIG_SET('SIZEOF_BLKCNT_T_4'):
321 conf.CHECK_CODE('''
322 static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 8)];''',
323 'SIZEOF_BLKCNT_T_8',
324 headers='replace.h sys/types.h sys/stat.h unistd.h',
325 msg="Checking whether blkcnt_t is 64 bit")
327 # Check for POSIX capability support
328 conf.CHECK_FUNCS_IN('cap_get_proc', 'cap', headers='sys/capability.h')
330 if "HAVE_SYS_CAPABILITY_H" in conf.env:
331 conf.CHECK_CODE('''
332 cap_t cap;
333 cap_value_t vals[1];
334 if (!(cap = cap_get_proc())) exit(1);
335 vals[0] = CAP_CHOWN;
336 cap_set_flag(cap, CAP_INHERITABLE, 1, vals, CAP_CLEAR);
337 cap_set_proc(cap);''',
338 'HAVE_POSIX_CAPABILITIES', execute=True, lib="cap",
339 headers='sys/capability.h',
340 msg="Checking whether POSIX capabilities are available")
342 conf.CHECK_CODE('int i;', 'BROKEN_NISPLUS_INCLUDE_FILES',
343 headers='sys/types.h sys/acl.h rpcsvc/nis.h',
344 msg="Checking for broken nisplus include files")
346 # Check if the compiler will optimize out functions
347 conf.CHECK_CODE('''
348 #include <sys/types.h>
349 size_t __unsafe_string_function_usage_here_size_t__(void);
350 #define CHECK_STRING_SIZE(d, len) (sizeof(d) != (len) && sizeof(d) != sizeof(char *))
351 static size_t push_string_check_fn(void *dest, const char *src, size_t dest_len) {
352 return 0;
355 #define push_string_check(dest, src, dest_len) \
356 (CHECK_STRING_SIZE(dest, dest_len) \
357 ? __unsafe_string_function_usage_here_size_t__() \
358 : push_string_check_fn(dest, src, dest_len))
360 int main(int argc, char **argv) {
361 char outbuf[1024];
362 char *p = outbuf;
363 const char *foo = "bar";
364 p += 31 + push_string_check(p + 31, foo, sizeof(outbuf) - (p + 31 - outbuf));
365 return 0;
366 }''', 'HAVE_COMPILER_WILL_OPTIMIZE_OUT_FNS',
367 addmain=False,
368 add_headers=False,
369 msg="Checking if the compiler will optimize out functions")
371 # Check if the compiler supports the LL suffix on long long integers
372 # AIX needs this
373 conf.CHECK_CODE('long long i = 0x8000000000LL', 'COMPILER_SUPPORTS_LL',
374 headers='stdio.h',
375 msg="Checking for LL suffix on long long integers")
377 conf.CHECK_FUNCS('''
378 _acl __acl atexit
379 _chdir __chdir chflags chmod _close __close _closedir
380 __closedir crypt16 devnm dirfd
381 DNSServiceRegister _dup __dup _dup2 __dup2 endmntent execl
382 _facl __facl _fchdir
383 __fchdir fchmod fchown _fcntl __fcntl fcvt fcvtl fdatasync
384 _fork __fork fseeko
385 fsetxattr _fstat __fstat fsync
386 futimens futimes __fxstat getauthuid
387 getcwd _getcwd __getcwd getdents __getdents getdirentries
388 getgrent getgrnam getgrouplist getgrset getmntent getpagesize
389 getpwanam getpwent_r getrlimit
390 glob grantpt hstrerror initgroups innetgr
391 llseek _llseek __llseek _lseek __lseek
392 _lstat __lstat lutimes
393 __lxstat memalign mknod mlock mlockall munlock munlockall
394 _open __open _opendir __opendir
395 pathconf poll posix_fallocate
396 posix_memalign pread _pread __pread
397 pwrite _pwrite __pwrite
398 rdchk _read __read _readdir __readdir
399 _seekdir __seekdir
400 select setenv setgidx setgroups setlocale setluid
401 setmntent setpgid setpriv setsid setuidx
402 shmget shm_open
403 _stat __stat statvfs
404 strcasecmp strchr strpbrk strsignal strtol strupr sysconf sysctl sysctlbyname
405 __sys_llseek syslog _telldir __telldir timegm
406 utimensat vsyslog _write __write __xstat
407 ''')
409 conf.CHECK_SAMBA3_CHARSET() # see build/charset.py
411 # FIXME: these should be tests for features, but the old build system just
412 # checks for OSes.
413 host_os = sys.platform
414 Logs.info("building on %s" % host_os)
416 # Python doesn't have case switches... :/
417 # FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
418 # the search for .rfind('gnu') covers gnu* and *-gnu is that too broad?
420 conf.SET_TARGET_TYPE('sunacl', 'EMPTY')
421 if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('qnx') > -1):
422 if host_os.rfind('linux') > -1:
423 conf.DEFINE('LINUX', '1')
424 elif host_os.rfind('qnx') > -1:
425 conf.DEFINE('QNX', '1')
426 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
427 elif (host_os.rfind('darwin') > -1):
428 conf.DEFINE('DARWINOS', 1)
429 conf.ADD_CFLAGS('-fno-common')
430 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
431 elif (host_os.rfind('freebsd') > -1):
432 conf.DEFINE('FREEBSD', 1)
433 if conf.CHECK_HEADERS('sunacl.h'):
434 conf.DEFINE('HAVE_FREEBSD_SUNACL_H', '1')
435 conf.CHECK_FUNCS_IN(['acl'], 'sunacl')
436 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
437 elif (host_os.rfind('irix') > -1):
438 conf.DEFINE('IRIX', 1)
439 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
440 elif (host_os.rfind('aix') > -1):
441 conf.DEFINE('AIX', 1)
442 conf.DEFINE('STAT_ST_BLOCKSIZE', 'DEV_BSIZE')
443 elif (host_os.rfind('hpux') > -1):
444 conf.DEFINE('HPUX', 1)
445 conf.DEFINE('STAT_ST_BLOCKSIZE', '8192')
446 elif (host_os.rfind('osf') > -1):
447 conf.DEFINE('OSF1', 1)
448 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
450 # FIXME: Add more checks here.
451 else:
452 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
454 if Options.options.with_acl_support:
455 if (host_os.rfind('hpux') > -1):
456 Logs.info('Using HPUX ACLs')
457 conf.DEFINE('HAVE_HPUX_ACLS',1)
458 conf.DEFINE('POSIX_ACL_NEEDS_MASK',1)
459 default_static_modules.extend(TO_LIST('vfs_hpuxacl'))
460 elif (host_os.rfind('aix') > -1):
461 Logs.info('Using AIX ACLs')
462 conf.DEFINE('HAVE_AIX_ACLS',1)
463 default_static_modules.extend(TO_LIST('vfs_aixacl vfs_aixacl2'))
464 elif (host_os.rfind('darwin') > -1):
465 Logs.warn('ACLs on Darwin currently not supported')
466 conf.fatal("ACL support not available on Darwin/MacOS. "
467 "Use --without-acl-support for building without "
468 "ACL support. "
469 "ACL support is required to change permissions "
470 "from Windows clients.")
471 else:
472 conf.CHECK_FUNCS_IN(['acl_get_file'], 'acl')
473 if conf.CHECK_CODE('''
474 acl_t acl;
475 int entry_id;
476 acl_entry_t *entry_p;
477 return acl_get_entry(acl, entry_id, entry_p);
478 ''',
479 'HAVE_POSIX_ACLS',
480 headers='sys/types.h sys/acl.h', link=False,
481 msg="Checking for POSIX ACL support") :
482 conf.CHECK_CODE('''
483 acl_permset_t permset_d;
484 acl_perm_t perm;
485 return acl_get_perm_np(permset_d, perm);
486 ''',
487 'HAVE_ACL_GET_PERM_NP',
488 headers='sys/types.h sys/acl.h', link=True,
489 msg="Checking whether acl_get_perm_np() is available")
490 # source3/lib/sysacls.c calls posixacl_sys_acl_get_file()
491 required_static_modules.extend(TO_LIST('vfs_posixacl'))
492 conf.CHECK_VARIABLE('ACL_EVERYONE', headers='sys/acl.h')
493 elif conf.CHECK_FUNCS_IN(['facl'], 'sec'):
494 Logs.info('Using solaris or UnixWare ACLs')
495 conf.DEFINE('HAVE_SOLARIS_UNIXWARE_ACLS',1)
496 default_static_modules.extend(TO_LIST('vfs_solarisacl'))
497 elif conf.CHECK_FUNCS_IN(['acl_get_fd'], 'pacl'):
498 Logs.info('Using Tru64 ACLs')
499 conf.DEFINE('HAVE_TRU64_ACLS',1)
500 default_static_modules.extend(TO_LIST('vfs_tru64acl'))
501 else:
502 conf.fatal("ACL support not found. Try installing libacl1-dev "
503 "or libacl-devel. "
504 "Otherwise, use --without-acl-support to build "
505 "without ACL support. "
506 "ACL support is required to change permissions from "
507 "Windows clients.")
509 if conf.CHECK_FUNCS('dirfd'):
510 conf.DEFINE('HAVE_DIRFD_DECL', 1)
512 conf.CHECK_CODE('struct statfs fsd; fsid_t fsid = fsd.f_fsid; return statfs(".", &fsd);',
513 'HAVE_STATFS_F_FSID',
514 msg="vfs_fileid checking for statfs() and struct statfs.f_fsid",
515 headers='sys/types.h sys/statfs.h',
516 execute=True)
518 if conf.CONFIG_SET('HAVE_FALLOCATE'):
519 conf.CHECK_CODE('''
520 int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''',
521 'HAVE_LINUX_FALLOCATE',
522 msg="Checking whether the Linux 'fallocate' function is available",
523 headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
524 conf.CHECK_CODE('''
525 int ret = fallocate(0, FALLOC_FL_PUNCH_HOLE, 0, 10);''',
526 'HAVE_FALLOC_FL_PUNCH_HOLE',
527 msg="Checking whether Linux 'fallocate' supports hole-punching",
528 headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
530 conf.CHECK_CODE('''
531 int ret = lseek(0, 0, SEEK_HOLE);
532 ret = lseek(0, 0, SEEK_DATA);''',
533 'HAVE_LSEEK_HOLE_DATA',
534 msg="Checking whether lseek supports hole/data seeking",
535 headers='unistd.h sys/types.h')
537 conf.CHECK_CODE('''
538 ssize_t err = readahead(0,0,0x80000);''',
539 'HAVE_LINUX_READAHEAD',
540 msg="Checking whether Linux readahead is available",
541 headers='unistd.h fcntl.h')
542 conf.CHECK_DECLS('readahead', headers='fcntl.h', always=True)
544 conf.CHECK_CODE('int fd = openat(AT_FDCWD, ".", O_RDONLY);',
545 'HAVE_OPENAT',
546 msg='Checking for openat',
547 headers='fcntl.h')
549 if host_os.rfind('linux') > -1:
550 conf.CHECK_FUNCS_IN('io_submit', 'aio')
551 conf.CHECK_CODE('''
552 struct io_event ioev;
553 struct iocb *ioc;
554 io_context_t ctx;
555 struct timespec ts;
556 int fd;
557 char *buf;
558 fd = eventfd(0, EFD_NONBLOCK | EFD_CLOEXEC);
559 io_queue_init(128,&ctx);
560 io_prep_pwrite(ioc, 1, buf, 1, 0);
561 io_prep_pread(ioc, 1, buf, 1, 0);
562 io_set_eventfd(ioc, fd);
563 io_set_callback(ioc, (io_callback_t)(0));
564 io_submit(ctx, 1, &ioc);
565 io_getevents(ctx, 1, 1, &ioev, &ts);
566 ''',
567 'HAVE_LINUX_KERNEL_AIO',
568 msg='Checking for linux kernel asynchronous io support',
569 headers='unistd.h stdlib.h sys/types.h fcntl.h sys/eventfd.h libaio.h',
570 lib='aio')
572 conf.CHECK_CODE('''
573 struct msghdr msg;
574 union {
575 struct cmsghdr cm;
576 char control[CMSG_SPACE(sizeof(int))];
577 } control_un;
578 msg.msg_control = control_un.control;
579 msg.msg_controllen = sizeof(control_un.control);
580 ''',
581 'HAVE_STRUCT_MSGHDR_MSG_CONTROL',
582 msg='Checking if we can use msg_control for passing file descriptors',
583 headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
584 conf.CHECK_CODE('''
585 struct msghdr msg;
586 int fd;
587 msg.msg_accrights = (caddr_t) &fd;
588 msg.msg_accrightslen = sizeof(fd);
589 ''',
590 'HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS',
591 msg='Checking if we can use msg_accrights for passing file descriptors',
592 headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
594 if Options.options.with_winbind:
595 conf.env.build_winbind = True
596 conf.DEFINE('WITH_WINBIND', '1')
598 conf.find_program('awk', var='AWK')
600 conf.CHECK_HEADERS('asm/types.h')
602 conf.CHECK_CODE('dev_t dev; int i = major(dev); return 0', "HAVE_DEVICE_MAJOR_FN",
603 headers='unistd.h sys/types.h',
604 msg="Checking for major macro")
606 conf.CHECK_CODE('dev_t dev; int i = minor(dev); return 0', "HAVE_DEVICE_MINOR_FN",
607 headers='unistd.h sys/types.h',
608 msg="Checking for minor macro")
610 conf.CHECK_STRUCTURE_MEMBER('struct dirent', 'd_off',
611 headers='unistd.h sys/types.h dirent.h',
612 define='HAVE_DIRENT_D_OFF')
614 conf.CHECK_FUNCS('setnetgrent getnetgrent endnetgrent')
615 if conf.CHECK_CFLAGS('-Werror-implicit-function-declaration'):
616 netgrent_cflags = '-Werror-implicit-function-declaration'
617 else:
618 netgrent_cflags = ''
619 conf.CHECK_CODE('setnetgrent("foo")', 'HAVE_SETNETGRENT_PROTOTYPE',
620 msg="Checking for setnetgrent prototype",
621 headers='netdb.h netgroup.h',
622 cflags=netgrent_cflags)
623 conf.CHECK_CODE('getnetgrent', 'HAVE_GETNETGRENT_PROTOTYPE',
624 msg="Checking for getnetgrent prototype",
625 headers='netdb.h netgroup.h',
626 cflags=netgrent_cflags)
627 conf.CHECK_CODE('endnetgrent', 'HAVE_ENDNETGRENT_PROTOTYPE',
628 msg="Checking for endnetgrent prototype",
629 headers='netdb.h netgroup.h',
630 cflags=netgrent_cflags)
633 # Look for CUPS
634 if Options.options.with_cups:
635 conf.find_program('cups-config', var='CUPS_CONFIG')
636 if conf.env.CUPS_CONFIG:
637 # we would normally use --libs here, but cups-config incorrectly adds
638 # gssapi_krb5 and other libraries to its --libs output. That breaks the use
639 # of an in-tree heimdal kerberos
640 conf.CHECK_CFG(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags",
641 package="", uselib_store="CUPS")
642 conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups')
643 conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', 'cups')
644 if conf.CONFIG_SET('HAVE_CUPS_CUPS_H') and conf.CONFIG_SET('HAVE_CUPS_LANGUAGE_H'):
645 conf.DEFINE('HAVE_CUPS', '1')
646 else:
647 conf.undefine('HAVE_CUPS')
648 conf.SET_TARGET_TYPE('cups', 'EMPTY')
649 else:
650 # define an empty subsystem for cups, to allow it to be used as an empty dependency
651 conf.SET_TARGET_TYPE('cups', 'EMPTY')
653 if Options.options.with_iprint:
654 if conf.CONFIG_SET('HAVE_CUPS'):
655 conf.DEFINE('HAVE_IPRINT', '1')
656 else:
657 Logs.warn("--enable-iprint=yes but cups support not sufficient")
658 if Options.options.with_syslog:
659 conf.DEFINE('WITH_SYSLOG', '1')
660 if Options.options.with_automount:
661 conf.DEFINE('WITH_AUTOMOUNT', '1')
663 # Check for LDAP
664 if Options.options.with_ldap:
665 conf.CHECK_HEADERS('ldap.h lber.h ldap_pvt.h')
666 conf.CHECK_TYPE('ber_tag_t', 'unsigned int', headers='ldap.h lber.h')
667 conf.CHECK_FUNCS_IN('ber_scanf ber_sockbuf_add_io', 'lber')
668 conf.CHECK_VARIABLE('LDAP_OPT_SOCKBUF', headers='ldap.h')
670 # if we LBER_OPT_LOG_PRINT_FN we can intercept ldap logging and print it out
671 # for the samba logs
672 conf.CHECK_VARIABLE('LBER_OPT_LOG_PRINT_FN',
673 define='HAVE_LBER_LOG_PRINT_FN', headers='lber.h')
675 conf.CHECK_FUNCS_IN('ldap_init ldap_init_fd ldap_initialize ldap_set_rebind_proc', 'ldap')
676 conf.CHECK_FUNCS_IN('ldap_add_result_entry', 'ldap')
678 # Check if ldap_set_rebind_proc() takes three arguments
679 if conf.CHECK_CODE('ldap_set_rebind_proc(0, 0, 0)',
680 'LDAP_SET_REBIND_PROC_ARGS',
681 msg="Checking whether ldap_set_rebind_proc takes 3 arguments",
682 headers='ldap.h lber.h', link=False):
683 conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '3')
684 else:
685 conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '2')
687 # last but not least, if ldap_init() exists, we want to use ldap
688 if conf.CONFIG_SET('HAVE_LDAP_INIT') and conf.CONFIG_SET('HAVE_LDAP_H'):
689 conf.DEFINE('HAVE_LDAP', '1')
690 conf.DEFINE('LDAP_DEPRECATED', '1')
691 conf.env['HAVE_LDAP'] = '1'
692 # if ber_sockbuf_add_io() and LDAP_OPT_SOCKBUF are available, we can add
693 # SASL wrapping hooks
694 if conf.CONFIG_SET('HAVE_BER_SOCKBUF_ADD_IO') and \
695 conf.CONFIG_SET('HAVE_LDAP_OPT_SOCKBUF'):
696 conf.DEFINE('HAVE_LDAP_SASL_WRAPPING', '1')
697 else:
698 conf.fatal("LDAP support not found. "
699 "Try installing libldap2-dev or openldap-devel. "
700 "Otherwise, use --without-ldap to build without "
701 "LDAP support. "
702 "LDAP support is required for the LDAP passdb backend, "
703 "LDAP idmap backends and ADS. "
704 "ADS support improves communication with "
705 "Active Directory domain controllers.")
706 else:
707 conf.SET_TARGET_TYPE('ldap', 'EMPTY')
708 conf.SET_TARGET_TYPE('lber', 'EMPTY')
710 if Options.options.with_ads == False:
711 use_ads = False
712 use_ads_krb5 = False
713 use_ads_ldap = False
714 else:
715 use_ads = True
716 use_ads_krb5 = True
717 use_ads_ldap = True
718 if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
719 not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
720 Logs.warn("arcfour-hmac-md5 encryption type not found in -lkrb5")
721 use_ads_krb5 = False
722 if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
723 Logs.warn("krb5_mk_req_extended not found in -lkrb5")
724 use_ads_krb5 = False
725 if not conf.CONFIG_SET('HAVE_KRB5_GET_HOST_REALM'):
726 Logs.warn("krb5_get_host_realm not found in -lkrb5")
727 use_ads_krb5 = False
728 if not conf.CONFIG_SET('HAVE_KRB5_FREE_HOST_REALM'):
729 Logs.warn("krb5_free_host_realm not found in -lkrb5")
730 use_ads_krb5 = False
731 if not conf.CONFIG_SET('HAVE_KRB5_FWD_TGT_CREDS'):
732 Logs.warn("krb5_fwd_tgt_creds found in -lkrb5")
733 use_ads_krb5 = False
734 if not conf.CONFIG_SET('HAVE_KRB5_GET_INIT_CREDS_OPT_ALLOC'):
735 Logs.warn("krb5_get_init_creds_opt_alloc not found in -lkrb5")
736 use_ads_krb5 = False
737 if not conf.CONFIG_SET('KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT'):
738 Logs.warn("krb5_get_init_creds_opt_free was not found or was too old in -lkrb5")
739 use_ads_krb5 = False
740 if not conf.CONFIG_SET('HAVE_KRB5_GET_RENEWED_CREDS'):
741 Logs.warn("krb5_get_renewed_creds not found in -lkrb5")
742 use_ads_krb5 = False
743 if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL_COMPARE_ANY_REALM'):
744 Logs.warn("krb5_principal_compare_any_realm not found in -lkrb5")
745 use_ads_krb5 = False
746 if not conf.CONFIG_SET('HAVE_KRB5_C_STRING_TO_KEY') and \
747 not conf.CONFIG_SET('HAVE_KRB5_STRING_TO_KEY_SALT'):
748 Logs.warn("krb5_c_string_to_key not found in -lkrb5")
749 use_ads_krb5 = False
750 if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
751 not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
752 Logs.warn("no CREATE_KEY_FUNCTIONS detected")
753 use_ads_krb5 = False
754 if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
755 not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
756 Logs.warn("no GET_ENCTYPES_FUNCTIONS detected")
757 use_ads_krb5 = False
758 if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
759 not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
760 Logs.warn("no KT_FREE_FUNCTION detected")
761 use_ads_krb5 = False
762 if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM'):
763 Logs.warn("krb5_c_verify_checksum_compare not found in -lkrb5")
764 use_ads_krb5 = False
766 # We don't actually use
767 # gsskrb5_extract_authz_data_from_sec_context, but it is a
768 # clue that this Heimdal, which does the PAC processing we
769 # need on the standard gss_inquire_sec_context_by_oid
770 if not conf.CONFIG_SET('HAVE_GSS_GET_NAME_ATTRIBUTE') and \
771 not (conf.CONFIG_SET('HAVE_GSSKRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT') and \
772 conf.CONFIG_SET('HAVE_GSS_INQUIRE_SEC_CONTEXT_BY_OID')):
773 Logs.warn("need either gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support")
774 use_ads_krb5 = False
776 if not conf.CONFIG_SET('HAVE_GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT'):
777 Logs.warn("need gss_krb5_export_lucid_sec_context for SPNEGO and gss_wrap support")
778 use_ads_krb5 = False
780 if use_ads_krb5:
781 conf.DEFINE('HAVE_KRB5', '1')
782 conf.env['HAVE_KRB5'] = '1'
783 else:
784 conf.undefine('HAVE_KRB5_H')
785 conf.undefine('HAVE_GSSAPI_H')
786 conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
787 conf.undefine('HAVE_GSSAPI_GSSAPI_H')
788 use_ads = False
790 if not conf.CONFIG_SET('HAVE_LDAP'):
791 use_ads = False
792 use_ads_ldap = False
794 if use_ads:
795 conf.DEFINE('WITH_ADS', '1')
796 conf.env['HAVE_ADS'] = '1'
797 Logs.info("Building with Active Directory support.")
798 # these have broken dependencies
799 forced_shared_modules.extend(TO_LIST('idmap_ad idmap_rfc2307'))
800 elif Options.options.with_ads == False:
801 Logs.info("Building without Active Directory support (--without-ads).")
802 else:
803 if not use_ads_krb5:
804 Logs.warn("Active Directory support not available: krb5 libs don't have all required features")
805 if not use_ads_ldap:
806 Logs.warn("Active Directory support not available: LDAP support is not available.")
807 if Options.options.with_ads:
808 conf.fatal("Active Directory support not found. Use --without-ads "
809 "for building without Active Directory support. "
810 "ADS support improves communication with "
811 "Active Directory domain controllers.")
812 else:
813 # this is the auto-mode case
814 Logs.warn("Building without Active Directory support.")
817 if Options.options.with_utmp:
818 conf.env.with_utmp = True
819 if not conf.CHECK_HEADERS('utmp.h'): conf.env.with_utmp = False
820 conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent')
821 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_name', headers='utmp.h',
822 define='HAVE_UT_UT_NAME')
823 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_user', headers='utmp.h',
824 define='HAVE_UT_UT_USER')
825 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_id', headers='utmp.h',
826 define='HAVE_UT_UT_ID')
827 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_host', headers='utmp.h',
828 define='HAVE_UT_UT_HOST')
829 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_time', headers='utmp.h',
830 define='HAVE_UT_UT_TIME')
831 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_tv', headers='utmp.h',
832 define='HAVE_UT_UT_TV')
833 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_type', headers='utmp.h',
834 define='HAVE_UT_UT_TYPE')
835 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_pid', headers='utmp.h',
836 define='HAVE_UT_UT_PID')
837 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_exit.e_exit', headers='utmp.h',
838 define='HAVE_UT_UT_EXIT')
839 conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_syslen', headers='utmpx.h',
840 define='HAVE_UX_UT_SYSLEN')
841 conf.CHECK_CODE('struct utmp utarg; struct utmp *utreturn; utreturn = pututline(&utarg);',
842 'PUTUTLINE_RETURNS_UTMP', headers='utmp.h',
843 msg="Checking whether pututline returns pointer")
844 conf.CHECK_SIZEOF(['((struct utmp *)NULL)->ut_line'], headers='utmp.h',
845 define='SIZEOF_UTMP_UT_LINE', critical=False)
846 if not conf.CONFIG_SET('SIZEOF_UTMP_UT_LINE'):
847 conf.env.with_utmp = False
848 elif int(conf.env.SIZEOF_UTMP_UT_LINE) < 15:
849 conf.env.with_utmp = False
850 if conf.env.with_utmp:
851 conf.DEFINE('WITH_UTMP', 1)
852 else:
853 Logs.warn("--with-utmp but utmp support not sufficient")
855 if Options.options.with_avahi:
856 conf.env.with_avahi = True
857 if not conf.CHECK_HEADERS('avahi-common/watch.h avahi-client/client.h'): conf.env.with_avahi = False
858 if not conf.CHECK_FUNCS_IN('avahi_client_new', 'avahi-client'): conf.env.with_avahi = False
859 if not conf.CHECK_FUNCS_IN('avahi_strerror', 'avahi-common'): conf.env.with_avahi = False
860 if conf.env.with_avahi:
861 conf.DEFINE('WITH_AVAHI_SUPPORT', 1)
862 else:
863 conf.SET_TARGET_TYPE('avahi-common', 'EMPTY')
864 conf.SET_TARGET_TYPE('avahi-client', 'EMPTY')
866 if Options.options.with_iconv:
867 conf.env.with_iconv = True
868 if not conf.CHECK_FUNCS_IN('iconv_open', 'iconv', headers='iconv.h'):
869 conf.env.with_iconv = False
870 if conf.env.with_iconv:
871 conf.DEFINE('HAVE_ICONV', 1)
873 if Options.options.with_pam:
874 use_pam=True
875 conf.CHECK_HEADERS('security/pam_appl.h pam/pam_appl.h')
876 if not conf.CONFIG_SET('HAVE_SECURITY_PAM_APPL_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_APPL_H'):
877 Logs.warn("--with-pam=yes but pam_appl.h not found")
878 use_pam=False
879 conf.CHECK_FUNCS_IN('pam_get_data', 'pam')
880 conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
881 if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
882 Logs.warn("--with-pam=yes but pam_modules.h not found")
883 use_pam=False
884 conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h')
885 conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h')
886 conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam')
887 conf.CHECK_CODE('''
888 #if defined(HAVE_SECURITY_PAM_APPL_H)
889 #include <security/pam_appl.h>
890 #elif defined(HAVE_PAM_PAM_APPL_H)
891 #include <pam/pam_appl.h>
892 #endif
893 pam_set_item(0, PAM_RHOST, 0);
894 ''',
895 'HAVE_PAM_RHOST',
896 lib='pam',
897 msg="Checking whether PAM_RHOST is available");
898 conf.CHECK_CODE('''
899 #if defined(HAVE_SECURITY_PAM_APPL_H)
900 #include <security/pam_appl.h>
901 #elif defined(HAVE_PAM_PAM_APPL_H)
902 #include <pam/pam_appl.h>
903 #endif
904 pam_set_item(0, PAM_TTY, 0);
905 ''',
906 'HAVE_PAM_TTY',
907 lib='pam',
908 msg="Checking whether PAM_TTY is available");
909 conf.CHECK_CODE('''
910 #if (!defined(LINUX))
912 #define PAM_EXTERN extern
913 #if defined(HAVE_SECURITY_PAM_APPL_H)
914 #include <security/pam_appl.h>
915 #elif defined(HAVE_PAM_PAM_APPL_H)
916 #include <pam/pam_appl.h>
917 #endif
919 #endif
921 #if defined(HAVE_SECURITY_PAM_MODULES_H)
922 #include <security/pam_modules.h>
923 #elif defined(HAVE_PAM_PAM_MODULES_H)
924 #include <pam/pam_modules.h>
925 #endif
927 #if defined(HAVE_SECURITY__PAM_MACROS_H)
928 #include <security/_pam_macros.h>
929 #elif defined(HAVE_PAM__PAM_MACROS_H)
930 #include <pam/_pam_macros.h>
931 #endif
933 #ifdef HAVE_SECURITY_PAM_EXT_H
934 #include <security/pam_ext.h>
935 #endif
937 int i; i = PAM_RADIO_TYPE;
938 ''',
939 'HAVE_PAM_RADIO_TYPE',
940 lib='pam',
941 msg="Checking whether PAM_RADIO_TYPE is available");
942 if use_pam:
943 conf.DEFINE('WITH_PAM', 1)
944 conf.DEFINE('WITH_PAM_MODULES', 1)
946 seteuid = False
949 # Ensure we select the correct set of system calls on Linux.
951 if (host_os.rfind('linux') > -1):
952 conf.CHECK_CODE('''
953 #if defined(HAVE_UNISTD_H)
954 #include <unistd.h>
955 #endif
956 #include <stdlib.h>
957 #include <stdio.h>
958 #include <sys/types.h>
959 #include <errno.h>
961 #ifdef HAVE_SYS_PRIV_H
962 #include <sys/priv.h>
963 #endif
964 #ifdef HAVE_SYS_ID_H
965 #include <sys/id.h>
966 #endif
968 #if defined(HAVE_SYSCALL_H)
969 #include <syscall.h>
970 #endif
972 #if defined(HAVE_SYS_SYSCALL_H)
973 #include <sys/syscall.h>
974 #endif
976 syscall(SYS_setresuid32, -1, -1, -1);
977 syscall(SYS_setresgid32, -1, -1, -1);
978 syscall(SYS_setreuid32, -1, -1);
979 syscall(SYS_setregid32, -1, -1);
980 syscall(SYS_setuid32, -1);
981 syscall(SYS_setgid32, -1);
982 syscall(SYS_setgroups32, 0, NULL);
983 ''',
984 'USE_LINUX_32BIT_SYSCALLS',
985 msg="Checking whether Linux should use 32-bit credential calls");
987 if (conf.CONFIG_SET('USE_LINUX_32BIT_SYSCALLS')):
988 seteuid = conf.CHECK_CODE('''
989 #define AUTOCONF_TEST 1
990 #define USE_LINUX_THREAD_CREDENTIALS 1
991 #define USE_LINUX_32BIT_SYSCALLS 1
992 #include "../lib/util/setid.c"
993 #include "./lib/util_sec.c"
994 ''',
995 'USE_LINUX_THREAD_CREDENTIALS',
996 addmain=False,
997 execute=True,
998 msg="Checking whether we can use Linux thread-specific credentials with 32-bit system calls")
999 else:
1000 seteuid = conf.CHECK_CODE('''
1001 #define AUTOCONF_TEST 1
1002 #define USE_LINUX_THREAD_CREDENTIALS 1
1003 #include "../lib/util/setid.c"
1004 #include "./lib/util_sec.c"
1005 ''',
1006 'USE_LINUX_THREAD_CREDENTIALS',
1007 addmain=False,
1008 execute=True,
1009 msg="Checking whether we can use Linux thread-specific credentials")
1010 if not seteuid:
1011 seteuid = conf.CHECK_CODE('''
1012 #define AUTOCONF_TEST 1
1013 #define USE_SETREUID 1
1014 #include "../lib/util/setid.c"
1015 #include "./lib/util_sec.c"
1016 ''',
1017 'USE_SETREUID',
1018 addmain=False,
1019 execute=True,
1020 msg="Checking whether setreuid is available")
1021 if not seteuid:
1022 seteuid = conf.CHECK_CODE('''
1023 #define AUTOCONF_TEST 1
1024 #define USE_SETRESUID 1
1025 #include "../lib/util/setid.c"
1026 #include "./lib/util_sec.c"
1027 ''',
1028 'USE_SETRESUID',
1029 addmain=False,
1030 execute=True,
1031 msg="Checking whether setresuid is available")
1032 if not seteuid:
1033 seteuid = conf.CHECK_CODE('''
1034 #define AUTOCONF_TEST 1
1035 #define USE_SETEUID 1
1036 #include "../lib/util/setid.c"
1037 #include "./lib/util_sec.c"
1038 ''',
1039 'USE_SETEUID',
1040 addmain=False,
1041 execute=True,
1042 msg="Checking whether seteuid is available")
1043 if not seteuid:
1044 seteuid = conf.CHECK_CODE('''
1045 #define AUTOCONF_TEST 1
1046 #define USE_SETUIDX 1
1047 #include "../lib/util/setid.c"
1048 #include "./lib/util_sec.c"
1049 ''',
1050 'USE_SETUIDX',
1051 addmain=False,
1052 execute=True,
1053 mandatory=True,
1054 msg="Checking whether setuidx is available")
1055 if Options.options.with_dnsupdate:
1056 if not conf.CONFIG_SET('HAVE_KRB5'):
1057 Logs.warn("--with-dnsupdate=yes but gssapi support not sufficient")
1058 else:
1059 conf.DEFINE('WITH_DNS_UPDATES', 1)
1060 conf.CHECK_HEADERS('valgrind.h valgrind/valgrind.h valgrind/memcheck.h')
1061 if Options.options.developer:
1062 if conf.CONFIG_SET('HAVE_VALGRIND_H') or conf.CONFIG_SET('HAVE_VALGRIND_VALGRIND_H'):
1063 conf.DEFINE('VALGRIND', '1')
1065 if conf.CHECK_CODE('''
1066 #include <bits/sockaddr.h>
1067 #include <linux/netlink.h>
1068 ''',
1069 'HAVE_LINUX_NETLINK_H',
1070 msg="Checking whether Linux netlink is available"):
1072 conf.CHECK_CODE('''
1073 #include <bits/sockaddr.h>
1074 #include <linux/netlink.h>
1075 #include <linux/rtnetlink.h>
1076 ''',
1077 'HAVE_LINUX_RTNETLINK_H',
1078 msg='Checking whether Linux rtnetlink is available')
1080 conf.CHECK_CODE('''
1081 #include "../tests/fcntl_lock.c"
1082 ''',
1083 'HAVE_FCNTL_LOCK',
1084 addmain=False,
1085 execute=True,
1086 msg='Checking whether fcntl locking is available')
1088 # glibc up to 2.3.6 had dangerously broken posix_fallocate(). DON'T USE IT.
1089 if not conf.CHECK_CODE('''
1090 #define _XOPEN_SOURCE 600
1091 #include <stdlib.h>
1092 #if defined(__GLIBC__) && ((__GLIBC__ < 2) || (__GLIBC__ == 2 && __GLIBC_MINOR__ < 4))
1093 #error probably broken posix_fallocate
1094 #endif
1095 ''',
1096 '_HAVE_UNBROKEN_POSIX_FALLOCATE',
1097 msg='Checking for broken posix_fallocate'):
1098 conf.DEFINE('HAVE_BROKEN_POSIX_FALLOCATE', '1')
1101 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtim.tv_nsec',
1102 define='HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') # Linux, Solaris
1103 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimensec',
1104 define='HAVE_STRUCT_STAT_ST_MTIMENSEC') # BSD, if defined _POSIX_SOURCE
1105 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimespec.tv_nsec',
1106 define='HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') # BSD, if not defined _POSIX_SOURCE
1107 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtime_n',
1108 define='HAVE_STRUCT_STAT_ST_MTIME_N') # AIX
1109 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_umtime',
1110 define='HAVE_STRUCT_STAT_ST_UMTIME') # Tru64
1111 if conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') or \
1112 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMENSEC') or \
1113 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') or \
1114 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIME_N') or \
1115 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_UMTIME'):
1116 conf.DEFINE('HAVE_STAT_HIRES_TIMESTAMPS', '1')
1118 # recent FreeBSD, NetBSD have creation timestamps called birthtime:
1119 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtime',
1120 define='HAVE_STRUCT_STAT_ST_BIRTHTIME')
1121 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimespec.tv_nsec',
1122 define='HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC')
1123 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimensec',
1124 define='HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC')
1126 conf.CHECK_CODE('''
1127 ssize_t err = posix_fadvise(0,0,0x80000,POSIX_FADV_WILLNEED);
1128 ''',
1129 'HAVE_POSIX_FADVISE',
1130 msg='Checking whether posix_fadvise is available',
1131 headers='unistd.h fcntl.h')
1133 for v in ['_SC_NGROUPS_MAX', '_SC_NPROC_ONLN', '_SC_NPROCESSORS_ONLN', '_SC_PAGESIZE' ]:
1134 conf.CHECK_CODE('''
1135 #include <unistd.h>
1136 return sysconf(%s) == -1 ? 1 : 0;
1137 ''' % v,
1138 'SYSCONF%s' % v,
1139 msg='Checking whether sysconf(%s) is available' % v)
1141 conf.CHECK_CODE('''
1142 #include <sys/syscall.h>
1143 #include <unistd.h>
1144 syscall(SYS_initgroups, 16, NULL, NULL, 0);
1145 ''',
1146 'HAVE_DARWIN_INITGROUPS',
1147 msg='Checking whether to use the Darwin-specific initgroups system call')
1149 conf.CHECK_CODE('''struct utimbuf tbuf; tbuf.actime = 0; tbuf.modtime = 1; exit(utime("foo.c",&tbuf));''',
1150 'HAVE_UTIMBUF',
1151 headers='sys/types.h utime.h',
1152 msg='Checking whether struct utimbuf is available')
1154 if conf.CHECK_CODE('''struct sigevent s;''',
1155 'HAVE_STRUCT_SIGEVENT',
1156 headers='sys/types.h stdlib.h stddef.h signal.h',
1157 msg='Checking whether we have the struct sigevent'):
1158 conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sival_ptr',
1159 define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIVAL_PTR',
1160 headers='signal.h');
1161 conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sigval_ptr',
1162 define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIGVAL_PTR',
1163 headers='signal.h');
1165 if os.path.exists('/proc/sys/kernel/core_pattern'):
1166 conf.DEFINE('HAVE_SYS_KERNEL_PROC_CORE_PATTERN', '1')
1168 if conf.CHECK_CODE('''
1169 #include <time.h>
1170 main() {
1171 struct tm *tm;
1172 if (sizeof(time_t) == 8) {
1173 time_t max_time = 0x7fffffffffffffffll;
1174 tm = gmtime(&max_time);
1175 /* This should fail with 32-bit tm_year. */
1176 if (tm == NULL) {
1177 /* Max time_t that works with 32-bit int tm_year in struct tm. */
1178 max_time = 67768036191676799ll;
1179 tm = gmtime(&max_time);
1180 if (tm) {
1181 exit(0);
1185 exit(1);
1186 }''',
1187 '__TIME_T_MAX',
1188 addmain=False,
1189 execute=True,
1190 msg="Checking for the maximum value of the 'time_t' type"):
1191 conf.DEFINE('TIME_T_MAX', '67768036191676799ll')
1193 conf.CHECK_CODE('''
1194 #if defined(HAVE_UNISTD_H)
1195 #include <unistd.h>
1196 #endif
1197 #include <sys/types.h>
1198 main() { dev_t dev = makedev(1,2); return 0; }
1199 ''',
1200 'HAVE_MAKEDEV',
1201 addmain=False,
1202 msg='Checking whether the macro for makedev is available')
1204 conf.CHECK_CODE('''
1205 #include <stdio.h>
1206 #include <limits.h>
1207 #include <signal.h>
1209 void exit_on_core(int ignored) {
1210 exit(1);
1213 main() {
1214 char *newpath;
1215 signal(SIGSEGV, exit_on_core);
1216 newpath = realpath("/tmp", NULL);
1217 exit((newpath != NULL) ? 0 : 1);
1219 ''',
1220 'REALPATH_TAKES_NULL',
1221 addmain=False,
1222 execute=True,
1223 msg='Checking whether the realpath function allows a NULL argument')
1225 conf.CHECK_CODE('''#include "../tests/ftruncate.c"''',
1226 'HAVE_FTRUNCATE_EXTEND',
1227 msg='Checking for ftruncate extend',
1228 addmain=False,
1229 execute=True)
1231 if Options.options.with_sendfile_support:
1232 if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('k*bsd*-gnu') > -1) or (host_os.rfind('kopensolaris*-gnu') > -1):
1233 conf.CHECK_CODE('''
1234 int tofd, fromfd;
1235 off_t offset;
1236 size_t total;
1237 ssize_t nwritten = sendfile(tofd, fromfd, &offset, total);
1238 ''',
1239 '_HAVE_SENDFILE',
1240 headers='sys/sendfile.h',
1241 msg='Checking for linux sendfile support')
1243 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1244 conf.DEFINE('HAVE_SENDFILE', '1')
1245 conf.DEFINE('LINUX_SENDFILE_API', '1')
1246 conf.DEFINE('WITH_SENDFILE', '1')
1247 elif (host_os.rfind('freebsd') > -1) or (host_os.rfind('dragonfly') > -1):
1248 conf.CHECK_CODE('''
1249 #include <sys/types.h>
1250 #include <unistd.h>
1251 #include <sys/socket.h>
1252 #include <sys/uio.h>
1253 int fromfd, tofd, ret, total=0;
1254 off_t offset, nwritten;
1255 struct sf_hdtr hdr;
1256 struct iovec hdtrl;
1257 hdr.headers = &hdtrl;
1258 hdr.hdr_cnt = 1;
1259 hdr.trailers = NULL;
1260 hdr.trl_cnt = 0;
1261 hdtrl.iov_base = NULL;
1262 hdtrl.iov_len = 0;
1263 ret = sendfile(fromfd, tofd, offset, total, &hdr, &nwritten, 0)
1264 ''',
1265 '_HAVE_SENDFILE',
1266 msg='Checking for freebsd sendfile support')
1267 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1268 conf.DEFINE('HAVE_SENDFILE', '1')
1269 conf.DEFINE('FREEBSD_SENDFILE_API', '1')
1270 conf.DEFINE('WITH_SENDFILE', '1')
1271 elif (host_os.rfind('darwin') > -1):
1272 conf.CHECK_CODE('''
1273 #include <sys/types.h>
1274 #include <sys/socket.h>
1275 #include <sys/uio.h>
1276 int fromfd, tofd, ret;
1277 off_t offset, nwritten;
1278 struct sf_hdtr hdr;
1279 struct iovec hdtrl;
1280 hdr.headers = &hdtrl;
1281 hdr.hdr_cnt = 1;
1282 hdr.trailers = (void *)0;
1283 hdr.trl_cnt = 0;
1284 hdtrl.iov_base = (void *)0;
1285 hdtrl.iov_len = 0;
1286 ret = sendfile(fromfd, tofd, offset, &nwritten, &hdr, 0);
1287 ''',
1288 '_HAVE_SENDFILE',
1289 msg='Checking for darwin sendfile support')
1290 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1291 conf.DEFINE('HAVE_SENDFILE', '1')
1292 conf.DEFINE('DARWIN_SENDFILE_API', '1')
1293 conf.DEFINE('WITH_SENDFILE', '1')
1294 elif (host_os.rfind('hpux') > -1) or (host_os.rfind('osf') > -1):
1295 conf.CHECK_CODE('''
1296 #include <sys/socket.h>
1297 #include <sys/uio.h>
1298 int fromfd, tofd;
1299 size_t total=0;
1300 struct iovec hdtrl[2];
1301 ssize_t nwritten;
1302 off_t offset;
1303 hdtrl[0].iov_base = 0;
1304 hdtrl[0].iov_len = 0;
1305 nwritten = sendfile(tofd, fromfd, offset, total, &hdtrl[0], 0);
1306 ''',
1307 '_HAVE_SENDFILE',
1308 msg='Checking for osf/hpux sendfile support')
1309 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1310 conf.DEFINE('HAVE_SENDFILE', '1')
1311 conf.DEFINE('HPUX_SENDFILE_API', '1')
1312 conf.DEFINE('WITH_SENDFILE', '1')
1313 elif (host_os.rfind('solaris') > -1):
1314 conf.CHECK_FUNCS_IN('sendfile', 'sendfilev')
1315 conf.CHECK_CODE('''
1316 #include <sys/sendfile.h>,
1317 int sfvcnt;
1318 size_t xferred;
1319 struct sendfilevec vec[2];
1320 ssize_t nwritten;
1321 int tofd;
1322 sfvcnt = 2;
1323 vec[0].sfv_fd = SFV_FD_SELF;
1324 vec[0].sfv_flag = 0;
1325 vec[0].sfv_off = 0;
1326 vec[0].sfv_len = 0;
1327 vec[1].sfv_fd = 0;
1328 vec[1].sfv_flag = 0;
1329 vec[1].sfv_off = 0;
1330 vec[1].sfv_len = 0;
1331 nwritten = sendfilev(tofd, vec, sfvcnt, &xferred);
1332 ''',
1333 '_HAVE_SENDFILEV',
1334 msg='Checking for solaris sendfilev support')
1335 if conf.CONFIG_SET('_HAVE_SENDFILEV'):
1336 conf.DEFINE('HAVE_SENDFILEV', '1')
1337 conf.DEFINE('SOLARIS_SENDFILE_API', '1')
1338 conf.DEFINE('WITH_SENDFILE', '1')
1339 elif (host_os.rfind('aix') > -1):
1340 conf.CHECK_CODE('''
1341 #include <sys/socket.h>
1342 int fromfd, tofd;
1343 size_t total=0;
1344 struct sf_parms hdtrl;
1345 ssize_t nwritten;
1346 hdtrl.header_data = 0;
1347 hdtrl.header_length = 0;
1348 hdtrl.file_descriptor = fromfd;
1349 hdtrl.file_offset = 0;
1350 hdtrl.file_bytes = 0;
1351 hdtrl.trailer_data = 0;
1352 hdtrl.trailer_length = 0;
1353 nwritten = send_file(&tofd, &hdtrl, 0);
1354 ''',
1355 '_HAVE_SENDFILE',
1356 msg='Checking for AIX send_file support')
1357 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1358 conf.DEFINE('HAVE_SENDFILE', '1')
1359 conf.DEFINE('AIX_SENDFILE_API', '1')
1360 conf.DEFINE('WITH_SENDFILE', '1')
1362 # Check for getcwd allowing a NULL arg.
1363 conf.CHECK_CODE('''
1364 #include <unistd.h>
1365 main() {
1366 char *s = getcwd(NULL,0);
1367 exit(s != NULL ? 0 : 1);
1368 }''', 'GETCWD_TAKES_NULL', addmain=False, execute=True,
1369 msg="getcwd takes a NULL argument")
1372 # UnixWare 7.x has its getspnam in -lgen
1373 conf.CHECK_FUNCS_IN('getspnam', 'gen')
1374 conf.CHECK_FUNCS_IN('getspnam', 'security')
1375 conf.CHECK_FUNCS_IN('getspnam', 'sec')
1377 if Options.options.with_quotas:
1378 # For quotas on Veritas VxFS filesystems
1379 conf.CHECK_HEADERS('sys/fs/vx_quota.h')
1380 # For sys/quota.h and linux/quota.h
1381 conf.CHECK_HEADERS('sys/quota.h')
1382 # For quotas on BSD systems
1383 conf.CHECK_HEADERS('ufs/ufs/quota.h')
1384 # For quotas on Linux XFS filesystems
1385 if conf.CHECK_HEADERS('xfs/xqm.h'):
1386 conf.DEFINE('HAVE_XFS_QUOTAS', '1')
1387 else:
1388 # For Irix XFS
1389 conf.CHECK_CODE('''
1390 #include "confdefs.h"
1391 #ifdef HAVE_SYS_TYPES_H
1392 #include <sys/types.h>
1393 #endif
1394 #ifdef HAVE_ASM_TYPES_H
1395 #include <asm/types.h>
1396 #endif
1397 #include <sys/quota.h>
1398 int i = Q_XGETQUOTA;''',
1399 define='HAVE_XFS_QUOTAS',
1400 msg='for XFS QUOTA in <sys/quota.h>',
1401 execute=False,
1402 local_include=False)
1404 # For IRIX like dqb_isoftlimit instead of dqb_fsoftlimit in struc dqblk
1405 conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_fsoftlimit', define='HAVE_DQB_FSOFTLIMIT',
1406 headers='sys/quota.h')
1407 #darwin style quota bytecount
1408 conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_curbytes', define='HAVE_STRUCT_DQBLK_DQB_CURBYTES',
1409 headers='sys/quota.h')
1410 if conf.CHECK_HEADERS('rpcsvc/rquota.h'):
1411 conf.DEFINE('HAVE_NFS_QUOTAS', '1')
1412 conf.CHECK_STRUCTURE_MEMBER('struct getquota_rslt', 'getquota_rslt_u',
1413 define='HAVE_GETQUOTA_RSLT_GETQUOTA_RSLT_U',
1414 headers='rpcsvc/rquota.h')
1416 if (host_os.rfind('linux') > -1):
1417 conf.DEFINE('HAVE_QUOTACTL_LINUX', '1')
1418 elif not conf.CONFIG_SET("HAVE_XFS_QUOTAS"):
1419 if not conf.CHECK_CODE('''
1420 #define HAVE_QUOTACTL_4A 1
1421 #define AUTOCONF_TEST 1
1422 #include "../tests/sysquotas.c"
1423 ''',
1424 cflags=conf.env['WERROR_CFLAGS'],
1425 define='HAVE_QUOTACTL_4A',
1426 msg='for QUOTACTL_4A: long quotactl(int cmd, char *special, qid_t id, caddr_t addr)',
1427 execute=True,
1428 addmain=False):
1430 conf.CHECK_CODE('''
1431 #define HAVE_QUOTACTL_4B 1
1432 #define AUTOCONF_TEST 1
1433 #include "../tests/sysquotas.c"
1434 ''',
1435 cflags=conf.env['WERROR_CFLAGS'],
1436 define='HAVE_QUOTACTL_4B',
1437 msg='for QUOTACTL_4B: int quotactl(const char *path, int cmd, int id, char *addr)',
1438 execute=True,
1439 addmain=False)
1441 conf.CHECK_CODE('''
1442 clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
1443 ''',
1444 headers="rpc/rpc.h rpc/types.h rpcsvc/rquota.h rpc/nettype.h rpc/xdr.h",
1445 define='HAVE_NFS_QUOTAS',
1446 msg='for NFS QUOTAS',
1447 execute=True,
1448 local_include=False)
1450 if conf.CONFIG_SET('HAVE_QUOTACTL_LINUX') or \
1451 conf.CONFIG_SET('HAVE_QUOTACTL_4A') or \
1452 conf.CONFIG_SET('HAVE_QUOTACTL_4B') or \
1453 conf.CONFIG_SET('HAVE_XFS_QUOTAS'):
1454 conf.DEFINE('HAVE_SYS_QUOTAS', '1')
1455 conf.DEFINE('WITH_QUOTAS', '1')
1458 # cluster support (CTDB)
1460 if not Options.options.with_cluster_support:
1461 Logs.info("building without cluster support (--without-cluster-support)")
1462 conf.env.with_ctdb = False
1463 else:
1464 Logs.info("building with cluster support")
1465 conf.env.with_ctdb = True
1466 conf.DEFINE('CLUSTER_SUPPORT', 1)
1468 conf.CHECK_CODE('void seekdir(DIR *d, long loc) { return; }',
1469 'SEEKDIR_RETURNS_VOID',
1470 headers='sys/types.h dirent.h',
1471 msg='Checking whether seekdir returns void')
1473 if Options.options.with_profiling_data:
1474 conf.DEFINE('WITH_PROFILE', 1);
1475 conf.CHECK_FUNCS('getrusage', headers="sys/time.h sys/resource.h")
1477 if Options.options.with_pthreadpool:
1478 if conf.CONFIG_SET('HAVE_PTHREAD'):
1479 conf.DEFINE('WITH_PTHREADPOOL', '1')
1480 else:
1481 Logs.warn("pthreadpool support cannot be enabled when pthread support was not found")
1482 conf.undefine('WITH_PTHREADPOOL')
1484 if (conf.CHECK_HEADERS('linux/ioctl.h sys/ioctl.h linux/fs.h') and
1485 conf.CHECK_DECLS('FS_IOC_GETFLAGS FS_COMPR_FL', headers='linux/fs.h')):
1486 conf.DEFINE('HAVE_LINUX_IOCTL', '1')
1488 conf.env['CCFLAGS_CEPHFS'] = "-D_FILE_OFFSET_BITS=64"
1489 if Options.options.libcephfs_dir:
1490 conf.env['CPPPATH_CEPHFS'] = Options.options.libcephfs_dir + '/include'
1491 conf.env['LIBPATH_CEPHFS'] = Options.options.libcephfs_dir + '/lib'
1493 if conf.CHECK_HEADERS('cephfs/libcephfs.h', False, False, 'cephfs') and conf.CHECK_LIB('cephfs'):
1494 conf.DEFINE('HAVE_CEPH', '1')
1496 if Options.options.with_glusterfs:
1497 conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 4" --cflags --libs',
1498 msg='Checking for glusterfs-api >= 4', uselib_store="GFAPI")
1499 conf.CHECK_HEADERS('api/glfs.h', lib='gfapi')
1500 conf.CHECK_LIB('gfapi', shlib=True)
1502 if conf.CONFIG_SET('HAVE_API_GLFS_H'):
1503 conf.DEFINE('HAVE_GLUSTERFS', '1')
1504 else:
1505 conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
1506 conf.undefine('HAVE_GLUSTERFS')
1507 else:
1508 conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
1509 conf.undefine('HAVE_GLUSTERFS')
1511 if Options.options.enable_vxfs:
1512 conf.DEFINE('HAVE_VXFS', '1')
1514 if conf.CHECK_CFG(package='dbus-1', args='--cflags --libs',
1515 msg='Checking for dbus', uselib_store="DBUS-1"):
1516 if (conf.CHECK_HEADERS('dbus/dbus.h', lib='dbus-1')
1517 and conf.CHECK_LIB('dbus-1', shlib=True)):
1518 conf.DEFINE('HAVE_DBUS', '1')
1520 conf.env.build_regedit = False
1521 if not Options.options.with_regedit == False:
1522 conf.PROCESS_SEPARATE_RULE('system_ncurses')
1523 if conf.CONFIG_SET('HAVE_NCURSES'):
1524 conf.env.build_regedit = True
1526 if conf.env.build_regedit:
1527 Logs.info("building regedit")
1528 else:
1529 if Options.options.with_regedit == False:
1530 Logs.info("not building regedit (--without-regedit)")
1531 elif Options.options.with_regedit == True:
1532 Logs.error("ncurses not available, cannot build regedit")
1533 conf.fatal("ncurses not available, but --with-regedit was specified")
1534 else:
1535 Logs.info("ncurses not available, not building regedit")
1537 conf.CHECK_FUNCS_IN('DES_pcbc_encrypt', 'crypto')
1538 if Options.options.with_fake_kaserver == True:
1539 conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
1540 conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
1541 if (conf.CONFIG_SET('HAVE_AFS_PARAM_H') and conf.CONFIG_SET('HAVE_AFS_STDS_H') and conf.CONFIG_SET('HAVE_DES_PCBC_ENCRYPT')):
1542 conf.DEFINE('WITH_FAKE_KASERVER', '1')
1543 else:
1544 conf.fatal('AFS headers not available, but --with-fake-kaserver was specified')
1546 conf.env['libtracker']=''
1547 conf.env.with_spotlight = False
1548 if Options.options.with_spotlight:
1549 versions = ['1.0', '0.16', '0.14']
1550 for version in versions:
1551 testlib = 'tracker-sparql-' + version
1552 if conf.CHECK_CFG(package=testlib,
1553 args='--cflags --libs',
1554 mandatory=False):
1555 conf.SET_TARGET_TYPE(testlib, 'SYSLIB')
1556 conf.env['libtracker'] = testlib
1557 conf.env.with_spotlight = True
1558 conf.DEFINE('WITH_SPOTLIGHT', '1')
1559 break
1561 if not conf.env.with_spotlight:
1562 conf.fatal("Spotlight support requested but tracker-sparql library missing")
1563 Logs.info("building with Spotlight support")
1565 forced_static_modules.extend(TO_LIST('auth_domain auth_builtin auth_sam auth_winbind'))
1566 default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam
1567 auth_unix auth_wbc
1568 nss_info_template idmap_tdb idmap_passdb
1569 idmap_nss'''))
1571 default_shared_modules.extend(TO_LIST('''
1572 vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk
1573 vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
1574 vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2
1575 vfs_readahead vfs_xattr_tdb vfs_posix_eadb
1576 vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
1577 vfs_preopen vfs_catia
1578 vfs_media_harmony vfs_unityed_media vfs_fruit vfs_shell_snap
1579 vfs_commit vfs_worm vfs_crossrename vfs_linux_xfs_sgid
1580 vfs_time_audit vfs_offline
1581 '''))
1582 default_shared_modules.extend(TO_LIST('auth_script idmap_tdb2 idmap_script'))
1583 # these have broken dependencies
1584 forced_shared_modules.extend(TO_LIST('idmap_autorid idmap_rid idmap_hash'))
1586 if Options.options.developer:
1587 default_static_modules.extend(TO_LIST('charset_weird'))
1588 default_shared_modules.extend(TO_LIST('perfcount_test'))
1589 default_shared_modules.extend(TO_LIST('vfs_skel_opaque vfs_skel_transparent vfs_shadow_copy_test'))
1590 default_shared_modules.extend(TO_LIST('auth_skel pdb_test'))
1592 if Options.options.enable_selftest or Options.options.developer:
1593 default_shared_modules.extend(TO_LIST('vfs_fake_acls vfs_nfs4acl_xattr'))
1596 if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
1597 default_static_modules.extend(TO_LIST('pdb_samba_dsdb auth_samba4 vfs_dfs_samba4'))
1599 if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
1600 default_shared_modules.extend(TO_LIST('vfs_zfsacl'))
1602 if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
1603 default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort'))
1605 if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
1606 default_shared_modules.extend(TO_LIST('vfs_fileid'))
1608 if (conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS')):
1609 default_shared_modules.extend(TO_LIST('vfs_aio_fork'))
1611 if Options.options.with_pthreadpool:
1612 default_shared_modules.extend(TO_LIST('vfs_aio_pthread'))
1614 if conf.CONFIG_SET('HAVE_LINUX_KERNEL_AIO'):
1615 default_shared_modules.extend(TO_LIST('vfs_aio_linux'))
1617 if conf.CONFIG_SET('HAVE_LDAP'):
1618 default_static_modules.extend(TO_LIST('pdb_ldapsam idmap_ldap'))
1620 if conf.CONFIG_SET('DARWINOS'):
1621 default_static_modules.extend(TO_LIST('charset_macosxfs'))
1623 if conf.CONFIG_SET('HAVE_GPFS'):
1624 default_shared_modules.extend(TO_LIST('vfs_gpfs'))
1626 if (conf.CONFIG_SET('HAVE_LINUX_IOCTL')
1627 and conf.CONFIG_SET('HAVE_BASENAME') and conf.CONFIG_SET('HAVE_DIRNAME')):
1628 default_shared_modules.extend(TO_LIST('vfs_btrfs'))
1630 if conf.CONFIG_SET("HAVE_CEPH"):
1631 default_shared_modules.extend(TO_LIST('vfs_ceph'))
1633 if conf.CONFIG_SET('HAVE_GLUSTERFS'):
1634 default_shared_modules.extend(TO_LIST('vfs_glusterfs'))
1636 if conf.CONFIG_SET('HAVE_VXFS'):
1637 default_shared_modules.extend(TO_LIST('vfs_vxfs'))
1639 if conf.CONFIG_SET('HAVE_DBUS'):
1640 default_shared_modules.extend(TO_LIST('vfs_snapper'))
1642 explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
1643 explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
1645 def replace_list_item(lst, item, value):
1646 try:
1647 idx = lst.index(item)
1648 lst[idx] = value
1649 except:
1650 pass
1651 # PDB module file name should have the same name as module registers itself
1652 # In Autoconf build we export LDAP passdb module as ldapsam but WAF build
1653 # was always exporting pdb_ldap. In order to support existing packages
1654 # allow referring to pdb_ldapsam as pdb_ldap but use proper name internally.
1655 replace_list_item(explicit_shared_modules, 'pdb_ldap', 'pdb_ldapsam')
1656 replace_list_item(explicit_static_modules, 'pdb_ldap', 'pdb_ldapsam')
1658 final_static_modules = []
1659 final_static_modules.extend(TO_LIST(required_static_modules))
1660 final_shared_modules = []
1662 if '!FORCED' not in explicit_static_modules:
1663 final_static_modules.extend(TO_LIST(forced_static_modules))
1664 if '!FORCED' not in explicit_shared_modules:
1665 final_shared_modules.extend(TO_LIST(forced_shared_modules))
1666 if '!DEFAULT' not in explicit_static_modules:
1667 final_static_modules.extend(TO_LIST(default_static_modules))
1668 if '!DEFAULT' not in explicit_shared_modules:
1669 final_shared_modules.extend(TO_LIST(default_shared_modules))
1671 if 'ALL' in explicit_static_modules:
1672 for m in default_shared_modules:
1673 if m in final_shared_modules:
1674 final_shared_modules.remove(m)
1675 final_static_modules.append(m)
1676 if 'ALL' in explicit_shared_modules:
1677 for m in default_static_modules:
1678 if m in final_static_modules:
1679 final_static_modules.remove(m)
1680 final_shared_modules.append(m)
1682 for m in explicit_static_modules:
1683 if m in ['ALL','!DEFAULT','!FORCED']:
1684 continue
1685 if m.startswith('!'):
1686 m = m[1:]
1687 if m in required_static_modules:
1688 raise Utils.WafError('These modules are REQUIRED as static modules: %s' %
1689 ' '.join(required_static_modules))
1690 if m in final_static_modules:
1691 final_static_modules.remove(m)
1692 continue
1693 if m in forced_shared_modules:
1694 raise Utils.WafError('These modules MUST be configured as shared modules: %s' %
1695 ' '.join(forced_shared_modules))
1696 if m in final_shared_modules:
1697 final_shared_modules.remove(m)
1698 if m not in final_static_modules:
1699 final_static_modules.append(m)
1700 for m in explicit_shared_modules:
1701 if m in ['ALL','!DEFAULT','!FORCED']:
1702 continue
1703 if m.startswith('!'):
1704 m = m[1:]
1705 if m in final_shared_modules:
1706 final_shared_modules.remove(m)
1707 continue
1708 if m in required_static_modules:
1709 raise Utils.WafError('These modules are REQUIRED as static modules: %s' %
1710 ' '.join(required_static_modules))
1711 if m in forced_static_modules:
1712 raise Utils.WafError('These module MUST be configured as static modules: %s' %
1713 ' '.join(forced_static_modules))
1714 if m in final_static_modules:
1715 final_static_modules.remove(m)
1716 if m not in final_shared_modules:
1717 final_shared_modules.append(m)
1719 conf.env['static_modules'] = final_static_modules
1720 conf.env['shared_modules'] = final_shared_modules
1722 conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
1724 static_list = {}
1725 shared_list = {}
1727 prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount']
1728 conf.env['MODULE_PREFIXES'] = prefixes
1729 for p in prefixes:
1730 for m in final_static_modules:
1731 if m.find(p) == 0:
1732 if not p in static_list:
1733 static_list[p] = []
1734 static_list[p].append(m)
1735 for m in final_shared_modules:
1736 if m.find(p) == 0:
1737 if not p in shared_list:
1738 shared_list[p] = []
1739 shared_list[p].append(m)
1741 for p in prefixes:
1742 static_env = "%s_STATIC" % p.upper()
1743 shared_env = "%s_SHARED" % p.upper()
1744 conf.env[static_env] = []
1745 conf.env[shared_env] = []
1746 if p in static_list:
1747 decl_list=""
1748 for entry in static_list[p]:
1749 decl_list += "extern NTSTATUS %s_init(void); " % entry
1750 conf.env[static_env].append('%s' % entry)
1751 decl_list = decl_list.rstrip()
1752 conf.DEFINE('static_decl_%s' % p, decl_list)
1753 conf.DEFINE('static_init_%s' % p, '{ %s_init(); }' % '_init(); '.join(static_list[p]))
1754 else:
1755 conf.DEFINE('static_decl_%s' % p, '')
1756 conf.DEFINE('static_init_%s' % p, '{}')
1757 if p in shared_list:
1758 for entry in shared_list[p]:
1759 conf.DEFINE('%s_init' % entry, 'samba_init_module')
1760 conf.env[shared_env].append('%s' % entry)
1761 Logs.info("%s: %s" % (static_env, ','.join(conf.env[static_env])))
1762 Logs.info("%s: %s" % (shared_env, ','.join(conf.env[shared_env])))
1764 conf.SAMBA_CONFIG_H('include/config.h')
1766 def ctags(ctx):
1767 "build 'tags' file using ctags"
1768 import Utils
1769 source_root = os.path.dirname(Utils.g_module.root_path)
1770 cmd = 'ctags $(find %s/.. -name "*.[ch]" | grep -v "*_proto\.h")' % source_root
1771 print("Running: %s" % cmd)
1772 os.system(cmd)