winbindd: add retry to _winbind_SendToSam
[Samba.git] / source3 / wscript
blob48a9271f0021d0fb07e055d60bcdcddb55ab3988
1 #!/usr/bin/env python
3 srcdir=".."
5 import sys, os
6 from optparse import SUPPRESS_HELP
7 sys.path.insert(0, srcdir+"/buildtools/wafsamba")
8 sys.path.insert(0, "source3")
9 import wafsamba, Options, Logs, Utils, Scripting
10 import build.charset
11 import samba_utils, samba_version
12 import samba3
13 import bison, flex
15 default_prefix = Options.default_prefix = '/usr/local/samba'
17 def set_options(opt):
19 opt.add_option('--with-static-modules',
20 help=("Comma-separated list of names of modules to statically link in. "+
21 "May include !module to disable 'module'. "+
22 "Can be '!FORCED' to disable all non-required static only modules. "+
23 "Can be '!DEFAULT' to disable all modules defaulting to a static build. "+
24 "Can be 'ALL' to build all default shared modules static. "+
25 "The most specific one wins, while the order is ignored "+
26 "and --with-static-modules is evaluated before "+
27 "--with-shared-modules"),
28 action="store", dest='static_modules', default=None)
29 opt.add_option('--with-shared-modules',
30 help=("Comma-separated list of names of modules to build shared. "+
31 "May include !module to disable 'module'. "+
32 "Can be '!FORCED' to disable all non-required shared only modules. "+
33 "Can be '!DEFAULT' to disable all modules defaulting to a shared build. "+
34 "Can be 'ALL' to build all default static modules shared. "+
35 "The most specific one wins, while the order is ignored "+
36 "and --with-static-modules is evaluated before "+
37 "--with-shared-modules"),
38 action="store", dest='shared_modules', default=None)
40 opt.SAMBA3_ADD_OPTION('winbind')
41 opt.SAMBA3_ADD_OPTION('ads')
42 opt.SAMBA3_ADD_OPTION('ldap')
43 opt.SAMBA3_ADD_OPTION('cups', with_name="enable", without_name="disable")
44 opt.SAMBA3_ADD_OPTION('iprint', with_name="enable", without_name="disable")
45 opt.SAMBA3_ADD_OPTION('pam')
46 opt.SAMBA3_ADD_OPTION('quotas')
47 opt.SAMBA3_ADD_OPTION('sendfile-support')
48 opt.SAMBA3_ADD_OPTION('utmp')
49 opt.SAMBA3_ADD_OPTION('avahi', with_name="enable", without_name="disable")
50 opt.SAMBA3_ADD_OPTION('iconv')
51 opt.SAMBA3_ADD_OPTION('acl-support')
52 opt.SAMBA3_ADD_OPTION('dnsupdate')
53 opt.SAMBA3_ADD_OPTION('syslog')
54 opt.SAMBA3_ADD_OPTION('automount')
55 opt.SAMBA3_ADD_OPTION('dmapi', default=None) # None means autodetection
56 opt.SAMBA3_ADD_OPTION('fam', default=None) # None means autodetection
57 opt.SAMBA3_ADD_OPTION('profiling-data', default=False)
58 opt.SAMBA3_ADD_OPTION('libarchive', default=None)
60 opt.SAMBA3_ADD_OPTION('cluster-support', default=False)
62 opt.SAMBA3_ADD_OPTION('regedit', default=None)
64 opt.SAMBA3_ADD_OPTION('fake-kaserver',
65 help=("Include AFS fake-kaserver support"), default=False)
67 opt.add_option('--with-libcephfs',
68 help=("Directory under which libcephfs is installed"),
69 action="store", dest='libcephfs_dir', default=None)
71 opt.SAMBA3_ADD_OPTION('glusterfs', with_name="enable", without_name="disable", default=True)
72 opt.SAMBA3_ADD_OPTION('cephfs', with_name="enable", without_name="disable", default=True)
74 opt.add_option('--enable-vxfs',
75 help=("enable support for VxFS (default=no)"),
76 action="store_true", dest='enable_vxfs', default=False)
78 opt.SAMBA3_ADD_OPTION('spotlight', with_name="enable", without_name="disable", default=False)
80 def configure(conf):
81 from samba_utils import TO_LIST
83 default_static_modules = []
84 default_shared_modules = []
85 required_static_modules = []
86 forced_static_modules = []
87 forced_shared_modules = []
89 if Options.options.developer:
90 conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD')
91 conf.env.developer = True
93 if sys.platform != 'openbsd5':
94 conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
96 # We crash without vfs_default
97 required_static_modules.extend(TO_LIST('vfs_default'))
99 conf.CHECK_HEADERS('execinfo.h libexc.h libunwind.h netdb.h')
100 conf.CHECK_HEADERS('linux/falloc.h linux/ioctl.h')
102 conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod')
103 conf.CHECK_FUNCS('strtol strchr strupr chflags')
104 conf.CHECK_FUNCS('getrlimit fsync fdatasync setpgid')
105 conf.CHECK_FUNCS('setsid glob strpbrk crypt16 getauthuid')
106 conf.CHECK_FUNCS('innetgr')
107 conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf')
108 conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups syscall sysconf')
109 conf.CHECK_FUNCS('atexit grantpt posix_openpt fallocate')
110 conf.CHECK_FUNCS('fseeko setluid')
111 conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
112 conf.CHECK_FUNCS('fdopendir')
113 conf.CHECK_FUNCS('fstatat')
114 conf.CHECK_FUNCS('getpwent_r setenv clearenv strcasecmp fcvt fcvtl')
115 conf.CHECK_FUNCS('syslog vsyslog timegm setlocale')
116 conf.CHECK_FUNCS_IN('nanosleep', 'rt')
117 conf.CHECK_FUNCS('lutimes futimes utimensat futimens')
118 conf.CHECK_FUNCS('mlock munlock mlockall munlockall')
119 conf.CHECK_FUNCS('memalign posix_memalign hstrerror')
120 conf.CHECK_FUNCS('shmget')
121 conf.CHECK_FUNCS_IN('shm_open', 'rt', checklibc=True)
122 conf.CHECK_FUNCS_IN('yp_get_default_domain', 'nsl')
123 conf.CHECK_FUNCS_IN('dn_expand _dn_expand __dn_expand', 'resolv')
124 conf.CHECK_FUNCS_IN('dn_expand', 'inet')
125 conf.CHECK_DECLS('fdatasync', reverse=True)
126 conf.CHECK_DECLS('readahead', reverse=True, headers='fcntl.h')
128 if conf.CHECK_CODE('''
129 #if defined(HAVE_UNISTD_H)
130 #include <unistd.h>
131 #endif
132 long ret = splice(0,0,1,0,400,SPLICE_F_MOVE);
133 ''',
134 'HAVE_LINUX_SPLICE',
135 headers='fcntl.h'):
136 conf.CHECK_DECLS('splice', reverse=True, headers='fcntl.h')
138 # Check for inotify support (Skip if we are SunOS)
139 #NOTE: illumos provides sys/inotify.h but is not an exact match for linux
140 host_os = sys.platform
141 if host_os.rfind('sunos') == -1:
142 conf.CHECK_HEADERS('sys/inotify.h')
143 if conf.env.HAVE_SYS_INOTIFY_H:
144 conf.DEFINE('HAVE_INOTIFY', 1)
146 # Check for kernel change notify support
147 conf.CHECK_CODE('''
148 #ifndef F_NOTIFY
149 #define F_NOTIFY 1026
150 #endif
151 main() {
152 exit(fcntl(open("/tmp", O_RDONLY), F_NOTIFY, 0) == -1 ? 1 : 0);
153 }''', 'HAVE_KERNEL_CHANGE_NOTIFY', addmain=False, execute=True,
154 headers='fcntl.h signal.h',
155 msg="Checking for kernel change notify support")
157 # Check for Linux kernel oplocks
158 conf.CHECK_CODE('''
159 #include <sys/types.h>
160 #include <fcntl.h>
161 #include <signal.h>
162 #ifndef F_GETLEASE
163 #define F_GETLEASE 1025
164 #endif
165 main() {
166 exit(fcntl(open("/tmp", O_RDONLY), F_GETLEASE, 0) == -1 ? 1 : 0);
167 }''', 'HAVE_KERNEL_OPLOCKS_LINUX', addmain=False, execute=True,
168 msg="Checking for Linux kernel oplocks")
170 # Check for IRIX kernel oplock types
171 conf.CHECK_CODE('oplock_stat_t t; t.os_state = OP_REVOKE; t.os_dev = 1; t.os_ino = 1;',
172 'HAVE_KERNEL_OPLOCKS_IRIX', headers='fcntl.h',
173 msg="Checking for IRIX kernel oplock types")
175 # Check for kernel share modes
176 conf.CHECK_CODE('''
177 #include <sys/types.h>
178 #include <fcntl.h>
179 #include <signal.h>
180 #include <sys/file.h>
181 #ifndef LOCK_MAND
182 #define LOCK_MAND 32
183 #define LOCK_READ 64
184 #endif
185 main() {
186 exit(flock(open("/dev/null", O_RDWR), LOCK_MAND|LOCK_READ) != 0);
187 }''', 'HAVE_KERNEL_SHARE_MODES', addmain=False, execute=True,
188 msg="Checking for kernel share modes")
190 # check for fam libs
191 samba_fam_libs=None
192 check_for_fam=False
193 if Options.options.with_fam is None:
194 check_for_fam=True
195 elif Options.options.with_fam == True:
196 check_for_fam=True
198 if check_for_fam and conf.CHECK_HEADERS('fam.h'):
199 if conf.CHECK_FUNCS_IN('FAMOpen2', 'fam'):
200 samba_fam_libs='fam'
201 elif conf.CHECK_FUNCS_IN('FAMOpen2', 'fam C'):
202 samba_fam_libs='fam C'
203 conf.CHECK_TYPE('enum FAMCodes', headers='fam.h',
204 define='HAVE_FAM_H_FAMCODES_TYPEDEF',
205 msg='Checking whether enum FAMCodes is available')
206 conf.CHECK_FUNCS_IN('FAMNoExists', 'fam')
208 if samba_fam_libs is not None:
209 conf.DEFINE('SAMBA_FAM_LIBS', samba_fam_libs)
210 conf.DEFINE('HAVE_FAM', 1)
211 else:
212 if Options.options.with_fam == True:
213 conf.fatal('FAM support requested, but no suitable FAM library found')
214 elif check_for_fam:
215 Logs.warn('no suitable FAM library found')
217 # check for libarchive (tar command in smbclient)
218 # None means autodetect, True/False means enable/disable
219 conf.SET_TARGET_TYPE('archive', 'EMPTY')
220 if Options.options.with_libarchive is not False:
221 libarchive_mandatory = Options.options.with_libarchive == True
222 Logs.info("Checking for libarchive existence")
223 if conf.CHECK_HEADERS('archive.h') and conf.CHECK_LIB('archive', shlib=True):
224 conf.CHECK_FUNCS_IN('archive_read_support_filter_all archive_read_free', 'archive')
225 elif libarchive_mandatory:
226 conf.fatal('libarchive support requested, but not found')
228 # check for DMAPI libs
229 if Options.options.with_dmapi == False:
230 have_dmapi = False
231 else:
232 have_dmapi = True
233 Logs.info("Checking for DMAPI library existence")
234 samba_dmapi_lib = ''
235 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dm'):
236 samba_dmapi_lib = 'dm'
237 else:
238 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'jfsdm'):
239 samba_dmapi_lib = 'jfsdm'
240 else:
241 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dmapi'):
242 samba_dmapi_lib = 'dmapi'
243 else:
244 if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'xdsm'):
245 samba_dmapi_lib = 'xdsm'
246 # only bother to test headers and compilation when a candidate
247 # library has been found
248 if samba_dmapi_lib == '':
249 have_dmapi = False
250 broken_dmapi = "no suitable DMAPI library found"
252 if have_dmapi:
253 conf.CHECK_HEADERS('sys/dmi.h xfs/dmapi.h sys/jfsdmapi.h sys/dmapi.h dmapi.h')
254 conf.CHECK_CODE('''
255 #include <time.h> /* needed by Tru64 */
256 #include <sys/types.h> /* needed by AIX */
257 #ifdef HAVE_XFS_DMAPI_H
258 #include <xfs/dmapi.h>
259 #elif defined(HAVE_SYS_DMI_H)
260 #include <sys/dmi.h>
261 #elif defined(HAVE_SYS_JFSDMAPI_H)
262 #include <sys/jfsdmapi.h>
263 #elif defined(HAVE_SYS_DMAPI_H)
264 #include <sys/dmapi.h>
265 #elif defined(HAVE_DMAPI_H)
266 #include <dmapi.h>
267 #endif
269 /* This link test is designed to fail on IRI 6.4, but should
270 * succeed on Linux, IRIX 6.5 and AIX.
272 int main(int argc, char **argv)
274 char * version;
275 dm_eventset_t events;
276 /* This doesn't take an argument on IRIX 6.4. */
277 dm_init_service(&version);
278 /* IRIX 6.4 expects events to be a pointer. */
279 DMEV_ISSET(DM_EVENT_READ, events);
281 return 0;
283 ''',
284 'USEABLE_DMAPI_LIBRARY',
285 addmain=False,
286 execute=False,
287 lib=samba_dmapi_lib,
288 msg='Checking whether DMAPI lib '+samba_dmapi_lib+' can be used')
289 if not conf.CONFIG_SET('USEABLE_DMAPI_LIBRARY'):
290 have_dmapi = False
291 broken_dmapi = "no usable DMAPI library found"
293 if have_dmapi:
294 Logs.info("Building with DMAPI support.")
295 conf.env['dmapi_lib'] = samba_dmapi_lib
296 conf.DEFINE('USE_DMAPI', 1)
297 else:
298 if Options.options.with_dmapi == False:
299 Logs.info("Building without DMAPI support (--without-dmapi).")
300 elif Options.options.with_dmapi == True:
301 Logs.error("DMAPI support not available: " + broken_dmapi)
302 conf.fatal('DMAPI support requested but not found.');
303 else:
304 Logs.warn("Building without DMAPI support: " + broken_dmapi)
305 conf.env['dmapi_lib'] = ''
307 # Check for various members of the stat structure
308 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blocks', define='HAVE_STAT_ST_BLOCKS',
309 headers='sys/stat.h')
310 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blksize', define='HAVE_STAT_ST_BLKSIZE',
311 headers='sys/stat.h')
312 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_flags', define='HAVE_STAT_ST_FLAGS',
313 headers='sys/types.h sys/stat.h unistd.h')
315 if conf.env.HAVE_BLKCNT_T:
316 conf.CHECK_CODE('''
317 static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 4)];''',
318 'SIZEOF_BLKCNT_T_4',
319 headers='replace.h sys/types.h sys/stat.h unistd.h',
320 msg="Checking whether blkcnt_t is 32 bit")
322 # If sizeof is 4 it can't be 8
323 if conf.env.HAVE_BLKCNT_T:
324 if not conf.CONFIG_SET('SIZEOF_BLKCNT_T_4'):
325 conf.CHECK_CODE('''
326 static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 8)];''',
327 'SIZEOF_BLKCNT_T_8',
328 headers='replace.h sys/types.h sys/stat.h unistd.h',
329 msg="Checking whether blkcnt_t is 64 bit")
331 # Check for POSIX capability support
332 conf.CHECK_FUNCS_IN('cap_get_proc', 'cap', headers='sys/capability.h')
334 if conf.env.HAVE_SYS_CAPABILITY_H:
335 conf.CHECK_CODE('''
336 cap_t cap;
337 cap_value_t vals[1];
338 if (!(cap = cap_get_proc())) exit(1);
339 vals[0] = CAP_CHOWN;
340 cap_set_flag(cap, CAP_INHERITABLE, 1, vals, CAP_CLEAR);
341 cap_set_proc(cap);''',
342 'HAVE_POSIX_CAPABILITIES', execute=True, lib="cap",
343 headers='sys/capability.h',
344 msg="Checking whether POSIX capabilities are available")
346 conf.CHECK_CODE('int i;', 'BROKEN_NISPLUS_INCLUDE_FILES',
347 headers='sys/types.h sys/acl.h rpcsvc/nis.h',
348 msg="Checking for broken nisplus include files")
350 # Check if the compiler will optimize out functions
351 conf.CHECK_CODE('''
352 #include <sys/types.h>
353 size_t __unsafe_string_function_usage_here_size_t__(void);
354 #define CHECK_STRING_SIZE(d, len) (sizeof(d) != (len) && sizeof(d) != sizeof(char *))
355 static size_t push_string_check_fn(void *dest, const char *src, size_t dest_len) {
356 return 0;
359 #define push_string_check(dest, src, dest_len) \
360 (CHECK_STRING_SIZE(dest, dest_len) \
361 ? __unsafe_string_function_usage_here_size_t__() \
362 : push_string_check_fn(dest, src, dest_len))
364 int main(int argc, char **argv) {
365 char outbuf[1024];
366 char *p = outbuf;
367 const char *foo = "bar";
368 p += 31 + push_string_check(p + 31, foo, sizeof(outbuf) - (p + 31 - outbuf));
369 return 0;
370 }''', 'HAVE_COMPILER_WILL_OPTIMIZE_OUT_FNS',
371 addmain=False,
372 add_headers=False,
373 msg="Checking if the compiler will optimize out functions")
375 # Check if the compiler supports the LL suffix on long long integers
376 # AIX needs this
377 conf.CHECK_CODE('long long i = 0x8000000000LL', 'COMPILER_SUPPORTS_LL',
378 headers='stdio.h',
379 msg="Checking for LL suffix on long long integers")
381 conf.CHECK_FUNCS('''
382 _acl __acl atexit
383 _chdir __chdir chflags chmod _close __close _closedir
384 __closedir crypt16 devnm dirfd
385 DNSServiceRegister _dup __dup _dup2 __dup2 endmntent execl
386 _facl __facl _fchdir
387 __fchdir fchmod fchown _fcntl __fcntl fcvt fcvtl fdatasync
388 _fork __fork fseeko
389 fsetxattr _fstat __fstat fsync
390 futimens futimes __fxstat getauthuid
391 getcwd _getcwd __getcwd getdents __getdents getdirentries
392 getgrent getgrnam getgrouplist getgrset getmntent getpagesize
393 getpwanam getpwent_r getrlimit
394 glob grantpt hstrerror initgroups innetgr
395 llseek _llseek __llseek _lseek __lseek
396 _lstat __lstat lutimes
397 __lxstat memalign mknod mlock mlockall munlock munlockall
398 _open __open _opendir __opendir
399 pathconf poll
400 posix_memalign pread _pread __pread
401 pwrite _pwrite __pwrite
402 rdchk _read __read _readdir __readdir
403 _seekdir __seekdir
404 select setenv setgidx setgroups setlocale setluid
405 setmntent setpgid setpriv setsid setuidx
406 shmget shm_open
407 _stat __stat statvfs
408 strcasecmp strchr strpbrk strsignal strtol strupr sysconf sysctl sysctlbyname
409 __sys_llseek syslog _telldir __telldir timegm
410 utimensat vsyslog _write __write __xstat
411 ''')
413 conf.CHECK_SAMBA3_CHARSET() # see build/charset.py
415 # FIXME: these should be tests for features, but the old build system just
416 # checks for OSes.
417 host_os = sys.platform
418 Logs.info("building on %s" % host_os)
420 # Python doesn't have case switches... :/
421 # FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
422 # the search for .rfind('gnu') covers gnu* and *-gnu is that too broad?
424 conf.SET_TARGET_TYPE('sunacl', 'EMPTY')
425 if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('qnx') > -1):
426 if host_os.rfind('linux') > -1:
427 conf.DEFINE('LINUX', '1')
428 elif host_os.rfind('qnx') > -1:
429 conf.DEFINE('QNX', '1')
430 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
431 elif (host_os.rfind('darwin') > -1):
432 conf.DEFINE('DARWINOS', 1)
433 conf.ADD_CFLAGS('-fno-common')
434 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
435 elif (host_os.rfind('freebsd') > -1):
436 conf.DEFINE('FREEBSD', 1)
437 if conf.CHECK_HEADERS('sunacl.h'):
438 conf.DEFINE('HAVE_FREEBSD_SUNACL_H', '1')
439 conf.CHECK_FUNCS_IN(['acl'], 'sunacl')
440 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
441 elif (host_os.rfind('irix') > -1):
442 conf.DEFINE('IRIX', 1)
443 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
444 elif (host_os.rfind('aix') > -1):
445 conf.DEFINE('AIX', 1)
446 conf.DEFINE('STAT_ST_BLOCKSIZE', 'DEV_BSIZE')
447 elif (host_os.rfind('hpux') > -1):
448 conf.DEFINE('HPUX', 1)
449 conf.DEFINE('STAT_ST_BLOCKSIZE', '8192')
450 elif (host_os.rfind('osf') > -1):
451 conf.DEFINE('OSF1', 1)
452 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
454 # FIXME: Add more checks here.
455 else:
456 conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
458 if Options.options.with_acl_support:
459 if (host_os.rfind('hpux') > -1):
460 Logs.info('Using HPUX ACLs')
461 conf.DEFINE('HAVE_HPUX_ACLS',1)
462 conf.DEFINE('POSIX_ACL_NEEDS_MASK',1)
463 default_static_modules.extend(TO_LIST('vfs_hpuxacl'))
464 elif (host_os.rfind('aix') > -1):
465 Logs.info('Using AIX ACLs')
466 conf.DEFINE('HAVE_AIX_ACLS',1)
467 default_static_modules.extend(TO_LIST('vfs_aixacl vfs_aixacl2'))
468 elif (host_os.rfind('darwin') > -1):
469 Logs.warn('ACLs on Darwin currently not supported')
470 conf.fatal("ACL support not available on Darwin/MacOS. "
471 "Use --without-acl-support for building without "
472 "ACL support. "
473 "ACL support is required to change permissions "
474 "from Windows clients.")
475 else:
476 conf.CHECK_FUNCS_IN(['acl_get_file'], 'acl')
477 if conf.CHECK_CODE('''
478 acl_t acl;
479 int entry_id;
480 acl_entry_t *entry_p;
481 return acl_get_entry(acl, entry_id, entry_p);
482 ''',
483 'HAVE_POSIX_ACLS',
484 headers='sys/types.h sys/acl.h', link=False,
485 msg="Checking for POSIX ACL support") :
486 conf.CHECK_CODE('''
487 acl_permset_t permset_d;
488 acl_perm_t perm;
489 return acl_get_perm_np(permset_d, perm);
490 ''',
491 'HAVE_ACL_GET_PERM_NP',
492 headers='sys/types.h sys/acl.h', link=True,
493 msg="Checking whether acl_get_perm_np() is available")
494 # source3/lib/sysacls.c calls posixacl_sys_acl_get_file()
495 required_static_modules.extend(TO_LIST('vfs_posixacl'))
496 conf.CHECK_VARIABLE('ACL_EVERYONE', headers='sys/acl.h')
497 elif conf.CHECK_FUNCS_IN(['facl'], 'sec'):
498 Logs.info('Using solaris or UnixWare ACLs')
499 conf.DEFINE('HAVE_SOLARIS_UNIXWARE_ACLS',1)
500 default_static_modules.extend(TO_LIST('vfs_solarisacl'))
501 elif conf.CHECK_FUNCS_IN(['acl_get_fd'], 'pacl'):
502 Logs.info('Using Tru64 ACLs')
503 conf.DEFINE('HAVE_TRU64_ACLS',1)
504 default_static_modules.extend(TO_LIST('vfs_tru64acl'))
505 else:
506 conf.fatal("ACL support not found. Try installing libacl1-dev "
507 "or libacl-devel. "
508 "Otherwise, use --without-acl-support to build "
509 "without ACL support. "
510 "ACL support is required to change permissions from "
511 "Windows clients.")
513 if conf.CHECK_FUNCS('dirfd'):
514 conf.DEFINE('HAVE_DIRFD_DECL', 1)
516 conf.CHECK_CODE('struct statfs fsd; fsid_t fsid = fsd.f_fsid; return statfs(".", &fsd);',
517 'HAVE_STATFS_F_FSID',
518 msg="vfs_fileid checking for statfs() and struct statfs.f_fsid",
519 headers='sys/types.h sys/statfs.h',
520 execute=True)
522 if conf.CONFIG_SET('HAVE_FALLOCATE'):
523 conf.CHECK_CODE('''
524 int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''',
525 'HAVE_LINUX_FALLOCATE',
526 msg="Checking whether the Linux 'fallocate' function is available",
527 headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
528 conf.CHECK_CODE('''
529 int ret = fallocate(0, FALLOC_FL_PUNCH_HOLE, 0, 10);''',
530 'HAVE_FALLOC_FL_PUNCH_HOLE',
531 msg="Checking whether Linux 'fallocate' supports hole-punching",
532 headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
534 conf.CHECK_CODE('''
535 int ret = lseek(0, 0, SEEK_HOLE);
536 ret = lseek(0, 0, SEEK_DATA);''',
537 'HAVE_LSEEK_HOLE_DATA',
538 msg="Checking whether lseek supports hole/data seeking",
539 headers='unistd.h sys/types.h')
541 conf.CHECK_CODE('''
542 ssize_t err = readahead(0,0,0x80000);''',
543 'HAVE_LINUX_READAHEAD',
544 msg="Checking whether Linux readahead is available",
545 headers='unistd.h fcntl.h')
546 conf.CHECK_DECLS('readahead', headers='fcntl.h', always=True)
548 conf.CHECK_CODE('int fd = openat(AT_FDCWD, ".", O_RDONLY);',
549 'HAVE_OPENAT',
550 msg='Checking for openat',
551 headers='fcntl.h')
553 conf.CHECK_CODE('''
554 struct msghdr msg;
555 union {
556 struct cmsghdr cm;
557 char control[CMSG_SPACE(sizeof(int))];
558 } control_un;
559 msg.msg_control = control_un.control;
560 msg.msg_controllen = sizeof(control_un.control);
561 ''',
562 'HAVE_STRUCT_MSGHDR_MSG_CONTROL',
563 msg='Checking if we can use msg_control for passing file descriptors',
564 headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
565 conf.CHECK_CODE('''
566 struct msghdr msg;
567 int fd;
568 msg.msg_accrights = (caddr_t) &fd;
569 msg.msg_accrightslen = sizeof(fd);
570 ''',
571 'HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS',
572 msg='Checking if we can use msg_accrights for passing file descriptors',
573 headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
575 if Options.options.with_winbind:
576 conf.env.build_winbind = True
577 conf.DEFINE('WITH_WINBIND', '1')
579 conf.find_program('awk', var='AWK')
581 conf.CHECK_HEADERS('asm/types.h')
583 conf.CHECK_CODE('dev_t dev; int i = major(dev); return 0', "HAVE_DEVICE_MAJOR_FN",
584 headers='unistd.h sys/types.h',
585 msg="Checking for major macro")
587 conf.CHECK_CODE('dev_t dev; int i = minor(dev); return 0', "HAVE_DEVICE_MINOR_FN",
588 headers='unistd.h sys/types.h',
589 msg="Checking for minor macro")
591 conf.CHECK_STRUCTURE_MEMBER('struct dirent', 'd_off',
592 headers='unistd.h sys/types.h dirent.h',
593 define='HAVE_DIRENT_D_OFF')
595 conf.CHECK_FUNCS('setnetgrent getnetgrent endnetgrent')
596 if conf.CHECK_CFLAGS('-Werror-implicit-function-declaration'):
597 netgrent_cflags = '-Werror-implicit-function-declaration'
598 else:
599 netgrent_cflags = ''
600 conf.CHECK_CODE('setnetgrent("foo")', 'HAVE_SETNETGRENT_PROTOTYPE',
601 msg="Checking for setnetgrent prototype",
602 headers='netdb.h netgroup.h',
603 cflags=netgrent_cflags)
604 conf.CHECK_CODE('getnetgrent', 'HAVE_GETNETGRENT_PROTOTYPE',
605 msg="Checking for getnetgrent prototype",
606 headers='netdb.h netgroup.h',
607 cflags=netgrent_cflags)
608 conf.CHECK_CODE('endnetgrent', 'HAVE_ENDNETGRENT_PROTOTYPE',
609 msg="Checking for endnetgrent prototype",
610 headers='netdb.h netgroup.h',
611 cflags=netgrent_cflags)
613 if (conf.CONFIG_SET('HAVE_YP_GET_DEFAULT_DOMAIN') and
614 conf.CONFIG_SET('HAVE_SETNETGRENT') and
615 conf.CONFIG_SET('HAVE_ENDNETGRENT') and
616 conf.CONFIG_SET('HAVE_GETNETGRENT')):
617 conf.DEFINE('HAVE_NETGROUP', '1')
619 # Look for CUPS
620 if Options.options.with_cups:
621 conf.find_program('cups-config', var='CUPS_CONFIG')
622 if conf.env.CUPS_CONFIG:
623 # we would normally use --libs here, but cups-config incorrectly adds
624 # gssapi_krb5 and other libraries to its --libs output. That breaks the use
625 # of an in-tree heimdal kerberos
626 conf.CHECK_CFG(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags",
627 package="", uselib_store="CUPS")
628 conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups')
629 conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', 'cups')
630 if conf.CONFIG_SET('HAVE_CUPS_CUPS_H') and conf.CONFIG_SET('HAVE_CUPS_LANGUAGE_H'):
631 conf.DEFINE('HAVE_CUPS', '1')
632 else:
633 conf.undefine('HAVE_CUPS')
634 conf.SET_TARGET_TYPE('cups', 'EMPTY')
635 else:
636 # define an empty subsystem for cups, to allow it to be used as an empty dependency
637 conf.SET_TARGET_TYPE('cups', 'EMPTY')
639 if Options.options.with_iprint:
640 if conf.CONFIG_SET('HAVE_CUPS'):
641 conf.DEFINE('HAVE_IPRINT', '1')
642 else:
643 Logs.warn("--enable-iprint=yes but cups support not sufficient")
644 if Options.options.with_syslog:
645 conf.DEFINE('WITH_SYSLOG', '1')
646 if Options.options.with_automount:
647 conf.DEFINE('WITH_AUTOMOUNT', '1')
649 # Check for LDAP
650 if Options.options.with_ldap:
651 conf.CHECK_HEADERS('ldap.h lber.h ldap_pvt.h')
652 conf.CHECK_TYPE('ber_tag_t', 'unsigned int', headers='ldap.h lber.h')
653 conf.CHECK_FUNCS_IN('ber_scanf ber_sockbuf_add_io', 'lber')
654 conf.CHECK_VARIABLE('LDAP_OPT_SOCKBUF', headers='ldap.h')
656 # if we LBER_OPT_LOG_PRINT_FN we can intercept ldap logging and print it out
657 # for the samba logs
658 conf.CHECK_VARIABLE('LBER_OPT_LOG_PRINT_FN',
659 define='HAVE_LBER_LOG_PRINT_FN', headers='lber.h')
661 conf.CHECK_FUNCS_IN('ldap_init ldap_init_fd ldap_initialize ldap_set_rebind_proc', 'ldap')
662 conf.CHECK_FUNCS_IN('ldap_add_result_entry', 'ldap')
664 # Check if ldap_set_rebind_proc() takes three arguments
665 if conf.CHECK_CODE('ldap_set_rebind_proc(0, 0, 0)',
666 'LDAP_SET_REBIND_PROC_ARGS',
667 msg="Checking whether ldap_set_rebind_proc takes 3 arguments",
668 headers='ldap.h lber.h', link=False):
669 conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '3')
670 else:
671 conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '2')
673 # last but not least, if ldap_init() exists, we want to use ldap
674 if conf.CONFIG_SET('HAVE_LDAP_INIT') and conf.CONFIG_SET('HAVE_LDAP_H'):
675 conf.DEFINE('HAVE_LDAP', '1')
676 conf.DEFINE('LDAP_DEPRECATED', '1')
677 conf.env['HAVE_LDAP'] = '1'
678 # if ber_sockbuf_add_io() and LDAP_OPT_SOCKBUF are available, we can add
679 # SASL wrapping hooks
680 if conf.CONFIG_SET('HAVE_BER_SOCKBUF_ADD_IO') and \
681 conf.CONFIG_SET('HAVE_LDAP_OPT_SOCKBUF'):
682 conf.DEFINE('HAVE_LDAP_SASL_WRAPPING', '1')
683 else:
684 conf.fatal("LDAP support not found. "
685 "Try installing libldap2-dev or openldap-devel. "
686 "Otherwise, use --without-ldap to build without "
687 "LDAP support. "
688 "LDAP support is required for the LDAP passdb backend, "
689 "LDAP idmap backends and ADS. "
690 "ADS support improves communication with "
691 "Active Directory domain controllers.")
692 else:
693 conf.SET_TARGET_TYPE('ldap', 'EMPTY')
694 conf.SET_TARGET_TYPE('lber', 'EMPTY')
696 if Options.options.with_ads == False:
697 use_ads = False
698 use_ads_krb5 = False
699 use_ads_ldap = False
700 else:
701 use_ads = True
702 use_ads_krb5 = True
703 use_ads_ldap = True
704 if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
705 not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
706 Logs.warn("arcfour-hmac-md5 encryption type not found in -lkrb5")
707 use_ads_krb5 = False
708 if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
709 Logs.warn("krb5_mk_req_extended not found in -lkrb5")
710 use_ads_krb5 = False
711 if not conf.CONFIG_SET('HAVE_KRB5_GET_HOST_REALM'):
712 Logs.warn("krb5_get_host_realm not found in -lkrb5")
713 use_ads_krb5 = False
714 if not conf.CONFIG_SET('HAVE_KRB5_FREE_HOST_REALM'):
715 Logs.warn("krb5_free_host_realm not found in -lkrb5")
716 use_ads_krb5 = False
717 if not conf.CONFIG_SET('HAVE_KRB5_FWD_TGT_CREDS'):
718 Logs.warn("krb5_fwd_tgt_creds found in -lkrb5")
719 use_ads_krb5 = False
720 if not conf.CONFIG_SET('HAVE_KRB5_GET_INIT_CREDS_OPT_ALLOC'):
721 Logs.warn("krb5_get_init_creds_opt_alloc not found in -lkrb5")
722 use_ads_krb5 = False
723 if not conf.CONFIG_SET('KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT'):
724 Logs.warn("krb5_get_init_creds_opt_free was not found or was too old in -lkrb5")
725 use_ads_krb5 = False
726 if not conf.CONFIG_SET('HAVE_KRB5_GET_RENEWED_CREDS'):
727 Logs.warn("krb5_get_renewed_creds not found in -lkrb5")
728 use_ads_krb5 = False
729 if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL_COMPARE_ANY_REALM'):
730 Logs.warn("krb5_principal_compare_any_realm not found in -lkrb5")
731 use_ads_krb5 = False
732 if not conf.CONFIG_SET('HAVE_KRB5_C_STRING_TO_KEY') and \
733 not conf.CONFIG_SET('HAVE_KRB5_STRING_TO_KEY_SALT'):
734 Logs.warn("krb5_c_string_to_key not found in -lkrb5")
735 use_ads_krb5 = False
736 if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
737 not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
738 Logs.warn("no CREATE_KEY_FUNCTIONS detected")
739 use_ads_krb5 = False
740 if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
741 not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
742 Logs.warn("no GET_ENCTYPES_FUNCTIONS detected")
743 use_ads_krb5 = False
744 if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
745 not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
746 Logs.warn("no KT_FREE_FUNCTION detected")
747 use_ads_krb5 = False
748 if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM'):
749 Logs.warn("krb5_c_verify_checksum_compare not found in -lkrb5")
750 use_ads_krb5 = False
752 # We don't actually use
753 # gsskrb5_extract_authz_data_from_sec_context, but it is a
754 # clue that this Heimdal, which does the PAC processing we
755 # need on the standard gss_inquire_sec_context_by_oid
756 if not conf.CONFIG_SET('HAVE_GSS_GET_NAME_ATTRIBUTE') and \
757 not (conf.CONFIG_SET('HAVE_GSSKRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT') and \
758 conf.CONFIG_SET('HAVE_GSS_INQUIRE_SEC_CONTEXT_BY_OID')):
759 Logs.warn("need either gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support")
760 use_ads_krb5 = False
762 if not conf.CONFIG_SET('HAVE_GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT'):
763 Logs.warn("need gss_krb5_export_lucid_sec_context for SPNEGO and gss_wrap support")
764 use_ads_krb5 = False
766 if use_ads_krb5:
767 conf.DEFINE('HAVE_KRB5', '1')
768 conf.env['HAVE_KRB5'] = '1'
769 else:
770 conf.undefine('HAVE_KRB5_H')
771 conf.undefine('HAVE_GSSAPI_H')
772 conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
773 conf.undefine('HAVE_GSSAPI_GSSAPI_H')
774 use_ads = False
776 if not conf.CONFIG_SET('HAVE_LDAP'):
777 use_ads = False
778 use_ads_ldap = False
780 if use_ads:
781 conf.DEFINE('WITH_ADS', '1')
782 conf.env['HAVE_ADS'] = '1'
783 Logs.info("Building with Active Directory support.")
784 # these have broken dependencies
785 forced_shared_modules.extend(TO_LIST('idmap_ad idmap_rfc2307'))
786 elif Options.options.with_ads == False:
787 Logs.info("Building without Active Directory support (--without-ads).")
788 else:
789 if not use_ads_krb5:
790 Logs.warn("Active Directory support not available: krb5 libs don't have all required features")
791 if not use_ads_ldap:
792 Logs.warn("Active Directory support not available: LDAP support is not available.")
793 if Options.options.with_ads:
794 conf.fatal("Active Directory support not found. Use --without-ads "
795 "for building without Active Directory support. "
796 "ADS support improves communication with "
797 "Active Directory domain controllers.")
798 else:
799 # this is the auto-mode case
800 Logs.warn("Building without Active Directory support.")
803 if Options.options.with_utmp:
804 conf.env.with_utmp = True
805 if not conf.CHECK_HEADERS('utmp.h'): conf.env.with_utmp = False
806 conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent')
807 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_name', headers='utmp.h',
808 define='HAVE_UT_UT_NAME')
809 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_user', headers='utmp.h',
810 define='HAVE_UT_UT_USER')
811 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_id', headers='utmp.h',
812 define='HAVE_UT_UT_ID')
813 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_host', headers='utmp.h',
814 define='HAVE_UT_UT_HOST')
815 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_time', headers='utmp.h',
816 define='HAVE_UT_UT_TIME')
817 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_tv', headers='utmp.h',
818 define='HAVE_UT_UT_TV')
819 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_type', headers='utmp.h',
820 define='HAVE_UT_UT_TYPE')
821 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_pid', headers='utmp.h',
822 define='HAVE_UT_UT_PID')
823 conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_exit.e_exit', headers='utmp.h',
824 define='HAVE_UT_UT_EXIT')
825 conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_syslen', headers='utmpx.h',
826 define='HAVE_UX_UT_SYSLEN')
827 conf.CHECK_CODE('struct utmp utarg; struct utmp *utreturn; utreturn = pututline(&utarg);',
828 'PUTUTLINE_RETURNS_UTMP', headers='utmp.h',
829 msg="Checking whether pututline returns pointer")
830 conf.CHECK_SIZEOF(['((struct utmp *)NULL)->ut_line'], headers='utmp.h',
831 define='SIZEOF_UTMP_UT_LINE', critical=False)
832 if not conf.CONFIG_SET('SIZEOF_UTMP_UT_LINE'):
833 conf.env.with_utmp = False
834 elif int(conf.env.SIZEOF_UTMP_UT_LINE) < 15:
835 conf.env.with_utmp = False
836 if conf.env.with_utmp:
837 conf.DEFINE('WITH_UTMP', 1)
838 else:
839 Logs.warn("--with-utmp but utmp support not sufficient")
841 if Options.options.with_avahi:
842 conf.env.with_avahi = True
843 if not conf.CHECK_HEADERS('avahi-common/watch.h avahi-client/client.h'): conf.env.with_avahi = False
844 if not conf.CHECK_FUNCS_IN('avahi_client_new', 'avahi-client'): conf.env.with_avahi = False
845 if not conf.CHECK_FUNCS_IN('avahi_strerror', 'avahi-common'): conf.env.with_avahi = False
846 if conf.env.with_avahi:
847 conf.DEFINE('WITH_AVAHI_SUPPORT', 1)
848 else:
849 conf.SET_TARGET_TYPE('avahi-common', 'EMPTY')
850 conf.SET_TARGET_TYPE('avahi-client', 'EMPTY')
852 if Options.options.with_iconv:
853 conf.env.with_iconv = True
854 if not conf.CHECK_FUNCS_IN('iconv_open', 'iconv', headers='iconv.h'):
855 conf.env.with_iconv = False
856 if conf.env.with_iconv:
857 conf.DEFINE('HAVE_ICONV', 1)
859 if Options.options.with_pam:
860 use_pam=True
861 conf.CHECK_HEADERS('security/pam_appl.h pam/pam_appl.h')
862 if not conf.CONFIG_SET('HAVE_SECURITY_PAM_APPL_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_APPL_H'):
863 Logs.warn("--with-pam=yes but pam_appl.h not found")
864 use_pam=False
865 conf.CHECK_FUNCS_IN('pam_get_data', 'pam')
866 conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
867 if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
868 Logs.warn("--with-pam=yes but pam_modules.h not found")
869 use_pam=False
870 conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h')
871 conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h')
872 conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam')
873 conf.CHECK_CODE('''
874 #if defined(HAVE_SECURITY_PAM_APPL_H)
875 #include <security/pam_appl.h>
876 #elif defined(HAVE_PAM_PAM_APPL_H)
877 #include <pam/pam_appl.h>
878 #endif
879 pam_set_item(0, PAM_RHOST, 0);
880 ''',
881 'HAVE_PAM_RHOST',
882 lib='pam',
883 msg="Checking whether PAM_RHOST is available");
884 conf.CHECK_CODE('''
885 #if defined(HAVE_SECURITY_PAM_APPL_H)
886 #include <security/pam_appl.h>
887 #elif defined(HAVE_PAM_PAM_APPL_H)
888 #include <pam/pam_appl.h>
889 #endif
890 pam_set_item(0, PAM_TTY, 0);
891 ''',
892 'HAVE_PAM_TTY',
893 lib='pam',
894 msg="Checking whether PAM_TTY is available");
895 conf.CHECK_CODE('''
896 #if (!defined(LINUX))
898 #define PAM_EXTERN extern
899 #if defined(HAVE_SECURITY_PAM_APPL_H)
900 #include <security/pam_appl.h>
901 #elif defined(HAVE_PAM_PAM_APPL_H)
902 #include <pam/pam_appl.h>
903 #endif
905 #endif
907 #if defined(HAVE_SECURITY_PAM_MODULES_H)
908 #include <security/pam_modules.h>
909 #elif defined(HAVE_PAM_PAM_MODULES_H)
910 #include <pam/pam_modules.h>
911 #endif
913 #if defined(HAVE_SECURITY__PAM_MACROS_H)
914 #include <security/_pam_macros.h>
915 #elif defined(HAVE_PAM__PAM_MACROS_H)
916 #include <pam/_pam_macros.h>
917 #endif
919 #ifdef HAVE_SECURITY_PAM_EXT_H
920 #include <security/pam_ext.h>
921 #endif
923 int i; i = PAM_RADIO_TYPE;
924 ''',
925 'HAVE_PAM_RADIO_TYPE',
926 lib='pam',
927 msg="Checking whether PAM_RADIO_TYPE is available");
928 if use_pam:
929 conf.DEFINE('WITH_PAM', 1)
930 conf.DEFINE('WITH_PAM_MODULES', 1)
931 else:
932 conf.fatal("PAM support is enabled but prerequisite libraries "
933 "or headers not found. Use --without-pam to disable "
934 "PAM support.");
936 seteuid = False
939 # Ensure we select the correct set of system calls on Linux.
941 if (host_os.rfind('linux') > -1):
942 conf.CHECK_CODE('''
943 #if defined(HAVE_UNISTD_H)
944 #include <unistd.h>
945 #endif
946 #include <stdlib.h>
947 #include <stdio.h>
948 #include <sys/types.h>
949 #include <errno.h>
951 #ifdef HAVE_SYS_PRIV_H
952 #include <sys/priv.h>
953 #endif
954 #ifdef HAVE_SYS_ID_H
955 #include <sys/id.h>
956 #endif
958 #if defined(HAVE_SYSCALL_H)
959 #include <syscall.h>
960 #endif
962 #if defined(HAVE_SYS_SYSCALL_H)
963 #include <sys/syscall.h>
964 #endif
966 syscall(SYS_setresuid32, -1, -1, -1);
967 syscall(SYS_setresgid32, -1, -1, -1);
968 syscall(SYS_setreuid32, -1, -1);
969 syscall(SYS_setregid32, -1, -1);
970 syscall(SYS_setuid32, -1);
971 syscall(SYS_setgid32, -1);
972 syscall(SYS_setgroups32, 0, NULL);
973 ''',
974 'USE_LINUX_32BIT_SYSCALLS',
975 msg="Checking whether Linux should use 32-bit credential calls");
977 if (conf.CONFIG_SET('USE_LINUX_32BIT_SYSCALLS')):
978 seteuid = conf.CHECK_CODE('''
979 #define AUTOCONF_TEST 1
980 #define USE_LINUX_THREAD_CREDENTIALS 1
981 #define USE_LINUX_32BIT_SYSCALLS 1
982 #include "../lib/util/setid.c"
983 #include "./lib/util_sec.c"
984 ''',
985 'USE_LINUX_THREAD_CREDENTIALS',
986 addmain=False,
987 execute=True,
988 msg="Checking whether we can use Linux thread-specific credentials with 32-bit system calls")
989 else:
990 seteuid = conf.CHECK_CODE('''
991 #define AUTOCONF_TEST 1
992 #define USE_LINUX_THREAD_CREDENTIALS 1
993 #include "../lib/util/setid.c"
994 #include "./lib/util_sec.c"
995 ''',
996 'USE_LINUX_THREAD_CREDENTIALS',
997 addmain=False,
998 execute=True,
999 msg="Checking whether we can use Linux thread-specific credentials")
1000 if not seteuid:
1001 seteuid = conf.CHECK_CODE('''
1002 #define AUTOCONF_TEST 1
1003 #define USE_SETREUID 1
1004 #include "../lib/util/setid.c"
1005 #include "./lib/util_sec.c"
1006 ''',
1007 'USE_SETREUID',
1008 addmain=False,
1009 execute=True,
1010 msg="Checking whether setreuid is available")
1011 if not seteuid:
1012 seteuid = conf.CHECK_CODE('''
1013 #define AUTOCONF_TEST 1
1014 #define USE_SETRESUID 1
1015 #include "../lib/util/setid.c"
1016 #include "./lib/util_sec.c"
1017 ''',
1018 'USE_SETRESUID',
1019 addmain=False,
1020 execute=True,
1021 msg="Checking whether setresuid is available")
1022 if not seteuid:
1023 seteuid = conf.CHECK_CODE('''
1024 #define AUTOCONF_TEST 1
1025 #define USE_SETEUID 1
1026 #include "../lib/util/setid.c"
1027 #include "./lib/util_sec.c"
1028 ''',
1029 'USE_SETEUID',
1030 addmain=False,
1031 execute=True,
1032 msg="Checking whether seteuid is available")
1033 if not seteuid:
1034 seteuid = conf.CHECK_CODE('''
1035 #define AUTOCONF_TEST 1
1036 #define USE_SETUIDX 1
1037 #include "../lib/util/setid.c"
1038 #include "./lib/util_sec.c"
1039 ''',
1040 'USE_SETUIDX',
1041 addmain=False,
1042 execute=True,
1043 mandatory=True,
1044 msg="Checking whether setuidx is available")
1045 if Options.options.with_dnsupdate:
1046 if not conf.CONFIG_SET('HAVE_KRB5'):
1047 Logs.warn("--with-dnsupdate=yes but gssapi support not sufficient")
1048 else:
1049 conf.DEFINE('WITH_DNS_UPDATES', 1)
1050 conf.CHECK_HEADERS('valgrind.h valgrind/valgrind.h valgrind/memcheck.h')
1051 if Options.options.developer:
1052 if conf.CONFIG_SET('HAVE_VALGRIND_H') or conf.CONFIG_SET('HAVE_VALGRIND_VALGRIND_H'):
1053 conf.DEFINE('VALGRIND', '1')
1055 if conf.CHECK_CODE('''
1056 #include <bits/sockaddr.h>
1057 #include <linux/netlink.h>
1058 ''',
1059 'HAVE_LINUX_NETLINK_H',
1060 msg="Checking whether Linux netlink is available"):
1062 conf.CHECK_CODE('''
1063 #include <bits/sockaddr.h>
1064 #include <linux/netlink.h>
1065 #include <linux/rtnetlink.h>
1066 ''',
1067 'HAVE_LINUX_RTNETLINK_H',
1068 msg='Checking whether Linux rtnetlink is available')
1070 conf.CHECK_CODE('''
1071 #include "../tests/fcntl_lock.c"
1072 ''',
1073 'HAVE_FCNTL_LOCK',
1074 addmain=False,
1075 execute=True,
1076 msg='Checking whether fcntl locking is available')
1078 conf.CHECK_CODE('''
1079 #include <unistd.h>
1080 #include <sys/types.h>
1081 #include <sys/stat.h>
1082 #include <fcntl.h>
1083 #include <errno.h>
1085 #define DATA "ofdtest.fcntl"
1087 int main() {
1088 struct flock lck = {
1089 .l_whence = SEEK_SET,
1090 .l_type = F_WRLCK,
1091 .l_start = 0,
1092 .l_len = 1,
1093 .l_pid = 0,
1095 int ret;
1096 int fd1;
1097 int fd2;
1098 char *testdir = getenv("TESTDIR");
1100 if (testdir) {
1101 if (chdir(testdir) != 0) {
1102 goto err;
1106 unlink(DATA);
1107 fd1 = open(DATA, O_RDWR|O_CREAT|O_EXCL, 0600);
1108 fd2 = open(DATA, O_RDWR);
1109 if (fd1 == -1 || fd2 == -1) {
1110 goto err;
1112 ret = fcntl(fd1,F_OFD_SETLKW,&lck);
1113 if (ret == -1) {
1114 goto err;
1116 ret = fcntl(fd2,F_OFD_SETLK,&lck);
1117 if (ret != -1) {
1118 goto err;
1120 if (errno != EAGAIN) {
1121 goto err;
1123 ret = fcntl(fd2,F_OFD_GETLK,&lck);
1124 if (ret == -1) {
1125 goto err;
1127 unlink(DATA);
1128 exit(0);
1129 err:
1130 unlink(DATA);
1131 exit(1);
1132 }''',
1133 'HAVE_OFD_LOCKS',
1134 addmain=False,
1135 execute=True,
1136 msg="Checking whether fcntl lock supports open file description locks")
1138 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtim.tv_nsec',
1139 define='HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') # Linux, Solaris
1140 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimensec',
1141 define='HAVE_STRUCT_STAT_ST_MTIMENSEC') # BSD, if defined _POSIX_SOURCE
1142 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimespec.tv_nsec',
1143 define='HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') # BSD, if not defined _POSIX_SOURCE
1144 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtime_n',
1145 define='HAVE_STRUCT_STAT_ST_MTIME_N') # AIX
1146 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_umtime',
1147 define='HAVE_STRUCT_STAT_ST_UMTIME') # Tru64
1148 if conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') or \
1149 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMENSEC') or \
1150 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') or \
1151 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIME_N') or \
1152 conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_UMTIME'):
1153 conf.DEFINE('HAVE_STAT_HIRES_TIMESTAMPS', '1')
1155 # recent FreeBSD, NetBSD have creation timestamps called birthtime:
1156 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtime',
1157 define='HAVE_STRUCT_STAT_ST_BIRTHTIME')
1158 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimespec.tv_nsec',
1159 define='HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC')
1160 conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimensec',
1161 define='HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC')
1163 conf.CHECK_CODE('''
1164 ssize_t err = posix_fadvise(0,0,0x80000,POSIX_FADV_WILLNEED);
1165 ''',
1166 'HAVE_POSIX_FADVISE',
1167 msg='Checking whether posix_fadvise is available',
1168 headers='unistd.h fcntl.h')
1170 for v in ['_SC_NGROUPS_MAX', '_SC_NPROC_ONLN', '_SC_NPROCESSORS_ONLN', '_SC_PAGESIZE' ]:
1171 conf.CHECK_CODE('''
1172 #include <unistd.h>
1173 return sysconf(%s) == -1 ? 1 : 0;
1174 ''' % v,
1175 'SYSCONF%s' % v,
1176 msg='Checking whether sysconf(%s) is available' % v)
1178 conf.CHECK_CODE('''
1179 #include <sys/syscall.h>
1180 #include <unistd.h>
1181 syscall(SYS_initgroups, 16, NULL, NULL, 0);
1182 ''',
1183 'HAVE_DARWIN_INITGROUPS',
1184 msg='Checking whether to use the Darwin-specific initgroups system call')
1186 conf.CHECK_CODE('''struct utimbuf tbuf; tbuf.actime = 0; tbuf.modtime = 1; exit(utime("foo.c",&tbuf));''',
1187 'HAVE_UTIMBUF',
1188 headers='sys/types.h utime.h',
1189 msg='Checking whether struct utimbuf is available')
1191 if conf.CHECK_CODE('''struct sigevent s;''',
1192 'HAVE_STRUCT_SIGEVENT',
1193 headers='sys/types.h stdlib.h stddef.h signal.h',
1194 msg='Checking whether we have the struct sigevent'):
1195 conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sival_ptr',
1196 define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIVAL_PTR',
1197 headers='signal.h');
1198 conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sigval_ptr',
1199 define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIGVAL_PTR',
1200 headers='signal.h');
1202 if os.path.exists('/proc/sys/kernel/core_pattern'):
1203 conf.DEFINE('HAVE_SYS_KERNEL_PROC_CORE_PATTERN', '1')
1205 if conf.CHECK_CODE('''
1206 #include <time.h>
1207 main() {
1208 struct tm *tm;
1209 if (sizeof(time_t) == 8) {
1210 time_t max_time = 0x7fffffffffffffffll;
1211 tm = gmtime(&max_time);
1212 /* This should fail with 32-bit tm_year. */
1213 if (tm == NULL) {
1214 /* Max time_t that works with 32-bit int tm_year in struct tm. */
1215 max_time = 67768036191676799ll;
1216 tm = gmtime(&max_time);
1217 if (tm) {
1218 exit(0);
1222 exit(1);
1223 }''',
1224 '__TIME_T_MAX',
1225 addmain=False,
1226 execute=True,
1227 msg="Checking for the maximum value of the 'time_t' type"):
1228 conf.DEFINE('TIME_T_MAX', '67768036191676799ll')
1230 conf.CHECK_CODE('''
1231 #if defined(HAVE_UNISTD_H)
1232 #include <unistd.h>
1233 #endif
1234 #include <sys/types.h>
1235 main() { dev_t dev = makedev(1,2); return 0; }
1236 ''',
1237 'HAVE_MAKEDEV',
1238 addmain=False,
1239 msg='Checking whether the macro for makedev is available')
1241 conf.CHECK_CODE('''
1242 #include <stdio.h>
1243 #include <limits.h>
1244 #include <signal.h>
1246 void exit_on_core(int ignored) {
1247 exit(1);
1250 main() {
1251 char *newpath;
1252 signal(SIGSEGV, exit_on_core);
1253 newpath = realpath("/tmp", NULL);
1254 exit((newpath != NULL) ? 0 : 1);
1256 ''',
1257 'REALPATH_TAKES_NULL',
1258 addmain=False,
1259 execute=True,
1260 msg='Checking whether the realpath function allows a NULL argument')
1262 conf.CHECK_CODE('''#include "../tests/ftruncate.c"''',
1263 'HAVE_FTRUNCATE_EXTEND',
1264 msg='Checking for ftruncate extend',
1265 addmain=False,
1266 execute=True)
1268 if Options.options.with_sendfile_support:
1269 if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('k*bsd*-gnu') > -1) or (host_os.rfind('kopensolaris*-gnu') > -1):
1270 conf.CHECK_CODE('''
1271 int tofd, fromfd;
1272 off_t offset;
1273 size_t total;
1274 ssize_t nwritten = sendfile(tofd, fromfd, &offset, total);
1275 ''',
1276 '_HAVE_SENDFILE',
1277 headers='sys/sendfile.h',
1278 msg='Checking for linux sendfile support')
1280 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1281 conf.DEFINE('HAVE_SENDFILE', '1')
1282 conf.DEFINE('LINUX_SENDFILE_API', '1')
1283 conf.DEFINE('WITH_SENDFILE', '1')
1284 elif (host_os.rfind('freebsd') > -1) or (host_os.rfind('dragonfly') > -1):
1285 conf.CHECK_CODE('''
1286 #include <sys/types.h>
1287 #include <unistd.h>
1288 #include <sys/socket.h>
1289 #include <sys/uio.h>
1290 int fromfd, tofd, ret, total=0;
1291 off_t offset, nwritten;
1292 struct sf_hdtr hdr;
1293 struct iovec hdtrl;
1294 hdr.headers = &hdtrl;
1295 hdr.hdr_cnt = 1;
1296 hdr.trailers = NULL;
1297 hdr.trl_cnt = 0;
1298 hdtrl.iov_base = NULL;
1299 hdtrl.iov_len = 0;
1300 ret = sendfile(fromfd, tofd, offset, total, &hdr, &nwritten, 0)
1301 ''',
1302 '_HAVE_SENDFILE',
1303 msg='Checking for freebsd sendfile support')
1304 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1305 conf.DEFINE('HAVE_SENDFILE', '1')
1306 conf.DEFINE('FREEBSD_SENDFILE_API', '1')
1307 conf.DEFINE('WITH_SENDFILE', '1')
1308 elif (host_os.rfind('darwin') > -1):
1309 conf.CHECK_CODE('''
1310 #include <sys/types.h>
1311 #include <sys/socket.h>
1312 #include <sys/uio.h>
1313 int fromfd, tofd, ret;
1314 off_t offset, nwritten;
1315 struct sf_hdtr hdr;
1316 struct iovec hdtrl;
1317 hdr.headers = &hdtrl;
1318 hdr.hdr_cnt = 1;
1319 hdr.trailers = (void *)0;
1320 hdr.trl_cnt = 0;
1321 hdtrl.iov_base = (void *)0;
1322 hdtrl.iov_len = 0;
1323 ret = sendfile(fromfd, tofd, offset, &nwritten, &hdr, 0);
1324 ''',
1325 '_HAVE_SENDFILE',
1326 msg='Checking for darwin sendfile support')
1327 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1328 conf.DEFINE('HAVE_SENDFILE', '1')
1329 conf.DEFINE('DARWIN_SENDFILE_API', '1')
1330 conf.DEFINE('WITH_SENDFILE', '1')
1331 elif (host_os.rfind('hpux') > -1) or (host_os.rfind('osf') > -1):
1332 conf.CHECK_CODE('''
1333 #include <sys/socket.h>
1334 #include <sys/uio.h>
1335 int fromfd, tofd;
1336 size_t total=0;
1337 struct iovec hdtrl[2];
1338 ssize_t nwritten;
1339 off_t offset;
1340 hdtrl[0].iov_base = 0;
1341 hdtrl[0].iov_len = 0;
1342 nwritten = sendfile(tofd, fromfd, offset, total, &hdtrl[0], 0);
1343 ''',
1344 '_HAVE_SENDFILE',
1345 msg='Checking for osf/hpux sendfile support')
1346 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1347 conf.DEFINE('HAVE_SENDFILE', '1')
1348 conf.DEFINE('HPUX_SENDFILE_API', '1')
1349 conf.DEFINE('WITH_SENDFILE', '1')
1350 elif (host_os.rfind('solaris') > -1):
1351 conf.CHECK_FUNCS_IN('sendfile', 'sendfilev')
1352 conf.CHECK_CODE('''
1353 #include <sys/sendfile.h>,
1354 int sfvcnt;
1355 size_t xferred;
1356 struct sendfilevec vec[2];
1357 ssize_t nwritten;
1358 int tofd;
1359 sfvcnt = 2;
1360 vec[0].sfv_fd = SFV_FD_SELF;
1361 vec[0].sfv_flag = 0;
1362 vec[0].sfv_off = 0;
1363 vec[0].sfv_len = 0;
1364 vec[1].sfv_fd = 0;
1365 vec[1].sfv_flag = 0;
1366 vec[1].sfv_off = 0;
1367 vec[1].sfv_len = 0;
1368 nwritten = sendfilev(tofd, vec, sfvcnt, &xferred);
1369 ''',
1370 '_HAVE_SENDFILEV',
1371 msg='Checking for solaris sendfilev support')
1372 if conf.CONFIG_SET('_HAVE_SENDFILEV'):
1373 conf.DEFINE('HAVE_SENDFILEV', '1')
1374 conf.DEFINE('SOLARIS_SENDFILE_API', '1')
1375 conf.DEFINE('WITH_SENDFILE', '1')
1376 elif (host_os.rfind('aix') > -1):
1377 conf.CHECK_CODE('''
1378 #include <sys/socket.h>
1379 int fromfd, tofd;
1380 size_t total=0;
1381 struct sf_parms hdtrl;
1382 ssize_t nwritten;
1383 hdtrl.header_data = 0;
1384 hdtrl.header_length = 0;
1385 hdtrl.file_descriptor = fromfd;
1386 hdtrl.file_offset = 0;
1387 hdtrl.file_bytes = 0;
1388 hdtrl.trailer_data = 0;
1389 hdtrl.trailer_length = 0;
1390 nwritten = send_file(&tofd, &hdtrl, 0);
1391 ''',
1392 '_HAVE_SENDFILE',
1393 msg='Checking for AIX send_file support')
1394 if conf.CONFIG_SET('_HAVE_SENDFILE'):
1395 conf.DEFINE('HAVE_SENDFILE', '1')
1396 conf.DEFINE('AIX_SENDFILE_API', '1')
1397 conf.DEFINE('WITH_SENDFILE', '1')
1399 # Check for getcwd allowing a NULL arg.
1400 conf.CHECK_CODE('''
1401 #include <unistd.h>
1402 main() {
1403 char *s = getcwd(NULL,0);
1404 exit(s != NULL ? 0 : 1);
1405 }''', 'GETCWD_TAKES_NULL', addmain=False, execute=True,
1406 msg="getcwd takes a NULL argument")
1409 # UnixWare 7.x has its getspnam in -lgen
1410 conf.CHECK_FUNCS_IN('getspnam', 'gen')
1411 conf.CHECK_FUNCS_IN('getspnam', 'security')
1412 conf.CHECK_FUNCS_IN('getspnam', 'sec')
1414 legacy_quota_libs = ''
1415 if Options.options.with_quotas:
1416 # For quotas on Veritas VxFS filesystems
1417 conf.CHECK_HEADERS('sys/fs/vx_quota.h')
1418 # For sys/quota.h and linux/quota.h
1419 conf.CHECK_HEADERS('sys/quota.h')
1420 # For quotas on BSD systems
1421 conf.CHECK_HEADERS('ufs/ufs/quota.h')
1422 # For quotas on Linux XFS filesystems
1423 if conf.CHECK_HEADERS('xfs/xqm.h'):
1424 conf.DEFINE('HAVE_XFS_QUOTAS', '1')
1425 else:
1426 # For Irix XFS
1427 conf.CHECK_CODE('''
1428 #include "confdefs.h"
1429 #ifdef HAVE_SYS_TYPES_H
1430 #include <sys/types.h>
1431 #endif
1432 #ifdef HAVE_ASM_TYPES_H
1433 #include <asm/types.h>
1434 #endif
1435 #include <sys/quota.h>
1436 int i = Q_XGETQUOTA;''',
1437 define='HAVE_XFS_QUOTAS',
1438 msg='for XFS QUOTA in <sys/quota.h>',
1439 execute=False,
1440 local_include=False)
1442 # For IRIX like dqb_isoftlimit instead of dqb_fsoftlimit in struc dqblk
1443 conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_fsoftlimit', define='HAVE_DQB_FSOFTLIMIT',
1444 headers='sys/quota.h')
1445 #darwin style quota bytecount
1446 conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_curbytes', define='HAVE_STRUCT_DQBLK_DQB_CURBYTES',
1447 headers='sys/quota.h')
1448 if conf.CHECK_HEADERS('rpcsvc/rquota.h', lib='tirpc'):
1449 # Optional structure member
1450 conf.CHECK_STRUCTURE_MEMBER('struct getquota_rslt', 'getquota_rslt_u',
1451 define='HAVE_GETQUOTA_RSLT_GETQUOTA_RSLT_U',
1452 headers='rpcsvc/rquota.h',
1453 lib='tirpc')
1455 # Required fucntion for NFS quote support
1456 conf.CHECK_CODE('''
1457 clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
1458 ''',
1459 headers="rpc/rpc.h rpc/types.h rpcsvc/rquota.h rpc/nettype.h rpc/xdr.h",
1460 define='HAVE_NFS_QUOTAS',
1461 msg='checking for clnt_create()',
1462 execute=True,
1463 local_include=False,
1464 lib='tirpc')
1466 if (host_os.rfind('linux') > -1):
1467 conf.DEFINE('HAVE_QUOTACTL_LINUX', '1')
1468 elif not conf.CONFIG_SET("HAVE_XFS_QUOTAS"):
1469 if not conf.CHECK_CODE('''
1470 #define HAVE_QUOTACTL_4A 1
1471 #define AUTOCONF_TEST 1
1472 #include "../tests/sysquotas.c"
1473 ''',
1474 cflags=conf.env['WERROR_CFLAGS'],
1475 define='HAVE_QUOTACTL_4A',
1476 msg='for QUOTACTL_4A: long quotactl(int cmd, char *special, qid_t id, caddr_t addr)',
1477 execute=True,
1478 addmain=False):
1480 conf.CHECK_CODE('''
1481 #define HAVE_QUOTACTL_4B 1
1482 #define AUTOCONF_TEST 1
1483 #include "../tests/sysquotas.c"
1484 ''',
1485 cflags=conf.env['WERROR_CFLAGS'],
1486 define='HAVE_QUOTACTL_4B',
1487 msg='for QUOTACTL_4B: int quotactl(const char *path, int cmd, int id, char *addr)',
1488 execute=True,
1489 addmain=False)
1491 if conf.CONFIG_SET('HAVE_QUOTACTL_LINUX') or \
1492 conf.CONFIG_SET('HAVE_QUOTACTL_4A') or \
1493 conf.CONFIG_SET('HAVE_QUOTACTL_4B') or \
1494 conf.CONFIG_SET('HAVE_XFS_QUOTAS'):
1495 conf.DEFINE('HAVE_SYS_QUOTAS', '1')
1496 conf.DEFINE('WITH_QUOTAS', '1')
1499 # check if Legacy quota code can be brought in
1500 # if standard interfaces are not supported
1502 if not conf.CONFIG_SET('WITH_QUOTAS'):
1503 if host_os.rfind('sunos5') > -1:
1504 conf.DEFINE('SUNOS5', '1')
1505 legacy_quota_libs = 'nsl'
1506 conf.CHECK_CODE('''
1507 #define WITH_QUOTAS 1
1508 #define AUTOCONF_TEST 1
1509 #include "../tests/oldquotas.c"
1510 ''',
1511 cflags=conf.env['WERROR_CFLAGS'],
1512 define='WITH_QUOTAS',
1513 lib=legacy_quota_libs,
1514 msg='Checking whether legacy quota code can be used',
1515 execute=False,
1516 addmain=False)
1517 if not conf.CONFIG_SET('WITH_QUOTAS'):
1518 legacy_quota_libs = ''
1519 conf.env['legacy_quota_libs'] = legacy_quota_libs
1522 # cluster support (CTDB)
1524 if not Options.options.with_cluster_support:
1525 Logs.info("building without cluster support (--without-cluster-support)")
1526 conf.env.with_ctdb = False
1527 else:
1528 Logs.info("building with cluster support")
1529 conf.env.with_ctdb = True
1530 conf.DEFINE('CLUSTER_SUPPORT', 1)
1532 conf.CHECK_CODE('void seekdir(DIR *d, long loc) { return; }',
1533 'SEEKDIR_RETURNS_VOID',
1534 headers='sys/types.h dirent.h',
1535 msg='Checking whether seekdir returns void')
1537 if Options.options.with_profiling_data:
1538 conf.DEFINE('WITH_PROFILE', 1);
1539 conf.CHECK_FUNCS('getrusage', headers="sys/time.h sys/resource.h")
1541 if (conf.CHECK_HEADERS('linux/ioctl.h sys/ioctl.h linux/fs.h') and
1542 conf.CHECK_DECLS('FS_IOC_GETFLAGS FS_COMPR_FL', headers='linux/fs.h')):
1543 conf.DEFINE('HAVE_LINUX_IOCTL', '1')
1545 conf.env['CCFLAGS_CEPHFS'] = "-D_FILE_OFFSET_BITS=64"
1546 if Options.options.libcephfs_dir:
1547 conf.env['CPPPATH_CEPHFS'] = Options.options.libcephfs_dir + '/include'
1548 conf.env['LIBPATH_CEPHFS'] = Options.options.libcephfs_dir + '/lib'
1549 conf.env['LIBPATH_CEPH-COMMON'] = Options.options.libcephfs_dir + '/lib/ceph'
1550 else:
1551 conf.env['LIBPATH_CEPH-COMMON'] = Options.options.LIBDIR + '/ceph'
1553 if (Options.options.with_cephfs and
1554 conf.CHECK_HEADERS('cephfs/libcephfs.h', False, False, 'cephfs') and
1555 conf.CHECK_LIB('cephfs', shlib=True)):
1556 conf.CHECK_LIB('ceph-common', shlib=True)
1557 if Options.options.with_acl_support:
1558 conf.DEFINE('HAVE_CEPH', '1')
1559 if conf.CHECK_FUNCS_IN('ceph_statx', 'cephfs ceph-common',
1560 headers='cephfs/libcephfs.h'):
1561 conf.DEFINE('HAVE_CEPH_STATX', '1')
1562 else:
1563 Logs.warn("ceph support disabled due to --without-acl-support")
1564 conf.undefine('HAVE_CEPH')
1566 if Options.options.with_glusterfs:
1567 conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 4" --cflags --libs',
1568 msg='Checking for glusterfs-api >= 4', uselib_store="GFAPI")
1569 conf.CHECK_HEADERS('glusterfs/api/glfs.h', lib='gfapi')
1570 conf.CHECK_LIB('gfapi', shlib=True)
1572 if conf.CONFIG_SET('HAVE_GLUSTERFS_API_GLFS_H'):
1573 if Options.options.with_acl_support:
1574 conf.DEFINE('HAVE_GLUSTERFS', '1')
1575 else:
1576 Logs.warn("GlusterFS support disabled due to --without-acl-support")
1577 conf.undefine('HAVE_GLUSTERFS')
1578 else:
1579 conf.undefine('HAVE_GLUSTERFS')
1581 conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 6" --cflags --libs',
1582 msg='Checking for glusterfs-api >= 6',
1583 uselib_store="GFAPI_VER_6")
1584 else:
1585 conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
1586 conf.undefine('HAVE_GLUSTERFS')
1588 if Options.options.enable_vxfs:
1589 conf.DEFINE('HAVE_VXFS', '1')
1591 if conf.CHECK_CFG(package='dbus-1', args='--cflags --libs',
1592 msg='Checking for dbus', uselib_store="DBUS-1"):
1593 if (conf.CHECK_HEADERS('dbus/dbus.h', lib='dbus-1')
1594 and conf.CHECK_LIB('dbus-1', shlib=True)):
1595 conf.DEFINE('HAVE_DBUS', '1')
1597 conf.env.build_regedit = False
1598 if not Options.options.with_regedit == False:
1599 conf.PROCESS_SEPARATE_RULE('system_ncurses')
1600 if conf.CONFIG_SET('HAVE_NCURSES'):
1601 conf.env.build_regedit = True
1603 if conf.env.build_regedit:
1604 Logs.info("building regedit")
1605 else:
1606 if Options.options.with_regedit == False:
1607 Logs.info("not building regedit (--without-regedit)")
1608 elif Options.options.with_regedit == True:
1609 Logs.error("ncurses not available, cannot build regedit")
1610 conf.fatal("ncurses not available, but --with-regedit was specified")
1611 else:
1612 Logs.info("ncurses not available, not building regedit")
1614 if conf.CHECK_HEADERS('ftw.h') and conf.CHECK_FUNCS('nftw'):
1615 conf.env.build_mvxattr = True
1617 conf.CHECK_FUNCS_IN('DES_pcbc_encrypt', 'crypto')
1618 if Options.options.with_fake_kaserver == True:
1619 conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
1620 conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
1621 if (conf.CONFIG_SET('HAVE_AFS_PARAM_H') and conf.CONFIG_SET('HAVE_AFS_STDS_H') and conf.CONFIG_SET('HAVE_DES_PCBC_ENCRYPT')):
1622 conf.DEFINE('WITH_FAKE_KASERVER', '1')
1623 else:
1624 conf.fatal('AFS headers not available, but --with-fake-kaserver was specified')
1626 conf.env['libtracker']=''
1627 conf.env.with_spotlight = False
1628 if Options.options.with_spotlight:
1630 Logs.info("Requested Spotlight support, checking for bison")
1631 bison.detect(conf)
1632 if not conf.env['BISON']:
1633 conf.fatal("Spotlight support requested but bison missing")
1634 conf.CHECK_COMMAND('%s --version | head -n1' % conf.env['BISON'], msg='Using bison version', define=None, on_target=False)
1635 Logs.info("Requested Spotlight support, checking for flex")
1636 flex.detect(conf)
1637 if not conf.env['FLEX']:
1638 conf.fatal("Spotlight support requested but flex missing")
1639 conf.CHECK_COMMAND('%s --version' % conf.env['FLEX'], msg='Using flex version', define=None, on_target=False)
1640 versions = ['1.0', '0.16', '0.14']
1641 for version in versions:
1642 testlib = 'tracker-sparql-' + version
1643 if conf.CHECK_CFG(package=testlib,
1644 args='--cflags --libs',
1645 mandatory=False):
1646 conf.SET_TARGET_TYPE(testlib, 'SYSLIB')
1647 conf.env['libtracker'] = testlib
1648 conf.env.with_spotlight = True
1649 conf.DEFINE('WITH_SPOTLIGHT', '1')
1650 break
1652 if not conf.env.with_spotlight:
1653 conf.fatal("Spotlight support requested but tracker-sparql library missing")
1654 Logs.info("building with Spotlight support")
1655 default_static_modules.extend(TO_LIST('rpc_mdssvc_module'))
1657 conf.CHECK_HEADERS('rpc/xdr.h', lib='tirpc')
1659 forced_static_modules.extend(TO_LIST('auth_builtin auth_sam auth_winbind'))
1660 default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam
1661 auth_unix
1662 nss_info_template idmap_tdb idmap_passdb
1663 idmap_nss'''))
1665 default_shared_modules.extend(TO_LIST('''
1666 vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit vfs_netatalk
1667 vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
1668 vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2
1669 vfs_readahead vfs_xattr_tdb
1670 vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
1671 vfs_preopen vfs_catia
1672 vfs_media_harmony vfs_unityed_media vfs_fruit vfs_shell_snap
1673 vfs_commit vfs_worm vfs_crossrename vfs_linux_xfs_sgid
1674 vfs_time_audit vfs_offline vfs_virusfilter
1675 '''))
1676 default_shared_modules.extend(TO_LIST('auth_script idmap_tdb2 idmap_script'))
1677 # these have broken dependencies
1678 forced_shared_modules.extend(TO_LIST('idmap_autorid idmap_rid idmap_hash'))
1680 if Options.options.developer:
1681 default_static_modules.extend(TO_LIST('charset_weird'))
1682 default_shared_modules.extend(TO_LIST('perfcount_test'))
1683 default_shared_modules.extend(TO_LIST('vfs_skel_opaque vfs_skel_transparent vfs_shadow_copy_test'))
1684 default_shared_modules.extend(TO_LIST('auth_skel pdb_test'))
1685 default_shared_modules.extend(TO_LIST('vfs_fake_dfq'))
1686 default_shared_modules.extend(TO_LIST('gpext_security gpext_registry gpext_scripts'))
1688 if Options.options.enable_selftest or Options.options.developer:
1689 default_shared_modules.extend(TO_LIST('vfs_fake_acls vfs_nfs4acl_xattr'))
1690 default_shared_modules.extend(TO_LIST('vfs_error_inject'))
1692 if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
1693 default_static_modules.extend(TO_LIST('pdb_samba_dsdb auth_samba4 vfs_dfs_samba4'))
1694 default_shared_modules.extend(TO_LIST('vfs_posix_eadb'))
1696 if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
1697 default_shared_modules.extend(TO_LIST('vfs_zfsacl'))
1699 if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
1700 default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort'))
1702 if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
1703 default_shared_modules.extend(TO_LIST('vfs_fileid'))
1705 if (conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS')):
1706 default_shared_modules.extend(TO_LIST('vfs_aio_fork'))
1708 if Options.options.with_pthreadpool:
1709 default_shared_modules.extend(TO_LIST('vfs_aio_pthread'))
1711 if conf.CONFIG_SET('HAVE_LDAP'):
1712 default_static_modules.extend(TO_LIST('pdb_ldapsam idmap_ldap'))
1714 if conf.CONFIG_SET('DARWINOS'):
1715 default_static_modules.extend(TO_LIST('charset_macosxfs'))
1717 if conf.CONFIG_SET('HAVE_GPFS'):
1718 default_shared_modules.extend(TO_LIST('vfs_gpfs'))
1720 if (conf.CONFIG_SET('HAVE_LINUX_IOCTL')
1721 and conf.CONFIG_SET('HAVE_BASENAME') and conf.CONFIG_SET('HAVE_DIRNAME')):
1722 default_shared_modules.extend(TO_LIST('vfs_btrfs'))
1724 if conf.CONFIG_SET("HAVE_CEPH"):
1725 default_shared_modules.extend(TO_LIST('vfs_ceph'))
1727 if conf.CONFIG_SET('HAVE_GLUSTERFS'):
1728 default_shared_modules.extend(TO_LIST('vfs_glusterfs'))
1730 if conf.CONFIG_SET('HAVE_VXFS'):
1731 default_shared_modules.extend(TO_LIST('vfs_vxfs'))
1733 if conf.CONFIG_SET('HAVE_DBUS'):
1734 default_shared_modules.extend(TO_LIST('vfs_snapper'))
1736 explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
1737 explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
1739 def replace_list_item(lst, item, value):
1740 try:
1741 idx = lst.index(item)
1742 lst[idx] = value
1743 except:
1744 pass
1745 # PDB module file name should have the same name as module registers itself
1746 # In Autoconf build we export LDAP passdb module as ldapsam but WAF build
1747 # was always exporting pdb_ldap. In order to support existing packages
1748 # allow referring to pdb_ldapsam as pdb_ldap but use proper name internally.
1749 replace_list_item(explicit_shared_modules, 'pdb_ldap', 'pdb_ldapsam')
1750 replace_list_item(explicit_static_modules, 'pdb_ldap', 'pdb_ldapsam')
1752 final_static_modules = []
1753 final_static_modules.extend(TO_LIST(required_static_modules))
1754 final_shared_modules = []
1756 if '!FORCED' not in explicit_static_modules:
1757 final_static_modules.extend(TO_LIST(forced_static_modules))
1758 if '!FORCED' not in explicit_shared_modules:
1759 final_shared_modules.extend(TO_LIST(forced_shared_modules))
1760 if '!DEFAULT' not in explicit_static_modules:
1761 final_static_modules.extend(TO_LIST(default_static_modules))
1762 if '!DEFAULT' not in explicit_shared_modules:
1763 final_shared_modules.extend(TO_LIST(default_shared_modules))
1765 if 'ALL' in explicit_static_modules:
1766 for m in default_shared_modules:
1767 if m in final_shared_modules:
1768 final_shared_modules.remove(m)
1769 final_static_modules.append(m)
1770 if 'ALL' in explicit_shared_modules:
1771 for m in default_static_modules:
1772 if m in final_static_modules:
1773 final_static_modules.remove(m)
1774 final_shared_modules.append(m)
1776 for m in explicit_static_modules:
1777 if m in ['ALL','!DEFAULT','!FORCED']:
1778 continue
1779 if m.startswith('!'):
1780 m = m[1:]
1781 if m in required_static_modules:
1782 raise Utils.WafError('These modules are REQUIRED as static modules: %s' %
1783 ' '.join(required_static_modules))
1784 if m in final_static_modules:
1785 final_static_modules.remove(m)
1786 continue
1787 if m in forced_shared_modules:
1788 raise Utils.WafError('These modules MUST be configured as shared modules: %s' %
1789 ' '.join(forced_shared_modules))
1790 if m in final_shared_modules:
1791 final_shared_modules.remove(m)
1792 if m not in final_static_modules:
1793 final_static_modules.append(m)
1794 for m in explicit_shared_modules:
1795 if m in ['ALL','!DEFAULT','!FORCED']:
1796 continue
1797 if m.startswith('!'):
1798 m = m[1:]
1799 if m in final_shared_modules:
1800 final_shared_modules.remove(m)
1801 continue
1802 if m in required_static_modules:
1803 raise Utils.WafError('These modules are REQUIRED as static modules: %s' %
1804 ' '.join(required_static_modules))
1805 if m in forced_static_modules:
1806 raise Utils.WafError('These module MUST be configured as static modules: %s' %
1807 ' '.join(forced_static_modules))
1808 if m in final_static_modules:
1809 final_static_modules.remove(m)
1810 if m not in final_shared_modules:
1811 final_shared_modules.append(m)
1813 conf.env['static_modules'] = final_static_modules
1814 conf.env['shared_modules'] = final_shared_modules
1816 conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
1818 static_list = {}
1819 shared_list = {}
1821 prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount', 'rpc']
1822 conf.env['MODULE_PREFIXES'] = prefixes
1823 for p in prefixes:
1824 for m in final_static_modules:
1825 if m.find(p) == 0:
1826 if not p in static_list:
1827 static_list[p] = []
1828 static_list[p].append(m)
1829 for m in final_shared_modules:
1830 if m.find(p) == 0:
1831 if not p in shared_list:
1832 shared_list[p] = []
1833 shared_list[p].append(m)
1835 for p in prefixes:
1836 static_env = "%s_STATIC" % p.upper()
1837 shared_env = "%s_SHARED" % p.upper()
1838 conf.env[static_env] = []
1839 conf.env[shared_env] = []
1840 if p in static_list:
1841 decl_list=""
1842 for entry in static_list[p]:
1843 decl_list += "extern NTSTATUS %s_init(TALLOC_CTX *mem_ctx); " % entry
1844 conf.env[static_env].append('%s' % entry)
1845 decl_list = decl_list.rstrip()
1846 conf.DEFINE('static_decl_%s' % p, decl_list)
1847 conf.DEFINE('static_init_%s(mem_ctx)' % p, '{ %s_init((mem_ctx)); }' % '_init((mem_ctx)); '.join(static_list[p]))
1848 else:
1849 conf.DEFINE('static_decl_%s' % p, '')
1850 conf.DEFINE('static_init_%s(mem_ctx)' % p, '{}')
1851 if p in shared_list:
1852 for entry in shared_list[p]:
1853 conf.DEFINE('%s_init' % entry, 'samba_init_module')
1854 conf.env[shared_env].append('%s' % entry)
1855 Logs.info("%s: %s" % (static_env, ','.join(conf.env[static_env])))
1856 Logs.info("%s: %s" % (shared_env, ','.join(conf.env[shared_env])))
1858 conf.SAMBA_CONFIG_H('include/config.h')