vfs_ceph: add user_id smb.conf parameter
[Samba.git] / source3 / wscript
blob07338e90271e3750089ce0cf72d1a4ad61befdee
1 #!/usr/bin/env python
3 srcdir=".."
5 import sys, os
6 from optparse import SUPPRESS_HELP
7 sys.path.insert(0, srcdir+"/buildtools/wafsamba")
8 sys.path.insert(0, "source3")
9 import wafsamba, Options, Logs, Utils, Scripting
10 import build.charset
11 import samba_utils, samba_version
12 import samba3
13 import bison, flex
15 default_prefix = Options.default_prefix = '/usr/local/samba'
17 def set_options(opt):
19 opt.add_option('--with-static-modules',
20 help=("Comma-separated list of names of modules to statically link in. "+
21 "May include !module to disable 'module'. "+
22 "Can be '!FORCED' to disable all non-required static only modules. "+
23 "Can be '!DEFAULT' to disable all modules defaulting to a static build. "+
24 "Can be 'ALL' to build all default shared modules static. "+
25 "The most specific one wins, while the order is ignored "+
26 "and --with-static-modules is evaluated before "+
27 "--with-shared-modules"),
28 action="store", dest='static_modules', default=None)
29 opt.add_option('--with-shared-modules',
30 help=("Comma-separated list of names of modules to build shared. "+
31 "May include !module to disable 'module'. "+
32 "Can be '!FORCED' to disable all non-required shared only modules. "+
33 "Can be '!DEFAULT' to disable all modules defaulting to a shared build. "+
34 "Can be 'ALL' to build all default static modules shared. "+
35 "The most specific one wins, while the order is ignored "+
36 "and --with-static-modules is evaluated before "+
37 "--with-shared-modules"),
38 action="store", dest='shared_modules', default=None)
40 opt.SAMBA3_ADD_OPTION('winbind')
41 opt.SAMBA3_ADD_OPTION('ads')
42 opt.SAMBA3_ADD_OPTION('ldap')
43 opt.SAMBA3_ADD_OPTION('cups', with_name="enable", without_name="disable")
44 opt.SAMBA3_ADD_OPTION('iprint', with_name="enable", without_name="disable")
45 opt.SAMBA3_ADD_OPTION('pam')
46 opt.SAMBA3_ADD_OPTION('quotas')
47 opt.SAMBA3_ADD_OPTION('sendfile-support')
48 opt.SAMBA3_ADD_OPTION('utmp')
49 opt.SAMBA3_ADD_OPTION('avahi', with_name="enable", without_name="disable")
50 opt.SAMBA3_ADD_OPTION('iconv')
51 opt.SAMBA3_ADD_OPTION('acl-support')
52 opt.SAMBA3_ADD_OPTION('dnsupdate')
53 opt.SAMBA3_ADD_OPTION('syslog')
54 opt.SAMBA3_ADD_OPTION('automount')
55 opt.SAMBA3_ADD_OPTION('dmapi', default=None) # None means autodetection
56 opt.SAMBA3_ADD_OPTION('fam', default=None) # None means autodetection
57 opt.SAMBA3_ADD_OPTION('profiling-data', default=False)
58 opt.SAMBA3_ADD_OPTION('libarchive', default=None)
60 opt.SAMBA3_ADD_OPTION('cluster-support', default=False)
62 opt.SAMBA3_ADD_OPTION('regedit', default=None)
64 opt.SAMBA3_ADD_OPTION('fake-kaserver',
65 help=("Include AFS fake-kaserver support"), default=False)
67 opt.add_option('--with-libcephfs',
68 help=("Directory under which libcephfs is installed"),
69 action="store", dest='libcephfs_dir', default=None)
71 opt.SAMBA3_ADD_OPTION('glusterfs', with_name="enable", without_name="disable", default=True)
72 opt.SAMBA3_ADD_OPTION('cephfs', with_name="enable", without_name="disable", default=True)
74 opt.add_option('--enable-vxfs',
75 help=("enable support for VxFS (default=no)"),
76 action="store_true", dest='enable_vxfs', default=False)
78 opt.SAMBA3_ADD_OPTION('spotlight', with_name="enable", without_name="disable", default=False)
80 def configure(conf):
81 from samba_utils import TO_LIST
83 default_static_modules = []
84 default_shared_modules = []
85 required_static_modules = []
86 forced_static_modules = []
87 forced_shared_modules = []
89 if Options.options.developer:
90 conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD')
91 conf.env.developer = True
93 if sys.platform != 'openbsd5':
94 conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
96 # We crash without vfs_default
97 required_static_modules.extend(TO_LIST('vfs_default'))
99 conf.CHECK_HEADERS('execinfo.h libexc.h libunwind.h netdb.h')
100 conf.CHECK_HEADERS('linux/falloc.h linux/ioctl.h')
102 conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod')
103 conf.CHECK_FUNCS('strtol strchr strupr chflags')
104 conf.CHECK_FUNCS('getrlimit fsync fdatasync setpgid')
105 conf.CHECK_FUNCS('setsid glob strpbrk crypt16 getauthuid')
106 conf.CHECK_FUNCS('innetgr')
107 conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf')
108 conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups syscall sysconf')
109 conf.CHECK_FUNCS('atexit grantpt posix_openpt fallocate posix_fallocate')
110 conf.CHECK_FUNCS('fseeko setluid')
111 conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
112 conf.CHECK_FUNCS('fdopendir')
113 conf.CHECK_FUNCS('fstatat')
114 conf.CHECK_FUNCS('getpwent_r setenv clearenv strcasecmp fcvt fcvtl')
115 conf.CHECK_FUNCS('syslog vsyslog timegm setlocale')
116 conf.CHECK_FUNCS_IN('nanosleep', 'rt')
117 conf.CHECK_FUNCS('lutimes futimes utimensat futimens')
118 conf.CHECK_FUNCS('mlock munlock mlockall munlockall')
119 conf.CHECK_FUNCS('memalign posix_memalign hstrerror')
120 conf.CHECK_FUNCS('shmget')
121 conf.CHECK_FUNCS_IN('shm_open', 'rt', checklibc=True)
122 #FIXME: for some reason this one still fails
123 conf.CHECK_FUNCS_IN('yp_get_default_domain', 'nsl')
124 conf.CHECK_FUNCS_IN('dn_expand _dn_expand __dn_expand', 'resolv')
125 conf.CHECK_FUNCS_IN('dn_expand', 'inet')
126 conf.CHECK_DECLS('fdatasync', reverse=True)
127 conf.CHECK_DECLS('readahead', reverse=True, headers='fcntl.h')
129 if conf.CHECK_CODE('''
130 #if defined(HAVE_UNISTD_H)
131 #include <unistd.h>
132 #endif
133 long ret = splice(0,0,1,0,400,SPLICE_F_MOVE);
134 ''',
135 'HAVE_LINUX_SPLICE',
136 headers='fcntl.h'):
137 conf.CHECK_DECLS('splice', reverse=True, headers='fcntl.h')
139 # Check for inotify support (Skip if we are SunOS)
140 #NOTE: illumos provides sys/inotify.h but is not an exact match for linux
141 host_os = sys.platform
142 if host_os.rfind('sunos') == -1:
143 conf.CHECK_HEADERS('sys/inotify.h')
144 if "HAVE_SYS_INOTIFY_H" in conf.env:
145 conf.DEFINE('HAVE_INOTIFY', 1)
147 # Check for kernel change notify support
148 conf.CHECK_CODE('''
149 #ifndef F_NOTIFY
150 #define F_NOTIFY 1026
151 #endif
152 main() {
153 exit(fcntl(open("/tmp", O_RDONLY), F_NOTIFY, 0) == -1 ? 1 : 0);
154 }''', 'HAVE_KERNEL_CHANGE_NOTIFY', addmain=False, execute=True,
155 headers='fcntl.h signal.h',
156 msg="Checking for kernel change notify support")
158 # Check for Linux kernel oplocks
159 conf.CHECK_CODE('''
160 #include <sys/types.h>
161 #include <fcntl.h>
162 #include <signal.h>
163 #ifndef F_NOTIFY
164 #define F_NOTIFY 1026
165 #endif
166 main() {
167 exit(fcntl(open("/tmp", O_RDONLY), F_NOTIFY, 0) == -1 ? 1 : 0);
168 }''', 'HAVE_KERNEL_OPLOCKS_LINUX', addmain=False, execute=True,
169 msg="Checking for Linux kernel oplocks")
171 # Check for IRIX kernel oplock types
172 conf.CHECK_CODE('oplock_stat_t t; t.os_state = OP_REVOKE; t.os_dev = 1; t.os_ino = 1;',
173 'HAVE_KERNEL_OPLOCKS_IRIX', headers='fcntl.h',
174 msg="Checking for IRIX kernel oplock types")
176 # Check for kernel share modes
177 conf.CHECK_CODE('''
178 #include <sys/types.h>
179 #include <fcntl.h>
180 #include <signal.h>
181 #include <sys/file.h>
182 #ifndef LOCK_MAND
183 #define LOCK_MAND 32
184 #define LOCK_READ 64
185 #endif
186 main() {
187 exit(flock(open("/dev/null", O_RDWR), LOCK_MAND|LOCK_READ) != 0);
188 }''', 'HAVE_KERNEL_SHARE_MODES', addmain=False, execute=True,
189 msg="Checking for kernel share modes")
191 # check for fam libs
192 samba_fam_libs=None
193 check_for_fam=False
194 if Options.options.with_fam is None:
195 check_for_fam=True
196 elif Options.options.with_fam == True:
197 check_for_fam=True
199 if check_for_fam and conf.CHECK_HEADERS('fam.h'):
200 if conf.CHECK_FUNCS_IN('FAMOpen2', 'fam'):
201 samba_fam_libs='fam'
202 elif conf.CHECK_FUNCS_IN('FAMOpen2', 'fam C'):
203 samba_fam_libs='fam C'
204 conf.CHECK_TYPE('enum FAMCodes', headers='fam.h',
205 define='HAVE_FAM_H_FAMCODES_TYPEDEF',
206 msg='Checking whether enum FAMCodes is available')
207 conf.CHECK_FUNCS_IN('FAMNoExists', 'fam')
209 if samba_fam_libs is not None:
210 conf.DEFINE('SAMBA_FAM_LIBS', samba_fam_libs)
211 conf.DEFINE('HAVE_FAM', 1)
212 else:
213 if Options.options.with_fam == True:
214 conf.fatal('FAM support requested, but no suitable FAM library found')
215 elif check_for_fam:
216 Logs.warn('no suitable FAM library found')
218 # check for libarchive (tar command in smbclient)
219 # None means autodetect, True/False means enable/disable
220 conf.SET_TARGET_TYPE('archive', 'EMPTY')
221 if Options.options.with_libarchive is not False:
222 libarchive_mandatory = Options.options.with_libarchive == True
223 Logs.info("Checking for libarchive existence")
224 if conf.CHECK_HEADERS('archive.h') and conf.CHECK_LIB('archive', shlib=True):
225 conf.CHECK_FUNCS_IN('archive_read_support_filter_all archive_read_free', 'archive')
226 elif libarchive_mandatory:
227 conf.fatal('libarchive support requested, but not found')
229 # check for DMAPI libs
230 if Options.options.with_dmapi == False:
231 have_dmapi = False
232 else:
233 have_dmapi = True
234 Logs.info("Checking for DMAPI library existence")
235 samba_dmapi_lib = ''
236 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dm'):
237 samba_dmapi_lib = 'dm'
238 else:
239 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'jfsdm'):
240 samba_dmapi_lib = 'jfsdm'
241 else:
242 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dmapi'):
243 samba_dmapi_lib = 'dmapi'
244 else:
245 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'xdsm'):
246 samba_dmapi_lib = 'xdsm'
247 # only bother to test headers and compilation when a candidate
248 # library has been found
249 if samba_dmapi_lib == '':
250 have_dmapi = False
251 broken_dmapi = "no suitable DMAPI library found"
253 if have_dmapi:
254 conf.CHECK_HEADERS('sys/dmi.h xfs/dmapi.h sys/jfsdmapi.h sys/dmapi.h dmapi.h')
255 conf.CHECK_CODE('''
256 #include <time.h> /* needed by Tru64 */
257 #include <sys/types.h> /* needed by AIX */
258 #ifdef HAVE_XFS_DMAPI_H
259 #include <xfs/dmapi.h>
260 #elif defined(HAVE_SYS_DMI_H)
261 #include <sys/dmi.h>
262 #elif defined(HAVE_SYS_JFSDMAPI_H)
263 #include <sys/jfsdmapi.h>
264 #elif defined(HAVE_SYS_DMAPI_H)
265 #include <sys/dmapi.h>
266 #elif defined(HAVE_DMAPI_H)
267 #include <dmapi.h>
268 #endif
270 /* This link test is designed to fail on IRI 6.4, but should
271 * succeed on Linux, IRIX 6.5 and AIX.
273 int main(int argc, char **argv)
275 char * version;
276 dm_eventset_t events;
277 /* This doesn't take an argument on IRIX 6.4. */
278 dm_init_service(&version);
279 /* IRIX 6.4 expects events to be a pointer. */
280 DMEV_ISSET(DM_EVENT_READ, events);
282 return 0;
284 ''',
285 'USEABLE_DMAPI_LIBRARY',
286 addmain=False,
287 execute=False,
288 lib=samba_dmapi_lib,
289 msg='Checking whether DMAPI lib '+samba_dmapi_lib+' can be used')
290 if not conf.CONFIG_SET('USEABLE_DMAPI_LIBRARY'):
291 have_dmapi = False
292 broken_dmapi = "no usable DMAPI library found"
294 if have_dmapi:
295 Logs.info("Building with DMAPI support.")
296 conf.env['dmapi_lib'] = samba_dmapi_lib
297 conf.DEFINE('USE_DMAPI', 1)
298 else:
299 if Options.options.with_dmapi == False:
300 Logs.info("Building without DMAPI support (--without-dmapi).")
301 elif Options.options.with_dmapi == True:
302 Logs.error("DMAPI support not available: " + broken_dmapi)
303 conf.fatal('DMAPI support requested but not found.');
304 else:
305 Logs.warn("Building without DMAPI support: " + broken_dmapi)
306 conf.env['dmapi_lib'] = ''
308 # Check for various members of the stat structure
309 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blocks', define='HAVE_STAT_ST_BLOCKS',
310 headers='sys/stat.h')
311 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blksize', define='HAVE_STAT_ST_BLKSIZE',
312 headers='sys/stat.h')
313 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_flags', define='HAVE_STAT_ST_FLAGS',
314 headers='sys/types.h sys/stat.h unistd.h')
316 if "HAVE_BLKCNT_T" in conf.env:
317 conf.CHECK_CODE('''
318 static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 4)];''',
319 'SIZEOF_BLKCNT_T_4',
320 headers='replace.h sys/types.h sys/stat.h unistd.h',
321 msg="Checking whether blkcnt_t is 32 bit")
323 # If sizeof is 4 it can't be 8
324 if "HAVE_BLKCNT_T" in conf.env:
325 if not conf.CONFIG_SET('SIZEOF_BLKCNT_T_4'):
326 conf.CHECK_CODE('''
327 static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 8)];''',
328 'SIZEOF_BLKCNT_T_8',
329 headers='replace.h sys/types.h sys/stat.h unistd.h',
330 msg="Checking whether blkcnt_t is 64 bit")
332 # Check for POSIX capability support
333 conf.CHECK_FUNCS_IN('cap_get_proc', 'cap', headers='sys/capability.h')
335 if "HAVE_SYS_CAPABILITY_H" in conf.env:
336 conf.CHECK_CODE('''
337 cap_t cap;
338 cap_value_t vals[1];
339 if (!(cap = cap_get_proc())) exit(1);
340 vals[0] = CAP_CHOWN;
341 cap_set_flag(cap, CAP_INHERITABLE, 1, vals, CAP_CLEAR);
342 cap_set_proc(cap);''',
343 'HAVE_POSIX_CAPABILITIES', execute=True, lib="cap",
344 headers='sys/capability.h',
345 msg="Checking whether POSIX capabilities are available")
347 conf.CHECK_CODE('int i;', 'BROKEN_NISPLUS_INCLUDE_FILES',
348 headers='sys/types.h sys/acl.h rpcsvc/nis.h',
349 msg="Checking for broken nisplus include files")
351 # Check if the compiler will optimize out functions
352 conf.CHECK_CODE('''
353 #include <sys/types.h>
354 size_t __unsafe_string_function_usage_here_size_t__(void);
355 #define CHECK_STRING_SIZE(d, len) (sizeof(d) != (len) && sizeof(d) != sizeof(char *))
356 static size_t push_string_check_fn(void *dest, const char *src, size_t dest_len) {
357 return 0;
360 #define push_string_check(dest, src, dest_len) \
361 (CHECK_STRING_SIZE(dest, dest_len) \
362 ? __unsafe_string_function_usage_here_size_t__() \
363 : push_string_check_fn(dest, src, dest_len))
365 int main(int argc, char **argv) {
366 char outbuf[1024];
367 char *p = outbuf;
368 const char *foo = "bar";
369 p += 31 + push_string_check(p + 31, foo, sizeof(outbuf) - (p + 31 - outbuf));
370 return 0;
371 }''', 'HAVE_COMPILER_WILL_OPTIMIZE_OUT_FNS',
372 addmain=False,
373 add_headers=False,
374 msg="Checking if the compiler will optimize out functions")
376 # Check if the compiler supports the LL suffix on long long integers
377 # AIX needs this
378 conf.CHECK_CODE('long long i = 0x8000000000LL', 'COMPILER_SUPPORTS_LL',
379 headers='stdio.h',
380 msg="Checking for LL suffix on long long integers")
382 conf.CHECK_FUNCS('''
383 _acl __acl atexit
384 _chdir __chdir chflags chmod _close __close _closedir
385 __closedir crypt16 devnm dirfd
386 DNSServiceRegister _dup __dup _dup2 __dup2 endmntent execl
387 _facl __facl _fchdir
388 __fchdir fchmod fchown _fcntl __fcntl fcvt fcvtl fdatasync
389 _fork __fork fseeko
390 fsetxattr _fstat __fstat fsync
391 futimens futimes __fxstat getauthuid
392 getcwd _getcwd __getcwd getdents __getdents getdirentries
393 getgrent getgrnam getgrouplist getgrset getmntent getpagesize
394 getpwanam getpwent_r getrlimit
395 glob grantpt hstrerror initgroups innetgr
396 llseek _llseek __llseek _lseek __lseek
397 _lstat __lstat lutimes
398 __lxstat memalign mknod mlock mlockall munlock munlockall
399 _open __open _opendir __opendir
400 pathconf poll posix_fallocate
401 posix_memalign pread _pread __pread
402 pwrite _pwrite __pwrite
403 rdchk _read __read _readdir __readdir
404 _seekdir __seekdir
405 select setenv setgidx setgroups setlocale setluid
406 setmntent setpgid setpriv setsid setuidx
407 shmget shm_open
408 _stat __stat statvfs
409 strcasecmp strchr strpbrk strsignal strtol strupr sysconf sysctl sysctlbyname
410 __sys_llseek syslog _telldir __telldir timegm
411 utimensat vsyslog _write __write __xstat
412 ''')
414 conf.CHECK_SAMBA3_CHARSET() # see build/charset.py
416 # FIXME: these should be tests for features, but the old build system just
417 # checks for OSes.
418 host_os = sys.platform
419 Logs.info("building on %s" % host_os)
421 # Python doesn't have case switches... :/
422 # FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
423 # the search for .rfind('gnu') covers gnu* and *-gnu is that too broad?
425 conf.SET_TARGET_TYPE('sunacl', 'EMPTY')
426 if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('qnx') > -1):
427 if host_os.rfind('linux') > -1:
428 conf.DEFINE('LINUX', '1')
429 elif host_os.rfind('qnx') > -1:
430 conf.DEFINE('QNX', '1')
431 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
432 elif (host_os.rfind('darwin') > -1):
433 conf.DEFINE('DARWINOS', 1)
434 conf.ADD_CFLAGS('-fno-common')
435 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
436 elif (host_os.rfind('freebsd') > -1):
437 conf.DEFINE('FREEBSD', 1)
438 if conf.CHECK_HEADERS('sunacl.h'):
439 conf.DEFINE('HAVE_FREEBSD_SUNACL_H', '1')
440 conf.CHECK_FUNCS_IN(['acl'], 'sunacl')
441 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
442 elif (host_os.rfind('irix') > -1):
443 conf.DEFINE('IRIX', 1)
444 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
445 elif (host_os.rfind('aix') > -1):
446 conf.DEFINE('AIX', 1)
447 conf.DEFINE('STAT_ST_BLOCKSIZE', 'DEV_BSIZE')
448 elif (host_os.rfind('hpux') > -1):
449 conf.DEFINE('HPUX', 1)
450 conf.DEFINE('STAT_ST_BLOCKSIZE', '8192')
451 elif (host_os.rfind('osf') > -1):
452 conf.DEFINE('OSF1', 1)
453 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
455 # FIXME: Add more checks here.
456 else:
457 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
459 if Options.options.with_acl_support:
460 if (host_os.rfind('hpux') > -1):
461 Logs.info('Using HPUX ACLs')
462 conf.DEFINE('HAVE_HPUX_ACLS',1)
463 conf.DEFINE('POSIX_ACL_NEEDS_MASK',1)
464 default_static_modules.extend(TO_LIST('vfs_hpuxacl'))
465 elif (host_os.rfind('aix') > -1):
466 Logs.info('Using AIX ACLs')
467 conf.DEFINE('HAVE_AIX_ACLS',1)
468 default_static_modules.extend(TO_LIST('vfs_aixacl vfs_aixacl2'))
469 elif (host_os.rfind('darwin') > -1):
470 Logs.warn('ACLs on Darwin currently not supported')
471 conf.fatal("ACL support not available on Darwin/MacOS. "
472 "Use --without-acl-support for building without "
473 "ACL support. "
474 "ACL support is required to change permissions "
475 "from Windows clients.")
476 else:
477 conf.CHECK_FUNCS_IN(['acl_get_file'], 'acl')
478 if conf.CHECK_CODE('''
479 acl_t acl;
480 int entry_id;
481 acl_entry_t *entry_p;
482 return acl_get_entry(acl, entry_id, entry_p);
483 ''',
484 'HAVE_POSIX_ACLS',
485 headers='sys/types.h sys/acl.h', link=False,
486 msg="Checking for POSIX ACL support") :
487 conf.CHECK_CODE('''
488 acl_permset_t permset_d;
489 acl_perm_t perm;
490 return acl_get_perm_np(permset_d, perm);
491 ''',
492 'HAVE_ACL_GET_PERM_NP',
493 headers='sys/types.h sys/acl.h', link=True,
494 msg="Checking whether acl_get_perm_np() is available")
495 # source3/lib/sysacls.c calls posixacl_sys_acl_get_file()
496 required_static_modules.extend(TO_LIST('vfs_posixacl'))
497 conf.CHECK_VARIABLE('ACL_EVERYONE', headers='sys/acl.h')
498 elif conf.CHECK_FUNCS_IN(['facl'], 'sec'):
499 Logs.info('Using solaris or UnixWare ACLs')
500 conf.DEFINE('HAVE_SOLARIS_UNIXWARE_ACLS',1)
501 default_static_modules.extend(TO_LIST('vfs_solarisacl'))
502 elif conf.CHECK_FUNCS_IN(['acl_get_fd'], 'pacl'):
503 Logs.info('Using Tru64 ACLs')
504 conf.DEFINE('HAVE_TRU64_ACLS',1)
505 default_static_modules.extend(TO_LIST('vfs_tru64acl'))
506 else:
507 conf.fatal("ACL support not found. Try installing libacl1-dev "
508 "or libacl-devel. "
509 "Otherwise, use --without-acl-support to build "
510 "without ACL support. "
511 "ACL support is required to change permissions from "
512 "Windows clients.")
514 if conf.CHECK_FUNCS('dirfd'):
515 conf.DEFINE('HAVE_DIRFD_DECL', 1)
517 conf.CHECK_CODE('struct statfs fsd; fsid_t fsid = fsd.f_fsid; return statfs(".", &fsd);',
518 'HAVE_STATFS_F_FSID',
519 msg="vfs_fileid checking for statfs() and struct statfs.f_fsid",
520 headers='sys/types.h sys/statfs.h',
521 execute=True)
523 if conf.CONFIG_SET('HAVE_FALLOCATE'):
524 conf.CHECK_CODE('''
525 int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''',
526 'HAVE_LINUX_FALLOCATE',
527 msg="Checking whether the Linux 'fallocate' function is available",
528 headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
529 conf.CHECK_CODE('''
530 int ret = fallocate(0, FALLOC_FL_PUNCH_HOLE, 0, 10);''',
531 'HAVE_FALLOC_FL_PUNCH_HOLE',
532 msg="Checking whether Linux 'fallocate' supports hole-punching",
533 headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
535 conf.CHECK_CODE('''
536 int ret = lseek(0, 0, SEEK_HOLE);
537 ret = lseek(0, 0, SEEK_DATA);''',
538 'HAVE_LSEEK_HOLE_DATA',
539 msg="Checking whether lseek supports hole/data seeking",
540 headers='unistd.h sys/types.h')
542 conf.CHECK_CODE('''
543 ssize_t err = readahead(0,0,0x80000);''',
544 'HAVE_LINUX_READAHEAD',
545 msg="Checking whether Linux readahead is available",
546 headers='unistd.h fcntl.h')
547 conf.CHECK_DECLS('readahead', headers='fcntl.h', always=True)
549 conf.CHECK_CODE('int fd = openat(AT_FDCWD, ".", O_RDONLY);',
550 'HAVE_OPENAT',
551 msg='Checking for openat',
552 headers='fcntl.h')
554 if host_os.rfind('linux') > -1:
555 conf.CHECK_FUNCS_IN('io_submit', 'aio')
556 conf.CHECK_CODE('''
557 struct io_event ioev;
558 struct iocb *ioc;
559 io_context_t ctx;
560 struct timespec ts;
561 int fd;
562 char *buf;
563 fd = eventfd(0, EFD_NONBLOCK | EFD_CLOEXEC);
564 io_queue_init(128,&ctx);
565 io_prep_pwrite(ioc, 1, buf, 1, 0);
566 io_prep_pread(ioc, 1, buf, 1, 0);
567 io_set_eventfd(ioc, fd);
568 io_set_callback(ioc, (io_callback_t)(0));
569 io_submit(ctx, 1, &ioc);
570 io_getevents(ctx, 1, 1, &ioev, &ts);
571 ''',
572 'HAVE_LINUX_KERNEL_AIO',
573 msg='Checking for linux kernel asynchronous io support',
574 headers='unistd.h stdlib.h sys/types.h fcntl.h sys/eventfd.h libaio.h',
575 lib='aio')
577 conf.CHECK_CODE('''
578 struct msghdr msg;
579 union {
580 struct cmsghdr cm;
581 char control[CMSG_SPACE(sizeof(int))];
582 } control_un;
583 msg.msg_control = control_un.control;
584 msg.msg_controllen = sizeof(control_un.control);
585 ''',
586 'HAVE_STRUCT_MSGHDR_MSG_CONTROL',
587 msg='Checking if we can use msg_control for passing file descriptors',
588 headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
589 conf.CHECK_CODE('''
590 struct msghdr msg;
591 int fd;
592 msg.msg_accrights = (caddr_t) &fd;
593 msg.msg_accrightslen = sizeof(fd);
594 ''',
595 'HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS',
596 msg='Checking if we can use msg_accrights for passing file descriptors',
597 headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
599 if Options.options.with_winbind:
600 conf.env.build_winbind = True
601 conf.DEFINE('WITH_WINBIND', '1')
603 conf.find_program('awk', var='AWK')
605 conf.CHECK_HEADERS('asm/types.h')
607 conf.CHECK_CODE('dev_t dev; int i = major(dev); return 0', "HAVE_DEVICE_MAJOR_FN",
608 headers='unistd.h sys/types.h',
609 msg="Checking for major macro")
611 conf.CHECK_CODE('dev_t dev; int i = minor(dev); return 0', "HAVE_DEVICE_MINOR_FN",
612 headers='unistd.h sys/types.h',
613 msg="Checking for minor macro")
615 conf.CHECK_STRUCTURE_MEMBER('struct dirent', 'd_off',
616 headers='unistd.h sys/types.h dirent.h',
617 define='HAVE_DIRENT_D_OFF')
619 conf.CHECK_FUNCS('setnetgrent getnetgrent endnetgrent')
620 if conf.CHECK_CFLAGS('-Werror-implicit-function-declaration'):
621 netgrent_cflags = '-Werror-implicit-function-declaration'
622 else:
623 netgrent_cflags = ''
624 conf.CHECK_CODE('setnetgrent("foo")', 'HAVE_SETNETGRENT_PROTOTYPE',
625 msg="Checking for setnetgrent prototype",
626 headers='netdb.h netgroup.h',
627 cflags=netgrent_cflags)
628 conf.CHECK_CODE('getnetgrent', 'HAVE_GETNETGRENT_PROTOTYPE',
629 msg="Checking for getnetgrent prototype",
630 headers='netdb.h netgroup.h',
631 cflags=netgrent_cflags)
632 conf.CHECK_CODE('endnetgrent', 'HAVE_ENDNETGRENT_PROTOTYPE',
633 msg="Checking for endnetgrent prototype",
634 headers='netdb.h netgroup.h',
635 cflags=netgrent_cflags)
638 # Look for CUPS
639 if Options.options.with_cups:
640 conf.find_program('cups-config', var='CUPS_CONFIG')
641 if conf.env.CUPS_CONFIG:
642 # we would normally use --libs here, but cups-config incorrectly adds
643 # gssapi_krb5 and other libraries to its --libs output. That breaks the use
644 # of an in-tree heimdal kerberos
645 conf.CHECK_CFG(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags",
646 package="", uselib_store="CUPS")
647 conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups')
648 conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', 'cups')
649 if conf.CONFIG_SET('HAVE_CUPS_CUPS_H') and conf.CONFIG_SET('HAVE_CUPS_LANGUAGE_H'):
650 conf.DEFINE('HAVE_CUPS', '1')
651 else:
652 conf.undefine('HAVE_CUPS')
653 conf.SET_TARGET_TYPE('cups', 'EMPTY')
654 else:
655 # define an empty subsystem for cups, to allow it to be used as an empty dependency
656 conf.SET_TARGET_TYPE('cups', 'EMPTY')
658 if Options.options.with_iprint:
659 if conf.CONFIG_SET('HAVE_CUPS'):
660 conf.DEFINE('HAVE_IPRINT', '1')
661 else:
662 Logs.warn("--enable-iprint=yes but cups support not sufficient")
663 if Options.options.with_syslog:
664 conf.DEFINE('WITH_SYSLOG', '1')
665 if Options.options.with_automount:
666 conf.DEFINE('WITH_AUTOMOUNT', '1')
668 # Check for LDAP
669 if Options.options.with_ldap:
670 conf.CHECK_HEADERS('ldap.h lber.h ldap_pvt.h')
671 conf.CHECK_TYPE('ber_tag_t', 'unsigned int', headers='ldap.h lber.h')
672 conf.CHECK_FUNCS_IN('ber_scanf ber_sockbuf_add_io', 'lber')
673 conf.CHECK_VARIABLE('LDAP_OPT_SOCKBUF', headers='ldap.h')
675 # if we LBER_OPT_LOG_PRINT_FN we can intercept ldap logging and print it out
676 # for the samba logs
677 conf.CHECK_VARIABLE('LBER_OPT_LOG_PRINT_FN',
678 define='HAVE_LBER_LOG_PRINT_FN', headers='lber.h')
680 conf.CHECK_FUNCS_IN('ldap_init ldap_init_fd ldap_initialize ldap_set_rebind_proc', 'ldap')
681 conf.CHECK_FUNCS_IN('ldap_add_result_entry', 'ldap')
683 # Check if ldap_set_rebind_proc() takes three arguments
684 if conf.CHECK_CODE('ldap_set_rebind_proc(0, 0, 0)',
685 'LDAP_SET_REBIND_PROC_ARGS',
686 msg="Checking whether ldap_set_rebind_proc takes 3 arguments",
687 headers='ldap.h lber.h', link=False):
688 conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '3')
689 else:
690 conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '2')
692 # last but not least, if ldap_init() exists, we want to use ldap
693 if conf.CONFIG_SET('HAVE_LDAP_INIT') and conf.CONFIG_SET('HAVE_LDAP_H'):
694 conf.DEFINE('HAVE_LDAP', '1')
695 conf.DEFINE('LDAP_DEPRECATED', '1')
696 conf.env['HAVE_LDAP'] = '1'
697 # if ber_sockbuf_add_io() and LDAP_OPT_SOCKBUF are available, we can add
698 # SASL wrapping hooks
699 if conf.CONFIG_SET('HAVE_BER_SOCKBUF_ADD_IO') and \
700 conf.CONFIG_SET('HAVE_LDAP_OPT_SOCKBUF'):
701 conf.DEFINE('HAVE_LDAP_SASL_WRAPPING', '1')
702 else:
703 conf.fatal("LDAP support not found. "
704 "Try installing libldap2-dev or openldap-devel. "
705 "Otherwise, use --without-ldap to build without "
706 "LDAP support. "
707 "LDAP support is required for the LDAP passdb backend, "
708 "LDAP idmap backends and ADS. "
709 "ADS support improves communication with "
710 "Active Directory domain controllers.")
711 else:
712 conf.SET_TARGET_TYPE('ldap', 'EMPTY')
713 conf.SET_TARGET_TYPE('lber', 'EMPTY')
715 if Options.options.with_ads == False:
716 use_ads = False
717 use_ads_krb5 = False
718 use_ads_ldap = False
719 else:
720 use_ads = True
721 use_ads_krb5 = True
722 use_ads_ldap = True
723 if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
724 not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
725 Logs.warn("arcfour-hmac-md5 encryption type not found in -lkrb5")
726 use_ads_krb5 = False
727 if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
728 Logs.warn("krb5_mk_req_extended not found in -lkrb5")
729 use_ads_krb5 = False
730 if not conf.CONFIG_SET('HAVE_KRB5_GET_HOST_REALM'):
731 Logs.warn("krb5_get_host_realm not found in -lkrb5")
732 use_ads_krb5 = False
733 if not conf.CONFIG_SET('HAVE_KRB5_FREE_HOST_REALM'):
734 Logs.warn("krb5_free_host_realm not found in -lkrb5")
735 use_ads_krb5 = False
736 if not conf.CONFIG_SET('HAVE_KRB5_FWD_TGT_CREDS'):
737 Logs.warn("krb5_fwd_tgt_creds found in -lkrb5")
738 use_ads_krb5 = False
739 if not conf.CONFIG_SET('HAVE_KRB5_GET_INIT_CREDS_OPT_ALLOC'):
740 Logs.warn("krb5_get_init_creds_opt_alloc not found in -lkrb5")
741 use_ads_krb5 = False
742 if not conf.CONFIG_SET('KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT'):
743 Logs.warn("krb5_get_init_creds_opt_free was not found or was too old in -lkrb5")
744 use_ads_krb5 = False
745 if not conf.CONFIG_SET('HAVE_KRB5_GET_RENEWED_CREDS'):
746 Logs.warn("krb5_get_renewed_creds not found in -lkrb5")
747 use_ads_krb5 = False
748 if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL_COMPARE_ANY_REALM'):
749 Logs.warn("krb5_principal_compare_any_realm not found in -lkrb5")
750 use_ads_krb5 = False
751 if not conf.CONFIG_SET('HAVE_KRB5_C_STRING_TO_KEY') and \
752 not conf.CONFIG_SET('HAVE_KRB5_STRING_TO_KEY_SALT'):
753 Logs.warn("krb5_c_string_to_key not found in -lkrb5")
754 use_ads_krb5 = False
755 if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
756 not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
757 Logs.warn("no CREATE_KEY_FUNCTIONS detected")
758 use_ads_krb5 = False
759 if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
760 not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
761 Logs.warn("no GET_ENCTYPES_FUNCTIONS detected")
762 use_ads_krb5 = False
763 if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
764 not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
765 Logs.warn("no KT_FREE_FUNCTION detected")
766 use_ads_krb5 = False
767 if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM'):
768 Logs.warn("krb5_c_verify_checksum_compare not found in -lkrb5")
769 use_ads_krb5 = False
771 # We don't actually use
772 # gsskrb5_extract_authz_data_from_sec_context, but it is a
773 # clue that this Heimdal, which does the PAC processing we
774 # need on the standard gss_inquire_sec_context_by_oid
775 if not conf.CONFIG_SET('HAVE_GSS_GET_NAME_ATTRIBUTE') and \
776 not (conf.CONFIG_SET('HAVE_GSSKRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT') and \
777 conf.CONFIG_SET('HAVE_GSS_INQUIRE_SEC_CONTEXT_BY_OID')):
778 Logs.warn("need either gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support")
779 use_ads_krb5 = False
781 if not conf.CONFIG_SET('HAVE_GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT'):
782 Logs.warn("need gss_krb5_export_lucid_sec_context for SPNEGO and gss_wrap support")
783 use_ads_krb5 = False
785 if use_ads_krb5:
786 conf.DEFINE('HAVE_KRB5', '1')
787 conf.env['HAVE_KRB5'] = '1'
788 else:
789 conf.undefine('HAVE_KRB5_H')
790 conf.undefine('HAVE_GSSAPI_H')
791 conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
792 conf.undefine('HAVE_GSSAPI_GSSAPI_H')
793 use_ads = False
795 if not conf.CONFIG_SET('HAVE_LDAP'):
796 use_ads = False
797 use_ads_ldap = False
799 if use_ads:
800 conf.DEFINE('WITH_ADS', '1')
801 conf.env['HAVE_ADS'] = '1'
802 Logs.info("Building with Active Directory support.")
803 # these have broken dependencies
804 forced_shared_modules.extend(TO_LIST('idmap_ad idmap_rfc2307'))
805 elif Options.options.with_ads == False:
806 Logs.info("Building without Active Directory support (--without-ads).")
807 else:
808 if not use_ads_krb5:
809 Logs.warn("Active Directory support not available: krb5 libs don't have all required features")
810 if not use_ads_ldap:
811 Logs.warn("Active Directory support not available: LDAP support is not available.")
812 if Options.options.with_ads:
813 conf.fatal("Active Directory support not found. Use --without-ads "
814 "for building without Active Directory support. "
815 "ADS support improves communication with "
816 "Active Directory domain controllers.")
817 else:
818 # this is the auto-mode case
819 Logs.warn("Building without Active Directory support.")
822 if Options.options.with_utmp:
823 conf.env.with_utmp = True
824 if not conf.CHECK_HEADERS('utmp.h'): conf.env.with_utmp = False
825 conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent')
826 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_name', headers='utmp.h',
827 define='HAVE_UT_UT_NAME')
828 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_user', headers='utmp.h',
829 define='HAVE_UT_UT_USER')
830 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_id', headers='utmp.h',
831 define='HAVE_UT_UT_ID')
832 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_host', headers='utmp.h',
833 define='HAVE_UT_UT_HOST')
834 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_time', headers='utmp.h',
835 define='HAVE_UT_UT_TIME')
836 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_tv', headers='utmp.h',
837 define='HAVE_UT_UT_TV')
838 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_type', headers='utmp.h',
839 define='HAVE_UT_UT_TYPE')
840 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_pid', headers='utmp.h',
841 define='HAVE_UT_UT_PID')
842 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_exit.e_exit', headers='utmp.h',
843 define='HAVE_UT_UT_EXIT')
844 conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_syslen', headers='utmpx.h',
845 define='HAVE_UX_UT_SYSLEN')
846 conf.CHECK_CODE('struct utmp utarg; struct utmp *utreturn; utreturn = pututline(&utarg);',
847 'PUTUTLINE_RETURNS_UTMP', headers='utmp.h',
848 msg="Checking whether pututline returns pointer")
849 conf.CHECK_SIZEOF(['((struct utmp *)NULL)->ut_line'], headers='utmp.h',
850 define='SIZEOF_UTMP_UT_LINE', critical=False)
851 if not conf.CONFIG_SET('SIZEOF_UTMP_UT_LINE'):
852 conf.env.with_utmp = False
853 elif int(conf.env.SIZEOF_UTMP_UT_LINE) < 15:
854 conf.env.with_utmp = False
855 if conf.env.with_utmp:
856 conf.DEFINE('WITH_UTMP', 1)
857 else:
858 Logs.warn("--with-utmp but utmp support not sufficient")
860 if Options.options.with_avahi:
861 conf.env.with_avahi = True
862 if not conf.CHECK_HEADERS('avahi-common/watch.h avahi-client/client.h'): conf.env.with_avahi = False
863 if not conf.CHECK_FUNCS_IN('avahi_client_new', 'avahi-client'): conf.env.with_avahi = False
864 if not conf.CHECK_FUNCS_IN('avahi_strerror', 'avahi-common'): conf.env.with_avahi = False
865 if conf.env.with_avahi:
866 conf.DEFINE('WITH_AVAHI_SUPPORT', 1)
867 else:
868 conf.SET_TARGET_TYPE('avahi-common', 'EMPTY')
869 conf.SET_TARGET_TYPE('avahi-client', 'EMPTY')
871 if Options.options.with_iconv:
872 conf.env.with_iconv = True
873 if not conf.CHECK_FUNCS_IN('iconv_open', 'iconv', headers='iconv.h'):
874 conf.env.with_iconv = False
875 if conf.env.with_iconv:
876 conf.DEFINE('HAVE_ICONV', 1)
878 if Options.options.with_pam:
879 use_pam=True
880 conf.CHECK_HEADERS('security/pam_appl.h pam/pam_appl.h')
881 if not conf.CONFIG_SET('HAVE_SECURITY_PAM_APPL_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_APPL_H'):
882 Logs.warn("--with-pam=yes but pam_appl.h not found")
883 use_pam=False
884 conf.CHECK_FUNCS_IN('pam_get_data', 'pam')
885 conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
886 if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
887 Logs.warn("--with-pam=yes but pam_modules.h not found")
888 use_pam=False
889 conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h')
890 conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h')
891 conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam')
892 conf.CHECK_CODE('''
893 #if defined(HAVE_SECURITY_PAM_APPL_H)
894 #include <security/pam_appl.h>
895 #elif defined(HAVE_PAM_PAM_APPL_H)
896 #include <pam/pam_appl.h>
897 #endif
898 pam_set_item(0, PAM_RHOST, 0);
899 ''',
900 'HAVE_PAM_RHOST',
901 lib='pam',
902 msg="Checking whether PAM_RHOST is available");
903 conf.CHECK_CODE('''
904 #if defined(HAVE_SECURITY_PAM_APPL_H)
905 #include <security/pam_appl.h>
906 #elif defined(HAVE_PAM_PAM_APPL_H)
907 #include <pam/pam_appl.h>
908 #endif
909 pam_set_item(0, PAM_TTY, 0);
910 ''',
911 'HAVE_PAM_TTY',
912 lib='pam',
913 msg="Checking whether PAM_TTY is available");
914 conf.CHECK_CODE('''
915 #if (!defined(LINUX))
917 #define PAM_EXTERN extern
918 #if defined(HAVE_SECURITY_PAM_APPL_H)
919 #include <security/pam_appl.h>
920 #elif defined(HAVE_PAM_PAM_APPL_H)
921 #include <pam/pam_appl.h>
922 #endif
924 #endif
926 #if defined(HAVE_SECURITY_PAM_MODULES_H)
927 #include <security/pam_modules.h>
928 #elif defined(HAVE_PAM_PAM_MODULES_H)
929 #include <pam/pam_modules.h>
930 #endif
932 #if defined(HAVE_SECURITY__PAM_MACROS_H)
933 #include <security/_pam_macros.h>
934 #elif defined(HAVE_PAM__PAM_MACROS_H)
935 #include <pam/_pam_macros.h>
936 #endif
938 #ifdef HAVE_SECURITY_PAM_EXT_H
939 #include <security/pam_ext.h>
940 #endif
942 int i; i = PAM_RADIO_TYPE;
943 ''',
944 'HAVE_PAM_RADIO_TYPE',
945 lib='pam',
946 msg="Checking whether PAM_RADIO_TYPE is available");
947 if use_pam:
948 conf.DEFINE('WITH_PAM', 1)
949 conf.DEFINE('WITH_PAM_MODULES', 1)
951 seteuid = False
954 # Ensure we select the correct set of system calls on Linux.
956 if (host_os.rfind('linux') > -1):
957 conf.CHECK_CODE('''
958 #if defined(HAVE_UNISTD_H)
959 #include <unistd.h>
960 #endif
961 #include <stdlib.h>
962 #include <stdio.h>
963 #include <sys/types.h>
964 #include <errno.h>
966 #ifdef HAVE_SYS_PRIV_H
967 #include <sys/priv.h>
968 #endif
969 #ifdef HAVE_SYS_ID_H
970 #include <sys/id.h>
971 #endif
973 #if defined(HAVE_SYSCALL_H)
974 #include <syscall.h>
975 #endif
977 #if defined(HAVE_SYS_SYSCALL_H)
978 #include <sys/syscall.h>
979 #endif
981 syscall(SYS_setresuid32, -1, -1, -1);
982 syscall(SYS_setresgid32, -1, -1, -1);
983 syscall(SYS_setreuid32, -1, -1);
984 syscall(SYS_setregid32, -1, -1);
985 syscall(SYS_setuid32, -1);
986 syscall(SYS_setgid32, -1);
987 syscall(SYS_setgroups32, 0, NULL);
988 ''',
989 'USE_LINUX_32BIT_SYSCALLS',
990 msg="Checking whether Linux should use 32-bit credential calls");
992 if (conf.CONFIG_SET('USE_LINUX_32BIT_SYSCALLS')):
993 seteuid = conf.CHECK_CODE('''
994 #define AUTOCONF_TEST 1
995 #define USE_LINUX_THREAD_CREDENTIALS 1
996 #define USE_LINUX_32BIT_SYSCALLS 1
997 #include "../lib/util/setid.c"
998 #include "./lib/util_sec.c"
999 ''',
1000 'USE_LINUX_THREAD_CREDENTIALS',
1001 addmain=False,
1002 execute=True,
1003 msg="Checking whether we can use Linux thread-specific credentials with 32-bit system calls")
1004 else:
1005 seteuid = conf.CHECK_CODE('''
1006 #define AUTOCONF_TEST 1
1007 #define USE_LINUX_THREAD_CREDENTIALS 1
1008 #include "../lib/util/setid.c"
1009 #include "./lib/util_sec.c"
1010 ''',
1011 'USE_LINUX_THREAD_CREDENTIALS',
1012 addmain=False,
1013 execute=True,
1014 msg="Checking whether we can use Linux thread-specific credentials")
1015 if not seteuid:
1016 seteuid = conf.CHECK_CODE('''
1017 #define AUTOCONF_TEST 1
1018 #define USE_SETREUID 1
1019 #include "../lib/util/setid.c"
1020 #include "./lib/util_sec.c"
1021 ''',
1022 'USE_SETREUID',
1023 addmain=False,
1024 execute=True,
1025 msg="Checking whether setreuid is available")
1026 if not seteuid:
1027 seteuid = conf.CHECK_CODE('''
1028 #define AUTOCONF_TEST 1
1029 #define USE_SETRESUID 1
1030 #include "../lib/util/setid.c"
1031 #include "./lib/util_sec.c"
1032 ''',
1033 'USE_SETRESUID',
1034 addmain=False,
1035 execute=True,
1036 msg="Checking whether setresuid is available")
1037 if not seteuid:
1038 seteuid = conf.CHECK_CODE('''
1039 #define AUTOCONF_TEST 1
1040 #define USE_SETEUID 1
1041 #include "../lib/util/setid.c"
1042 #include "./lib/util_sec.c"
1043 ''',
1044 'USE_SETEUID',
1045 addmain=False,
1046 execute=True,
1047 msg="Checking whether seteuid is available")
1048 if not seteuid:
1049 seteuid = conf.CHECK_CODE('''
1050 #define AUTOCONF_TEST 1
1051 #define USE_SETUIDX 1
1052 #include "../lib/util/setid.c"
1053 #include "./lib/util_sec.c"
1054 ''',
1055 'USE_SETUIDX',
1056 addmain=False,
1057 execute=True,
1058 mandatory=True,
1059 msg="Checking whether setuidx is available")
1060 if Options.options.with_dnsupdate:
1061 if not conf.CONFIG_SET('HAVE_KRB5'):
1062 Logs.warn("--with-dnsupdate=yes but gssapi support not sufficient")
1063 else:
1064 conf.DEFINE('WITH_DNS_UPDATES', 1)
1065 conf.CHECK_HEADERS('valgrind.h valgrind/valgrind.h valgrind/memcheck.h')
1066 if Options.options.developer:
1067 if conf.CONFIG_SET('HAVE_VALGRIND_H') or conf.CONFIG_SET('HAVE_VALGRIND_VALGRIND_H'):
1068 conf.DEFINE('VALGRIND', '1')
1070 if conf.CHECK_CODE('''
1071 #include <bits/sockaddr.h>
1072 #include <linux/netlink.h>
1073 ''',
1074 'HAVE_LINUX_NETLINK_H',
1075 msg="Checking whether Linux netlink is available"):
1077 conf.CHECK_CODE('''
1078 #include <bits/sockaddr.h>
1079 #include <linux/netlink.h>
1080 #include <linux/rtnetlink.h>
1081 ''',
1082 'HAVE_LINUX_RTNETLINK_H',
1083 msg='Checking whether Linux rtnetlink is available')
1085 conf.CHECK_CODE('''
1086 #include "../tests/fcntl_lock.c"
1087 ''',
1088 'HAVE_FCNTL_LOCK',
1089 addmain=False,
1090 execute=True,
1091 msg='Checking whether fcntl locking is available')
1093 conf.CHECK_CODE('''
1094 #include <unistd.h>
1095 #include <sys/types.h>
1096 #include <sys/stat.h>
1097 #include <fcntl.h>
1098 #include <errno.h>
1100 #define DATA "ofdtest.fcntl"
1102 int main() {
1103 struct flock lck = {
1104 .l_whence = SEEK_SET,
1105 .l_type = F_WRLCK,
1106 .l_start = 0,
1107 .l_len = 1,
1108 .l_pid = 0,
1110 int ret;
1111 int fd1;
1112 int fd2;
1113 char *testdir = getenv("TESTDIR");
1115 if (testdir) {
1116 if (chdir(testdir) != 0) {
1117 goto err;
1121 unlink(DATA);
1122 fd1 = open(DATA, O_RDWR|O_CREAT|O_EXCL, 0600);
1123 fd2 = open(DATA, O_RDWR);
1124 if (fd1 == -1 || fd2 == -1) {
1125 goto err;
1127 ret = fcntl(fd1,F_OFD_SETLKW,&lck);
1128 if (ret == -1) {
1129 goto err;
1131 ret = fcntl(fd2,F_OFD_SETLK,&lck);
1132 if (ret != -1) {
1133 goto err;
1135 if (errno != EAGAIN) {
1136 goto err;
1138 ret = fcntl(fd2,F_OFD_GETLK,&lck);
1139 if (ret == -1) {
1140 goto err;
1142 unlink(DATA);
1143 exit(0);
1144 err:
1145 unlink(DATA);
1146 exit(1);
1147 }''',
1148 'HAVE_OFD_LOCKS',
1149 addmain=False,
1150 execute=True,
1151 msg="Checking whether fcntl lock supports open file description locks")
1153 # glibc up to 2.3.6 had dangerously broken posix_fallocate(). DON'T USE IT.
1154 if not conf.CHECK_CODE('''
1155 #define _XOPEN_SOURCE 600
1156 #include <stdlib.h>
1157 #if defined(__GLIBC__) && ((__GLIBC__ < 2) || (__GLIBC__ == 2 && __GLIBC_MINOR__ < 4))
1158 #error probably broken posix_fallocate
1159 #endif
1160 ''',
1161 '_HAVE_UNBROKEN_POSIX_FALLOCATE',
1162 msg='Checking for broken posix_fallocate'):
1163 conf.DEFINE('HAVE_BROKEN_POSIX_FALLOCATE', '1')
1166 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtim.tv_nsec',
1167 define='HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') # Linux, Solaris
1168 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimensec',
1169 define='HAVE_STRUCT_STAT_ST_MTIMENSEC') # BSD, if defined _POSIX_SOURCE
1170 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimespec.tv_nsec',
1171 define='HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') # BSD, if not defined _POSIX_SOURCE
1172 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtime_n',
1173 define='HAVE_STRUCT_STAT_ST_MTIME_N') # AIX
1174 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_umtime',
1175 define='HAVE_STRUCT_STAT_ST_UMTIME') # Tru64
1176 if conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') or \
1177 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMENSEC') or \
1178 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') or \
1179 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIME_N') or \
1180 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_UMTIME'):
1181 conf.DEFINE('HAVE_STAT_HIRES_TIMESTAMPS', '1')
1183 # recent FreeBSD, NetBSD have creation timestamps called birthtime:
1184 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtime',
1185 define='HAVE_STRUCT_STAT_ST_BIRTHTIME')
1186 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimespec.tv_nsec',
1187 define='HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC')
1188 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimensec',
1189 define='HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC')
1191 conf.CHECK_CODE('''
1192 ssize_t err = posix_fadvise(0,0,0x80000,POSIX_FADV_WILLNEED);
1193 ''',
1194 'HAVE_POSIX_FADVISE',
1195 msg='Checking whether posix_fadvise is available',
1196 headers='unistd.h fcntl.h')
1198 for v in ['_SC_NGROUPS_MAX', '_SC_NPROC_ONLN', '_SC_NPROCESSORS_ONLN', '_SC_PAGESIZE' ]:
1199 conf.CHECK_CODE('''
1200 #include <unistd.h>
1201 return sysconf(%s) == -1 ? 1 : 0;
1202 ''' % v,
1203 'SYSCONF%s' % v,
1204 msg='Checking whether sysconf(%s) is available' % v)
1206 conf.CHECK_CODE('''
1207 #include <sys/syscall.h>
1208 #include <unistd.h>
1209 syscall(SYS_initgroups, 16, NULL, NULL, 0);
1210 ''',
1211 'HAVE_DARWIN_INITGROUPS',
1212 msg='Checking whether to use the Darwin-specific initgroups system call')
1214 conf.CHECK_CODE('''struct utimbuf tbuf; tbuf.actime = 0; tbuf.modtime = 1; exit(utime("foo.c",&tbuf));''',
1215 'HAVE_UTIMBUF',
1216 headers='sys/types.h utime.h',
1217 msg='Checking whether struct utimbuf is available')
1219 if conf.CHECK_CODE('''struct sigevent s;''',
1220 'HAVE_STRUCT_SIGEVENT',
1221 headers='sys/types.h stdlib.h stddef.h signal.h',
1222 msg='Checking whether we have the struct sigevent'):
1223 conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sival_ptr',
1224 define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIVAL_PTR',
1225 headers='signal.h');
1226 conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sigval_ptr',
1227 define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIGVAL_PTR',
1228 headers='signal.h');
1230 if os.path.exists('/proc/sys/kernel/core_pattern'):
1231 conf.DEFINE('HAVE_SYS_KERNEL_PROC_CORE_PATTERN', '1')
1233 if conf.CHECK_CODE('''
1234 #include <time.h>
1235 main() {
1236 struct tm *tm;
1237 if (sizeof(time_t) == 8) {
1238 time_t max_time = 0x7fffffffffffffffll;
1239 tm = gmtime(&max_time);
1240 /* This should fail with 32-bit tm_year. */
1241 if (tm == NULL) {
1242 /* Max time_t that works with 32-bit int tm_year in struct tm. */
1243 max_time = 67768036191676799ll;
1244 tm = gmtime(&max_time);
1245 if (tm) {
1246 exit(0);
1250 exit(1);
1251 }''',
1252 '__TIME_T_MAX',
1253 addmain=False,
1254 execute=True,
1255 msg="Checking for the maximum value of the 'time_t' type"):
1256 conf.DEFINE('TIME_T_MAX', '67768036191676799ll')
1258 conf.CHECK_CODE('''
1259 #if defined(HAVE_UNISTD_H)
1260 #include <unistd.h>
1261 #endif
1262 #include <sys/types.h>
1263 main() { dev_t dev = makedev(1,2); return 0; }
1264 ''',
1265 'HAVE_MAKEDEV',
1266 addmain=False,
1267 msg='Checking whether the macro for makedev is available')
1269 conf.CHECK_CODE('''
1270 #include <stdio.h>
1271 #include <limits.h>
1272 #include <signal.h>
1274 void exit_on_core(int ignored) {
1275 exit(1);
1278 main() {
1279 char *newpath;
1280 signal(SIGSEGV, exit_on_core);
1281 newpath = realpath("/tmp", NULL);
1282 exit((newpath != NULL) ? 0 : 1);
1284 ''',
1285 'REALPATH_TAKES_NULL',
1286 addmain=False,
1287 execute=True,
1288 msg='Checking whether the realpath function allows a NULL argument')
1290 conf.CHECK_CODE('''#include "../tests/ftruncate.c"''',
1291 'HAVE_FTRUNCATE_EXTEND',
1292 msg='Checking for ftruncate extend',
1293 addmain=False,
1294 execute=True)
1296 if Options.options.with_sendfile_support:
1297 if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('k*bsd*-gnu') > -1) or (host_os.rfind('kopensolaris*-gnu') > -1):
1298 conf.CHECK_CODE('''
1299 int tofd, fromfd;
1300 off_t offset;
1301 size_t total;
1302 ssize_t nwritten = sendfile(tofd, fromfd, &offset, total);
1303 ''',
1304 '_HAVE_SENDFILE',
1305 headers='sys/sendfile.h',
1306 msg='Checking for linux sendfile support')
1308 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1309 conf.DEFINE('HAVE_SENDFILE', '1')
1310 conf.DEFINE('LINUX_SENDFILE_API', '1')
1311 conf.DEFINE('WITH_SENDFILE', '1')
1312 elif (host_os.rfind('freebsd') > -1) or (host_os.rfind('dragonfly') > -1):
1313 conf.CHECK_CODE('''
1314 #include <sys/types.h>
1315 #include <unistd.h>
1316 #include <sys/socket.h>
1317 #include <sys/uio.h>
1318 int fromfd, tofd, ret, total=0;
1319 off_t offset, nwritten;
1320 struct sf_hdtr hdr;
1321 struct iovec hdtrl;
1322 hdr.headers = &hdtrl;
1323 hdr.hdr_cnt = 1;
1324 hdr.trailers = NULL;
1325 hdr.trl_cnt = 0;
1326 hdtrl.iov_base = NULL;
1327 hdtrl.iov_len = 0;
1328 ret = sendfile(fromfd, tofd, offset, total, &hdr, &nwritten, 0)
1329 ''',
1330 '_HAVE_SENDFILE',
1331 msg='Checking for freebsd sendfile support')
1332 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1333 conf.DEFINE('HAVE_SENDFILE', '1')
1334 conf.DEFINE('FREEBSD_SENDFILE_API', '1')
1335 conf.DEFINE('WITH_SENDFILE', '1')
1336 elif (host_os.rfind('darwin') > -1):
1337 conf.CHECK_CODE('''
1338 #include <sys/types.h>
1339 #include <sys/socket.h>
1340 #include <sys/uio.h>
1341 int fromfd, tofd, ret;
1342 off_t offset, nwritten;
1343 struct sf_hdtr hdr;
1344 struct iovec hdtrl;
1345 hdr.headers = &hdtrl;
1346 hdr.hdr_cnt = 1;
1347 hdr.trailers = (void *)0;
1348 hdr.trl_cnt = 0;
1349 hdtrl.iov_base = (void *)0;
1350 hdtrl.iov_len = 0;
1351 ret = sendfile(fromfd, tofd, offset, &nwritten, &hdr, 0);
1352 ''',
1353 '_HAVE_SENDFILE',
1354 msg='Checking for darwin sendfile support')
1355 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1356 conf.DEFINE('HAVE_SENDFILE', '1')
1357 conf.DEFINE('DARWIN_SENDFILE_API', '1')
1358 conf.DEFINE('WITH_SENDFILE', '1')
1359 elif (host_os.rfind('hpux') > -1) or (host_os.rfind('osf') > -1):
1360 conf.CHECK_CODE('''
1361 #include <sys/socket.h>
1362 #include <sys/uio.h>
1363 int fromfd, tofd;
1364 size_t total=0;
1365 struct iovec hdtrl[2];
1366 ssize_t nwritten;
1367 off_t offset;
1368 hdtrl[0].iov_base = 0;
1369 hdtrl[0].iov_len = 0;
1370 nwritten = sendfile(tofd, fromfd, offset, total, &hdtrl[0], 0);
1371 ''',
1372 '_HAVE_SENDFILE',
1373 msg='Checking for osf/hpux sendfile support')
1374 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1375 conf.DEFINE('HAVE_SENDFILE', '1')
1376 conf.DEFINE('HPUX_SENDFILE_API', '1')
1377 conf.DEFINE('WITH_SENDFILE', '1')
1378 elif (host_os.rfind('solaris') > -1):
1379 conf.CHECK_FUNCS_IN('sendfile', 'sendfilev')
1380 conf.CHECK_CODE('''
1381 #include <sys/sendfile.h>,
1382 int sfvcnt;
1383 size_t xferred;
1384 struct sendfilevec vec[2];
1385 ssize_t nwritten;
1386 int tofd;
1387 sfvcnt = 2;
1388 vec[0].sfv_fd = SFV_FD_SELF;
1389 vec[0].sfv_flag = 0;
1390 vec[0].sfv_off = 0;
1391 vec[0].sfv_len = 0;
1392 vec[1].sfv_fd = 0;
1393 vec[1].sfv_flag = 0;
1394 vec[1].sfv_off = 0;
1395 vec[1].sfv_len = 0;
1396 nwritten = sendfilev(tofd, vec, sfvcnt, &xferred);
1397 ''',
1398 '_HAVE_SENDFILEV',
1399 msg='Checking for solaris sendfilev support')
1400 if conf.CONFIG_SET('_HAVE_SENDFILEV'):
1401 conf.DEFINE('HAVE_SENDFILEV', '1')
1402 conf.DEFINE('SOLARIS_SENDFILE_API', '1')
1403 conf.DEFINE('WITH_SENDFILE', '1')
1404 elif (host_os.rfind('aix') > -1):
1405 conf.CHECK_CODE('''
1406 #include <sys/socket.h>
1407 int fromfd, tofd;
1408 size_t total=0;
1409 struct sf_parms hdtrl;
1410 ssize_t nwritten;
1411 hdtrl.header_data = 0;
1412 hdtrl.header_length = 0;
1413 hdtrl.file_descriptor = fromfd;
1414 hdtrl.file_offset = 0;
1415 hdtrl.file_bytes = 0;
1416 hdtrl.trailer_data = 0;
1417 hdtrl.trailer_length = 0;
1418 nwritten = send_file(&tofd, &hdtrl, 0);
1419 ''',
1420 '_HAVE_SENDFILE',
1421 msg='Checking for AIX send_file support')
1422 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1423 conf.DEFINE('HAVE_SENDFILE', '1')
1424 conf.DEFINE('AIX_SENDFILE_API', '1')
1425 conf.DEFINE('WITH_SENDFILE', '1')
1427 # Check for getcwd allowing a NULL arg.
1428 conf.CHECK_CODE('''
1429 #include <unistd.h>
1430 main() {
1431 char *s = getcwd(NULL,0);
1432 exit(s != NULL ? 0 : 1);
1433 }''', 'GETCWD_TAKES_NULL', addmain=False, execute=True,
1434 msg="getcwd takes a NULL argument")
1437 # UnixWare 7.x has its getspnam in -lgen
1438 conf.CHECK_FUNCS_IN('getspnam', 'gen')
1439 conf.CHECK_FUNCS_IN('getspnam', 'security')
1440 conf.CHECK_FUNCS_IN('getspnam', 'sec')
1442 legacy_quota_libs = ''
1443 if Options.options.with_quotas:
1444 # For quotas on Veritas VxFS filesystems
1445 conf.CHECK_HEADERS('sys/fs/vx_quota.h')
1446 # For sys/quota.h and linux/quota.h
1447 conf.CHECK_HEADERS('sys/quota.h')
1448 # For quotas on BSD systems
1449 conf.CHECK_HEADERS('ufs/ufs/quota.h')
1450 # For quotas on Linux XFS filesystems
1451 if conf.CHECK_HEADERS('xfs/xqm.h'):
1452 conf.DEFINE('HAVE_XFS_QUOTAS', '1')
1453 else:
1454 # For Irix XFS
1455 conf.CHECK_CODE('''
1456 #include "confdefs.h"
1457 #ifdef HAVE_SYS_TYPES_H
1458 #include <sys/types.h>
1459 #endif
1460 #ifdef HAVE_ASM_TYPES_H
1461 #include <asm/types.h>
1462 #endif
1463 #include <sys/quota.h>
1464 int i = Q_XGETQUOTA;''',
1465 define='HAVE_XFS_QUOTAS',
1466 msg='for XFS QUOTA in <sys/quota.h>',
1467 execute=False,
1468 local_include=False)
1470 # For IRIX like dqb_isoftlimit instead of dqb_fsoftlimit in struc dqblk
1471 conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_fsoftlimit', define='HAVE_DQB_FSOFTLIMIT',
1472 headers='sys/quota.h')
1473 #darwin style quota bytecount
1474 conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_curbytes', define='HAVE_STRUCT_DQBLK_DQB_CURBYTES',
1475 headers='sys/quota.h')
1476 if conf.CHECK_HEADERS('rpcsvc/rquota.h'):
1477 conf.DEFINE('HAVE_NFS_QUOTAS', '1')
1478 conf.CHECK_STRUCTURE_MEMBER('struct getquota_rslt', 'getquota_rslt_u',
1479 define='HAVE_GETQUOTA_RSLT_GETQUOTA_RSLT_U',
1480 headers='rpcsvc/rquota.h')
1482 if (host_os.rfind('linux') > -1):
1483 conf.DEFINE('HAVE_QUOTACTL_LINUX', '1')
1484 elif not conf.CONFIG_SET("HAVE_XFS_QUOTAS"):
1485 if not conf.CHECK_CODE('''
1486 #define HAVE_QUOTACTL_4A 1
1487 #define AUTOCONF_TEST 1
1488 #include "../tests/sysquotas.c"
1489 ''',
1490 cflags=conf.env['WERROR_CFLAGS'],
1491 define='HAVE_QUOTACTL_4A',
1492 msg='for QUOTACTL_4A: long quotactl(int cmd, char *special, qid_t id, caddr_t addr)',
1493 execute=True,
1494 addmain=False):
1496 conf.CHECK_CODE('''
1497 #define HAVE_QUOTACTL_4B 1
1498 #define AUTOCONF_TEST 1
1499 #include "../tests/sysquotas.c"
1500 ''',
1501 cflags=conf.env['WERROR_CFLAGS'],
1502 define='HAVE_QUOTACTL_4B',
1503 msg='for QUOTACTL_4B: int quotactl(const char *path, int cmd, int id, char *addr)',
1504 execute=True,
1505 addmain=False)
1507 conf.CHECK_CODE('''
1508 clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
1509 ''',
1510 headers="rpc/rpc.h rpc/types.h rpcsvc/rquota.h rpc/nettype.h rpc/xdr.h",
1511 define='HAVE_NFS_QUOTAS',
1512 msg='for NFS QUOTAS',
1513 execute=True,
1514 local_include=False)
1516 if conf.CONFIG_SET('HAVE_QUOTACTL_LINUX') or \
1517 conf.CONFIG_SET('HAVE_QUOTACTL_4A') or \
1518 conf.CONFIG_SET('HAVE_QUOTACTL_4B') or \
1519 conf.CONFIG_SET('HAVE_XFS_QUOTAS'):
1520 conf.DEFINE('HAVE_SYS_QUOTAS', '1')
1521 conf.DEFINE('WITH_QUOTAS', '1')
1524 # check if Legacy quota code can be brought in
1525 # if standard interfaces are not supported
1527 if not conf.CONFIG_SET('WITH_QUOTAS'):
1528 if host_os.rfind('sunos5') > -1:
1529 conf.DEFINE('SUNOS5', '1')
1530 legacy_quota_libs = 'nsl'
1531 conf.CHECK_CODE('''
1532 #define WITH_QUOTAS 1
1533 #define AUTOCONF_TEST 1
1534 #include "../tests/oldquotas.c"
1535 ''',
1536 cflags=conf.env['WERROR_CFLAGS'],
1537 define='WITH_QUOTAS',
1538 lib=legacy_quota_libs,
1539 msg='Checking whether legacy quota code can be used',
1540 execute=False,
1541 addmain=False)
1542 if not conf.CONFIG_SET('WITH_QUOTAS'):
1543 legacy_quota_libs = ''
1544 conf.env['legacy_quota_libs'] = legacy_quota_libs
1547 # cluster support (CTDB)
1549 if not Options.options.with_cluster_support:
1550 Logs.info("building without cluster support (--without-cluster-support)")
1551 conf.env.with_ctdb = False
1552 else:
1553 Logs.info("building with cluster support")
1554 conf.env.with_ctdb = True
1555 conf.DEFINE('CLUSTER_SUPPORT', 1)
1557 conf.CHECK_CODE('void seekdir(DIR *d, long loc) { return; }',
1558 'SEEKDIR_RETURNS_VOID',
1559 headers='sys/types.h dirent.h',
1560 msg='Checking whether seekdir returns void')
1562 if Options.options.with_profiling_data:
1563 conf.DEFINE('WITH_PROFILE', 1);
1564 conf.CHECK_FUNCS('getrusage', headers="sys/time.h sys/resource.h")
1566 if (conf.CHECK_HEADERS('linux/ioctl.h sys/ioctl.h linux/fs.h') and
1567 conf.CHECK_DECLS('FS_IOC_GETFLAGS FS_COMPR_FL', headers='linux/fs.h')):
1568 conf.DEFINE('HAVE_LINUX_IOCTL', '1')
1570 conf.env['CCFLAGS_CEPHFS'] = "-D_FILE_OFFSET_BITS=64"
1571 if Options.options.libcephfs_dir:
1572 conf.env['CPPPATH_CEPHFS'] = Options.options.libcephfs_dir + '/include'
1573 conf.env['LIBPATH_CEPHFS'] = Options.options.libcephfs_dir + '/lib'
1575 if conf.CHECK_HEADERS('cephfs/libcephfs.h', False, False, 'cephfs') and conf.CHECK_LIB('cephfs', shlib=True) and Options.options.with_cephfs:
1576 if Options.options.with_acl_support:
1577 conf.DEFINE('HAVE_CEPH', '1')
1578 if conf.CHECK_FUNCS_IN('ceph_statx', 'cephfs', headers='cephfs/libcephfs.h'):
1579 conf.DEFINE('HAVE_CEPH_STATX', '1')
1580 else:
1581 Logs.warn("ceph support disabled due to --without-acl-support")
1582 conf.undefine('HAVE_CEPH')
1584 if Options.options.with_glusterfs:
1585 conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 4" --cflags --libs',
1586 msg='Checking for glusterfs-api >= 4', uselib_store="GFAPI")
1587 conf.CHECK_HEADERS('api/glfs.h', lib='gfapi')
1588 conf.CHECK_LIB('gfapi', shlib=True)
1590 if conf.CONFIG_SET('HAVE_API_GLFS_H'):
1591 if Options.options.with_acl_support:
1592 conf.DEFINE('HAVE_GLUSTERFS', '1')
1593 else:
1594 Logs.warn("GlusterFS support disabled due to --without-acl-support")
1595 conf.undefine('HAVE_GLUSTERFS')
1596 else:
1597 conf.undefine('HAVE_GLUSTERFS')
1598 else:
1599 conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
1600 conf.undefine('HAVE_GLUSTERFS')
1602 if Options.options.enable_vxfs:
1603 conf.DEFINE('HAVE_VXFS', '1')
1605 if conf.CHECK_CFG(package='dbus-1', args='--cflags --libs',
1606 msg='Checking for dbus', uselib_store="DBUS-1"):
1607 if (conf.CHECK_HEADERS('dbus/dbus.h', lib='dbus-1')
1608 and conf.CHECK_LIB('dbus-1', shlib=True)):
1609 conf.DEFINE('HAVE_DBUS', '1')
1611 conf.env.build_regedit = False
1612 if not Options.options.with_regedit == False:
1613 conf.PROCESS_SEPARATE_RULE('system_ncurses')
1614 if conf.CONFIG_SET('HAVE_NCURSES'):
1615 conf.env.build_regedit = True
1617 if conf.env.build_regedit:
1618 Logs.info("building regedit")
1619 else:
1620 if Options.options.with_regedit == False:
1621 Logs.info("not building regedit (--without-regedit)")
1622 elif Options.options.with_regedit == True:
1623 Logs.error("ncurses not available, cannot build regedit")
1624 conf.fatal("ncurses not available, but --with-regedit was specified")
1625 else:
1626 Logs.info("ncurses not available, not building regedit")
1628 if conf.CHECK_HEADERS('ftw.h') and conf.CHECK_FUNCS('nftw'):
1629 conf.env.build_mvxattr = True
1631 conf.CHECK_FUNCS_IN('DES_pcbc_encrypt', 'crypto')
1632 if Options.options.with_fake_kaserver == True:
1633 conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
1634 conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
1635 if (conf.CONFIG_SET('HAVE_AFS_PARAM_H') and conf.CONFIG_SET('HAVE_AFS_STDS_H') and conf.CONFIG_SET('HAVE_DES_PCBC_ENCRYPT')):
1636 conf.DEFINE('WITH_FAKE_KASERVER', '1')
1637 else:
1638 conf.fatal('AFS headers not available, but --with-fake-kaserver was specified')
1640 conf.env['libtracker']=''
1641 conf.env.with_spotlight = False
1642 if Options.options.with_spotlight:
1644 Logs.info("Requested Spotlight support, checking for bison")
1645 bison.detect(conf)
1646 if not conf.env['BISON']:
1647 conf.fatal("Spotlight support requested but bison missing")
1648 conf.CHECK_COMMAND('%s --version | head -n1' % conf.env['BISON'], msg='Using bison version', define=None, on_target=False)
1649 Logs.info("Requested Spotlight support, checking for flex")
1650 flex.detect(conf)
1651 if not conf.env['FLEX']:
1652 conf.fatal("Spotlight support requested but flex missing")
1653 conf.CHECK_COMMAND('%s --version' % conf.env['FLEX'], msg='Using flex version', define=None, on_target=False)
1654 versions = ['1.0', '0.16', '0.14']
1655 for version in versions:
1656 testlib = 'tracker-sparql-' + version
1657 if conf.CHECK_CFG(package=testlib,
1658 args='--cflags --libs',
1659 mandatory=False):
1660 conf.SET_TARGET_TYPE(testlib, 'SYSLIB')
1661 conf.env['libtracker'] = testlib
1662 conf.env.with_spotlight = True
1663 conf.DEFINE('WITH_SPOTLIGHT', '1')
1664 break
1666 if not conf.env.with_spotlight:
1667 conf.fatal("Spotlight support requested but tracker-sparql library missing")
1668 Logs.info("building with Spotlight support")
1669 default_static_modules.extend(TO_LIST('rpc_mdssvc_module'))
1671 forced_static_modules.extend(TO_LIST('auth_domain auth_builtin auth_sam auth_winbind'))
1672 default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam
1673 auth_unix
1674 nss_info_template idmap_tdb idmap_passdb
1675 idmap_nss'''))
1677 default_shared_modules.extend(TO_LIST('''
1678 vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk
1679 vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
1680 vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2
1681 vfs_readahead vfs_xattr_tdb
1682 vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
1683 vfs_preopen vfs_catia
1684 vfs_media_harmony vfs_unityed_media vfs_fruit vfs_shell_snap
1685 vfs_commit vfs_worm vfs_crossrename vfs_linux_xfs_sgid
1686 vfs_time_audit vfs_offline
1687 '''))
1688 default_shared_modules.extend(TO_LIST('auth_script idmap_tdb2 idmap_script'))
1689 # these have broken dependencies
1690 forced_shared_modules.extend(TO_LIST('idmap_autorid idmap_rid idmap_hash'))
1692 if Options.options.developer:
1693 default_static_modules.extend(TO_LIST('charset_weird'))
1694 default_shared_modules.extend(TO_LIST('perfcount_test'))
1695 default_shared_modules.extend(TO_LIST('vfs_skel_opaque vfs_skel_transparent vfs_shadow_copy_test'))
1696 default_shared_modules.extend(TO_LIST('auth_skel pdb_test'))
1697 default_shared_modules.extend(TO_LIST('vfs_fake_dfq'))
1699 if Options.options.enable_selftest or Options.options.developer:
1700 default_shared_modules.extend(TO_LIST('vfs_fake_acls vfs_nfs4acl_xattr'))
1702 if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
1703 default_static_modules.extend(TO_LIST('pdb_samba_dsdb auth_samba4 vfs_dfs_samba4'))
1704 default_shared_modules.extend('vfs_posix_eadb')
1706 if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
1707 default_shared_modules.extend(TO_LIST('vfs_zfsacl'))
1709 if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
1710 default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort'))
1712 if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
1713 default_shared_modules.extend(TO_LIST('vfs_fileid'))
1715 if (conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS')):
1716 default_shared_modules.extend(TO_LIST('vfs_aio_fork'))
1718 if Options.options.with_pthreadpool:
1719 default_shared_modules.extend(TO_LIST('vfs_aio_pthread'))
1721 if conf.CONFIG_SET('HAVE_LINUX_KERNEL_AIO'):
1722 default_shared_modules.extend(TO_LIST('vfs_aio_linux'))
1724 if conf.CONFIG_SET('HAVE_LDAP'):
1725 default_static_modules.extend(TO_LIST('pdb_ldapsam idmap_ldap'))
1727 if conf.CONFIG_SET('DARWINOS'):
1728 default_static_modules.extend(TO_LIST('charset_macosxfs'))
1730 if conf.CONFIG_SET('HAVE_GPFS'):
1731 default_shared_modules.extend(TO_LIST('vfs_gpfs'))
1733 if (conf.CONFIG_SET('HAVE_LINUX_IOCTL')
1734 and conf.CONFIG_SET('HAVE_BASENAME') and conf.CONFIG_SET('HAVE_DIRNAME')):
1735 default_shared_modules.extend(TO_LIST('vfs_btrfs'))
1737 if conf.CONFIG_SET("HAVE_CEPH"):
1738 default_shared_modules.extend(TO_LIST('vfs_ceph'))
1740 if conf.CONFIG_SET('HAVE_GLUSTERFS'):
1741 default_shared_modules.extend(TO_LIST('vfs_glusterfs'))
1743 if conf.CONFIG_SET('HAVE_VXFS'):
1744 default_shared_modules.extend(TO_LIST('vfs_vxfs'))
1746 if conf.CONFIG_SET('HAVE_DBUS'):
1747 default_shared_modules.extend(TO_LIST('vfs_snapper'))
1749 explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
1750 explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
1752 def replace_list_item(lst, item, value):
1753 try:
1754 idx = lst.index(item)
1755 lst[idx] = value
1756 except:
1757 pass
1758 # PDB module file name should have the same name as module registers itself
1759 # In Autoconf build we export LDAP passdb module as ldapsam but WAF build
1760 # was always exporting pdb_ldap. In order to support existing packages
1761 # allow referring to pdb_ldapsam as pdb_ldap but use proper name internally.
1762 replace_list_item(explicit_shared_modules, 'pdb_ldap', 'pdb_ldapsam')
1763 replace_list_item(explicit_static_modules, 'pdb_ldap', 'pdb_ldapsam')
1765 final_static_modules = []
1766 final_static_modules.extend(TO_LIST(required_static_modules))
1767 final_shared_modules = []
1769 if '!FORCED' not in explicit_static_modules:
1770 final_static_modules.extend(TO_LIST(forced_static_modules))
1771 if '!FORCED' not in explicit_shared_modules:
1772 final_shared_modules.extend(TO_LIST(forced_shared_modules))
1773 if '!DEFAULT' not in explicit_static_modules:
1774 final_static_modules.extend(TO_LIST(default_static_modules))
1775 if '!DEFAULT' not in explicit_shared_modules:
1776 final_shared_modules.extend(TO_LIST(default_shared_modules))
1778 if 'ALL' in explicit_static_modules:
1779 for m in default_shared_modules:
1780 if m in final_shared_modules:
1781 final_shared_modules.remove(m)
1782 final_static_modules.append(m)
1783 if 'ALL' in explicit_shared_modules:
1784 for m in default_static_modules:
1785 if m in final_static_modules:
1786 final_static_modules.remove(m)
1787 final_shared_modules.append(m)
1789 for m in explicit_static_modules:
1790 if m in ['ALL','!DEFAULT','!FORCED']:
1791 continue
1792 if m.startswith('!'):
1793 m = m[1:]
1794 if m in required_static_modules:
1795 raise Utils.WafError('These modules are REQUIRED as static modules: %s' %
1796 ' '.join(required_static_modules))
1797 if m in final_static_modules:
1798 final_static_modules.remove(m)
1799 continue
1800 if m in forced_shared_modules:
1801 raise Utils.WafError('These modules MUST be configured as shared modules: %s' %
1802 ' '.join(forced_shared_modules))
1803 if m in final_shared_modules:
1804 final_shared_modules.remove(m)
1805 if m not in final_static_modules:
1806 final_static_modules.append(m)
1807 for m in explicit_shared_modules:
1808 if m in ['ALL','!DEFAULT','!FORCED']:
1809 continue
1810 if m.startswith('!'):
1811 m = m[1:]
1812 if m in final_shared_modules:
1813 final_shared_modules.remove(m)
1814 continue
1815 if m in required_static_modules:
1816 raise Utils.WafError('These modules are REQUIRED as static modules: %s' %
1817 ' '.join(required_static_modules))
1818 if m in forced_static_modules:
1819 raise Utils.WafError('These module MUST be configured as static modules: %s' %
1820 ' '.join(forced_static_modules))
1821 if m in final_static_modules:
1822 final_static_modules.remove(m)
1823 if m not in final_shared_modules:
1824 final_shared_modules.append(m)
1826 conf.env['static_modules'] = final_static_modules
1827 conf.env['shared_modules'] = final_shared_modules
1829 conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
1831 static_list = {}
1832 shared_list = {}
1834 prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount', 'rpc']
1835 conf.env['MODULE_PREFIXES'] = prefixes
1836 for p in prefixes:
1837 for m in final_static_modules:
1838 if m.find(p) == 0:
1839 if not p in static_list:
1840 static_list[p] = []
1841 static_list[p].append(m)
1842 for m in final_shared_modules:
1843 if m.find(p) == 0:
1844 if not p in shared_list:
1845 shared_list[p] = []
1846 shared_list[p].append(m)
1848 for p in prefixes:
1849 static_env = "%s_STATIC" % p.upper()
1850 shared_env = "%s_SHARED" % p.upper()
1851 conf.env[static_env] = []
1852 conf.env[shared_env] = []
1853 if p in static_list:
1854 decl_list=""
1855 for entry in static_list[p]:
1856 decl_list += "extern NTSTATUS %s_init(void); " % entry
1857 conf.env[static_env].append('%s' % entry)
1858 decl_list = decl_list.rstrip()
1859 conf.DEFINE('static_decl_%s' % p, decl_list)
1860 conf.DEFINE('static_init_%s' % p, '{ %s_init(); }' % '_init(); '.join(static_list[p]))
1861 else:
1862 conf.DEFINE('static_decl_%s' % p, '')
1863 conf.DEFINE('static_init_%s' % p, '{}')
1864 if p in shared_list:
1865 for entry in shared_list[p]:
1866 conf.DEFINE('%s_init' % entry, 'samba_init_module')
1867 conf.env[shared_env].append('%s' % entry)
1868 Logs.info("%s: %s" % (static_env, ','.join(conf.env[static_env])))
1869 Logs.info("%s: %s" % (shared_env, ','.join(conf.env[shared_env])))
1871 conf.SAMBA_CONFIG_H('include/config.h')