2012-05-24 17:28:31 +04:00
import Logs, Options, sys
2012-04-20 13:53:11 +04:00
# Check for kerberos
have_gssapi=False
2017-01-20 11:14:03 +03:00
krb5_min_required_version = "1.9"
# Requried versions
krb5_required_version = krb5_min_required_version
if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
krb5_required_version = "1.15.1"
def parse_version(v):
return tuple(map(int, (v.split("."))))
2012-05-21 13:45:12 +04:00
def krb5_define_syslib(conf, lib, deps):
found = 'FOUND_SYSTEMLIB_' + lib
if found in conf.env:
return
conf.SET_TARGET_TYPE(lib, 'SYSLIB')
conf.SET_SYSLIB_DEPS(lib, deps)
conf.env[found] = True
2012-05-03 13:28:50 +04:00
2012-04-20 13:53:11 +04:00
Logs.info("Looking for kerberos features")
conf.find_program('krb5-config.heimdal', var='HEIMDAL_KRB5_CONFIG')
2012-05-28 20:03:00 +04:00
if isinstance(Options.options.with_system_mitkrb5, list):
path_krb5_config = [x+'/bin' for x in Options.options.with_system_mitkrb5]
else:
path_krb5_config = None
conf.find_program('krb5-config', path_list=path_krb5_config, var='KRB5_CONFIG')
2012-04-20 13:53:11 +04:00
if conf.env.KRB5_CONFIG:
2015-03-07 17:31:19 +03:00
conf.CHECK_CFG(path=conf.env.KRB5_CONFIG, args="--cflags --libs",
2012-05-21 13:45:12 +04:00
package="", uselib_store="KRB5")
krb5_define_syslib(conf, "krb5", conf.env['LIB_KRB5'])
2016-09-07 13:29:18 +03:00
conf.CHECK_CFG(path=conf.env.KRB5_CONFIG, args="--cflags --libs",
package="kadm-server", uselib_store="KADM-SERVER")
conf.CHECK_FUNCS_IN('kadm5_init', 'kadm5srv_mit')
2014-05-09 15:44:05 +04:00
conf.CHECK_CFG(path=conf.env.KRB5_CONFIG, args="--cflags --libs",
package="kdb", uselib_store="KDB5")
krb5_define_syslib(conf, "kdb5", conf.env['LIB_KDB5'])
2015-03-07 17:31:19 +03:00
conf.CHECK_CFG(path=conf.env.KRB5_CONFIG, args="--cflags --libs",
2012-05-21 13:45:12 +04:00
package="gssapi", uselib_store="GSSAPI")
krb5_define_syslib(conf, "gssapi", conf.env['LIB_GSSAPI'])
2014-05-15 03:38:08 +04:00
if 'k5crypto' in conf.env['LIB_GSSAPI']:
krb5_define_syslib(conf, "k5crypto", conf.env['LIB_GSSAPI'])
if 'com_err' in conf.env['LIB_GSSAPI']:
krb5_define_syslib(conf, "com_err", conf.env['LIB_GSSAPI'])
2012-05-28 20:03:00 +04:00
if 'gssapi_krb5' in conf.env['LIB_GSSAPI']:
krb5_define_syslib(conf, "gssapi_krb5", conf.env['LIB_GSSAPI'])
2012-05-21 13:45:12 +04:00
2017-08-29 21:54:43 +03:00
vendor = conf.cmd_and_log("%(path)s --vendor" % dict(path=conf.env.KRB5_CONFIG)
2012-04-20 13:53:11 +04:00
conf.env.KRB5_VENDOR = vendor.strip().lower()
if conf.env.KRB5_VENDOR != 'heimdal':
conf.define('USING_SYSTEM_KRB5', 1)
del conf.env.HEIMDAL_KRB5_CONFIG
2017-08-29 21:54:43 +03:00
krb5_conf_version = conf.cmd_and_log("%(path)s --version" % dict(path=conf.env.KRB5_CONFIG)).strip()
2017-01-20 11:14:03 +03:00
krb5_version = krb5_conf_version.split()[-1]
2012-06-07 15:22:33 +04:00
# drop '-prerelease' suffix
2017-01-20 11:14:03 +03:00
if krb5_version.find('-') > 0:
krb5_version = krb5_version.split("-")[0]
if parse_version(krb5_version) < parse_version(krb5_required_version):
2017-05-02 19:09:04 +03:00
Logs.error('ERROR: The MIT KRB5 build with Samba AD requires at least %s. %s has been found and cannot be used' % (krb5_required_version, krb5_version))
Logs.error('ERROR: If you want to just build Samba FS (File Server) use the option --without-ad-dc which requires version %s' % (krb5_min_required_version))
Logs.error('ERROR: You may try to build with embedded Heimdal Kerberos by not specifying --with-system-mitkrb5')
2012-05-24 17:28:31 +04:00
sys.exit(1)
else:
2017-01-20 11:14:03 +03:00
Logs.info('MIT Kerberos %s detected, MIT krb5 build can proceed' % (krb5_version))
2012-04-20 13:53:11 +04:00
2015-03-07 17:31:19 +03:00
conf.CHECK_CFG(args="--cflags --libs", package="com_err", uselib_store="com_err")
2012-05-21 13:45:12 +04:00
conf.CHECK_FUNCS_IN('_et_list', 'com_err')
conf.CHECK_HEADERS('com_err.h', lib='com_err')
2014-05-09 15:44:05 +04:00
conf.CHECK_HEADERS('kdb.h', lib='kdb5')
2012-05-21 13:45:12 +04:00
2012-04-20 13:53:11 +04:00
conf.CHECK_HEADERS('krb5.h krb5/locate_plugin.h', lib='krb5')
2018-06-15 15:59:00 +03:00
conf.CHECK_HEADERS('krb5.h krb5/localauth_plugin.h', lib='krb5')
2015-06-22 16:18:22 +03:00
possible_gssapi_headers="gssapi.h gssapi/gssapi_generic.h gssapi/gssapi.h gssapi/gssapi_ext.h gssapi/gssapi_krb5.h gssapi/gssapi_oid.h"
conf.CHECK_HEADERS(possible_gssapi_headers, lib='gssapi')
2012-04-20 13:53:11 +04:00
conf.CHECK_FUNCS_IN('krb5_encrypt_data', 'k5crypto')
conf.CHECK_FUNCS_IN('des_set_key','crypto')
conf.CHECK_FUNCS_IN('copy_Authenticator', 'asn1')
conf.CHECK_FUNCS_IN('roken_getaddrinfo_hostspec', 'roken')
2012-05-28 20:03:00 +04:00
2014-04-29 20:14:05 +04:00
conf.CHECK_HEADERS('profile.h')
2012-05-28 20:03:00 +04:00
if conf.CHECK_FUNCS_IN('gss_display_status', 'gssapi gssapi_krb5'):
2012-04-20 13:53:11 +04:00
have_gssapi=True
2012-05-28 20:03:00 +04:00
if not have_gssapi:
2012-05-31 13:44:50 +04:00
if conf.env.KRB5_CONFIG and conf.env.KRB5_CONFIG != 'heimdal':
Logs.error("ERROR: WAF build with MIT Krb5 requires working GSSAPI implementation")
sys.exit(1)
2012-05-28 20:03:00 +04:00
2012-04-20 13:53:11 +04:00
conf.CHECK_FUNCS_IN('''
gss_wrap_iov
gss_krb5_import_cred
gss_get_name_attribute
gss_mech_krb5
gss_oid_equal
gss_inquire_sec_context_by_oid
gsskrb5_extract_authz_data_from_sec_context
gss_krb5_export_lucid_sec_context
2012-05-02 20:24:34 +04:00
gss_import_cred gss_export_cred
2017-03-03 18:08:09 +03:00
gss_acquire_cred_from
2012-05-28 20:03:00 +04:00
''', 'gssapi gssapi_krb5')
2015-06-22 16:18:22 +03:00
conf.CHECK_VARIABLE('GSS_KRB5_CRED_NO_CI_FLAGS_X', headers=possible_gssapi_headers)
2012-04-20 13:53:11 +04:00
conf.CHECK_FUNCS_IN('krb5_mk_req_extended krb5_kt_compare', 'krb5')
conf.CHECK_FUNCS('''
2016-03-02 19:36:55 +03:00
krb5_auth_con_getrecvsubkey
krb5_auth_con_getsendsubkey
2012-04-20 13:53:11 +04:00
krb5_set_default_in_tkt_etypes krb5_set_default_tgs_enctypes
krb5_set_default_tgs_ktypes krb5_principal2salt
krb5_c_string_to_key krb5_get_pw_salt krb5_string_to_key_salt krb5_auth_con_setkey
krb5_auth_con_setuseruserkey krb5_get_permitted_enctypes
krb5_get_default_in_tkt_etypes krb5_free_data_contents
krb5_principal_get_comp_string krb5_free_unparsed_name
krb5_free_keytab_entry_contents krb5_kt_free_entry krb5_krbhst_init
krb5_krbhst_get_addrinfo
krb5_crypto_init krb5_crypto_destroy
krb5_c_verify_checksum krb5_principal_compare_any_realm
krb5_parse_name_norealm krb5_princ_size krb5_get_init_creds_opt_set_pac_request
krb5_get_renewed_creds krb5_free_error_contents
initialize_krb5_error_table krb5_get_init_creds_opt_alloc
krb5_get_init_creds_opt_free krb5_get_init_creds_opt_get_error
krb5_enctype_to_string krb5_fwd_tgt_creds krb5_auth_con_set_req_cksumtype
krb5_get_creds_opt_alloc krb5_get_creds_opt_set_impersonate krb5_get_creds
2012-04-26 01:29:09 +04:00
krb5_get_credentials_for_user krb5_get_host_realm krb5_free_host_realm
2012-04-27 01:21:22 +04:00
krb5_get_init_creds_keyblock krb5_get_init_creds_keytab
2012-04-27 18:52:26 +04:00
krb5_make_principal krb5_build_principal_alloc_va
2012-05-04 19:02:48 +04:00
krb5_cc_get_lifetime krb5_cc_retrieve_cred
2016-07-24 15:47:33 +03:00
krb5_cc_copy_creds
2014-04-29 20:14:05 +04:00
krb5_free_checksum_contents krb5_c_make_checksum krb5_create_checksum
krb5_config_get_bool_default krb5_get_profile
2014-05-08 16:59:00 +04:00
krb5_data_copy
2016-08-29 12:22:29 +03:00
krb5_init_keyblock krb5_principal_set_realm krb5_principal_get_type
2015-02-10 15:13:01 +03:00
krb5_principal_set_type
2014-05-08 17:06:51 +04:00
krb5_warnx
2016-02-15 14:58:07 +03:00
krb5_get_prompt_types
2014-04-29 20:14:05 +04:00
''',
2012-04-20 13:53:11 +04:00
lib='krb5 k5crypto')
conf.CHECK_DECLS('''krb5_get_credentials_for_user
krb5_auth_con_set_req_cksumtype''',
headers='krb5.h', always=True)
conf.CHECK_VARIABLE('AP_OPTS_USE_SUBKEY', headers='krb5.h')
conf.CHECK_VARIABLE('KV5M_KEYTAB', headers='krb5.h')
conf.CHECK_VARIABLE('KRB5_KU_OTHER_CKSUM', headers='krb5.h')
conf.CHECK_VARIABLE('KRB5_KEYUSAGE_APP_DATA_CKSUM', headers='krb5.h')
conf.CHECK_VARIABLE('ENCTYPE_AES128_CTS_HMAC_SHA1_96', headers='krb5.h')
conf.CHECK_VARIABLE('ENCTYPE_AES256_CTS_HMAC_SHA1_96', headers='krb5.h')
conf.CHECK_DECLS('KRB5_PDU_NONE', reverse=True, headers='krb5.h')
conf.CHECK_STRUCTURE_MEMBER('krb5_keytab_entry', 'key', headers='krb5.h',
define='HAVE_KRB5_KEYTAB_ENTRY_KEY')
conf.CHECK_STRUCTURE_MEMBER('krb5_keytab_entry', 'keyblock', headers='krb5.h',
define='HAVE_KRB5_KEYTAB_ENTRY_KEYBLOCK')
conf.CHECK_STRUCTURE_MEMBER('krb5_address', 'magic', headers='krb5.h',
define='HAVE_MAGIC_IN_KRB5_ADDRESS')
conf.CHECK_STRUCTURE_MEMBER('krb5_address', 'addrtype', headers='krb5.h',
define='HAVE_ADDRTYPE_IN_KRB5_ADDRESS')
conf.CHECK_STRUCTURE_MEMBER('krb5_ap_req', 'ticket', headers='krb5.h',
define='HAVE_TICKET_POINTER_IN_KRB5_AP_REQ')
2015-10-02 05:23:59 +03:00
conf.CHECK_STRUCTURE_MEMBER('krb5_prompt', 'type', headers='krb5.h',
define='HAVE_KRB5_PROMPT_TYPE')
2012-04-20 13:53:11 +04:00
conf.CHECK_TYPE('krb5_encrypt_block', headers='krb5.h')
conf.CHECK_CODE('''
krb5_context ctx;
krb5_get_init_creds_opt *opt = NULL;
krb5_get_init_creds_opt_free(ctx, opt);
''',
'KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT',
headers='krb5.h', link=False,
msg="Checking whether krb5_get_init_creds_opt_free takes a context argument")
conf.CHECK_CODE('''
const krb5_data *pkdata;
krb5_context context;
krb5_principal principal;
pkdata = krb5_princ_component(context, principal, 0);
''',
'HAVE_KRB5_PRINC_COMPONENT',
headers='krb5.h', lib='krb5',
msg="Checking whether krb5_princ_component is available")
conf.CHECK_CODE('''
int main(void) {
char buf[256];
krb5_enctype_to_string(1, buf, 256);
return 0;
}''',
'HAVE_KRB5_ENCTYPE_TO_STRING_WITH_SIZE_T_ARG',
headers='krb5.h', lib='krb5 k5crypto',
2012-10-30 15:19:24 +04:00
addmain=False, cflags=conf.env['WERROR_CFLAGS'],
2012-04-20 13:53:11 +04:00
msg="Checking whether krb5_enctype_to_string takes size_t argument")
conf.CHECK_CODE('''
int main(void) {
krb5_context context = NULL;
char *str = NULL;
krb5_enctype_to_string(context, 1, &str);
if (str) free (str);
return 0;
}''',
'HAVE_KRB5_ENCTYPE_TO_STRING_WITH_KRB5_CONTEXT_ARG',
headers='krb5.h stdlib.h', lib='krb5',
2012-10-30 15:19:24 +04:00
addmain=False, cflags=conf.env['WERROR_CFLAGS'],
2012-04-20 13:53:11 +04:00
msg="Checking whether krb5_enctype_to_string takes krb5_context argument")
conf.CHECK_CODE('''
int main(void) {
krb5_context ctx = NULL;
krb5_principal princ = NULL;
const char *str = krb5_princ_realm(ctx, princ)->data;
return 0;
}''',
'HAVE_KRB5_PRINC_REALM',
headers='krb5.h', lib='krb5',
addmain=False,
msg="Checking whether the macro krb5_princ_realm is defined")
conf.CHECK_CODE('''
int main(void) {
krb5_context context;
krb5_principal principal;
const char *realm; realm = krb5_principal_get_realm(context, principal);
return 0;
}''',
'HAVE_KRB5_PRINCIPAL_GET_REALM',
headers='krb5.h', lib='krb5',
addmain=False,
msg="Checking whether krb5_principal_get_realm is defined")
conf.CHECK_CODE('''
krb5_enctype enctype;
enctype = ENCTYPE_ARCFOUR_HMAC_MD5;
''',
'_HAVE_ENCTYPE_ARCFOUR_HMAC_MD5',
headers='krb5.h', lib='krb5',
msg="Checking whether the ENCTYPE_ARCFOUR_HMAC_MD5 key type definition is available");
2012-05-08 20:38:20 +04:00
conf.CHECK_CODE('''
krb5_enctype enctype;
enctype = ENCTYPE_ARCFOUR_HMAC_MD5_56;
''',
'_HAVE_ENCTYPE_ARCFOUR_HMAC_MD5_56',
headers='krb5.h', lib='krb5',
msg="Checking whether the ENCTYPE_ARCFOUR_HMAC_MD5_56 key type definition is available");
2012-04-20 13:53:11 +04:00
conf.CHECK_CODE('''
krb5_keytype keytype;
keytype = KEYTYPE_ARCFOUR_56;
''',
'_HAVE_KEYTYPE_ARCFOUR_56',
headers='krb5.h', lib='krb5',
msg="Checking whether the HAVE_KEYTYPE_ARCFOUR_56 key type definition is available");
if conf.CONFIG_SET('_HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and conf.CONFIG_SET('_HAVE_KEYTYPE_ARCFOUR_56'):
conf.DEFINE('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5', '1')
2012-05-08 20:38:20 +04:00
if conf.CONFIG_SET('_HAVE_ENCTYPE_ARCFOUR_HMAC_MD5_56') and conf.CONFIG_SET('_HAVE_KEYTYPE_ARCFOUR_56'):
conf.DEFINE('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5_56', '1')
2012-04-20 13:53:11 +04:00
conf.CHECK_CODE('''
krb5_enctype enctype;
enctype = ENCTYPE_ARCFOUR_HMAC;
''',
'HAVE_ENCTYPE_ARCFOUR_HMAC',
headers='krb5.h', lib='krb5',
msg="Checking whether the ENCTYPE_ARCFOUR_HMAC key type definition is available");
2012-05-08 20:38:20 +04:00
conf.CHECK_CODE('''
krb5_enctype enctype;
enctype = ENCTYPE_ARCFOUR_HMAC_EXP;
''',
'HAVE_ENCTYPE_ARCFOUR_HMAC_EXP',
headers='krb5.h', lib='krb5',
msg="Checking whether the ENCTYPE_ARCFOUR_HMAC_EXP key type definition is available");
2012-04-20 13:53:11 +04:00
conf.CHECK_CODE('''
krb5_context context;
krb5_keytab keytab;
krb5_init_context(&context);
return krb5_kt_resolve(context, "WRFILE:api", &keytab);
''',
'HAVE_WRFILE_KEYTAB',
headers='krb5.h', lib='krb5', execute=True,
2017-12-11 23:41:16 +03:00
msg="Checking whether the WRFILE -keytab is supported");
2012-04-20 13:53:11 +04:00
# Check for KRB5_DEPRECATED handling
conf.CHECK_CODE('''#define KRB5_DEPRECATED 1
#include <krb5.h>''',
'HAVE_KRB5_DEPRECATED_WITH_IDENTIFIER', addmain=False,
link=False,
msg="Checking for KRB5_DEPRECATED define taking an identifier")
2012-05-31 13:44:50 +04:00
conf.CHECK_CODE('''
krb5_creds creds;
creds.flags.b.initial = 0;
''',
'HAVE_FLAGS_IN_KRB5_CREDS',
headers='krb5.h', lib='krb5', execute=False,
msg="Checking whether krb5_creds have flags property")
2015-07-23 14:49:09 +03:00
# Check for MIT KDC
if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
Logs.info("Looking for MIT KDC")
conf.DEFINE('SAMBA_USES_MITKDC', 1);
kdc_path_list = [ '/usr/sbin', '/usr/lib/mit/sbin']
if getattr(Options.options, 'with_system_mitkdc', None):
conf.DEFINE('MIT_KDC_PATH', '"' + Options.options.with_system_mitkdc + '"')
else:
conf.find_program('krb5kdc', path_list=kdc_path_list, var='MIT_KDC_BINARY', mandatory=True)
conf.DEFINE('MIT_KDC_PATH', '"' + conf.env.MIT_KDC_BINARY + '"')