2013-04-08 02:33:55 +04:00
#!/usr/bin/env python
2010-03-20 18:37:03 +03:00
2018-02-02 17:34:32 +03:00
srcdir = ".."
2010-10-25 10:33:39 +04:00
2010-03-20 18:37:03 +03:00
import sys, os
2010-04-11 11:35:08 +04:00
from optparse import SUPPRESS_HELP
2018-02-02 17:34:32 +03:00
sys.path.insert(0, srcdir + "/buildtools/wafsamba")
2011-02-21 04:14:38 +03:00
sys.path.insert(0, "source3")
2018-02-02 17:34:32 +03:00
from waflib import Options, Logs, Errors
import wafsamba
2010-03-25 15:58:35 +03:00
import build.charset
2018-02-02 17:34:32 +03:00
from wafsamba import samba_utils
from samba_utils import TO_LIST
2010-04-23 10:59:43 +04:00
import samba3
2010-03-20 18:37:03 +03:00
2015-09-28 22:47:16 +03:00
default_prefix = Options.default_prefix = '/usr/local/samba'
2011-06-28 13:31:02 +04:00
2018-02-02 17:34:32 +03:00
def options(opt):
2010-03-20 18:37:03 +03:00
2010-03-26 10:42:37 +03:00
opt.add_option('--with-static-modules',
2015-08-13 15:22:45 +03:00
help=("Comma-separated list of names of modules to statically link in. "+
"May include !module to disable 'module'. "+
"Can be '!FORCED' to disable all non-required static only modules. "+
"Can be '!DEFAULT' to disable all modules defaulting to a static build. "+
"Can be 'ALL' to build all default shared modules static. "+
"The most specific one wins, while the order is ignored "+
"and --with-static-modules is evaluated before "+
"--with-shared-modules"),
2010-09-27 02:24:47 +04:00
action="store", dest='static_modules', default=None)
2010-03-26 10:42:37 +03:00
opt.add_option('--with-shared-modules',
2015-08-13 15:22:45 +03:00
help=("Comma-separated list of names of modules to build shared. "+
"May include !module to disable 'module'. "+
"Can be '!FORCED' to disable all non-required shared only modules. "+
"Can be '!DEFAULT' to disable all modules defaulting to a shared build. "+
"Can be 'ALL' to build all default static modules shared. "+
"The most specific one wins, while the order is ignored "+
"and --with-static-modules is evaluated before "+
"--with-shared-modules"),
2010-09-27 02:24:47 +04:00
action="store", dest='shared_modules', default=None)
2010-03-26 10:42:37 +03:00
2020-06-03 07:06:34 +03:00
# Optional Libraries
# ------------------
#
# Most of the calls to opt.samba_add_onoff_option() implicitly
2023-07-18 13:29:12 +03:00
# or explicitly use default=True
2020-06-03 07:06:34 +03:00
#
# To assist users and distributors to build Samba with the full feature
# set, the build system will abort if our dependent libraries and their
# header files are not found on the target system. This will mean for
# example, that xattr, acl and ldap headers must be installed for the
# default build to complete. The configure system will check for these
# headers, and the error message will indicate the option (such as
# --without-acl-support) that can be specified to skip this requirement.
#
# This will assist users and in particular distributors in building fully
# functional packages, while allowing those on systems truly without these
# facilities to continue to build Samba after careful consideration.
#
# It also ensures our container image generation in bootstrap/ is correct
# as otherwise a missing package there would just silently work
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('winbind')
opt.samba_add_onoff_option('ads')
opt.samba_add_onoff_option('ldap')
opt.samba_add_onoff_option('cups', with_name="enable", without_name="disable")
opt.samba_add_onoff_option('iprint', with_name="enable", without_name="disable")
opt.samba_add_onoff_option('pam')
2019-02-07 06:39:04 +03:00
opt.samba_add_onoff_option('quotas', default=None)
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('sendfile-support', default=None)
opt.samba_add_onoff_option('utmp')
opt.samba_add_onoff_option('avahi', with_name="enable", without_name="disable")
opt.samba_add_onoff_option('iconv')
opt.samba_add_onoff_option('acl-support')
opt.samba_add_onoff_option('syslog')
opt.samba_add_onoff_option('automount')
opt.samba_add_onoff_option('dmapi', default=None) # None means autodetection
opt.samba_add_onoff_option('fam', default=None) # None means autodetection
opt.samba_add_onoff_option('profiling-data', default=False)
opt.samba_add_onoff_option('libarchive', default=True)
2010-04-11 11:35:08 +04:00
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('cluster-support', default=False)
2011-04-02 04:20:49 +04:00
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('regedit', default=None)
2020-03-04 20:51:01 +03:00
opt.samba_add_onoff_option('winexe', default=None)
2012-07-10 17:16:35 +04:00
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('fake-kaserver',
2014-04-16 02:36:25 +04:00
help=("Include AFS fake-kaserver support"), default=False)
2013-04-24 23:52:57 +04:00
opt.add_option('--with-libcephfs',
help=("Directory under which libcephfs is installed"),
action="store", dest='libcephfs_dir', default=None)
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('glusterfs', with_name="enable", without_name="disable", default=True)
opt.samba_add_onoff_option('cephfs', with_name="enable", without_name="disable", default=True)
2011-04-02 04:20:49 +04:00
2014-09-01 12:40:10 +04:00
opt.add_option('--enable-vxfs',
help=("enable support for VxFS (default=no)"),
action="store_true", dest='enable_vxfs', default=False)
2019-04-17 17:42:20 +03:00
# default = None means autodetection
opt.samba_add_onoff_option('spotlight', with_name="enable", without_name="disable", default=None)
2016-07-26 13:47:43 +03:00
opt.samba_add_onoff_option('wsp', with_name="enable", without_name="disable", default=False)
2010-03-26 10:42:37 +03:00
2010-03-20 18:37:03 +03:00
def configure(conf):
2012-09-04 14:15:28 +04:00
default_static_modules = []
default_shared_modules = []
2015-08-13 15:22:45 +03:00
required_static_modules = []
forced_static_modules = []
forced_shared_modules = []
2012-09-04 14:15:28 +04:00
2012-03-16 15:57:09 +04:00
if sys.platform != 'openbsd5':
conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
2010-12-09 17:44:30 +03:00
2015-08-13 15:22:45 +03:00
# We crash without vfs_default
2018-07-25 13:26:05 +03:00
# and vfs_not_implemented provides helper function
# for other modules
2020-09-02 15:35:21 +03:00
required_static_modules.extend(['vfs_default', 'vfs_not_implemented'])
2015-08-13 15:22:45 +03:00
2018-04-10 07:35:07 +03:00
conf.CHECK_HEADERS('netdb.h')
2014-11-09 00:18:08 +03:00
conf.CHECK_HEADERS('linux/falloc.h linux/ioctl.h')
2010-03-21 14:13:41 +03:00
2019-08-21 02:28:18 +03:00
conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod mknodat')
2021-06-10 18:31:40 +03:00
conf.CHECK_FUNCS('strtol strchr strupr chflags fchflags')
2019-10-18 14:31:38 +03:00
conf.CHECK_FUNCS('getrlimit fsync setpgid')
2010-03-23 11:02:59 +03:00
conf.CHECK_FUNCS('setsid glob strpbrk crypt16 getauthuid')
2015-06-10 15:33:35 +03:00
conf.CHECK_FUNCS('innetgr')
2010-03-23 11:02:59 +03:00
conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf')
2012-06-29 00:41:19 +04:00
conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups syscall sysconf')
2017-08-22 18:09:01 +03:00
conf.CHECK_FUNCS('atexit grantpt posix_openpt fallocate')
2012-03-28 02:39:57 +04:00
conf.CHECK_FUNCS('fseeko setluid')
2010-03-24 03:27:31 +03:00
conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
2012-03-28 02:39:57 +04:00
conf.CHECK_FUNCS('fdopendir')
2020-11-16 16:37:43 +03:00
conf.CHECK_FUNCS('getpwent_r setenv clearenv strcasecmp')
2011-06-22 03:58:59 +04:00
conf.CHECK_FUNCS('syslog vsyslog timegm setlocale')
2021-04-13 13:07:52 +03:00
conf.CHECK_FUNCS('lutimes utimensat futimens')
2010-03-23 11:02:59 +03:00
conf.CHECK_FUNCS('mlock munlock mlockall munlockall')
conf.CHECK_FUNCS('memalign posix_memalign hstrerror')
2022-06-03 16:07:18 +03:00
conf.CHECK_FUNCS('getdomainname')
2010-04-12 00:05:10 +04:00
conf.CHECK_FUNCS_IN('dn_expand _dn_expand __dn_expand', 'resolv')
2012-09-14 22:41:08 +04:00
conf.CHECK_FUNCS_IN('dn_expand', 'inet')
2010-12-07 17:33:51 +03:00
conf.CHECK_DECLS('readahead', reverse=True, headers='fcntl.h')
if conf.CHECK_CODE('''
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
2012-06-18 10:49:18 +04:00
long ret = splice(0,0,1,0,400,SPLICE_F_MOVE);
2010-12-07 17:33:51 +03:00
''',
'HAVE_LINUX_SPLICE',
headers='fcntl.h'):
conf.CHECK_DECLS('splice', reverse=True, headers='fcntl.h')
2010-03-23 11:02:59 +03:00
2016-04-03 12:43:50 +03:00
# Check for inotify support (Skip if we are SunOS)
#NOTE: illumos provides sys/inotify.h but is not an exact match for linux
host_os = sys.platform
if host_os.rfind('sunos') == -1:
conf.CHECK_HEADERS('sys/inotify.h')
2016-03-26 16:35:52 +03:00
if conf.env.HAVE_SYS_INOTIFY_H:
2016-04-03 12:43:50 +03:00
conf.DEFINE('HAVE_INOTIFY', 1)
2010-03-21 14:20:52 +03:00
2010-03-21 14:53:44 +03:00
# Check for Linux kernel oplocks
s3/wscript: only check for F_SETLEASE being available at compile time
F_GETLEASE/F_SETLEASE are available (at least) since Linux 2.4.0 from
2002.
We also should not have the configure check depend on the filesystem
we find at build time. It's very common that the build-environment is
much more restricted than the runtime-environment will be.
As a history we had this check on Samba 3.6:
AC_CACHE_CHECK([for Linux kernel oplocks],samba_cv_HAVE_KERNEL_OPLOCKS_LINUX,[
AC_TRY_RUN([
#include <sys/types.h>
#include <fcntl.h>
#ifndef F_GETLEASE
#define F_GETLEASE 1025
#endif
main() {
int fd = open("/dev/null", O_RDONLY);
return fcntl(fd, F_GETLEASE, 0) == -1;
}
],
samba_cv_HAVE_KERNEL_OPLOCKS_LINUX=yes,samba_cv_HAVE_KERNEL_OPLOCKS_LINUX=no,samba_cv_HAVE_KERNEL_OPLOCKS_LINUX=cross)])
if test x"$samba_cv_HAVE_KERNEL_OPLOCKS_LINUX" = x"yes"; then
AC_DEFINE(HAVE_KERNEL_OPLOCKS_LINUX,1,[Whether to use linux kernel oplocks])
fi
which didn't depend on the filesystem.
Then we got a broken check introduced in Samba 4.0 (a copy of the
F_NOTIFY check):
# Check for Linux kernel oplocks
conf.CHECK_CODE('''
#include <sys/types.h>
#include <fcntl.h>
#include <signal.h>
#ifndef F_NOTIFY
#define F_NOTIFY 1026
#endif
main() {
exit(fcntl(open("/tmp", O_RDONLY), F_NOTIFY, 0) == -1 ? 1 : 0);
}''', 'HAVE_KERNEL_OPLOCKS_LINUX', addmain=False, execute=True,
msg="Checking for Linux kernel oplocks")
this got "fixed" in Samba 4.7 (and backports to 4.6, 4.5 and 4.4) into
# Check for Linux kernel oplocks
conf.CHECK_CODE('''
#include <sys/types.h>
#include <fcntl.h>
#include <signal.h>
#ifndef F_GETLEASE
#define F_GETLEASE 1025
#endif
main() {
exit(fcntl(open("/tmp", O_RDONLY), F_GETLEASE, 0) == -1 ? 1 : 0);
}''', 'HAVE_KERNEL_OPLOCKS_LINUX', addmain=False, execute=True,
msg="Checking for Linux kernel oplocks")
Lately it became dependend on the filesystem in the build-environment:
# Check for Linux kernel oplocks
conf.CHECK_CODE('''
#include <sys/types.h>
#include <fcntl.h>
#include <signal.h>
#ifndef F_GETLEASE
#define F_GETLEASE 1025
#endif
main() {
const char *fname="/tmp/oplock-test.txt";
int fd = open(fname, O_RDWR|O_CREAT, 0644);
int ret = fcntl(fd, F_SETLEASE, F_WRLCK);
unlink(fname);
return (ret == -1) ? 1 : 0;
}''', 'HAVE_KERNEL_OPLOCKS_LINUX', addmain=False, execute=True,
msg="Checking for Linux kernel oplocks")
Now we just check for F_SETLEASE being available in linux/fcntl.h.
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
2020-12-07 13:38:59 +03:00
if conf.CHECK_DECLS('F_SETLEASE', headers='linux/fcntl.h', reverse=True):
conf.DEFINE('HAVE_KERNEL_OPLOCKS_LINUX', 1)
2010-03-21 14:53:44 +03:00
2013-03-22 12:30:05 +04:00
# check for fam libs
samba_fam_libs=None
check_for_fam=False
if Options.options.with_fam is None:
check_for_fam=True
elif Options.options.with_fam == True:
check_for_fam=True
if check_for_fam and conf.CHECK_HEADERS('fam.h'):
if conf.CHECK_FUNCS_IN('FAMOpen2', 'fam'):
samba_fam_libs='fam'
elif conf.CHECK_FUNCS_IN('FAMOpen2', 'fam C'):
samba_fam_libs='fam C'
conf.CHECK_TYPE('enum FAMCodes', headers='fam.h',
define='HAVE_FAM_H_FAMCODES_TYPEDEF',
msg='Checking whether enum FAMCodes is available')
conf.CHECK_FUNCS_IN('FAMNoExists', 'fam')
if samba_fam_libs is not None:
conf.DEFINE('SAMBA_FAM_LIBS', samba_fam_libs)
2016-02-12 19:25:09 +03:00
conf.DEFINE('HAVE_FAM', 1)
2013-03-22 12:30:05 +04:00
else:
if Options.options.with_fam == True:
conf.fatal('FAM support requested, but no suitable FAM library found')
elif check_for_fam:
Logs.warn('no suitable FAM library found')
2013-08-07 18:34:22 +04:00
# check for libarchive (tar command in smbclient)
2013-08-07 19:50:15 +04:00
# None means autodetect, True/False means enable/disable
2015-05-28 15:55:28 +03:00
conf.SET_TARGET_TYPE('archive', 'EMPTY')
2013-08-07 19:50:15 +04:00
if Options.options.with_libarchive is not False:
2013-08-07 18:34:22 +04:00
Logs.info("Checking for libarchive existence")
2015-05-28 15:55:28 +03:00
if conf.CHECK_HEADERS('archive.h') and conf.CHECK_LIB('archive', shlib=True):
conf.CHECK_FUNCS_IN('archive_read_support_filter_all archive_read_free', 'archive')
2018-05-10 04:04:35 +03:00
else:
conf.fatal("libarchive support not found. "
"Try installing libarchive-dev or libarchive-devel. "
"Otherwise, use --without-libarchive to "
"build without libarchive support. "
"libarchive support is required for the smbclient "
"tar-file mode")
2018-05-10 05:00:54 +03:00
elif conf.CONFIG_GET('ENABLE_SELFTEST'):
2018-02-02 17:34:32 +03:00
raise Errors.WafError('libarchive library required for '
2018-05-10 05:00:54 +03:00
'--enable-selftest')
2013-08-07 18:34:22 +04:00
2012-11-07 21:40:07 +04:00
# check for DMAPI libs
2014-08-18 13:42:27 +04:00
if Options.options.with_dmapi == False:
have_dmapi = False
2012-11-07 21:40:07 +04:00
else:
2014-08-18 13:42:27 +04:00
have_dmapi = True
Logs.info("Checking for DMAPI library existence")
samba_dmapi_lib = ''
if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dm'):
samba_dmapi_lib = 'dm'
2012-11-07 21:40:07 +04:00
else:
2014-08-18 13:42:27 +04:00
if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'jfsdm'):
samba_dmapi_lib = 'jfsdm'
2012-11-07 21:40:07 +04:00
else:
2014-08-18 13:42:27 +04:00
if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dmapi'):
samba_dmapi_lib = 'dmapi'
else:
if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'xdsm'):
samba_dmapi_lib = 'xdsm'
# only bother to test headers and compilation when a candidate
# library has been found
if samba_dmapi_lib == '':
have_dmapi = False
broken_dmapi = "no suitable DMAPI library found"
if have_dmapi:
conf.CHECK_HEADERS('sys/dmi.h xfs/dmapi.h sys/jfsdmapi.h sys/dmapi.h dmapi.h')
conf.CHECK_CODE('''
2012-11-07 21:40:07 +04:00
#include <time.h> /* needed by Tru64 */
#include <sys/types.h> /* needed by AIX */
#ifdef HAVE_XFS_DMAPI_H
#include <xfs/dmapi.h>
#elif defined(HAVE_SYS_DMI_H)
#include <sys/dmi.h>
#elif defined(HAVE_SYS_JFSDMAPI_H)
#include <sys/jfsdmapi.h>
#elif defined(HAVE_SYS_DMAPI_H)
#include <sys/dmapi.h>
#elif defined(HAVE_DMAPI_H)
#include <dmapi.h>
#endif
/* This link test is designed to fail on IRI 6.4, but should
* succeed on Linux, IRIX 6.5 and AIX.
*/
int main(int argc, char **argv)
{
char * version;
dm_eventset_t events;
/* This doesn't take an argument on IRIX 6.4. */
dm_init_service(&version);
/* IRIX 6.4 expects events to be a pointer. */
DMEV_ISSET(DM_EVENT_READ, events);
return 0;
}
''',
2014-08-18 13:42:27 +04:00
'USEABLE_DMAPI_LIBRARY',
addmain=False,
execute=False,
lib=samba_dmapi_lib,
msg='Checking whether DMAPI lib '+samba_dmapi_lib+' can be used')
if not conf.CONFIG_SET('USEABLE_DMAPI_LIBRARY'):
have_dmapi = False
broken_dmapi = "no usable DMAPI library found"
if have_dmapi:
Logs.info("Building with DMAPI support.")
conf.env['dmapi_lib'] = samba_dmapi_lib
conf.DEFINE('USE_DMAPI', 1)
else:
if Options.options.with_dmapi == False:
Logs.info("Building without DMAPI support (--without-dmapi).")
elif Options.options.with_dmapi == True:
Logs.error("DMAPI support not available: " + broken_dmapi)
conf.fatal('DMAPI support requested but not found.');
2012-11-07 21:40:07 +04:00
else:
2014-08-18 13:42:27 +04:00
Logs.warn("Building without DMAPI support: " + broken_dmapi)
conf.env['dmapi_lib'] = ''
2012-11-07 21:40:07 +04:00
2010-03-22 01:43:28 +03:00
# Check for various members of the stat structure
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blocks', define='HAVE_STAT_ST_BLOCKS',
2010-03-24 03:27:31 +03:00
headers='sys/stat.h')
2010-03-22 01:43:28 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blksize', define='HAVE_STAT_ST_BLKSIZE',
2010-03-24 03:27:31 +03:00
headers='sys/stat.h')
2011-02-17 00:15:20 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_flags', define='HAVE_STAT_ST_FLAGS',
2012-02-01 01:30:45 +04:00
headers='sys/types.h sys/stat.h unistd.h')
2010-03-22 01:43:28 +03:00
2016-03-26 16:35:52 +03:00
if conf.env.HAVE_BLKCNT_T:
2014-04-21 17:18:18 +04:00
conf.CHECK_CODE('''
static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 4)];''',
'SIZEOF_BLKCNT_T_4',
headers='replace.h sys/types.h sys/stat.h unistd.h',
msg="Checking whether blkcnt_t is 32 bit")
2012-04-07 01:20:12 +04:00
2014-04-21 17:18:18 +04:00
# If sizeof is 4 it can't be 8
2016-03-26 16:35:52 +03:00
if conf.env.HAVE_BLKCNT_T:
2014-04-21 17:18:18 +04:00
if not conf.CONFIG_SET('SIZEOF_BLKCNT_T_4'):
conf.CHECK_CODE('''
static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 8)];''',
'SIZEOF_BLKCNT_T_8',
headers='replace.h sys/types.h sys/stat.h unistd.h',
msg="Checking whether blkcnt_t is 64 bit")
2012-04-07 01:20:12 +04:00
2010-03-22 10:48:09 +03:00
# Check for POSIX capability support
2010-04-09 01:03:40 +04:00
conf.CHECK_FUNCS_IN('cap_get_proc', 'cap', headers='sys/capability.h')
2016-03-26 16:35:52 +03:00
if conf.env.HAVE_SYS_CAPABILITY_H:
2010-03-22 10:48:09 +03:00
conf.CHECK_CODE('''
2010-03-24 03:27:31 +03:00
cap_t cap;
cap_value_t vals[1];
if (!(cap = cap_get_proc())) exit(1);
vals[0] = CAP_CHOWN;
cap_set_flag(cap, CAP_INHERITABLE, 1, vals, CAP_CLEAR);
cap_set_proc(cap);''',
'HAVE_POSIX_CAPABILITIES', execute=True, lib="cap",
headers='sys/capability.h',
msg="Checking whether POSIX capabilities are available")
2010-03-22 10:48:09 +03:00
2010-05-31 10:35:58 +04:00
conf.CHECK_CODE('int i;', 'BROKEN_NISPLUS_INCLUDE_FILES',
headers='sys/types.h sys/acl.h rpcsvc/nis.h',
msg="Checking for broken nisplus include files")
2010-03-22 10:48:09 +03:00
2010-03-23 00:58:43 +03:00
# Check if the compiler will optimize out functions
conf.CHECK_CODE('''
2014-10-11 22:50:46 +04:00
#include <sys/types.h>
size_t __unsafe_string_function_usage_here_size_t__(void);
#define CHECK_STRING_SIZE(d, len) (sizeof(d) != (len) && sizeof(d) != sizeof(char *))
static size_t push_string_check_fn(void *dest, const char *src, size_t dest_len) {
return 0;
}
#define push_string_check(dest, src, dest_len) \
(CHECK_STRING_SIZE(dest, dest_len) \
? __unsafe_string_function_usage_here_size_t__() \
: push_string_check_fn(dest, src, dest_len))
int main(int argc, char **argv) {
char outbuf[1024];
char *p = outbuf;
const char *foo = "bar";
p += 31 + push_string_check(p + 31, foo, sizeof(outbuf) - (p + 31 - outbuf));
return 0;
2010-03-23 00:58:43 +03:00
}''', 'HAVE_COMPILER_WILL_OPTIMIZE_OUT_FNS',
2014-10-11 22:50:46 +04:00
addmain=False,
add_headers=False,
msg="Checking if the compiler will optimize out functions")
2010-03-23 00:58:43 +03:00
2010-05-31 10:36:29 +04:00
# Check if the compiler supports the LL suffix on long long integers
# AIX needs this
conf.CHECK_CODE('long long i = 0x8000000000LL', 'COMPILER_SUPPORTS_LL',
headers='stdio.h',
msg="Checking for LL suffix on long long integers")
2010-03-24 03:27:31 +03:00
conf.CHECK_FUNCS('''
2019-09-30 12:52:06 +03:00
DNSServiceRegister
2019-09-30 12:49:28 +03:00
atexit
2019-09-30 12:52:06 +03:00
chflags
2021-06-10 18:31:40 +03:00
fchflags
2019-09-30 12:52:06 +03:00
chmod
crypt16
devnm
endmntent
execl
fchmod
fchown
2019-09-30 12:49:28 +03:00
fseeko
fsync
2019-09-30 12:52:06 +03:00
futimens
getauthuid
2019-09-30 12:49:28 +03:00
getcwd
2019-09-30 12:52:06 +03:00
getgrent
getgrnam
getgrouplist
getgrset
getmntent
getpagesize
getpwanam
getpwent_r
getrlimit
glob
grantpt
hstrerror
initgroups
innetgr
2019-09-30 12:49:28 +03:00
llseek
lutimes
2019-09-30 12:52:06 +03:00
memalign
mknod
mlock
mlockall
munlock
munlockall
2017-08-22 18:09:01 +03:00
pathconf poll
2019-09-30 12:52:06 +03:00
posix_memalign
pread
2019-09-30 12:49:28 +03:00
pwrite
rdchk
2019-09-30 12:52:06 +03:00
select
setenv
setgidx
setgroups
setlocale
setluid
setmntent
setpgid
setpriv
setsid
setuidx
2019-09-30 12:49:28 +03:00
statvfs
2019-09-30 12:52:06 +03:00
strcasecmp
strchr
strpbrk
strsignal
strtol
strupr
sysconf
sysctl
sysctlbyname
syslog
timegm
utimensat
vsyslog
2010-03-24 03:27:31 +03:00
''')
2010-03-25 15:58:35 +03:00
conf.CHECK_SAMBA3_CHARSET() # see build/charset.py
2010-09-26 12:56:09 +04:00
# FIXME: these should be tests for features, but the old build system just
# checks for OSes.
host_os = sys.platform
2011-02-21 04:16:03 +03:00
Logs.info("building on %s" % host_os)
2010-09-26 12:56:09 +04:00
# Python doesn't have case switches... :/
# FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
# the search for .rfind('gnu') covers gnu* and *-gnu is that too broad?
2011-01-31 11:38:21 +03:00
conf.SET_TARGET_TYPE('sunacl', 'EMPTY')
2010-09-26 12:56:09 +04:00
if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('qnx') > -1):
if host_os.rfind('linux') > -1:
conf.DEFINE('LINUX', '1')
elif host_os.rfind('qnx') > -1:
conf.DEFINE('QNX', '1')
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
elif (host_os.rfind('darwin') > -1):
conf.DEFINE('DARWINOS', 1)
conf.ADD_CFLAGS('-fno-common')
2012-09-23 08:30:10 +04:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2011-01-31 11:38:21 +03:00
elif (host_os.rfind('freebsd') > -1):
2012-10-23 10:53:58 +04:00
conf.DEFINE('FREEBSD', 1)
2011-01-31 11:38:21 +03:00
if conf.CHECK_HEADERS('sunacl.h'):
2011-08-08 05:16:20 +04:00
conf.DEFINE('HAVE_FREEBSD_SUNACL_H', '1')
2014-03-07 03:05:19 +04:00
conf.CHECK_FUNCS_IN(['acl'], 'sunacl')
2011-02-11 01:37:52 +03:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2012-09-23 08:30:10 +04:00
elif (host_os.rfind('irix') > -1):
conf.DEFINE('IRIX', 1)
2011-02-11 01:37:52 +03:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2012-09-23 08:30:10 +04:00
elif (host_os.rfind('aix') > -1):
conf.DEFINE('AIX', 1)
conf.DEFINE('STAT_ST_BLOCKSIZE', 'DEV_BSIZE')
elif (host_os.rfind('hpux') > -1):
conf.DEFINE('HPUX', 1)
conf.DEFINE('STAT_ST_BLOCKSIZE', '8192')
elif (host_os.rfind('osf') > -1):
conf.DEFINE('OSF1', 1)
2011-04-22 02:49:54 +04:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2012-09-23 08:30:10 +04:00
2010-09-26 12:56:09 +04:00
# FIXME: Add more checks here.
else:
2012-09-23 08:30:10 +04:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2010-09-26 12:56:09 +04:00
if Options.options.with_acl_support:
2014-03-05 06:06:02 +04:00
if (host_os.rfind('hpux') > -1):
2016-01-11 02:02:49 +03:00
Logs.info('Using HPUX ACLs')
2012-09-04 14:15:28 +04:00
conf.DEFINE('HAVE_HPUX_ACLS',1)
2012-09-23 08:30:37 +04:00
conf.DEFINE('POSIX_ACL_NEEDS_MASK',1)
2022-02-15 16:25:41 +03:00
required_static_modules.extend(['vfs_hpuxacl'])
2016-01-11 02:02:49 +03:00
elif (host_os.rfind('aix') > -1):
Logs.info('Using AIX ACLs')
2012-09-04 14:15:28 +04:00
conf.DEFINE('HAVE_AIX_ACLS',1)
2022-02-15 16:25:41 +03:00
required_static_modules.extend(['vfs_aixacl', 'vfs_aixacl2'])
2012-09-04 14:15:28 +04:00
elif (host_os.rfind('darwin') > -1):
2013-12-16 03:45:45 +04:00
Logs.warn('ACLs on Darwin currently not supported')
conf.fatal("ACL support not available on Darwin/MacOS. "
"Use --without-acl-support for building without "
"ACL support. "
"ACL support is required to change permissions "
"from Windows clients.")
2012-06-03 16:11:31 +04:00
else:
2014-03-05 06:06:02 +04:00
conf.CHECK_FUNCS_IN(['acl_get_file'], 'acl')
2012-06-03 16:11:31 +04:00
if conf.CHECK_CODE('''
2010-09-26 12:56:09 +04:00
acl_t acl;
int entry_id;
acl_entry_t *entry_p;
return acl_get_entry(acl, entry_id, entry_p);
''',
'HAVE_POSIX_ACLS',
headers='sys/types.h sys/acl.h', link=False,
2012-02-01 01:30:45 +04:00
msg="Checking for POSIX ACL support") :
2012-06-03 16:11:31 +04:00
conf.CHECK_CODE('''
2010-09-26 12:56:09 +04:00
acl_permset_t permset_d;
acl_perm_t perm;
return acl_get_perm_np(permset_d, perm);
''',
'HAVE_ACL_GET_PERM_NP',
headers='sys/types.h sys/acl.h', link=True,
msg="Checking whether acl_get_perm_np() is available")
2015-08-13 15:22:45 +03:00
# source3/lib/sysacls.c calls posixacl_sys_acl_get_file()
2020-09-02 15:35:21 +03:00
required_static_modules.extend(['vfs_posixacl'])
2014-10-10 15:53:56 +04:00
conf.CHECK_VARIABLE('ACL_EVERYONE', headers='sys/acl.h')
2014-03-05 06:06:02 +04:00
elif conf.CHECK_FUNCS_IN(['facl'], 'sec'):
Logs.info('Using solaris or UnixWare ACLs')
conf.DEFINE('HAVE_SOLARIS_UNIXWARE_ACLS',1)
2022-02-15 16:25:41 +03:00
required_static_modules.extend(['vfs_solarisacl'])
2013-12-16 03:45:45 +04:00
else:
conf.fatal("ACL support not found. Try installing libacl1-dev "
"or libacl-devel. "
"Otherwise, use --without-acl-support to build "
"without ACL support. "
"ACL support is required to change permissions from "
"Windows clients.")
2010-09-26 12:56:09 +04:00
2010-12-01 15:24:55 +03:00
if conf.CHECK_FUNCS('dirfd'):
conf.DEFINE('HAVE_DIRFD_DECL', 1)
2010-03-26 10:42:37 +03:00
2010-12-07 14:46:50 +03:00
conf.CHECK_CODE('struct statfs fsd; fsid_t fsid = fsd.f_fsid; return statfs(".", &fsd);',
'HAVE_STATFS_F_FSID',
2014-05-05 16:29:57 +04:00
msg="vfs_fileid checking for statfs() and struct statfs.f_fsid",
2010-12-07 14:46:50 +03:00
headers='sys/types.h sys/statfs.h',
execute=True)
2011-01-12 02:43:26 +03:00
if conf.CONFIG_SET('HAVE_FALLOCATE'):
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''',
'HAVE_LINUX_FALLOCATE',
msg="Checking whether the Linux 'fallocate' function is available",
headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
2015-02-09 21:39:06 +03:00
conf.CHECK_CODE('''
int ret = fallocate(0, FALLOC_FL_PUNCH_HOLE, 0, 10);''',
'HAVE_FALLOC_FL_PUNCH_HOLE',
msg="Checking whether Linux 'fallocate' supports hole-punching",
headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
2015-02-19 17:53:56 +03:00
conf.CHECK_CODE('''
int ret = lseek(0, 0, SEEK_HOLE);
ret = lseek(0, 0, SEEK_DATA);''',
'HAVE_LSEEK_HOLE_DATA',
msg="Checking whether lseek supports hole/data seeking",
headers='unistd.h sys/types.h')
2011-01-12 02:49:53 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
ssize_t err = readahead(0,0,0x80000);''',
'HAVE_LINUX_READAHEAD',
msg="Checking whether Linux readahead is available",
headers='unistd.h fcntl.h')
2011-01-12 02:49:53 +03:00
conf.CHECK_DECLS('readahead', headers='fcntl.h', always=True)
2011-01-12 02:43:26 +03:00
2012-07-04 00:34:21 +04:00
conf.CHECK_CODE('int fd = openat(AT_FDCWD, ".", O_RDONLY);',
2016-01-11 02:02:49 +03:00
'HAVE_OPENAT',
msg='Checking for openat',
headers='fcntl.h')
2012-07-04 00:34:21 +04:00
2011-02-07 13:40:06 +03:00
conf.CHECK_CODE('''
struct msghdr msg;
union {
2012-02-01 01:30:45 +04:00
struct cmsghdr cm;
2011-02-07 13:40:06 +03:00
char control[CMSG_SPACE(sizeof(int))];
} control_un;
msg.msg_control = control_un.control;
msg.msg_controllen = sizeof(control_un.control);
''',
2014-05-31 14:04:05 +04:00
'HAVE_STRUCT_MSGHDR_MSG_CONTROL',
2012-02-01 01:30:45 +04:00
msg='Checking if we can use msg_control for passing file descriptors',
headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
2011-02-07 13:40:06 +03:00
conf.CHECK_CODE('''
struct msghdr msg;
int fd;
2014-06-14 02:55:02 +04:00
msg.msg_accrights = (caddr_t) &fd;
msg.msg_accrightslen = sizeof(fd);
2011-02-07 13:40:06 +03:00
''',
2014-06-14 02:55:02 +04:00
'HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS',
msg='Checking if we can use msg_accrights for passing file descriptors',
2012-02-01 01:30:45 +04:00
headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
2011-02-07 13:40:06 +03:00
2010-04-11 11:35:08 +04:00
if Options.options.with_winbind:
2010-05-21 00:58:59 +04:00
conf.env.build_winbind = True
2010-04-11 11:35:08 +04:00
conf.DEFINE('WITH_WINBIND', '1')
2010-05-26 01:53:04 +04:00
conf.find_program('awk', var='AWK')
2010-06-01 00:39:47 +04:00
conf.CHECK_HEADERS('asm/types.h')
2010-06-01 01:02:16 +04:00
conf.CHECK_CODE('dev_t dev; int i = major(dev); return 0', "HAVE_DEVICE_MAJOR_FN",
2022-11-21 15:53:17 +03:00
headers='sys/sysmacros.h unistd.h sys/types.h',
2010-06-01 01:02:16 +04:00
msg="Checking for major macro")
conf.CHECK_CODE('dev_t dev; int i = minor(dev); return 0', "HAVE_DEVICE_MINOR_FN",
2022-11-21 15:53:17 +03:00
headers='sys/sysmacros.h unistd.h sys/types.h',
2010-06-01 01:02:16 +04:00
msg="Checking for minor macro")
2010-06-01 12:31:11 +04:00
conf.CHECK_STRUCTURE_MEMBER('struct dirent', 'd_off',
headers='unistd.h sys/types.h dirent.h',
define='HAVE_DIRENT_D_OFF')
2022-06-03 16:07:18 +03:00
if (conf.CONFIG_SET('HAVE_GETDOMAINNAME')):
conf.DEFINE('HAVE_NETGROUP', '1')
2010-04-05 16:41:23 +04:00
# Look for CUPS
2011-02-09 19:43:30 +03:00
if Options.options.with_cups:
conf.find_program('cups-config', var='CUPS_CONFIG')
if conf.env.CUPS_CONFIG:
2011-02-21 05:58:13 +03:00
# we would normally use --libs here, but cups-config incorrectly adds
# gssapi_krb5 and other libraries to its --libs output. That breaks the use
# of an in-tree heimdal kerberos
2015-03-07 17:31:19 +03:00
conf.CHECK_CFG(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags",
2011-10-12 10:17:02 +04:00
package="", uselib_store="CUPS")
2010-04-08 10:09:11 +04:00
conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups')
2019-11-20 13:27:10 +03:00
conf.CHECK_FUNCS_IN('httpConnect httpConnect2 httpConnectEncrypt', 'cups')
2011-02-10 22:37:02 +03:00
if conf.CONFIG_SET('HAVE_CUPS_CUPS_H') and conf.CONFIG_SET('HAVE_CUPS_LANGUAGE_H'):
conf.DEFINE('HAVE_CUPS', '1')
2011-02-11 03:31:37 +03:00
else:
conf.undefine('HAVE_CUPS')
2011-02-11 18:10:07 +03:00
conf.SET_TARGET_TYPE('cups', 'EMPTY')
2010-04-09 01:04:55 +04:00
else:
# define an empty subsystem for cups, to allow it to be used as an empty dependency
conf.SET_TARGET_TYPE('cups', 'EMPTY')
2010-04-05 16:41:23 +04:00
2011-02-04 18:49:30 +03:00
if Options.options.with_iprint:
2012-02-01 01:30:45 +04:00
if conf.CONFIG_SET('HAVE_CUPS'):
2011-02-04 18:49:30 +03:00
conf.DEFINE('HAVE_IPRINT', '1')
else:
2011-02-21 04:16:03 +03:00
Logs.warn("--enable-iprint=yes but cups support not sufficient")
2011-02-04 19:42:10 +03:00
if Options.options.with_syslog:
conf.DEFINE('WITH_SYSLOG', '1')
2011-02-07 15:21:35 +03:00
if Options.options.with_automount:
conf.DEFINE('WITH_AUTOMOUNT', '1')
2011-02-04 18:49:30 +03:00
2010-04-05 16:41:23 +04:00
# Check for LDAP
2010-04-12 00:05:10 +04:00
if Options.options.with_ldap:
2011-04-26 07:53:45 +04:00
conf.CHECK_HEADERS('ldap.h lber.h ldap_pvt.h')
2010-04-12 00:05:10 +04:00
conf.CHECK_TYPE('ber_tag_t', 'unsigned int', headers='ldap.h lber.h')
conf.CHECK_FUNCS_IN('ber_scanf ber_sockbuf_add_io', 'lber')
conf.CHECK_VARIABLE('LDAP_OPT_SOCKBUF', headers='ldap.h')
# if we LBER_OPT_LOG_PRINT_FN we can intercept ldap logging and print it out
# for the samba logs
conf.CHECK_VARIABLE('LBER_OPT_LOG_PRINT_FN',
define='HAVE_LBER_LOG_PRINT_FN', headers='lber.h')
2011-04-26 07:53:45 +04:00
conf.CHECK_FUNCS_IN('ldap_init ldap_init_fd ldap_initialize ldap_set_rebind_proc', 'ldap')
2010-04-12 00:05:10 +04:00
conf.CHECK_FUNCS_IN('ldap_add_result_entry', 'ldap')
# Check if ldap_set_rebind_proc() takes three arguments
if conf.CHECK_CODE('ldap_set_rebind_proc(0, 0, 0)',
'LDAP_SET_REBIND_PROC_ARGS',
msg="Checking whether ldap_set_rebind_proc takes 3 arguments",
headers='ldap.h lber.h', link=False):
conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '3')
else:
conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '2')
# last but not least, if ldap_init() exists, we want to use ldap
2012-09-22 08:57:22 +04:00
if conf.CONFIG_SET('HAVE_LDAP_INIT') and conf.CONFIG_SET('HAVE_LDAP_H'):
2010-04-12 00:05:10 +04:00
conf.DEFINE('HAVE_LDAP', '1')
conf.DEFINE('LDAP_DEPRECATED', '1')
2011-02-11 14:07:39 +03:00
conf.env['HAVE_LDAP'] = '1'
2011-03-17 16:05:48 +03:00
# if ber_sockbuf_add_io() and LDAP_OPT_SOCKBUF are available, we can add
# SASL wrapping hooks
if conf.CONFIG_SET('HAVE_BER_SOCKBUF_ADD_IO') and \
conf.CONFIG_SET('HAVE_LDAP_OPT_SOCKBUF'):
conf.DEFINE('HAVE_LDAP_SASL_WRAPPING', '1')
2013-12-16 04:31:31 +04:00
else:
conf.fatal("LDAP support not found. "
"Try installing libldap2-dev or openldap-devel. "
"Otherwise, use --without-ldap to build without "
"LDAP support. "
"LDAP support is required for the LDAP passdb backend, "
"LDAP idmap backends and ADS. "
"ADS support improves communication with "
"Active Directory domain controllers.")
2010-04-06 01:44:37 +04:00
else:
2010-04-12 00:05:10 +04:00
conf.SET_TARGET_TYPE('ldap', 'EMPTY')
conf.SET_TARGET_TYPE('lber', 'EMPTY')
2010-04-05 16:41:23 +04:00
2012-11-23 15:21:49 +04:00
if Options.options.with_ads == False:
use_ads = False
use_ads_krb5 = False
use_ads_ldap = False
else:
use_ads = True
use_ads_krb5 = True
use_ads_ldap = True
2011-02-10 14:42:47 +03:00
if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
2011-02-21 04:16:03 +03:00
Logs.warn("arcfour-hmac-md5 encryption type not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2011-02-10 00:43:41 +03:00
if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
2011-02-21 04:16:03 +03:00
Logs.warn("krb5_mk_req_extended not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 03:54:50 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_GET_HOST_REALM'):
Logs.warn("krb5_get_host_realm not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 03:54:50 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_FREE_HOST_REALM'):
Logs.warn("krb5_free_host_realm not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 03:59:44 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_FWD_TGT_CREDS'):
Logs.warn("krb5_fwd_tgt_creds found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 04:06:28 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_GET_INIT_CREDS_OPT_ALLOC'):
Logs.warn("krb5_get_init_creds_opt_alloc not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 04:06:28 +04:00
if not conf.CONFIG_SET('KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT'):
Logs.warn("krb5_get_init_creds_opt_free was not found or was too old in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 04:16:24 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_GET_RENEWED_CREDS'):
Logs.warn("krb5_get_renewed_creds not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 04:30:22 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL_COMPARE_ANY_REALM'):
Logs.warn("krb5_principal_compare_any_realm not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-04-02 01:28:19 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_C_STRING_TO_KEY') and \
not conf.CONFIG_SET('HAVE_KRB5_STRING_TO_KEY_SALT'):
Logs.warn("krb5_c_string_to_key not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2011-02-10 14:42:47 +03:00
if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
2011-02-10 00:43:41 +03:00
not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
2011-02-21 04:16:03 +03:00
Logs.warn("no CREATE_KEY_FUNCTIONS detected")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2011-02-10 14:42:47 +03:00
if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
2011-02-10 00:43:41 +03:00
not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
2011-02-21 04:16:03 +03:00
Logs.warn("no GET_ENCTYPES_FUNCTIONS detected")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2011-02-10 14:42:47 +03:00
if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
2011-02-10 00:43:41 +03:00
not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
2011-02-21 04:16:03 +03:00
Logs.warn("no KT_FREE_FUNCTION detected")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 03:51:29 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM'):
Logs.warn("krb5_c_verify_checksum_compare not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-06 11:32:41 +04:00
# We don't actually use
# gsskrb5_extract_authz_data_from_sec_context, but it is a
# clue that this Heimdal, which does the PAC processing we
# need on the standard gss_inquire_sec_context_by_oid
if not conf.CONFIG_SET('HAVE_GSS_GET_NAME_ATTRIBUTE') and \
2012-01-24 14:17:09 +04:00
not (conf.CONFIG_SET('HAVE_GSSKRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT') and \
conf.CONFIG_SET('HAVE_GSS_INQUIRE_SEC_CONTEXT_BY_OID')):
2013-02-03 15:30:10 +04:00
Logs.warn("need either gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-06 11:32:41 +04:00
2012-01-24 16:48:33 +04:00
if not conf.CONFIG_SET('HAVE_GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT'):
Logs.warn("need gss_krb5_export_lucid_sec_context for SPNEGO and gss_wrap support")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-24 16:48:33 +04:00
2012-11-23 15:21:49 +04:00
if use_ads_krb5:
2011-02-10 00:43:41 +03:00
conf.DEFINE('HAVE_KRB5', '1')
2012-11-23 15:21:49 +04:00
conf.env['HAVE_KRB5'] = '1'
2011-02-10 00:43:41 +03:00
else:
conf.undefine('HAVE_KRB5_H')
conf.undefine('HAVE_GSSAPI_H')
conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
conf.undefine('HAVE_GSSAPI_GSSAPI_H')
2012-11-23 15:21:49 +04:00
use_ads = False
if not conf.CONFIG_SET('HAVE_LDAP'):
use_ads = False
use_ads_ldap = False
if use_ads:
conf.DEFINE('WITH_ADS', '1')
conf.env['HAVE_ADS'] = '1'
Logs.info("Building with Active Directory support.")
2015-08-13 15:22:45 +03:00
# these have broken dependencies
2020-09-02 15:35:21 +03:00
forced_shared_modules.extend(['idmap_ad', 'idmap_rfc2307'])
2012-11-23 15:21:49 +04:00
elif Options.options.with_ads == False:
Logs.info("Building without Active Directory support (--without-ads).")
2019-07-24 07:22:12 +03:00
if not Options.options.without_ad_dc:
conf.fatal("Building --without-ads requires also "
"building --without-ad-dc.")
2012-11-23 15:21:49 +04:00
else:
if not use_ads_krb5:
Logs.warn("Active Directory support not available: krb5 libs don't have all required features")
if not use_ads_ldap:
2013-12-16 06:25:58 +04:00
Logs.warn("Active Directory support not available: LDAP support is not available.")
2012-11-23 15:21:49 +04:00
if Options.options.with_ads:
2013-12-16 05:59:35 +04:00
conf.fatal("Active Directory support not found. Use --without-ads "
"for building without Active Directory support. "
"ADS support improves communication with "
"Active Directory domain controllers.")
2012-11-23 15:21:49 +04:00
else:
# this is the auto-mode case
Logs.warn("Building without Active Directory support.")
2011-02-10 00:43:41 +03:00
2010-05-28 17:17:35 +04:00
if Options.options.with_utmp:
2012-03-14 15:37:33 +04:00
conf.env.with_utmp = True
if not conf.CHECK_HEADERS('utmp.h'): conf.env.with_utmp = False
2010-05-28 17:17:35 +04:00
conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_name', headers='utmp.h',
define='HAVE_UT_UT_NAME')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_user', headers='utmp.h',
define='HAVE_UT_UT_USER')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_id', headers='utmp.h',
define='HAVE_UT_UT_ID')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_host', headers='utmp.h',
define='HAVE_UT_UT_HOST')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_time', headers='utmp.h',
define='HAVE_UT_UT_TIME')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_tv', headers='utmp.h',
define='HAVE_UT_UT_TV')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_type', headers='utmp.h',
define='HAVE_UT_UT_TYPE')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_pid', headers='utmp.h',
define='HAVE_UT_UT_PID')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_exit.e_exit', headers='utmp.h',
define='HAVE_UT_UT_EXIT')
conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_syslen', headers='utmpx.h',
define='HAVE_UX_UT_SYSLEN')
2019-01-06 22:46:20 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_host', headers='utmpx.h',
define='HAVE_UX_UT_HOST')
2010-05-28 17:17:35 +04:00
conf.CHECK_CODE('struct utmp utarg; struct utmp *utreturn; utreturn = pututline(&utarg);',
'PUTUTLINE_RETURNS_UTMP', headers='utmp.h',
msg="Checking whether pututline returns pointer")
2012-10-08 13:15:50 +04:00
conf.CHECK_SIZEOF(['((struct utmp *)NULL)->ut_line'], headers='utmp.h',
2014-04-21 17:18:17 +04:00
define='SIZEOF_UTMP_UT_LINE', critical=False)
2012-10-08 13:15:50 +04:00
if not conf.CONFIG_SET('SIZEOF_UTMP_UT_LINE'):
conf.env.with_utmp = False
elif int(conf.env.SIZEOF_UTMP_UT_LINE) < 15:
conf.env.with_utmp = False
2012-03-14 15:37:33 +04:00
if conf.env.with_utmp:
conf.DEFINE('WITH_UTMP', 1)
2012-10-08 13:15:50 +04:00
else:
Logs.warn("--with-utmp but utmp support not sufficient")
2010-05-28 17:17:35 +04:00
2010-05-28 17:56:32 +04:00
if Options.options.with_avahi:
conf.env.with_avahi = True
if not conf.CHECK_HEADERS('avahi-common/watch.h avahi-client/client.h'): conf.env.with_avahi = False
if not conf.CHECK_FUNCS_IN('avahi_client_new', 'avahi-client'): conf.env.with_avahi = False
if not conf.CHECK_FUNCS_IN('avahi_strerror', 'avahi-common'): conf.env.with_avahi = False
if conf.env.with_avahi:
conf.DEFINE('WITH_AVAHI_SUPPORT', 1)
else:
conf.SET_TARGET_TYPE('avahi-common', 'EMPTY')
conf.SET_TARGET_TYPE('avahi-client', 'EMPTY')
2010-06-15 08:53:11 +04:00
if Options.options.with_iconv:
conf.env.with_iconv = True
if not conf.CHECK_FUNCS_IN('iconv_open', 'iconv', headers='iconv.h'):
conf.env.with_iconv = False
if conf.env.with_iconv:
conf.DEFINE('HAVE_ICONV', 1)
2010-09-28 10:54:39 +04:00
if Options.options.with_pam:
2011-02-10 23:10:53 +03:00
use_pam=True
2010-12-01 23:26:49 +03:00
conf.CHECK_HEADERS('security/pam_appl.h pam/pam_appl.h')
if not conf.CONFIG_SET('HAVE_SECURITY_PAM_APPL_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_APPL_H'):
2011-02-21 04:16:03 +03:00
Logs.warn("--with-pam=yes but pam_appl.h not found")
2011-02-10 23:10:53 +03:00
use_pam=False
conf.CHECK_FUNCS_IN('pam_get_data', 'pam')
conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
2011-02-21 04:16:03 +03:00
Logs.warn("--with-pam=yes but pam_modules.h not found")
2011-02-10 23:10:53 +03:00
use_pam=False
2010-12-01 23:26:49 +03:00
conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h')
conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h')
conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam')
2012-02-01 01:30:45 +04:00
conf.CHECK_CODE('''
2010-12-01 23:26:49 +03:00
#if defined(HAVE_SECURITY_PAM_APPL_H)
#include <security/pam_appl.h>
#elif defined(HAVE_PAM_PAM_APPL_H)
#include <pam/pam_appl.h>
#endif
pam_set_item(0, PAM_RHOST, 0);
''',
'HAVE_PAM_RHOST',
lib='pam',
msg="Checking whether PAM_RHOST is available");
2012-02-01 01:30:45 +04:00
conf.CHECK_CODE('''
2010-12-01 23:26:49 +03:00
#if defined(HAVE_SECURITY_PAM_APPL_H)
#include <security/pam_appl.h>
#elif defined(HAVE_PAM_PAM_APPL_H)
#include <pam/pam_appl.h>
#endif
pam_set_item(0, PAM_TTY, 0);
''',
'HAVE_PAM_TTY',
lib='pam',
msg="Checking whether PAM_TTY is available");
2012-02-01 01:30:45 +04:00
conf.CHECK_CODE('''
2010-12-01 23:26:49 +03:00
#if (!defined(LINUX))
#define PAM_EXTERN extern
#if defined(HAVE_SECURITY_PAM_APPL_H)
#include <security/pam_appl.h>
#elif defined(HAVE_PAM_PAM_APPL_H)
#include <pam/pam_appl.h>
#endif
#endif
#if defined(HAVE_SECURITY_PAM_MODULES_H)
#include <security/pam_modules.h>
#elif defined(HAVE_PAM_PAM_MODULES_H)
#include <pam/pam_modules.h>
#endif
#if defined(HAVE_SECURITY__PAM_MACROS_H)
#include <security/_pam_macros.h>
#elif defined(HAVE_PAM__PAM_MACROS_H)
#include <pam/_pam_macros.h>
#endif
#ifdef HAVE_SECURITY_PAM_EXT_H
#include <security/pam_ext.h>
#endif
int i; i = PAM_RADIO_TYPE;
''',
'HAVE_PAM_RADIO_TYPE',
lib='pam',
msg="Checking whether PAM_RADIO_TYPE is available");
2011-02-10 23:10:53 +03:00
if use_pam:
conf.DEFINE('WITH_PAM', 1)
conf.DEFINE('WITH_PAM_MODULES', 1)
2017-04-12 10:32:39 +03:00
else:
conf.fatal("PAM support is enabled but prerequisite libraries "
"or headers not found. Use --without-pam to disable "
"PAM support.");
2010-09-28 10:54:39 +04:00
2012-07-11 17:39:18 +04:00
seteuid = False
2012-07-02 02:32:44 +04:00
#
2012-07-03 01:08:41 +04:00
# Ensure we select the correct set of system calls on Linux.
2012-07-02 02:32:44 +04:00
#
2012-07-03 01:08:41 +04:00
if (host_os.rfind('linux') > -1):
conf.CHECK_CODE('''
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#include <stdlib.h>
#include <stdio.h>
#include <sys/types.h>
#include <errno.h>
#ifdef HAVE_SYS_PRIV_H
#include <sys/priv.h>
#endif
#ifdef HAVE_SYS_ID_H
#include <sys/id.h>
#endif
#if defined(HAVE_SYSCALL_H)
#include <syscall.h>
#endif
#if defined(HAVE_SYS_SYSCALL_H)
#include <sys/syscall.h>
#endif
syscall(SYS_setresuid32, -1, -1, -1);
syscall(SYS_setresgid32, -1, -1, -1);
syscall(SYS_setreuid32, -1, -1);
syscall(SYS_setregid32, -1, -1);
syscall(SYS_setuid32, -1);
syscall(SYS_setgid32, -1);
syscall(SYS_setgroups32, 0, NULL);
''',
'USE_LINUX_32BIT_SYSCALLS',
msg="Checking whether Linux should use 32-bit credential calls");
2012-07-11 17:39:18 +04:00
if (conf.CONFIG_SET('USE_LINUX_32BIT_SYSCALLS')):
2012-07-11 17:54:29 +04:00
seteuid = conf.CHECK_CODE('''
2012-07-03 01:08:41 +04:00
#define AUTOCONF_TEST 1
2018-06-28 15:28:34 +03:00
#define HAVE_LINUX_THREAD_CREDENTIALS 1
2012-07-03 01:08:41 +04:00
#define USE_LINUX_32BIT_SYSCALLS 1
#include "../lib/util/setid.c"
#include "./lib/util_sec.c"
''',
2018-06-28 15:28:34 +03:00
'HAVE_LINUX_THREAD_CREDENTIALS',
2012-07-03 01:08:41 +04:00
addmain=False,
execute=True,
msg="Checking whether we can use Linux thread-specific credentials with 32-bit system calls")
2012-07-11 17:39:18 +04:00
else:
2012-07-11 17:54:29 +04:00
seteuid = conf.CHECK_CODE('''
2012-07-03 01:08:41 +04:00
#define AUTOCONF_TEST 1
2018-06-28 15:28:34 +03:00
#define HAVE_LINUX_THREAD_CREDENTIALS 1
2012-07-03 01:08:41 +04:00
#include "../lib/util/setid.c"
#include "./lib/util_sec.c"
''',
2018-06-28 15:28:34 +03:00
'HAVE_LINUX_THREAD_CREDENTIALS',
2012-07-03 01:08:41 +04:00
addmain=False,
execute=True,
msg="Checking whether we can use Linux thread-specific credentials")
2010-09-24 05:15:09 +04:00
if not seteuid:
seteuid = conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#define AUTOCONF_TEST 1
#define USE_SETREUID 1
2012-06-30 00:46:23 +04:00
#include "../lib/util/setid.c"
2012-02-01 01:30:45 +04:00
#include "./lib/util_sec.c"
''',
'USE_SETREUID',
addmain=False,
execute=True,
msg="Checking whether setreuid is available")
2010-09-24 05:15:09 +04:00
if not seteuid:
seteuid = conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#define AUTOCONF_TEST 1
#define USE_SETRESUID 1
2012-06-30 00:46:23 +04:00
#include "../lib/util/setid.c"
2012-02-01 01:30:45 +04:00
#include "./lib/util_sec.c"
''',
'USE_SETRESUID',
addmain=False,
execute=True,
msg="Checking whether setresuid is available")
2010-09-24 05:15:09 +04:00
if not seteuid:
seteuid = conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#define AUTOCONF_TEST 1
#define USE_SETEUID 1
2012-06-30 00:46:23 +04:00
#include "../lib/util/setid.c"
2012-02-01 01:30:45 +04:00
#include "./lib/util_sec.c"
''',
'USE_SETEUID',
addmain=False,
execute=True,
msg="Checking whether seteuid is available")
2010-09-24 05:15:09 +04:00
if not seteuid:
seteuid = conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#define AUTOCONF_TEST 1
#define USE_SETUIDX 1
2012-06-30 00:46:23 +04:00
#include "../lib/util/setid.c"
2012-02-01 01:30:45 +04:00
#include "./lib/util_sec.c"
''',
'USE_SETUIDX',
addmain=False,
execute=True,
mandatory=True,
msg="Checking whether setuidx is available")
2018-06-21 13:46:06 +03:00
# valgrind.h or valgrind/valgrind.h is checked in lib/replace/wscript
2010-12-07 16:59:53 +03:00
if Options.options.developer:
if conf.CONFIG_SET('HAVE_VALGRIND_H') or conf.CONFIG_SET('HAVE_VALGRIND_VALGRIND_H'):
conf.DEFINE('VALGRIND', '1')
2010-09-24 05:15:09 +04:00
2011-02-01 21:22:04 +03:00
if conf.CHECK_CODE('''
#include <bits/sockaddr.h>
#include <linux/netlink.h>
''',
2012-02-01 01:30:45 +04:00
'HAVE_LINUX_NETLINK_H',
2011-02-01 21:22:04 +03:00
msg="Checking whether Linux netlink is available"):
2012-06-05 08:39:15 +04:00
2011-02-01 21:22:04 +03:00
conf.CHECK_CODE('''
#include <bits/sockaddr.h>
#include <linux/netlink.h>
#include <linux/rtnetlink.h>
''',
2012-02-01 01:30:45 +04:00
'HAVE_LINUX_RTNETLINK_H',
msg='Checking whether Linux rtnetlink is available')
2012-06-05 08:39:15 +04:00
2011-02-16 18:51:14 +03:00
conf.CHECK_CODE('''
#include "../tests/fcntl_lock.c"
''',
2012-02-01 01:30:45 +04:00
'HAVE_FCNTL_LOCK',
addmain=False,
execute=True,
msg='Checking whether fcntl locking is available')
2011-02-16 18:51:14 +03:00
2016-05-12 22:46:50 +03:00
conf.CHECK_CODE('''
#include <unistd.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <errno.h>
#define DATA "ofdtest.fcntl"
2022-11-02 04:57:03 +03:00
int main(void) {
2016-05-12 22:46:50 +03:00
struct flock lck = {
.l_whence = SEEK_SET,
.l_type = F_WRLCK,
.l_start = 0,
.l_len = 1,
.l_pid = 0,
};
int ret;
int fd1;
int fd2;
char *testdir = getenv("TESTDIR");
if (testdir) {
if (chdir(testdir) != 0) {
goto err;
}
}
unlink(DATA);
fd1 = open(DATA, O_RDWR|O_CREAT|O_EXCL, 0600);
fd2 = open(DATA, O_RDWR);
if (fd1 == -1 || fd2 == -1) {
goto err;
}
ret = fcntl(fd1,F_OFD_SETLKW,&lck);
if (ret == -1) {
goto err;
}
ret = fcntl(fd2,F_OFD_SETLK,&lck);
if (ret != -1) {
goto err;
}
if (errno != EAGAIN) {
goto err;
}
ret = fcntl(fd2,F_OFD_GETLK,&lck);
if (ret == -1) {
goto err;
}
unlink(DATA);
exit(0);
err:
unlink(DATA);
exit(1);
}''',
'HAVE_OFD_LOCKS',
addmain=False,
execute=True,
msg="Checking whether fcntl lock supports open file description locks")
2019-09-27 08:49:37 +03:00
conf.CHECK_CODE('''
#include <fcntl.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/socket.h>
int main(void)
{
int sockfd, ret;
struct f_owner_ex owner, get_owner;
sockfd = socket(AF_UNIX, SOCK_STREAM, 0);
if (sockfd == -1) {
goto err;
}
owner.type = F_OWNER_PID;
owner.pid = getpid();
ret = fcntl(sockfd, F_SETOWN_EX, &owner);
if (ret == -1) {
goto err;
}
ret = fcntl(sockfd, F_GETOWN_EX, &get_owner);
if (ret == -1) {
goto err;
}
if (get_owner.type != F_OWNER_PID) {
goto err;
}
if (get_owner.pid != getpid()) {
goto err;
}
close(sockfd);
exit(0);
err:
close(sockfd);
exit(1);
}''',
'HAVE_F_OWNER_EX',
addmain=False,
execute=True,
msg="Checking whether fcntl supports flags to send direct I/O availability signals")
conf.CHECK_CODE('''
#include <fcntl.h>
#include <unistd.h>
#include <stdlib.h>
#include <stdint.h>
#define DATA "hinttest.fcntl"
int main(void)
{
2020-09-21 08:48:43 +03:00
uint64_t hint, get_hint;
2019-09-27 08:49:37 +03:00
int fd;
fd = open(DATA, O_RDONLY | O_CREAT | O_EXCL);
if (fd == -1) {
goto err;
}
2020-09-21 08:48:43 +03:00
hint = RWH_WRITE_LIFE_SHORT;
int ret = fcntl(fd, F_SET_RW_HINT, &hint);
2019-09-27 08:49:37 +03:00
if (ret == -1) {
goto err;
}
ret = fcntl(fd, F_GET_RW_HINT, &get_hint);
if (ret == -1) {
goto err;
}
if (get_hint != RWH_WRITE_LIFE_SHORT) {
goto err;
}
2020-09-21 08:48:43 +03:00
hint = RWH_WRITE_LIFE_EXTREME;
ret = fcntl(fd, F_SET_FILE_RW_HINT, &hint);
2019-09-27 08:49:37 +03:00
if (ret == -1) {
goto err;
}
ret = fcntl(fd, F_GET_FILE_RW_HINT, &get_hint);
if (ret == -1) {
goto err;
}
if (get_hint != RWH_WRITE_LIFE_EXTREME) {
goto err;
}
close(fd);
unlink(DATA);
exit(0);
err:
close(fd);
unlink(DATA);
exit(1);
}''',
'HAVE_RW_HINTS',
addmain=False,
execute=True,
2023-07-18 13:29:12 +03:00
msg="Checking whether fcntl supports setting/getting hints")
2019-09-27 08:49:37 +03:00
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtim.tv_nsec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') # Linux, Solaris
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimensec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_MTIMENSEC') # BSD, if defined _POSIX_SOURCE
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimespec.tv_nsec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') # BSD, if not defined _POSIX_SOURCE
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtime_n',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_MTIME_N') # AIX
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_umtime',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_UMTIME') # Tru64
2011-02-16 19:33:05 +03:00
if conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') or \
conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMENSEC') or \
conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') or \
conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIME_N') or \
conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_UMTIME'):
conf.DEFINE('HAVE_STAT_HIRES_TIMESTAMPS', '1')
2011-02-16 23:58:47 +03:00
# recent FreeBSD, NetBSD have creation timestamps called birthtime:
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtime',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_BIRTHTIME')
2011-02-16 23:58:47 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimespec.tv_nsec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC')
2011-02-16 23:58:47 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimensec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC')
2011-02-16 23:58:47 +03:00
2011-02-16 19:55:26 +03:00
conf.CHECK_CODE('''
ssize_t err = posix_fadvise(0,0,0x80000,POSIX_FADV_WILLNEED);
''',
2012-02-01 01:30:45 +04:00
'HAVE_POSIX_FADVISE',
msg='Checking whether posix_fadvise is available',
headers='unistd.h fcntl.h')
2011-02-16 19:55:26 +03:00
2011-02-16 20:29:33 +03:00
for v in ['_SC_NGROUPS_MAX', '_SC_NPROC_ONLN', '_SC_NPROCESSORS_ONLN', '_SC_PAGESIZE' ]:
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <unistd.h>
return sysconf(%s) == -1 ? 1 : 0;
''' % v,
'SYSCONF%s' % v,
msg='Checking whether sysconf(%s) is available' % v)
2011-02-16 20:29:33 +03:00
2011-02-16 23:58:47 +03:00
conf.CHECK_CODE('''
#include <sys/syscall.h>
#include <unistd.h>
syscall(SYS_initgroups, 16, NULL, NULL, 0);
2012-02-01 01:30:45 +04:00
''',
'HAVE_DARWIN_INITGROUPS',
msg='Checking whether to use the Darwin-specific initgroups system call')
2011-02-16 23:58:47 +03:00
2011-02-17 12:53:25 +03:00
conf.CHECK_CODE('''struct utimbuf tbuf; tbuf.actime = 0; tbuf.modtime = 1; exit(utime("foo.c",&tbuf));''',
2012-02-01 01:30:45 +04:00
'HAVE_UTIMBUF',
headers='sys/types.h utime.h',
msg='Checking whether struct utimbuf is available')
2011-02-17 12:53:25 +03:00
2011-02-17 12:59:44 +03:00
if conf.CHECK_CODE('''struct sigevent s;''',
2012-02-01 01:30:45 +04:00
'HAVE_STRUCT_SIGEVENT',
headers='sys/types.h stdlib.h stddef.h signal.h',
msg='Checking whether we have the struct sigevent'):
2011-02-17 12:59:44 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sival_ptr',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIVAL_PTR',
headers='signal.h');
2011-02-17 12:59:44 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sigval_ptr',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIGVAL_PTR',
headers='signal.h');
2011-02-17 12:59:44 +03:00
2011-02-22 13:41:06 +03:00
if os.path.exists('/proc/sys/kernel/core_pattern'):
conf.DEFINE('HAVE_SYS_KERNEL_PROC_CORE_PATTERN', '1')
2011-02-22 13:49:52 +03:00
if conf.CHECK_CODE('''
#include <time.h>
2022-11-02 04:57:03 +03:00
int main(void) {
2012-02-01 01:30:45 +04:00
struct tm *tm;
if (sizeof(time_t) == 8) {
time_t max_time = 0x7fffffffffffffffll;
tm = gmtime(&max_time);
/* This should fail with 32-bit tm_year. */
if (tm == NULL) {
/* Max time_t that works with 32-bit int tm_year in struct tm. */
max_time = 67768036191676799ll;
tm = gmtime(&max_time);
if (tm) {
exit(0);
}
}
}
exit(1);
2011-02-22 13:49:52 +03:00
}''',
2012-02-01 01:30:45 +04:00
'__TIME_T_MAX',
addmain=False,
execute=True,
msg="Checking for the maximum value of the 'time_t' type"):
2011-02-22 13:49:52 +03:00
conf.DEFINE('TIME_T_MAX', '67768036191676799ll')
2011-02-22 13:53:51 +03:00
conf.CHECK_CODE('''
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#include <sys/types.h>
2019-03-21 13:55:46 +03:00
#if defined(HAVE_SYS_SYSMACROS_H)
#include <sys/sysmacros.h>
#endif
2022-11-02 04:57:03 +03:00
int main(void) { dev_t dev = makedev(1,2); return 0; }
2011-02-22 13:53:51 +03:00
''',
2012-02-01 01:30:45 +04:00
'HAVE_MAKEDEV',
addmain=False,
msg='Checking whether the macro for makedev is available')
2011-02-22 13:53:51 +03:00
2011-02-22 13:57:23 +03:00
conf.CHECK_CODE('''
#include <stdio.h>
#include <limits.h>
#include <signal.h>
2022-11-21 16:12:43 +03:00
#include <stdlib.h>
2011-02-22 13:57:23 +03:00
void exit_on_core(int ignored) {
2012-02-01 01:30:45 +04:00
exit(1);
2011-02-22 13:57:23 +03:00
}
2022-11-02 04:57:03 +03:00
int main(void) {
2012-02-01 01:30:45 +04:00
char *newpath;
signal(SIGSEGV, exit_on_core);
newpath = realpath("/tmp", NULL);
exit((newpath != NULL) ? 0 : 1);
2011-02-22 13:57:23 +03:00
}
''',
2012-02-01 01:30:45 +04:00
'REALPATH_TAKES_NULL',
addmain=False,
execute=True,
msg='Checking whether the realpath function allows a NULL argument')
2011-02-22 13:57:23 +03:00
2011-02-22 14:43:12 +03:00
conf.CHECK_CODE('''#include "../tests/ftruncate.c"''',
2012-02-01 01:30:45 +04:00
'HAVE_FTRUNCATE_EXTEND',
msg='Checking for ftruncate extend',
addmain=False,
execute=True)
2011-02-22 22:43:23 +03:00
2018-12-26 03:03:29 +03:00
conf.CHECK_CODE('''#include "../tests/readlink.c"''',
'HAVE_BROKEN_READLINK',
msg='Checking for readlink breakage',
addmain=False,
execute=True)
2019-02-11 00:38:49 +03:00
conf.SET_TARGET_TYPE('sendfile', 'EMPTY')
conf.CHECK_LIB('sendfile')
2019-01-07 03:05:19 +03:00
if not Options.options.with_sendfile_support == False:
2011-02-22 23:11:15 +03:00
if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('k*bsd*-gnu') > -1) or (host_os.rfind('kopensolaris*-gnu') > -1):
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
int tofd, fromfd;
off_t offset;
size_t total;
ssize_t nwritten = sendfile(tofd, fromfd, &offset, total);
''',
'_HAVE_SENDFILE',
2012-06-02 07:02:21 +04:00
headers='sys/sendfile.h',
2012-02-01 01:30:45 +04:00
msg='Checking for linux sendfile support')
2011-02-22 23:11:15 +03:00
2012-03-28 02:39:57 +04:00
if conf.CONFIG_SET('_HAVE_SENDFILE'):
2011-02-22 23:11:15 +03:00
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('LINUX_SENDFILE_API', '1')
2012-02-01 01:30:45 +04:00
elif (host_os.rfind('freebsd') > -1) or (host_os.rfind('dragonfly') > -1):
2011-02-22 23:16:39 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <sys/types.h>
#include <unistd.h>
#include <sys/socket.h>
#include <sys/uio.h>
int fromfd, tofd, ret, total=0;
off_t offset, nwritten;
struct sf_hdtr hdr;
struct iovec hdtrl;
hdr.headers = &hdtrl;
hdr.hdr_cnt = 1;
hdr.trailers = NULL;
hdr.trl_cnt = 0;
hdtrl.iov_base = NULL;
hdtrl.iov_len = 0;
ret = sendfile(fromfd, tofd, offset, total, &hdr, &nwritten, 0)
''',
'_HAVE_SENDFILE',
msg='Checking for freebsd sendfile support')
2011-02-22 23:16:39 +03:00
if conf.CONFIG_SET('_HAVE_SENDFILE'):
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('FREEBSD_SENDFILE_API', '1')
2012-07-02 14:47:06 +04:00
elif (host_os.rfind('darwin') > -1):
conf.CHECK_CODE('''
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/uio.h>
int fromfd, tofd, ret;
off_t offset, nwritten;
struct sf_hdtr hdr;
struct iovec hdtrl;
hdr.headers = &hdtrl;
hdr.hdr_cnt = 1;
hdr.trailers = (void *)0;
hdr.trl_cnt = 0;
hdtrl.iov_base = (void *)0;
hdtrl.iov_len = 0;
2016-01-11 02:02:49 +03:00
ret = sendfile(fromfd, tofd, offset, &nwritten, &hdr, 0);
2012-07-02 14:47:06 +04:00
''',
'_HAVE_SENDFILE',
msg='Checking for darwin sendfile support')
if conf.CONFIG_SET('_HAVE_SENDFILE'):
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('DARWIN_SENDFILE_API', '1')
2012-06-30 01:43:56 +04:00
elif (host_os.rfind('hpux') > -1) or (host_os.rfind('osf') > -1):
2011-02-22 23:24:39 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <sys/socket.h>
#include <sys/uio.h>
int fromfd, tofd;
size_t total=0;
struct iovec hdtrl[2];
ssize_t nwritten;
off_t offset;
hdtrl[0].iov_base = 0;
hdtrl[0].iov_len = 0;
nwritten = sendfile(tofd, fromfd, offset, total, &hdtrl[0], 0);
''',
'_HAVE_SENDFILE',
2012-06-30 01:43:56 +04:00
msg='Checking for osf/hpux sendfile support')
2012-03-28 02:39:57 +04:00
if conf.CONFIG_SET('_HAVE_SENDFILE'):
2011-02-22 23:24:39 +03:00
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('HPUX_SENDFILE_API', '1')
2019-01-07 02:28:34 +03:00
elif (host_os.rfind('sunos') > -1):
conf.CHECK_FUNCS_IN('sendfilev', 'sendfile')
2011-02-22 23:33:06 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <sys/sendfile.h>,
int sfvcnt;
size_t xferred;
struct sendfilevec vec[2];
ssize_t nwritten;
int tofd;
sfvcnt = 2;
vec[0].sfv_fd = SFV_FD_SELF;
vec[0].sfv_flag = 0;
vec[0].sfv_off = 0;
vec[0].sfv_len = 0;
vec[1].sfv_fd = 0;
vec[1].sfv_flag = 0;
vec[1].sfv_off = 0;
vec[1].sfv_len = 0;
nwritten = sendfilev(tofd, vec, sfvcnt, &xferred);
''',
'_HAVE_SENDFILEV',
2019-01-07 02:28:34 +03:00
msg='Checking for solaris sendfilev support',
lib='sendfile')
2012-03-28 02:39:57 +04:00
if conf.CONFIG_SET('_HAVE_SENDFILEV'):
2011-02-22 23:33:06 +03:00
conf.DEFINE('HAVE_SENDFILEV', '1')
conf.DEFINE('SOLARIS_SENDFILE_API', '1')
2012-02-01 01:30:45 +04:00
elif (host_os.rfind('aix') > -1):
2011-02-22 23:36:35 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <sys/socket.h>
int fromfd, tofd;
size_t total=0;
struct sf_parms hdtrl;
ssize_t nwritten;
hdtrl.header_data = 0;
hdtrl.header_length = 0;
hdtrl.file_descriptor = fromfd;
hdtrl.file_offset = 0;
hdtrl.file_bytes = 0;
hdtrl.trailer_data = 0;
hdtrl.trailer_length = 0;
nwritten = send_file(&tofd, &hdtrl, 0);
''',
'_HAVE_SENDFILE',
msg='Checking for AIX send_file support')
2011-02-22 23:36:35 +03:00
if conf.CONFIG_SET('_HAVE_SENDFILE'):
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('AIX_SENDFILE_API', '1')
2011-02-22 23:11:15 +03:00
2019-01-07 03:05:19 +03:00
if Options.options.with_sendfile_support == True and not conf.CONFIG_SET('HAVE_SENDFILE'):
conf.fatal('sendfile support not found but it was requested !')
2011-06-01 02:38:55 +04:00
# Check for getcwd allowing a NULL arg.
conf.CHECK_CODE('''
#include <unistd.h>
2022-11-02 04:57:03 +03:00
int main(void) {
2012-02-01 01:30:45 +04:00
char *s = getcwd(NULL,0);
2022-11-21 16:12:43 +03:00
return s != NULL ? 0 : 1;
2011-06-01 02:38:55 +04:00
}''', 'GETCWD_TAKES_NULL', addmain=False, execute=True,
msg="getcwd takes a NULL argument")
2011-02-23 00:56:23 +03:00
# UnixWare 7.x has its getspnam in -lgen
conf.CHECK_FUNCS_IN('getspnam', 'gen')
conf.CHECK_FUNCS_IN('getspnam', 'security')
conf.CHECK_FUNCS_IN('getspnam', 'sec')
2016-03-16 21:20:02 +03:00
legacy_quota_libs = ''
2019-02-07 06:39:04 +03:00
if not Options.options.with_quotas == False:
2011-02-23 14:29:24 +03:00
# For quotas on Veritas VxFS filesystems
conf.CHECK_HEADERS('sys/fs/vx_quota.h')
# For sys/quota.h and linux/quota.h
conf.CHECK_HEADERS('sys/quota.h')
2012-09-02 23:45:53 +04:00
# For quotas on BSD systems
conf.CHECK_HEADERS('ufs/ufs/quota.h')
2019-01-31 03:27:12 +03:00
# For quotas on AIX systems
conf.CHECK_HEADERS('jfs/quota.h')
2012-09-07 21:49:25 +04:00
# For quotas on Linux XFS filesystems
if conf.CHECK_HEADERS('xfs/xqm.h'):
conf.DEFINE('HAVE_XFS_QUOTAS', '1')
else:
# For Irix XFS
conf.CHECK_CODE('''
#include "confdefs.h"
#ifdef HAVE_SYS_TYPES_H
#include <sys/types.h>
#endif
#ifdef HAVE_ASM_TYPES_H
#include <asm/types.h>
#endif
#include <sys/quota.h>
int i = Q_XGETQUOTA;''',
define='HAVE_XFS_QUOTAS',
msg='for XFS QUOTA in <sys/quota.h>',
execute=False,
local_include=False)
2016-01-11 02:02:49 +03:00
2023-07-18 13:29:12 +03:00
# For IRIX like dqb_isoftlimit instead of dqb_fsoftlimit in struct dqblk
2012-09-07 22:02:03 +04:00
conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_fsoftlimit', define='HAVE_DQB_FSOFTLIMIT',
headers='sys/quota.h')
2012-09-26 06:33:13 +04:00
#darwin style quota bytecount
conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_curbytes', define='HAVE_STRUCT_DQBLK_DQB_CURBYTES',
headers='sys/quota.h')
2019-07-31 13:14:03 +03:00
conf.CHECK_HEADERS('rpc/types.h rpc/xdr.h', together=True)
2018-01-16 19:48:10 +03:00
if conf.CHECK_HEADERS('rpcsvc/rquota.h', lib='tirpc'):
2018-01-19 16:30:20 +03:00
# Optional structure member
2012-09-07 22:41:58 +04:00
conf.CHECK_STRUCTURE_MEMBER('struct getquota_rslt', 'getquota_rslt_u',
define='HAVE_GETQUOTA_RSLT_GETQUOTA_RSLT_U',
2018-01-19 16:30:20 +03:00
headers='rpcsvc/rquota.h',
lib='tirpc')
2019-07-31 12:45:31 +03:00
# Required function for NFS quota support
2018-01-19 16:30:20 +03:00
conf.CHECK_CODE('''
clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
''',
headers="rpc/rpc.h rpc/types.h rpcsvc/rquota.h rpc/nettype.h rpc/xdr.h",
define='HAVE_NFS_QUOTAS',
msg='checking for clnt_create()',
execute=True,
local_include=False,
lib='tirpc')
2011-04-02 04:20:49 +04:00
2012-09-10 14:35:40 +04:00
if (host_os.rfind('linux') > -1):
conf.DEFINE('HAVE_QUOTACTL_LINUX', '1')
2012-09-26 06:33:13 +04:00
elif not conf.CONFIG_SET("HAVE_XFS_QUOTAS"):
if not conf.CHECK_CODE('''
#define HAVE_QUOTACTL_4A 1
#define AUTOCONF_TEST 1
2012-09-29 08:28:57 +04:00
#include "../tests/sysquotas.c"
2012-09-26 06:33:13 +04:00
''',
2012-09-29 08:28:57 +04:00
cflags=conf.env['WERROR_CFLAGS'],
2012-09-26 06:33:13 +04:00
define='HAVE_QUOTACTL_4A',
msg='for QUOTACTL_4A: long quotactl(int cmd, char *special, qid_t id, caddr_t addr)',
execute=True,
2012-09-29 08:28:57 +04:00
addmain=False):
2012-09-26 06:33:13 +04:00
conf.CHECK_CODE('''
#define HAVE_QUOTACTL_4B 1
#define AUTOCONF_TEST 1
2012-09-29 08:28:57 +04:00
#include "../tests/sysquotas.c"
2012-09-26 06:33:13 +04:00
''',
2012-09-29 08:28:57 +04:00
cflags=conf.env['WERROR_CFLAGS'],
2012-09-26 06:33:13 +04:00
define='HAVE_QUOTACTL_4B',
msg='for QUOTACTL_4B: int quotactl(const char *path, int cmd, int id, char *addr)',
execute=True,
2012-09-29 08:28:57 +04:00
addmain=False)
2012-09-26 06:33:13 +04:00
2012-09-10 14:35:40 +04:00
if conf.CONFIG_SET('HAVE_QUOTACTL_LINUX') or \
conf.CONFIG_SET('HAVE_QUOTACTL_4A') or \
2012-09-26 06:42:15 +04:00
conf.CONFIG_SET('HAVE_QUOTACTL_4B') or \
conf.CONFIG_SET('HAVE_XFS_QUOTAS'):
2012-09-10 14:35:40 +04:00
conf.DEFINE('HAVE_SYS_QUOTAS', '1')
2012-09-26 06:42:15 +04:00
conf.DEFINE('WITH_QUOTAS', '1')
2012-09-10 14:35:40 +04:00
2016-02-03 07:41:42 +03:00
#
# check if Legacy quota code can be brought in
# if standard interfaces are not supported
#
if not conf.CONFIG_SET('WITH_QUOTAS'):
if host_os.rfind('sunos5') > -1:
conf.DEFINE('SUNOS5', '1')
legacy_quota_libs = 'nsl'
conf.CHECK_CODE('''
#define WITH_QUOTAS 1
#define AUTOCONF_TEST 1
#include "../tests/oldquotas.c"
''',
cflags=conf.env['WERROR_CFLAGS'],
define='WITH_QUOTAS',
lib=legacy_quota_libs,
msg='Checking whether legacy quota code can be used',
execute=False,
addmain=False)
if not conf.CONFIG_SET('WITH_QUOTAS'):
legacy_quota_libs = ''
2016-03-16 21:20:02 +03:00
conf.env['legacy_quota_libs'] = legacy_quota_libs
2016-02-03 07:41:42 +03:00
2019-02-07 06:39:04 +03:00
if Options.options.with_quotas == True and not conf.CONFIG_SET('WITH_QUOTAS'):
2020-05-12 16:07:14 +03:00
conf.fatal('quota support not found but it was requested !')
2019-02-07 06:39:04 +03:00
2018-03-13 18:58:49 +03:00
conf.CHECK_CODE('(void)unshare(CLONE_FS);',
headers='sched.h',
define='HAVE_UNSHARE_CLONE_FS',
msg='for Linux unshare(CLONE_FS)')
2011-04-02 04:20:49 +04:00
#
2014-10-24 19:55:17 +04:00
# cluster support (CTDB)
2011-04-02 04:20:49 +04:00
#
2014-10-10 07:29:51 +04:00
if not Options.options.with_cluster_support:
Logs.info("building without cluster support (--without-cluster-support)")
conf.env.with_ctdb = False
2011-04-02 04:20:49 +04:00
else:
Logs.info("building with cluster support")
2014-10-10 07:29:51 +04:00
conf.env.with_ctdb = True
2015-11-07 15:21:34 +03:00
conf.DEFINE('CLUSTER_SUPPORT', 1)
2011-04-02 04:20:49 +04:00
2011-04-14 02:17:29 +04:00
if Options.options.with_profiling_data:
conf.DEFINE('WITH_PROFILE', 1);
2014-11-14 14:52:33 +03:00
conf.CHECK_FUNCS('getrusage', headers="sys/time.h sys/resource.h")
2011-04-14 02:17:29 +04:00
2013-11-27 17:04:34 +04:00
if (conf.CHECK_HEADERS('linux/ioctl.h sys/ioctl.h linux/fs.h') and
2016-01-11 02:02:49 +03:00
conf.CHECK_DECLS('FS_IOC_GETFLAGS FS_COMPR_FL', headers='linux/fs.h')):
conf.DEFINE('HAVE_LINUX_IOCTL', '1')
2013-03-08 14:47:55 +04:00
2016-03-26 15:18:07 +03:00
conf.env['CFLAGS_CEPHFS'] = "-D_FILE_OFFSET_BITS=64"
2013-04-24 23:52:57 +04:00
if Options.options.libcephfs_dir:
2019-06-18 15:35:02 +03:00
Logs.error('''--with-libcephfs no longer supported, please use compiler
flags instead, e.g. GCC LIBRARY_PATH and C_INCLUDE_PATH''')
sys.exit(1)
2013-04-24 23:52:57 +04:00
2017-07-20 12:10:57 +03:00
if (Options.options.with_cephfs and
conf.CHECK_HEADERS('cephfs/libcephfs.h', False, False, 'cephfs') and
2018-01-16 01:20:39 +03:00
conf.CHECK_LIB('cephfs', shlib=True)):
2020-01-09 19:11:39 +03:00
if (Options.options.with_acl_support and
conf.CHECK_FUNCS_IN('ceph_statx', 'cephfs',
headers='cephfs/libcephfs.h')):
2016-07-26 18:44:47 +03:00
conf.DEFINE('HAVE_CEPH', '1')
2023-02-15 23:21:43 +03:00
conf.CHECK_FUNCS_IN('ceph_select_filesystem', 'cephfs',
headers='cephfs/libcephfs.h')
2016-07-26 18:44:47 +03:00
else:
2020-01-09 19:11:39 +03:00
Logs.warn('''Ceph support disabled due to --without-acl-support
or lack of ceph_statx support''')
2016-07-26 18:44:47 +03:00
conf.undefine('HAVE_CEPH')
2013-04-24 23:52:57 +04:00
2013-05-29 15:21:46 +04:00
if Options.options.with_glusterfs:
2015-03-07 17:31:19 +03:00
conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 4" --cflags --libs',
2013-05-29 15:21:46 +04:00
msg='Checking for glusterfs-api >= 4', uselib_store="GFAPI")
2017-10-31 17:52:49 +03:00
conf.CHECK_HEADERS('glusterfs/api/glfs.h', lib='gfapi')
2013-05-29 15:21:46 +04:00
conf.CHECK_LIB('gfapi', shlib=True)
2017-10-31 17:52:49 +03:00
if conf.CONFIG_SET('HAVE_GLUSTERFS_API_GLFS_H'):
2016-07-26 18:44:47 +03:00
if Options.options.with_acl_support:
conf.DEFINE('HAVE_GLUSTERFS', '1')
else:
Logs.warn("GlusterFS support disabled due to --without-acl-support")
conf.undefine('HAVE_GLUSTERFS')
2013-05-29 15:21:46 +04:00
else:
conf.undefine('HAVE_GLUSTERFS')
2017-11-14 13:21:44 +03:00
conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 6" --cflags --libs',
msg='Checking for glusterfs-api >= 6',
uselib_store="GFAPI_VER_6")
2018-03-20 09:02:20 +03:00
conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 7.6" --cflags --libs',
msg='Checking for glusterfs-api >= 7.6',
uselib_store="GFAPI_VER_7_6")
2020-11-02 18:10:44 +03:00
conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 7.9" --cflags --libs',
msg='Checking for glusterfs-api >= 7.9',
uselib_store="GFAPI_VER_7_9")
2022-08-19 09:47:33 +03:00
conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 7.11" --cflags --libs',
msg='Checking for glusterfs-api >= 7.11',
uselib_store="GFAPI_VER_7_11")
2013-05-29 15:21:46 +04:00
else:
conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
conf.undefine('HAVE_GLUSTERFS')
2014-09-01 12:40:10 +04:00
if Options.options.enable_vxfs:
2016-01-11 02:02:49 +03:00
conf.DEFINE('HAVE_VXFS', '1')
2014-09-01 12:40:10 +04:00
2019-06-05 18:01:49 +03:00
if conf.CHECK_CFG(package='liburing', args='--cflags --libs',
msg='Checking for liburing package', uselib_store="URING"):
if (conf.CHECK_HEADERS('liburing.h', lib='uring')
and conf.CHECK_LIB('uring', shlib=True)):
conf.CHECK_FUNCS_IN('io_uring_ring_dontfork', 'uring',
headers='liburing.h')
2022-08-09 13:29:24 +03:00
# There are a few distributions, which
# don't seem to have linux/openat2.h available
# during the liburing build, which means liburing/compat.h
# defines struct open_how directly instead of including
# linux/openat2.h, while linux/openat2.h is
# available on the installed system, which cause problems
# when we try to include both files.
#
# check if struct open_how is defined in liburing/compat.h
2023-07-18 13:29:12 +03:00
# itself and not via including linux/openat2.h
2022-08-09 13:29:24 +03:00
conf.CHECK_TYPE_IN('struct open_how', 'liburing/compat.h',
cflags='-D_LINUX_OPENAT2_H',
define='HAVE_STRUCT_OPEN_HOW_LIBURING_COMPAT_H')
2019-06-05 18:01:49 +03:00
conf.DEFINE('HAVE_LIBURING', '1')
2013-05-06 16:14:02 +04:00
conf.env.build_regedit = False
if not Options.options.with_regedit == False:
2012-08-02 13:29:10 +04:00
conf.PROCESS_SEPARATE_RULE('system_ncurses')
2013-05-06 16:14:02 +04:00
if conf.CONFIG_SET('HAVE_NCURSES'):
conf.env.build_regedit = True
if conf.env.build_regedit:
Logs.info("building regedit")
else:
if Options.options.with_regedit == False:
Logs.info("not building regedit (--without-regedit)")
elif Options.options.with_regedit == True:
Logs.error("ncurses not available, cannot build regedit")
conf.fatal("ncurses not available, but --with-regedit was specified")
else:
Logs.info("ncurses not available, not building regedit")
2017-02-03 16:57:45 +03:00
if conf.CHECK_HEADERS('ftw.h') and conf.CHECK_FUNCS('nftw'):
conf.env.build_mvxattr = True
2020-03-04 20:51:01 +03:00
conf.env.build_winexe = False
if not Options.options.with_winexe == False:
if conf.CONFIG_SET('HAVE_WINEXE_CC_WIN32') or conf.CONFIG_SET('HAVE_WINEXE_CC_WIN64'):
conf.env.build_winexe = True
if conf.env.build_winexe:
Logs.info("building winexe")
else:
if Options.options.with_winexe == False:
Logs.info("not building winexe (--without-winexe)")
elif Options.options.with_winexe == True:
Logs.error("mingw not available, cannot build winexe")
conf.fatal("mingw not available, but --with-winexe was specified")
else:
Logs.info("mingw not available, not building winexe")
2014-04-16 02:36:25 +04:00
conf.CHECK_FUNCS_IN('DES_pcbc_encrypt', 'crypto')
if Options.options.with_fake_kaserver == True:
conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
if (conf.CONFIG_SET('HAVE_AFS_PARAM_H') and conf.CONFIG_SET('HAVE_AFS_STDS_H') and conf.CONFIG_SET('HAVE_DES_PCBC_ENCRYPT')):
conf.DEFINE('WITH_FAKE_KASERVER', '1')
else:
conf.fatal('AFS headers not available, but --with-fake-kaserver was specified')
2016-01-20 17:08:31 +03:00
if conf.CHECK_CFG(package='glib-2.0',
args='--cflags --libs',
msg='Checking for glib-2.0',
uselib_store="GLIB-2.0"):
if (conf.CHECK_HEADERS('glib.h', lib='glib-2.0') and conf.CHECK_LIB('glib-2.0', shlib=True)):
conf.DEFINE('HAVE_GLIB', 1)
if conf.CONFIG_SET('HAVE_GLIB'):
conf.DEFINE('WITH_TEVENT_GLIB_GLUE', '1')
2014-07-23 09:15:50 +04:00
conf.env['libtracker']=''
2016-02-15 12:42:52 +03:00
tracker_versions = ['2.0', '1.0', '0.16', '0.14']
for version in tracker_versions:
testlib = 'tracker-sparql-' + version
if conf.CHECK_CFG(package=testlib,
args='--cflags --libs',
mandatory=False):
conf.SET_TARGET_TYPE(testlib, 'SYSLIB')
conf.env['libtracker'] = testlib
conf.DEFINE('HAVE_TRACKER', '1')
break
2019-04-17 17:42:20 +03:00
with_spotlight_tracker_backend = (
conf.CONFIG_SET('HAVE_TRACKER')
and conf.CONFIG_SET('HAVE_GLIB')
and conf.env['BISON']
and conf.env['FLEX']
and conf.CONFIG_GET('HAVE_UTF8_NORMALISATION')
)
2019-08-05 17:25:01 +03:00
with_spotlight_es_backend = (
conf.CONFIG_SET('HAVE_JSON_OBJECT')
and conf.env['BISON']
and conf.env['FLEX']
and conf.CONFIG_GET('HAVE_UTF8_NORMALISATION')
)
2016-07-26 13:47:43 +03:00
conf.env.with_wsp = False
if conf.CONFIG_GET('ENABLE_SELFTEST'):
Options.options.with_wsp = True
if Options.options.with_wsp:
Logs.info("building with WSP support")
conf.DEFINE('WITH_WSP', '1')
conf.env.with_wsp = True
2014-07-23 09:15:50 +04:00
conf.env.with_spotlight = False
2019-04-17 17:42:20 +03:00
if Options.options.with_spotlight is not False:
2019-04-17 12:00:52 +03:00
backends = ['noindex']
2019-05-06 16:03:02 +03:00
2019-04-17 17:42:20 +03:00
if not conf.env['BISON']:
Logs.warn("Spotlight support requested but bison missing")
if not conf.env['FLEX']:
Logs.warn("Spotlight support requested but flex missing")
if not conf.CONFIG_GET('HAVE_UTF8_NORMALISATION'):
Logs.warn("Missing support for Unicode normalisation. "
"Try installing icu-dev or libicu-devel.")
2019-04-17 12:00:52 +03:00
if not conf.CONFIG_SET('HAVE_TRACKER'):
Logs.warn('Missing libtracker-sparql development files for Spotlight backend "tracker"')
if not conf.CONFIG_SET('HAVE_GLIB'):
Logs.warn('Missing glib-2.0 development files for Spotlight backend "tracker"')
2019-08-05 17:25:01 +03:00
if not conf.CONFIG_GET('HAVE_JSON_OBJECT'):
Logs.warn('Missing libjansson development files for Spotlight backend "elasticsearch"')
2019-05-06 16:03:02 +03:00
2019-04-17 17:42:20 +03:00
if with_spotlight_tracker_backend:
conf.env.spotlight_backend_tracker = True
backends.append('tracker')
conf.DEFINE('HAVE_SPOTLIGHT_BACKEND_TRACKER', '1')
2019-08-05 17:25:01 +03:00
if with_spotlight_es_backend:
conf.env.spotlight_backend_es = True
backends.append('elasticsearch')
conf.DEFINE('HAVE_SPOTLIGHT_BACKEND_ES', '1')
if (Options.options.with_spotlight is True
and not conf.env.spotlight_backend_tracker
and not conf.env.spotlight_backend_es):
conf.fatal("Unmet dependencies for Spotlight backends")
2019-04-17 17:42:20 +03:00
2019-05-06 16:03:02 +03:00
Logs.info("Building with Spotlight support, available backends: %s" % ', '.join(backends))
2016-02-15 12:42:52 +03:00
conf.DEFINE('WITH_SPOTLIGHT', '1')
conf.env.with_spotlight = True
2012-07-10 17:16:35 +04:00
2019-07-31 13:19:24 +03:00
if not conf.CONFIG_SET('HAVE_RPC_XDR_H'):
2021-09-08 16:42:57 +03:00
conf.CHECK_HEADERS('rpc/types.h rpc/xdr.h', together=True, lib='tirpc')
2017-10-18 21:48:37 +03:00
2019-02-12 22:28:32 +03:00
if conf.CHECK_FUNCS_IN('nscd_flush_cache', 'nscd', headers='libnscd.h'):
conf.DEFINE('HAVE_NSCD_FLUSH_CACHE', '1')
2020-09-02 15:35:21 +03:00
forced_static_modules.extend(['auth_builtin', 'auth_sam', 'auth_winbind'])
default_static_modules.extend(['pdb_smbpasswd', 'pdb_tdbsam',
'auth_unix',
'nss_info_template', 'idmap_tdb', 'idmap_passdb',
'idmap_nss'])
default_shared_modules.extend(['vfs_recycle', 'vfs_audit', 'vfs_extd_audit', 'vfs_full_audit',
'vfs_fake_perms', 'vfs_default_quota', 'vfs_readonly', 'vfs_cap',
'vfs_expand_msdfs', 'vfs_shadow_copy', 'vfs_shadow_copy2',
'vfs_readahead', 'vfs_xattr_tdb',
'vfs_streams_xattr', 'vfs_streams_depot', 'vfs_acl_xattr', 'vfs_acl_tdb',
'vfs_preopen', 'vfs_catia',
'vfs_media_harmony', 'vfs_unityed_media', 'vfs_fruit', 'vfs_shell_snap',
'vfs_commit', 'vfs_worm', 'vfs_crossrename', 'vfs_linux_xfs_sgid',
'vfs_time_audit', 'vfs_offline', 'vfs_virusfilter', 'vfs_widelinks'])
2020-09-02 11:50:04 +03:00
if host_os.rfind('linux') > -1:
default_shared_modules.extend(['vfs_snapper'])
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['idmap_tdb2', 'idmap_script'])
2015-08-13 15:22:45 +03:00
# these have broken dependencies
2020-09-02 15:35:21 +03:00
forced_shared_modules.extend(['idmap_autorid', 'idmap_rid', 'idmap_hash'])
2011-02-11 03:31:37 +03:00
if Options.options.developer:
2020-09-02 15:35:21 +03:00
default_static_modules.extend(['charset_weird'])
2023-06-05 16:36:55 +03:00
default_shared_modules.extend(['vfs_skel_opaque',
'vfs_skel_transparent',
'vfs_shadow_copy_test',
2021-04-14 13:31:27 +03:00
'pdb_test',
2020-09-02 16:19:52 +03:00
'vfs_fake_dfq',
'gpext_security', 'gpext_registry', 'gpext_scripts'])
2011-09-09 17:51:06 +04:00
2012-08-15 14:34:41 +04:00
if Options.options.enable_selftest or Options.options.developer:
2020-09-02 16:19:52 +03:00
default_shared_modules.extend(['vfs_fake_acls', 'vfs_nfs4acl_xattr',
'vfs_error_inject',
'vfs_delay_inject'])
2012-08-15 14:34:41 +04:00
2012-05-21 13:45:12 +04:00
if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
2020-09-02 15:35:21 +03:00
default_static_modules.extend(['pdb_samba_dsdb', 'auth_samba4', 'vfs_dfs_samba4'])
default_shared_modules.extend(['vfs_posix_eadb'])
2011-05-06 18:50:04 +04:00
2011-02-11 03:31:37 +03:00
if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_zfsacl'])
2011-02-11 03:31:37 +03:00
if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_syncops', 'vfs_dirsort'])
2011-02-11 03:31:37 +03:00
if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_fileid'])
2011-02-11 03:31:37 +03:00
2014-06-14 02:55:02 +04:00
if (conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS')):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_aio_fork'])
2011-02-11 03:31:37 +03:00
2019-06-05 18:01:49 +03:00
if conf.CONFIG_SET('HAVE_LIBURING'):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_io_uring'])
2019-06-05 18:01:49 +03:00
2012-07-16 14:44:42 +04:00
if Options.options.with_pthreadpool:
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_aio_pthread'])
2012-07-16 14:44:42 +04:00
2011-02-11 03:31:37 +03:00
if conf.CONFIG_SET('HAVE_LDAP'):
2020-09-02 15:35:21 +03:00
default_static_modules.extend(['pdb_ldapsam', 'idmap_ldap'])
2011-02-11 03:31:37 +03:00
2011-02-16 23:58:47 +03:00
if conf.CONFIG_SET('DARWINOS'):
2020-09-02 15:35:21 +03:00
default_static_modules.extend(['charset_macosxfs'])
2011-02-16 23:58:47 +03:00
2020-05-29 11:39:00 +03:00
if conf.CONFIG_SET('HAVE_GPFS') and conf.CONFIG_SET('HAVE_KERNEL_OPLOCKS_LINUX'):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_gpfs'])
2011-05-04 20:01:04 +04:00
2012-09-04 17:29:58 +04:00
if (conf.CONFIG_SET('HAVE_LINUX_IOCTL')
and conf.CONFIG_SET('HAVE_BASENAME') and conf.CONFIG_SET('HAVE_DIRNAME')):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_btrfs'])
2013-03-08 14:47:55 +04:00
2013-04-24 23:52:57 +04:00
if conf.CONFIG_SET("HAVE_CEPH"):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_ceph'])
2019-03-26 18:35:18 +03:00
# Unlike vfs_ceph, vfs_ceph_snapshots doesn't depend on libcephfs, so
# can be enabled atop a kernel CephFS share (with vfs_default) in
# addition to vfs_ceph. Still, only enable vfs_ceph_snapshots builds
# if we're building with libcephfs for now.
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_ceph_snapshots'])
2013-04-24 23:52:57 +04:00
2013-05-29 15:21:46 +04:00
if conf.CONFIG_SET('HAVE_GLUSTERFS'):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_glusterfs'])
2013-05-29 15:21:46 +04:00
2019-08-01 01:47:29 +03:00
if conf.CONFIG_SET('HAVE_SETMNTENT'):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_glusterfs_fuse'])
2019-08-01 01:47:29 +03:00
2014-09-01 12:40:10 +04:00
if conf.CONFIG_SET('HAVE_VXFS'):
2020-09-02 15:35:21 +03:00
default_shared_modules.extend(['vfs_vxfs'])
2014-09-01 12:40:10 +04:00
2011-02-11 03:31:37 +03:00
explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
2013-02-06 12:43:16 +04:00
def replace_list_item(lst, item, value):
try:
idx = lst.index(item)
lst[idx] = value
except:
pass
# PDB module file name should have the same name as module registers itself
# In Autoconf build we export LDAP passdb module as ldapsam but WAF build
# was always exporting pdb_ldap. In order to support existing packages
# allow referring to pdb_ldapsam as pdb_ldap but use proper name internally.
replace_list_item(explicit_shared_modules, 'pdb_ldap', 'pdb_ldapsam')
replace_list_item(explicit_static_modules, 'pdb_ldap', 'pdb_ldapsam')
2015-08-13 15:22:45 +03:00
final_static_modules = []
final_static_modules.extend(TO_LIST(required_static_modules))
final_shared_modules = []
if '!FORCED' not in explicit_static_modules:
final_static_modules.extend(TO_LIST(forced_static_modules))
if '!FORCED' not in explicit_shared_modules:
final_shared_modules.extend(TO_LIST(forced_shared_modules))
if '!DEFAULT' not in explicit_static_modules:
final_static_modules.extend(TO_LIST(default_static_modules))
if '!DEFAULT' not in explicit_shared_modules:
final_shared_modules.extend(TO_LIST(default_shared_modules))
if 'ALL' in explicit_static_modules:
for m in default_shared_modules:
if m in final_shared_modules:
final_shared_modules.remove(m)
final_static_modules.append(m)
if 'ALL' in explicit_shared_modules:
for m in default_static_modules:
if m in final_static_modules:
final_static_modules.remove(m)
final_shared_modules.append(m)
2011-02-11 03:31:37 +03:00
for m in explicit_static_modules:
2015-08-13 15:22:45 +03:00
if m in ['ALL','!DEFAULT','!FORCED']:
continue
if m.startswith('!'):
m = m[1:]
if m in required_static_modules:
2018-02-02 17:34:32 +03:00
raise Errors.WafError('These modules are REQUIRED as static modules: %s' %
2015-08-13 15:22:45 +03:00
' '.join(required_static_modules))
if m in final_static_modules:
final_static_modules.remove(m)
continue
if m in forced_shared_modules:
2018-02-02 17:34:32 +03:00
raise Errors.WafError('These modules MUST be configured as shared modules: %s' %
2015-08-13 15:22:45 +03:00
' '.join(forced_shared_modules))
2011-02-11 03:31:37 +03:00
if m in final_shared_modules:
final_shared_modules.remove(m)
2015-08-13 15:22:45 +03:00
if m not in final_static_modules:
final_static_modules.append(m)
2011-02-11 03:31:37 +03:00
for m in explicit_shared_modules:
2015-08-13 15:22:45 +03:00
if m in ['ALL','!DEFAULT','!FORCED']:
continue
if m.startswith('!'):
m = m[1:]
if m in final_shared_modules:
final_shared_modules.remove(m)
continue
if m in required_static_modules:
2018-02-02 17:34:32 +03:00
raise Errors.WafError('These modules are REQUIRED as static modules: %s' %
2015-08-13 15:22:45 +03:00
' '.join(required_static_modules))
if m in forced_static_modules:
2018-02-02 17:34:32 +03:00
raise Errors.WafError('These module MUST be configured as static modules: %s' %
2015-08-13 15:22:45 +03:00
' '.join(forced_static_modules))
2011-02-11 03:31:37 +03:00
if m in final_static_modules:
final_static_modules.remove(m)
2015-08-13 15:22:45 +03:00
if m not in final_shared_modules:
final_shared_modules.append(m)
2012-10-18 12:58:04 +04:00
2011-02-11 03:31:37 +03:00
conf.env['static_modules'] = final_static_modules
conf.env['shared_modules'] = final_shared_modules
conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
2020-08-19 21:48:55 +03:00
conf.DEFINE('STRING_SHARED_MODULES', ' '.join(final_shared_modules), quote=True)
2011-02-11 03:31:37 +03:00
static_list = {}
shared_list = {}
2023-06-05 16:36:55 +03:00
prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext']
2011-02-11 03:31:37 +03:00
conf.env['MODULE_PREFIXES'] = prefixes
for p in prefixes:
for m in final_static_modules:
if m.find(p) == 0:
if not p in static_list:
static_list[p] = []
static_list[p].append(m)
for m in final_shared_modules:
if m.find(p) == 0:
if not p in shared_list:
shared_list[p] = []
shared_list[p].append(m)
for p in prefixes:
static_env = "%s_STATIC" % p.upper()
shared_env = "%s_SHARED" % p.upper()
conf.env[static_env] = []
conf.env[shared_env] = []
if p in static_list:
2019-08-26 00:08:18 +03:00
decl_list = " ".join("extern NTSTATUS %s_init(TALLOC_CTX *mem_ctx); " % entry for entry in static_list[p])
2011-02-11 03:31:37 +03:00
for entry in static_list[p]:
conf.env[static_env].append('%s' % entry)
conf.DEFINE('static_decl_%s' % p, decl_list)
2017-04-20 22:24:43 +03:00
conf.DEFINE('static_init_%s(mem_ctx)' % p, '{ %s_init((mem_ctx)); }' % '_init((mem_ctx)); '.join(static_list[p]))
2011-02-11 03:31:37 +03:00
else:
conf.DEFINE('static_decl_%s' % p, '')
2017-04-20 22:24:43 +03:00
conf.DEFINE('static_init_%s(mem_ctx)' % p, '{}')
2011-02-11 03:31:37 +03:00
if p in shared_list:
for entry in shared_list[p]:
2011-12-03 10:03:35 +04:00
conf.DEFINE('%s_init' % entry, 'samba_init_module')
2011-02-11 03:31:37 +03:00
conf.env[shared_env].append('%s' % entry)
2015-08-13 15:22:45 +03:00
Logs.info("%s: %s" % (static_env, ','.join(conf.env[static_env])))
Logs.info("%s: %s" % (shared_env, ','.join(conf.env[shared_env])))
2011-02-11 03:31:37 +03:00
2020-09-02 11:50:04 +03:00
if (('vfs_snapper' in shared_list.get('vfs', []) or 'vfs_snapper' in static_list.get('vfs', []))
and not (conf.CHECK_CFG(package='dbus-1', args='--cflags --libs',
msg='Checking for dbus', uselib_store="DBUS-1")
and conf.CHECK_HEADERS('dbus/dbus.h', lib='dbus-1')
and conf.CHECK_LIB('dbus-1', shlib=True))):
conf.fatal("vfs_snapper is enabled but prerequisite dbus-1 package not "
2020-11-06 16:04:19 +03:00
"found. Use --with-shared-modules='!vfs_snapper' to disable "
2020-09-02 11:50:04 +03:00
"vfs_snapper support.")
2010-03-20 18:37:03 +03:00
conf.SAMBA_CONFIG_H('include/config.h')