2013-04-08 02:33:55 +04:00
#!/usr/bin/env python
2010-03-20 18:37:03 +03:00
2018-02-02 17:34:32 +03:00
srcdir = ".."
2010-10-25 10:33:39 +04:00
2010-03-20 18:37:03 +03:00
import sys, os
2010-04-11 11:35:08 +04:00
from optparse import SUPPRESS_HELP
2018-02-02 17:34:32 +03:00
sys.path.insert(0, srcdir + "/buildtools/wafsamba")
2011-02-21 04:14:38 +03:00
sys.path.insert(0, "source3")
2018-02-02 17:34:32 +03:00
from waflib import Options, Logs, Errors
import wafsamba
2010-03-25 15:58:35 +03:00
import build.charset
2018-02-02 17:34:32 +03:00
from wafsamba import samba_utils
from samba_utils import TO_LIST
2010-04-23 10:59:43 +04:00
import samba3
waf: fix array access out of bounds exception in the check for flex
If flex is not installed the following expection is triggered:
Checking for flex
Checking for program 'flex' : not found
Traceback (most recent call last):
File "/home/slow/git/samba/scratch/third_party/waf/waflib/Scripting.py", line 158, in waf_entry_point
run_commands()
File "/home/slow/git/samba/scratch/third_party/waf/waflib/Scripting.py", line 251, in run_commands
ctx = run_command(cmd_name)
File "/home/slow/git/samba/scratch/third_party/waf/waflib/Scripting.py", line 235, in run_command
ctx.execute()
File "/home/slow/git/samba/scratch/third_party/waf/waflib/Configure.py", line 159, in execute
super(ConfigurationContext, self).execute()
File "/home/slow/git/samba/scratch/third_party/waf/waflib/Context.py", line 204, in execute
self.recurse([os.path.dirname(g_module.root_path)])
File "/home/slow/git/samba/scratch/third_party/waf/waflib/Context.py", line 286, in recurse
user_function(self)
File "/home/slow/git/samba/scratch/wscript", line 307, in configure
conf.RECURSE('source3')
File "./buildtools/wafsamba/samba_utils.py", line 66, in fun
return f(*k, **kw)
File "./buildtools/wafsamba/samba_utils.py", line 481, in RECURSE
return ctx.recurse(relpath)
File "/home/slow/git/samba/scratch/third_party/waf/waflib/Context.py", line 286, in recurse
user_function(self)
File "/home/slow/git/samba/scratch/source3/wscript", line 1660, in configure
flex.configure(conf)
File "/home/slow/git/samba/scratch/third_party/waf/waflib/Tools/flex.py", line 59, in configure
if re.search (r"\\msys\\[0-9.]+\\bin\\flex.exe$", conf.env.FLEX[0]):
IndexError: list index out of range
This happens because when the detection of flex fails, an excpetion is
thrown in Configure.py:find_program by calling self.fatal(), but as
Configure.py:find_program() is called from
samba_waf18.py:find_program_samba() which sets the keyword argument
mandatory=False, Configure.py:conf:fun() catches the expection.
As a result in flex.py the call to conf.find_program('flex', var='FLEX')
does not abort and
if re.search (r"\\msys\\[0-9.]+\\bin\\flex.exe$", conf.env.FLEX[0])
is executed even though conf.env.FLEX is None.
As this is a not a problem of upstream Samba, but triggered by our
samba_waf18.py:find_program_samba(), I don't pursue an upstream
fix. Instead, just use conf.find_program() directly instead of the
wrapper in flex.py.
Signed-off-by: Ralph Boehme <slow@samba.org>
Reviewed-by: Noel Power <npower@samba.org>
2019-03-29 20:18:27 +03:00
from waflib.Tools import bison
2010-03-20 18:37:03 +03:00
2015-09-28 22:47:16 +03:00
default_prefix = Options.default_prefix = '/usr/local/samba'
2011-06-28 13:31:02 +04:00
2018-02-02 17:34:32 +03:00
def options(opt):
2010-03-20 18:37:03 +03:00
2010-03-26 10:42:37 +03:00
opt.add_option('--with-static-modules',
2015-08-13 15:22:45 +03:00
help=("Comma-separated list of names of modules to statically link in. "+
"May include !module to disable 'module'. "+
"Can be '!FORCED' to disable all non-required static only modules. "+
"Can be '!DEFAULT' to disable all modules defaulting to a static build. "+
"Can be 'ALL' to build all default shared modules static. "+
"The most specific one wins, while the order is ignored "+
"and --with-static-modules is evaluated before "+
"--with-shared-modules"),
2010-09-27 02:24:47 +04:00
action="store", dest='static_modules', default=None)
2010-03-26 10:42:37 +03:00
opt.add_option('--with-shared-modules',
2015-08-13 15:22:45 +03:00
help=("Comma-separated list of names of modules to build shared. "+
"May include !module to disable 'module'. "+
"Can be '!FORCED' to disable all non-required shared only modules. "+
"Can be '!DEFAULT' to disable all modules defaulting to a shared build. "+
"Can be 'ALL' to build all default static modules shared. "+
"The most specific one wins, while the order is ignored "+
"and --with-static-modules is evaluated before "+
"--with-shared-modules"),
2010-09-27 02:24:47 +04:00
action="store", dest='shared_modules', default=None)
2010-03-26 10:42:37 +03:00
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('winbind')
opt.samba_add_onoff_option('ads')
opt.samba_add_onoff_option('ldap')
opt.samba_add_onoff_option('cups', with_name="enable", without_name="disable")
opt.samba_add_onoff_option('iprint', with_name="enable", without_name="disable")
opt.samba_add_onoff_option('pam')
2019-02-07 06:39:04 +03:00
opt.samba_add_onoff_option('quotas', default=None)
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('sendfile-support', default=None)
opt.samba_add_onoff_option('utmp')
opt.samba_add_onoff_option('avahi', with_name="enable", without_name="disable")
opt.samba_add_onoff_option('iconv')
opt.samba_add_onoff_option('acl-support')
opt.samba_add_onoff_option('dnsupdate')
opt.samba_add_onoff_option('syslog')
opt.samba_add_onoff_option('automount')
opt.samba_add_onoff_option('dmapi', default=None) # None means autodetection
opt.samba_add_onoff_option('fam', default=None) # None means autodetection
opt.samba_add_onoff_option('profiling-data', default=False)
opt.samba_add_onoff_option('libarchive', default=True)
2010-04-11 11:35:08 +04:00
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('cluster-support', default=False)
2011-04-02 04:20:49 +04:00
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('regedit', default=None)
2012-07-10 17:16:35 +04:00
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('fake-kaserver',
2014-04-16 02:36:25 +04:00
help=("Include AFS fake-kaserver support"), default=False)
2013-04-24 23:52:57 +04:00
opt.add_option('--with-libcephfs',
help=("Directory under which libcephfs is installed"),
action="store", dest='libcephfs_dir', default=None)
2019-01-30 19:13:47 +03:00
opt.samba_add_onoff_option('glusterfs', with_name="enable", without_name="disable", default=True)
opt.samba_add_onoff_option('cephfs', with_name="enable", without_name="disable", default=True)
2011-04-02 04:20:49 +04:00
2014-09-01 12:40:10 +04:00
opt.add_option('--enable-vxfs',
help=("enable support for VxFS (default=no)"),
action="store_true", dest='enable_vxfs', default=False)
2019-04-17 17:42:20 +03:00
# default = None means autodetection
opt.samba_add_onoff_option('spotlight', with_name="enable", without_name="disable", default=None)
2010-03-26 10:42:37 +03:00
2010-03-20 18:37:03 +03:00
def configure(conf):
2012-09-04 14:15:28 +04:00
default_static_modules = []
default_shared_modules = []
2015-08-13 15:22:45 +03:00
required_static_modules = []
forced_static_modules = []
forced_shared_modules = []
2012-09-04 14:15:28 +04:00
2010-03-20 18:37:03 +03:00
if Options.options.developer:
conf.ADD_CFLAGS('-DDEVELOPER -DDEBUG_PASSWORD')
2011-02-21 04:14:38 +03:00
conf.env.developer = True
2010-03-20 18:37:03 +03:00
2012-03-16 15:57:09 +04:00
if sys.platform != 'openbsd5':
conf.ADD_LDFLAGS("-Wl,--export-dynamic", testflags=True)
2010-12-09 17:44:30 +03:00
2015-08-13 15:22:45 +03:00
# We crash without vfs_default
2018-07-25 13:26:05 +03:00
# and vfs_not_implemented provides helper function
# for other modules
required_static_modules.extend(TO_LIST('vfs_default vfs_not_implemented'))
2015-08-13 15:22:45 +03:00
2018-04-10 07:35:07 +03:00
conf.CHECK_HEADERS('netdb.h')
2014-11-09 00:18:08 +03:00
conf.CHECK_HEADERS('linux/falloc.h linux/ioctl.h')
2010-03-21 14:13:41 +03:00
2019-08-21 02:28:18 +03:00
conf.CHECK_FUNCS('getcwd fchown chmod fchmod mknod mknodat')
2010-03-23 11:02:59 +03:00
conf.CHECK_FUNCS('strtol strchr strupr chflags')
conf.CHECK_FUNCS('getrlimit fsync fdatasync setpgid')
conf.CHECK_FUNCS('setsid glob strpbrk crypt16 getauthuid')
2015-06-10 15:33:35 +03:00
conf.CHECK_FUNCS('innetgr')
2010-03-23 11:02:59 +03:00
conf.CHECK_FUNCS('initgroups select poll rdchk getgrnam getgrent pathconf')
2012-06-29 00:41:19 +04:00
conf.CHECK_FUNCS('setpriv setgidx setuidx setgroups syscall sysconf')
2017-08-22 18:09:01 +03:00
conf.CHECK_FUNCS('atexit grantpt posix_openpt fallocate')
2012-03-28 02:39:57 +04:00
conf.CHECK_FUNCS('fseeko setluid')
2010-03-24 03:27:31 +03:00
conf.CHECK_FUNCS('getpwnam', headers='sys/types.h pwd.h')
2012-03-28 02:39:57 +04:00
conf.CHECK_FUNCS('fdopendir')
2013-06-08 04:53:45 +04:00
conf.CHECK_FUNCS('fstatat')
2016-04-27 19:01:51 +03:00
conf.CHECK_FUNCS('getpwent_r setenv clearenv strcasecmp fcvt fcvtl')
2011-06-22 03:58:59 +04:00
conf.CHECK_FUNCS('syslog vsyslog timegm setlocale')
2010-03-23 11:02:59 +03:00
conf.CHECK_FUNCS('lutimes futimes utimensat futimens')
conf.CHECK_FUNCS('mlock munlock mlockall munlockall')
conf.CHECK_FUNCS('memalign posix_memalign hstrerror')
2010-04-07 17:34:12 +04:00
conf.CHECK_FUNCS_IN('yp_get_default_domain', 'nsl')
2010-04-12 00:05:10 +04:00
conf.CHECK_FUNCS_IN('dn_expand _dn_expand __dn_expand', 'resolv')
2012-09-14 22:41:08 +04:00
conf.CHECK_FUNCS_IN('dn_expand', 'inet')
2010-12-07 17:33:51 +03:00
conf.CHECK_DECLS('fdatasync', reverse=True)
conf.CHECK_DECLS('readahead', reverse=True, headers='fcntl.h')
if conf.CHECK_CODE('''
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
2012-06-18 10:49:18 +04:00
long ret = splice(0,0,1,0,400,SPLICE_F_MOVE);
2010-12-07 17:33:51 +03:00
''',
'HAVE_LINUX_SPLICE',
headers='fcntl.h'):
conf.CHECK_DECLS('splice', reverse=True, headers='fcntl.h')
2010-03-23 11:02:59 +03:00
2016-04-03 12:43:50 +03:00
# Check for inotify support (Skip if we are SunOS)
#NOTE: illumos provides sys/inotify.h but is not an exact match for linux
host_os = sys.platform
if host_os.rfind('sunos') == -1:
conf.CHECK_HEADERS('sys/inotify.h')
2016-03-26 16:35:52 +03:00
if conf.env.HAVE_SYS_INOTIFY_H:
2016-04-03 12:43:50 +03:00
conf.DEFINE('HAVE_INOTIFY', 1)
2010-03-21 14:20:52 +03:00
2010-03-21 14:44:31 +03:00
# Check for kernel change notify support
conf.CHECK_CODE('''
#ifndef F_NOTIFY
#define F_NOTIFY 1026
#endif
main() {
exit(fcntl(open("/tmp", O_RDONLY), F_NOTIFY, 0) == -1 ? 1 : 0);
}''', 'HAVE_KERNEL_CHANGE_NOTIFY', addmain=False, execute=True,
2010-03-24 03:27:31 +03:00
headers='fcntl.h signal.h',
2010-03-21 14:44:31 +03:00
msg="Checking for kernel change notify support")
2010-03-21 14:53:44 +03:00
# Check for Linux kernel oplocks
conf.CHECK_CODE('''
#include <sys/types.h>
#include <fcntl.h>
#include <signal.h>
2017-03-06 14:09:53 +03:00
#ifndef F_GETLEASE
#define F_GETLEASE 1025
2010-03-21 14:53:44 +03:00
#endif
main() {
2017-03-06 14:09:53 +03:00
exit(fcntl(open("/tmp", O_RDONLY), F_GETLEASE, 0) == -1 ? 1 : 0);
2010-03-21 14:53:44 +03:00
}''', 'HAVE_KERNEL_OPLOCKS_LINUX', addmain=False, execute=True,
msg="Checking for Linux kernel oplocks")
2011-04-22 02:49:28 +04:00
# Check for kernel share modes
2010-03-22 00:49:25 +03:00
conf.CHECK_CODE('''
#include <sys/types.h>
#include <fcntl.h>
#include <signal.h>
#include <sys/file.h>
#ifndef LOCK_MAND
2012-02-01 01:30:45 +04:00
#define LOCK_MAND 32
#define LOCK_READ 64
2010-03-22 00:49:25 +03:00
#endif
main() {
exit(flock(open("/dev/null", O_RDWR), LOCK_MAND|LOCK_READ) != 0);
}''', 'HAVE_KERNEL_SHARE_MODES', addmain=False, execute=True,
2012-11-20 12:49:46 +04:00
msg="Checking for kernel share modes")
2010-03-22 00:49:25 +03:00
2013-03-22 12:30:05 +04:00
# check for fam libs
samba_fam_libs=None
check_for_fam=False
if Options.options.with_fam is None:
check_for_fam=True
elif Options.options.with_fam == True:
check_for_fam=True
if check_for_fam and conf.CHECK_HEADERS('fam.h'):
if conf.CHECK_FUNCS_IN('FAMOpen2', 'fam'):
samba_fam_libs='fam'
elif conf.CHECK_FUNCS_IN('FAMOpen2', 'fam C'):
samba_fam_libs='fam C'
conf.CHECK_TYPE('enum FAMCodes', headers='fam.h',
define='HAVE_FAM_H_FAMCODES_TYPEDEF',
msg='Checking whether enum FAMCodes is available')
conf.CHECK_FUNCS_IN('FAMNoExists', 'fam')
if samba_fam_libs is not None:
conf.DEFINE('SAMBA_FAM_LIBS', samba_fam_libs)
2016-02-12 19:25:09 +03:00
conf.DEFINE('HAVE_FAM', 1)
2013-03-22 12:30:05 +04:00
else:
if Options.options.with_fam == True:
conf.fatal('FAM support requested, but no suitable FAM library found')
elif check_for_fam:
Logs.warn('no suitable FAM library found')
2013-08-07 18:34:22 +04:00
# check for libarchive (tar command in smbclient)
2013-08-07 19:50:15 +04:00
# None means autodetect, True/False means enable/disable
2015-05-28 15:55:28 +03:00
conf.SET_TARGET_TYPE('archive', 'EMPTY')
2013-08-07 19:50:15 +04:00
if Options.options.with_libarchive is not False:
2013-08-07 18:34:22 +04:00
Logs.info("Checking for libarchive existence")
2015-05-28 15:55:28 +03:00
if conf.CHECK_HEADERS('archive.h') and conf.CHECK_LIB('archive', shlib=True):
conf.CHECK_FUNCS_IN('archive_read_support_filter_all archive_read_free', 'archive')
2018-05-10 04:04:35 +03:00
else:
conf.fatal("libarchive support not found. "
"Try installing libarchive-dev or libarchive-devel. "
"Otherwise, use --without-libarchive to "
"build without libarchive support. "
"libarchive support is required for the smbclient "
"tar-file mode")
2018-05-10 05:00:54 +03:00
elif conf.CONFIG_GET('ENABLE_SELFTEST'):
2018-02-02 17:34:32 +03:00
raise Errors.WafError('libarchive library required for '
2018-05-10 05:00:54 +03:00
'--enable-selftest')
2013-08-07 18:34:22 +04:00
2012-11-07 21:40:07 +04:00
# check for DMAPI libs
2014-08-18 13:42:27 +04:00
if Options.options.with_dmapi == False:
have_dmapi = False
2012-11-07 21:40:07 +04:00
else:
2014-08-18 13:42:27 +04:00
have_dmapi = True
Logs.info("Checking for DMAPI library existence")
samba_dmapi_lib = ''
if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dm'):
samba_dmapi_lib = 'dm'
2012-11-07 21:40:07 +04:00
else:
2014-08-18 13:42:27 +04:00
if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'jfsdm'):
samba_dmapi_lib = 'jfsdm'
2012-11-07 21:40:07 +04:00
else:
2014-08-18 13:42:27 +04:00
if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'dmapi'):
samba_dmapi_lib = 'dmapi'
else:
if conf.CHECK_FUNCS_IN('dm_get_eventlist', 'xdsm'):
samba_dmapi_lib = 'xdsm'
# only bother to test headers and compilation when a candidate
# library has been found
if samba_dmapi_lib == '':
have_dmapi = False
broken_dmapi = "no suitable DMAPI library found"
if have_dmapi:
conf.CHECK_HEADERS('sys/dmi.h xfs/dmapi.h sys/jfsdmapi.h sys/dmapi.h dmapi.h')
conf.CHECK_CODE('''
2012-11-07 21:40:07 +04:00
#include <time.h> /* needed by Tru64 */
#include <sys/types.h> /* needed by AIX */
#ifdef HAVE_XFS_DMAPI_H
#include <xfs/dmapi.h>
#elif defined(HAVE_SYS_DMI_H)
#include <sys/dmi.h>
#elif defined(HAVE_SYS_JFSDMAPI_H)
#include <sys/jfsdmapi.h>
#elif defined(HAVE_SYS_DMAPI_H)
#include <sys/dmapi.h>
#elif defined(HAVE_DMAPI_H)
#include <dmapi.h>
#endif
/* This link test is designed to fail on IRI 6.4, but should
* succeed on Linux, IRIX 6.5 and AIX.
*/
int main(int argc, char **argv)
{
char * version;
dm_eventset_t events;
/* This doesn't take an argument on IRIX 6.4. */
dm_init_service(&version);
/* IRIX 6.4 expects events to be a pointer. */
DMEV_ISSET(DM_EVENT_READ, events);
return 0;
}
''',
2014-08-18 13:42:27 +04:00
'USEABLE_DMAPI_LIBRARY',
addmain=False,
execute=False,
lib=samba_dmapi_lib,
msg='Checking whether DMAPI lib '+samba_dmapi_lib+' can be used')
if not conf.CONFIG_SET('USEABLE_DMAPI_LIBRARY'):
have_dmapi = False
broken_dmapi = "no usable DMAPI library found"
if have_dmapi:
Logs.info("Building with DMAPI support.")
conf.env['dmapi_lib'] = samba_dmapi_lib
conf.DEFINE('USE_DMAPI', 1)
else:
if Options.options.with_dmapi == False:
Logs.info("Building without DMAPI support (--without-dmapi).")
elif Options.options.with_dmapi == True:
Logs.error("DMAPI support not available: " + broken_dmapi)
conf.fatal('DMAPI support requested but not found.');
2012-11-07 21:40:07 +04:00
else:
2014-08-18 13:42:27 +04:00
Logs.warn("Building without DMAPI support: " + broken_dmapi)
conf.env['dmapi_lib'] = ''
2012-11-07 21:40:07 +04:00
2010-03-22 01:43:28 +03:00
# Check for various members of the stat structure
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blocks', define='HAVE_STAT_ST_BLOCKS',
2010-03-24 03:27:31 +03:00
headers='sys/stat.h')
2010-03-22 01:43:28 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_blksize', define='HAVE_STAT_ST_BLKSIZE',
2010-03-24 03:27:31 +03:00
headers='sys/stat.h')
2011-02-17 00:15:20 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_flags', define='HAVE_STAT_ST_FLAGS',
2012-02-01 01:30:45 +04:00
headers='sys/types.h sys/stat.h unistd.h')
2010-03-22 01:43:28 +03:00
2016-03-26 16:35:52 +03:00
if conf.env.HAVE_BLKCNT_T:
2014-04-21 17:18:18 +04:00
conf.CHECK_CODE('''
static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 4)];''',
'SIZEOF_BLKCNT_T_4',
headers='replace.h sys/types.h sys/stat.h unistd.h',
msg="Checking whether blkcnt_t is 32 bit")
2012-04-07 01:20:12 +04:00
2014-04-21 17:18:18 +04:00
# If sizeof is 4 it can't be 8
2016-03-26 16:35:52 +03:00
if conf.env.HAVE_BLKCNT_T:
2014-04-21 17:18:18 +04:00
if not conf.CONFIG_SET('SIZEOF_BLKCNT_T_4'):
conf.CHECK_CODE('''
static int test_array[1 - 2 * !(((long int)(sizeof(blkcnt_t))) <= 8)];''',
'SIZEOF_BLKCNT_T_8',
headers='replace.h sys/types.h sys/stat.h unistd.h',
msg="Checking whether blkcnt_t is 64 bit")
2012-04-07 01:20:12 +04:00
2010-03-22 10:48:09 +03:00
# Check for POSIX capability support
2010-04-09 01:03:40 +04:00
conf.CHECK_FUNCS_IN('cap_get_proc', 'cap', headers='sys/capability.h')
2016-03-26 16:35:52 +03:00
if conf.env.HAVE_SYS_CAPABILITY_H:
2010-03-22 10:48:09 +03:00
conf.CHECK_CODE('''
2010-03-24 03:27:31 +03:00
cap_t cap;
cap_value_t vals[1];
if (!(cap = cap_get_proc())) exit(1);
vals[0] = CAP_CHOWN;
cap_set_flag(cap, CAP_INHERITABLE, 1, vals, CAP_CLEAR);
cap_set_proc(cap);''',
'HAVE_POSIX_CAPABILITIES', execute=True, lib="cap",
headers='sys/capability.h',
msg="Checking whether POSIX capabilities are available")
2010-03-22 10:48:09 +03:00
2010-05-31 10:35:58 +04:00
conf.CHECK_CODE('int i;', 'BROKEN_NISPLUS_INCLUDE_FILES',
headers='sys/types.h sys/acl.h rpcsvc/nis.h',
msg="Checking for broken nisplus include files")
2010-03-22 10:48:09 +03:00
2010-03-23 00:58:43 +03:00
# Check if the compiler will optimize out functions
conf.CHECK_CODE('''
2014-10-11 22:50:46 +04:00
#include <sys/types.h>
size_t __unsafe_string_function_usage_here_size_t__(void);
#define CHECK_STRING_SIZE(d, len) (sizeof(d) != (len) && sizeof(d) != sizeof(char *))
static size_t push_string_check_fn(void *dest, const char *src, size_t dest_len) {
return 0;
}
#define push_string_check(dest, src, dest_len) \
(CHECK_STRING_SIZE(dest, dest_len) \
? __unsafe_string_function_usage_here_size_t__() \
: push_string_check_fn(dest, src, dest_len))
int main(int argc, char **argv) {
char outbuf[1024];
char *p = outbuf;
const char *foo = "bar";
p += 31 + push_string_check(p + 31, foo, sizeof(outbuf) - (p + 31 - outbuf));
return 0;
2010-03-23 00:58:43 +03:00
}''', 'HAVE_COMPILER_WILL_OPTIMIZE_OUT_FNS',
2014-10-11 22:50:46 +04:00
addmain=False,
add_headers=False,
msg="Checking if the compiler will optimize out functions")
2010-03-23 00:58:43 +03:00
2010-05-31 10:36:29 +04:00
# Check if the compiler supports the LL suffix on long long integers
# AIX needs this
conf.CHECK_CODE('long long i = 0x8000000000LL', 'COMPILER_SUPPORTS_LL',
headers='stdio.h',
msg="Checking for LL suffix on long long integers")
2010-03-24 03:27:31 +03:00
conf.CHECK_FUNCS('''
2019-09-30 12:49:28 +03:00
atexit
chflags chmod
crypt16 devnm dirfd
DNSServiceRegister endmntent execl
fchmod fchown fcvt fcvtl fdatasync
fseeko
fsync
futimens futimes getauthuid
getcwd
2011-03-14 15:08:58 +03:00
getgrent getgrnam getgrouplist getgrset getmntent getpagesize
2013-08-02 00:28:05 +04:00
getpwanam getpwent_r getrlimit
2010-05-28 17:17:35 +04:00
glob grantpt hstrerror initgroups innetgr
2019-09-30 12:49:28 +03:00
llseek
lutimes
memalign mknod mlock mlockall munlock munlockall
2017-08-22 18:09:01 +03:00
pathconf poll
2019-09-30 12:49:28 +03:00
posix_memalign pread
pwrite
rdchk
2012-06-01 07:29:38 +04:00
select setenv setgidx setgroups setlocale setluid
setmntent setpgid setpriv setsid setuidx
2019-09-30 12:49:28 +03:00
statvfs
2012-01-06 03:48:24 +04:00
strcasecmp strchr strpbrk strsignal strtol strupr sysconf sysctl sysctlbyname
2019-09-30 12:49:28 +03:00
syslog timegm
utimensat vsyslog
2010-03-24 03:27:31 +03:00
''')
2010-03-25 15:58:35 +03:00
conf.CHECK_SAMBA3_CHARSET() # see build/charset.py
2010-09-26 12:56:09 +04:00
# FIXME: these should be tests for features, but the old build system just
# checks for OSes.
host_os = sys.platform
2011-02-21 04:16:03 +03:00
Logs.info("building on %s" % host_os)
2010-09-26 12:56:09 +04:00
# Python doesn't have case switches... :/
# FIXME: original was *linux* | gnu* | k*bsd*-gnu | kopensolaris*-gnu | *qnx*)
# the search for .rfind('gnu') covers gnu* and *-gnu is that too broad?
2011-01-31 11:38:21 +03:00
conf.SET_TARGET_TYPE('sunacl', 'EMPTY')
2010-09-26 12:56:09 +04:00
if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('qnx') > -1):
if host_os.rfind('linux') > -1:
conf.DEFINE('LINUX', '1')
elif host_os.rfind('qnx') > -1:
conf.DEFINE('QNX', '1')
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
elif (host_os.rfind('darwin') > -1):
conf.DEFINE('DARWINOS', 1)
conf.ADD_CFLAGS('-fno-common')
2012-09-23 08:30:10 +04:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2011-01-31 11:38:21 +03:00
elif (host_os.rfind('freebsd') > -1):
2012-10-23 10:53:58 +04:00
conf.DEFINE('FREEBSD', 1)
2011-01-31 11:38:21 +03:00
if conf.CHECK_HEADERS('sunacl.h'):
2011-08-08 05:16:20 +04:00
conf.DEFINE('HAVE_FREEBSD_SUNACL_H', '1')
2014-03-07 03:05:19 +04:00
conf.CHECK_FUNCS_IN(['acl'], 'sunacl')
2011-02-11 01:37:52 +03:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2012-09-23 08:30:10 +04:00
elif (host_os.rfind('irix') > -1):
conf.DEFINE('IRIX', 1)
2011-02-11 01:37:52 +03:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2012-09-23 08:30:10 +04:00
elif (host_os.rfind('aix') > -1):
conf.DEFINE('AIX', 1)
conf.DEFINE('STAT_ST_BLOCKSIZE', 'DEV_BSIZE')
elif (host_os.rfind('hpux') > -1):
conf.DEFINE('HPUX', 1)
conf.DEFINE('STAT_ST_BLOCKSIZE', '8192')
elif (host_os.rfind('osf') > -1):
conf.DEFINE('OSF1', 1)
2011-04-22 02:49:54 +04:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2012-09-23 08:30:10 +04:00
2010-09-26 12:56:09 +04:00
# FIXME: Add more checks here.
else:
2012-09-23 08:30:10 +04:00
conf.DEFINE('STAT_ST_BLOCKSIZE', '512')
2010-09-26 12:56:09 +04:00
if Options.options.with_acl_support:
2014-03-05 06:06:02 +04:00
if (host_os.rfind('hpux') > -1):
2016-01-11 02:02:49 +03:00
Logs.info('Using HPUX ACLs')
2012-09-04 14:15:28 +04:00
conf.DEFINE('HAVE_HPUX_ACLS',1)
2012-09-23 08:30:37 +04:00
conf.DEFINE('POSIX_ACL_NEEDS_MASK',1)
2012-09-04 14:15:28 +04:00
default_static_modules.extend(TO_LIST('vfs_hpuxacl'))
2016-01-11 02:02:49 +03:00
elif (host_os.rfind('aix') > -1):
Logs.info('Using AIX ACLs')
2012-09-04 14:15:28 +04:00
conf.DEFINE('HAVE_AIX_ACLS',1)
2013-05-07 11:08:07 +04:00
default_static_modules.extend(TO_LIST('vfs_aixacl vfs_aixacl2'))
2012-09-04 14:15:28 +04:00
elif (host_os.rfind('darwin') > -1):
2013-12-16 03:45:45 +04:00
Logs.warn('ACLs on Darwin currently not supported')
conf.fatal("ACL support not available on Darwin/MacOS. "
"Use --without-acl-support for building without "
"ACL support. "
"ACL support is required to change permissions "
"from Windows clients.")
2012-06-03 16:11:31 +04:00
else:
2014-03-05 06:06:02 +04:00
conf.CHECK_FUNCS_IN(['acl_get_file'], 'acl')
2012-06-03 16:11:31 +04:00
if conf.CHECK_CODE('''
2010-09-26 12:56:09 +04:00
acl_t acl;
int entry_id;
acl_entry_t *entry_p;
return acl_get_entry(acl, entry_id, entry_p);
''',
'HAVE_POSIX_ACLS',
headers='sys/types.h sys/acl.h', link=False,
2012-02-01 01:30:45 +04:00
msg="Checking for POSIX ACL support") :
2012-06-03 16:11:31 +04:00
conf.CHECK_CODE('''
2010-09-26 12:56:09 +04:00
acl_permset_t permset_d;
acl_perm_t perm;
return acl_get_perm_np(permset_d, perm);
''',
'HAVE_ACL_GET_PERM_NP',
headers='sys/types.h sys/acl.h', link=True,
msg="Checking whether acl_get_perm_np() is available")
2015-08-13 15:22:45 +03:00
# source3/lib/sysacls.c calls posixacl_sys_acl_get_file()
required_static_modules.extend(TO_LIST('vfs_posixacl'))
2014-10-10 15:53:56 +04:00
conf.CHECK_VARIABLE('ACL_EVERYONE', headers='sys/acl.h')
2014-03-05 06:06:02 +04:00
elif conf.CHECK_FUNCS_IN(['facl'], 'sec'):
Logs.info('Using solaris or UnixWare ACLs')
conf.DEFINE('HAVE_SOLARIS_UNIXWARE_ACLS',1)
default_static_modules.extend(TO_LIST('vfs_solarisacl'))
2014-03-07 03:05:19 +04:00
elif conf.CHECK_FUNCS_IN(['acl_get_fd'], 'pacl'):
2014-03-05 06:06:02 +04:00
Logs.info('Using Tru64 ACLs')
conf.DEFINE('HAVE_TRU64_ACLS',1)
default_static_modules.extend(TO_LIST('vfs_tru64acl'))
2013-12-16 03:45:45 +04:00
else:
conf.fatal("ACL support not found. Try installing libacl1-dev "
"or libacl-devel. "
"Otherwise, use --without-acl-support to build "
"without ACL support. "
"ACL support is required to change permissions from "
"Windows clients.")
2010-09-26 12:56:09 +04:00
2010-12-01 15:24:55 +03:00
if conf.CHECK_FUNCS('dirfd'):
conf.DEFINE('HAVE_DIRFD_DECL', 1)
2010-03-26 10:42:37 +03:00
2010-12-07 14:46:50 +03:00
conf.CHECK_CODE('struct statfs fsd; fsid_t fsid = fsd.f_fsid; return statfs(".", &fsd);',
'HAVE_STATFS_F_FSID',
2014-05-05 16:29:57 +04:00
msg="vfs_fileid checking for statfs() and struct statfs.f_fsid",
2010-12-07 14:46:50 +03:00
headers='sys/types.h sys/statfs.h',
execute=True)
2011-01-12 02:43:26 +03:00
if conf.CONFIG_SET('HAVE_FALLOCATE'):
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
int ret = fallocate(0, FALLOC_FL_KEEP_SIZE, 0, 10);''',
'HAVE_LINUX_FALLOCATE',
msg="Checking whether the Linux 'fallocate' function is available",
headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
2015-02-09 21:39:06 +03:00
conf.CHECK_CODE('''
int ret = fallocate(0, FALLOC_FL_PUNCH_HOLE, 0, 10);''',
'HAVE_FALLOC_FL_PUNCH_HOLE',
msg="Checking whether Linux 'fallocate' supports hole-punching",
headers='unistd.h sys/types.h fcntl.h linux/falloc.h')
2015-02-19 17:53:56 +03:00
conf.CHECK_CODE('''
int ret = lseek(0, 0, SEEK_HOLE);
ret = lseek(0, 0, SEEK_DATA);''',
'HAVE_LSEEK_HOLE_DATA',
msg="Checking whether lseek supports hole/data seeking",
headers='unistd.h sys/types.h')
2011-01-12 02:49:53 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
ssize_t err = readahead(0,0,0x80000);''',
'HAVE_LINUX_READAHEAD',
msg="Checking whether Linux readahead is available",
headers='unistd.h fcntl.h')
2011-01-12 02:49:53 +03:00
conf.CHECK_DECLS('readahead', headers='fcntl.h', always=True)
2011-01-12 02:43:26 +03:00
2012-07-04 00:34:21 +04:00
conf.CHECK_CODE('int fd = openat(AT_FDCWD, ".", O_RDONLY);',
2016-01-11 02:02:49 +03:00
'HAVE_OPENAT',
msg='Checking for openat',
headers='fcntl.h')
2012-07-04 00:34:21 +04:00
2011-02-07 13:40:06 +03:00
conf.CHECK_CODE('''
struct msghdr msg;
union {
2012-02-01 01:30:45 +04:00
struct cmsghdr cm;
2011-02-07 13:40:06 +03:00
char control[CMSG_SPACE(sizeof(int))];
} control_un;
msg.msg_control = control_un.control;
msg.msg_controllen = sizeof(control_un.control);
''',
2014-05-31 14:04:05 +04:00
'HAVE_STRUCT_MSGHDR_MSG_CONTROL',
2012-02-01 01:30:45 +04:00
msg='Checking if we can use msg_control for passing file descriptors',
headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
2011-02-07 13:40:06 +03:00
conf.CHECK_CODE('''
struct msghdr msg;
int fd;
2014-06-14 02:55:02 +04:00
msg.msg_accrights = (caddr_t) &fd;
msg.msg_accrightslen = sizeof(fd);
2011-02-07 13:40:06 +03:00
''',
2014-06-14 02:55:02 +04:00
'HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS',
msg='Checking if we can use msg_accrights for passing file descriptors',
2012-02-01 01:30:45 +04:00
headers='sys/types.h stdlib.h stddef.h sys/socket.h sys/un.h')
2011-02-07 13:40:06 +03:00
2010-04-11 11:35:08 +04:00
if Options.options.with_winbind:
2010-05-21 00:58:59 +04:00
conf.env.build_winbind = True
2010-04-11 11:35:08 +04:00
conf.DEFINE('WITH_WINBIND', '1')
2010-05-26 01:53:04 +04:00
conf.find_program('awk', var='AWK')
2010-06-01 00:39:47 +04:00
conf.CHECK_HEADERS('asm/types.h')
2010-06-01 01:02:16 +04:00
conf.CHECK_CODE('dev_t dev; int i = major(dev); return 0', "HAVE_DEVICE_MAJOR_FN",
headers='unistd.h sys/types.h',
msg="Checking for major macro")
conf.CHECK_CODE('dev_t dev; int i = minor(dev); return 0', "HAVE_DEVICE_MINOR_FN",
headers='unistd.h sys/types.h',
msg="Checking for minor macro")
2010-06-01 12:31:11 +04:00
conf.CHECK_STRUCTURE_MEMBER('struct dirent', 'd_off',
headers='unistd.h sys/types.h dirent.h',
define='HAVE_DIRENT_D_OFF')
2018-01-24 12:02:13 +03:00
if (conf.CONFIG_SET('HAVE_YP_GET_DEFAULT_DOMAIN')):
2018-01-19 11:32:49 +03:00
conf.DEFINE('HAVE_NETGROUP', '1')
2010-04-05 16:39:07 +04:00
2010-04-05 16:41:23 +04:00
# Look for CUPS
2011-02-09 19:43:30 +03:00
if Options.options.with_cups:
conf.find_program('cups-config', var='CUPS_CONFIG')
if conf.env.CUPS_CONFIG:
2011-02-21 05:58:13 +03:00
# we would normally use --libs here, but cups-config incorrectly adds
# gssapi_krb5 and other libraries to its --libs output. That breaks the use
# of an in-tree heimdal kerberos
2015-03-07 17:31:19 +03:00
conf.CHECK_CFG(path=conf.env.CUPS_CONFIG, args="--cflags --ldflags",
2011-10-12 10:17:02 +04:00
package="", uselib_store="CUPS")
2010-04-08 10:09:11 +04:00
conf.CHECK_HEADERS('cups/cups.h cups/language.h', lib='cups')
2011-02-21 05:58:13 +03:00
conf.CHECK_FUNCS_IN('httpConnect httpConnectEncrypt', 'cups')
2011-02-10 22:37:02 +03:00
if conf.CONFIG_SET('HAVE_CUPS_CUPS_H') and conf.CONFIG_SET('HAVE_CUPS_LANGUAGE_H'):
conf.DEFINE('HAVE_CUPS', '1')
2011-02-11 03:31:37 +03:00
else:
conf.undefine('HAVE_CUPS')
2011-02-11 18:10:07 +03:00
conf.SET_TARGET_TYPE('cups', 'EMPTY')
2010-04-09 01:04:55 +04:00
else:
# define an empty subsystem for cups, to allow it to be used as an empty dependency
conf.SET_TARGET_TYPE('cups', 'EMPTY')
2010-04-05 16:41:23 +04:00
2011-02-04 18:49:30 +03:00
if Options.options.with_iprint:
2012-02-01 01:30:45 +04:00
if conf.CONFIG_SET('HAVE_CUPS'):
2011-02-04 18:49:30 +03:00
conf.DEFINE('HAVE_IPRINT', '1')
else:
2011-02-21 04:16:03 +03:00
Logs.warn("--enable-iprint=yes but cups support not sufficient")
2011-02-04 19:42:10 +03:00
if Options.options.with_syslog:
conf.DEFINE('WITH_SYSLOG', '1')
2011-02-07 15:21:35 +03:00
if Options.options.with_automount:
conf.DEFINE('WITH_AUTOMOUNT', '1')
2011-02-04 18:49:30 +03:00
2010-04-05 16:41:23 +04:00
# Check for LDAP
2010-04-12 00:05:10 +04:00
if Options.options.with_ldap:
2011-04-26 07:53:45 +04:00
conf.CHECK_HEADERS('ldap.h lber.h ldap_pvt.h')
2010-04-12 00:05:10 +04:00
conf.CHECK_TYPE('ber_tag_t', 'unsigned int', headers='ldap.h lber.h')
conf.CHECK_FUNCS_IN('ber_scanf ber_sockbuf_add_io', 'lber')
conf.CHECK_VARIABLE('LDAP_OPT_SOCKBUF', headers='ldap.h')
# if we LBER_OPT_LOG_PRINT_FN we can intercept ldap logging and print it out
# for the samba logs
conf.CHECK_VARIABLE('LBER_OPT_LOG_PRINT_FN',
define='HAVE_LBER_LOG_PRINT_FN', headers='lber.h')
2011-04-26 07:53:45 +04:00
conf.CHECK_FUNCS_IN('ldap_init ldap_init_fd ldap_initialize ldap_set_rebind_proc', 'ldap')
2010-04-12 00:05:10 +04:00
conf.CHECK_FUNCS_IN('ldap_add_result_entry', 'ldap')
# Check if ldap_set_rebind_proc() takes three arguments
if conf.CHECK_CODE('ldap_set_rebind_proc(0, 0, 0)',
'LDAP_SET_REBIND_PROC_ARGS',
msg="Checking whether ldap_set_rebind_proc takes 3 arguments",
headers='ldap.h lber.h', link=False):
conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '3')
else:
conf.DEFINE('LDAP_SET_REBIND_PROC_ARGS', '2')
# last but not least, if ldap_init() exists, we want to use ldap
2012-09-22 08:57:22 +04:00
if conf.CONFIG_SET('HAVE_LDAP_INIT') and conf.CONFIG_SET('HAVE_LDAP_H'):
2010-04-12 00:05:10 +04:00
conf.DEFINE('HAVE_LDAP', '1')
conf.DEFINE('LDAP_DEPRECATED', '1')
2011-02-11 14:07:39 +03:00
conf.env['HAVE_LDAP'] = '1'
2011-03-17 16:05:48 +03:00
# if ber_sockbuf_add_io() and LDAP_OPT_SOCKBUF are available, we can add
# SASL wrapping hooks
if conf.CONFIG_SET('HAVE_BER_SOCKBUF_ADD_IO') and \
conf.CONFIG_SET('HAVE_LDAP_OPT_SOCKBUF'):
conf.DEFINE('HAVE_LDAP_SASL_WRAPPING', '1')
2013-12-16 04:31:31 +04:00
else:
conf.fatal("LDAP support not found. "
"Try installing libldap2-dev or openldap-devel. "
"Otherwise, use --without-ldap to build without "
"LDAP support. "
"LDAP support is required for the LDAP passdb backend, "
"LDAP idmap backends and ADS. "
"ADS support improves communication with "
"Active Directory domain controllers.")
2010-04-06 01:44:37 +04:00
else:
2010-04-12 00:05:10 +04:00
conf.SET_TARGET_TYPE('ldap', 'EMPTY')
conf.SET_TARGET_TYPE('lber', 'EMPTY')
2010-04-05 16:41:23 +04:00
2012-11-23 15:21:49 +04:00
if Options.options.with_ads == False:
use_ads = False
use_ads_krb5 = False
use_ads_ldap = False
else:
use_ads = True
use_ads_krb5 = True
use_ads_ldap = True
2011-02-10 14:42:47 +03:00
if not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC_MD5') and \
not conf.CONFIG_SET('HAVE_ENCTYPE_ARCFOUR_HMAC'):
2011-02-21 04:16:03 +03:00
Logs.warn("arcfour-hmac-md5 encryption type not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2011-02-10 00:43:41 +03:00
if not conf.CONFIG_SET('HAVE_KRB5_MK_REQ_EXTENDED'):
2011-02-21 04:16:03 +03:00
Logs.warn("krb5_mk_req_extended not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 03:54:50 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_GET_HOST_REALM'):
Logs.warn("krb5_get_host_realm not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 03:54:50 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_FREE_HOST_REALM'):
Logs.warn("krb5_free_host_realm not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 03:59:44 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_FWD_TGT_CREDS'):
Logs.warn("krb5_fwd_tgt_creds found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 04:06:28 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_GET_INIT_CREDS_OPT_ALLOC'):
Logs.warn("krb5_get_init_creds_opt_alloc not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 04:06:28 +04:00
if not conf.CONFIG_SET('KRB5_CREDS_OPT_FREE_REQUIRES_CONTEXT'):
Logs.warn("krb5_get_init_creds_opt_free was not found or was too old in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 04:16:24 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_GET_RENEWED_CREDS'):
Logs.warn("krb5_get_renewed_creds not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 04:30:22 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL_COMPARE_ANY_REALM'):
Logs.warn("krb5_principal_compare_any_realm not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-04-02 01:28:19 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_C_STRING_TO_KEY') and \
not conf.CONFIG_SET('HAVE_KRB5_STRING_TO_KEY_SALT'):
Logs.warn("krb5_c_string_to_key not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2011-02-10 14:42:47 +03:00
if not conf.CONFIG_SET('HAVE_KRB5_PRINCIPAL2SALT') and \
2011-02-10 00:43:41 +03:00
not conf.CONFIG_SET('HAVE_KRB5_GET_PW_SALT'):
2011-02-21 04:16:03 +03:00
Logs.warn("no CREATE_KEY_FUNCTIONS detected")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2011-02-10 14:42:47 +03:00
if not conf.CONFIG_SET('HAVE_KRB5_GET_PERMITTED_ENCTYPES') and \
2011-02-10 00:43:41 +03:00
not conf.CONFIG_SET('HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES'):
2011-02-21 04:16:03 +03:00
Logs.warn("no GET_ENCTYPES_FUNCTIONS detected")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2011-02-10 14:42:47 +03:00
if not conf.CONFIG_SET('HAVE_KRB5_KT_FREE_ENTRY') and \
2011-02-10 00:43:41 +03:00
not conf.CONFIG_SET('HAVE_KRB5_FREE_KEYTAB_ENTRY_CONTENTS'):
2011-02-21 04:16:03 +03:00
Logs.warn("no KT_FREE_FUNCTION detected")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-05 03:51:29 +04:00
if not conf.CONFIG_SET('HAVE_KRB5_C_VERIFY_CHECKSUM'):
Logs.warn("krb5_c_verify_checksum_compare not found in -lkrb5")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-06 11:32:41 +04:00
# We don't actually use
# gsskrb5_extract_authz_data_from_sec_context, but it is a
# clue that this Heimdal, which does the PAC processing we
# need on the standard gss_inquire_sec_context_by_oid
if not conf.CONFIG_SET('HAVE_GSS_GET_NAME_ATTRIBUTE') and \
2012-01-24 14:17:09 +04:00
not (conf.CONFIG_SET('HAVE_GSSKRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT') and \
conf.CONFIG_SET('HAVE_GSS_INQUIRE_SEC_CONTEXT_BY_OID')):
2013-02-03 15:30:10 +04:00
Logs.warn("need either gss_get_name_attribute or gsskrb5_extract_authz_data_from_sec_context and gss_inquire_sec_context_by_oid in -lgssapi for PAC support")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-06 11:32:41 +04:00
2012-01-24 16:48:33 +04:00
if not conf.CONFIG_SET('HAVE_GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT'):
Logs.warn("need gss_krb5_export_lucid_sec_context for SPNEGO and gss_wrap support")
2012-11-23 15:21:49 +04:00
use_ads_krb5 = False
2012-01-24 16:48:33 +04:00
2012-11-23 15:21:49 +04:00
if use_ads_krb5:
2011-02-10 00:43:41 +03:00
conf.DEFINE('HAVE_KRB5', '1')
2012-11-23 15:21:49 +04:00
conf.env['HAVE_KRB5'] = '1'
2011-02-10 00:43:41 +03:00
else:
conf.undefine('HAVE_KRB5_H')
conf.undefine('HAVE_GSSAPI_H')
conf.undefine('HAVE_GSSAPI_GSSAPI_GENERIC_H')
conf.undefine('HAVE_GSSAPI_GSSAPI_H')
2012-11-23 15:21:49 +04:00
use_ads = False
if not conf.CONFIG_SET('HAVE_LDAP'):
use_ads = False
use_ads_ldap = False
if use_ads:
conf.DEFINE('WITH_ADS', '1')
conf.env['HAVE_ADS'] = '1'
Logs.info("Building with Active Directory support.")
2015-08-13 15:22:45 +03:00
# these have broken dependencies
forced_shared_modules.extend(TO_LIST('idmap_ad idmap_rfc2307'))
2012-11-23 15:21:49 +04:00
elif Options.options.with_ads == False:
Logs.info("Building without Active Directory support (--without-ads).")
else:
if not use_ads_krb5:
Logs.warn("Active Directory support not available: krb5 libs don't have all required features")
if not use_ads_ldap:
2013-12-16 06:25:58 +04:00
Logs.warn("Active Directory support not available: LDAP support is not available.")
2012-11-23 15:21:49 +04:00
if Options.options.with_ads:
2013-12-16 05:59:35 +04:00
conf.fatal("Active Directory support not found. Use --without-ads "
"for building without Active Directory support. "
"ADS support improves communication with "
"Active Directory domain controllers.")
2012-11-23 15:21:49 +04:00
else:
# this is the auto-mode case
Logs.warn("Building without Active Directory support.")
2011-02-10 00:43:41 +03:00
2010-05-28 17:17:35 +04:00
if Options.options.with_utmp:
2012-03-14 15:37:33 +04:00
conf.env.with_utmp = True
if not conf.CHECK_HEADERS('utmp.h'): conf.env.with_utmp = False
2010-05-28 17:17:35 +04:00
conf.CHECK_FUNCS('pututline pututxline updwtmp updwtmpx getutmpx getutxent')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_name', headers='utmp.h',
define='HAVE_UT_UT_NAME')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_user', headers='utmp.h',
define='HAVE_UT_UT_USER')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_id', headers='utmp.h',
define='HAVE_UT_UT_ID')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_host', headers='utmp.h',
define='HAVE_UT_UT_HOST')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_time', headers='utmp.h',
define='HAVE_UT_UT_TIME')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_tv', headers='utmp.h',
define='HAVE_UT_UT_TV')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_type', headers='utmp.h',
define='HAVE_UT_UT_TYPE')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_pid', headers='utmp.h',
define='HAVE_UT_UT_PID')
conf.CHECK_STRUCTURE_MEMBER('struct utmp', 'ut_exit.e_exit', headers='utmp.h',
define='HAVE_UT_UT_EXIT')
conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_syslen', headers='utmpx.h',
define='HAVE_UX_UT_SYSLEN')
2019-01-06 22:46:20 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct utmpx', 'ut_host', headers='utmpx.h',
define='HAVE_UX_UT_HOST')
2010-05-28 17:17:35 +04:00
conf.CHECK_CODE('struct utmp utarg; struct utmp *utreturn; utreturn = pututline(&utarg);',
'PUTUTLINE_RETURNS_UTMP', headers='utmp.h',
msg="Checking whether pututline returns pointer")
2012-10-08 13:15:50 +04:00
conf.CHECK_SIZEOF(['((struct utmp *)NULL)->ut_line'], headers='utmp.h',
2014-04-21 17:18:17 +04:00
define='SIZEOF_UTMP_UT_LINE', critical=False)
2012-10-08 13:15:50 +04:00
if not conf.CONFIG_SET('SIZEOF_UTMP_UT_LINE'):
conf.env.with_utmp = False
elif int(conf.env.SIZEOF_UTMP_UT_LINE) < 15:
conf.env.with_utmp = False
2012-03-14 15:37:33 +04:00
if conf.env.with_utmp:
conf.DEFINE('WITH_UTMP', 1)
2012-10-08 13:15:50 +04:00
else:
Logs.warn("--with-utmp but utmp support not sufficient")
2010-05-28 17:17:35 +04:00
2010-05-28 17:56:32 +04:00
if Options.options.with_avahi:
conf.env.with_avahi = True
if not conf.CHECK_HEADERS('avahi-common/watch.h avahi-client/client.h'): conf.env.with_avahi = False
if not conf.CHECK_FUNCS_IN('avahi_client_new', 'avahi-client'): conf.env.with_avahi = False
if not conf.CHECK_FUNCS_IN('avahi_strerror', 'avahi-common'): conf.env.with_avahi = False
if conf.env.with_avahi:
conf.DEFINE('WITH_AVAHI_SUPPORT', 1)
else:
conf.SET_TARGET_TYPE('avahi-common', 'EMPTY')
conf.SET_TARGET_TYPE('avahi-client', 'EMPTY')
2010-06-15 08:53:11 +04:00
if Options.options.with_iconv:
conf.env.with_iconv = True
if not conf.CHECK_FUNCS_IN('iconv_open', 'iconv', headers='iconv.h'):
conf.env.with_iconv = False
if conf.env.with_iconv:
conf.DEFINE('HAVE_ICONV', 1)
2010-09-28 10:54:39 +04:00
if Options.options.with_pam:
2011-02-10 23:10:53 +03:00
use_pam=True
2010-12-01 23:26:49 +03:00
conf.CHECK_HEADERS('security/pam_appl.h pam/pam_appl.h')
if not conf.CONFIG_SET('HAVE_SECURITY_PAM_APPL_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_APPL_H'):
2011-02-21 04:16:03 +03:00
Logs.warn("--with-pam=yes but pam_appl.h not found")
2011-02-10 23:10:53 +03:00
use_pam=False
conf.CHECK_FUNCS_IN('pam_get_data', 'pam')
conf.CHECK_HEADERS('security/pam_modules.h pam/pam_modules.h')
if not conf.CONFIG_SET('HAVE_SECURITY_PAM_MODULES_H') and not conf.CONFIG_SET('HAVE_PAM_PAM_MODULES_H'):
2011-02-21 04:16:03 +03:00
Logs.warn("--with-pam=yes but pam_modules.h not found")
2011-02-10 23:10:53 +03:00
use_pam=False
2010-12-01 23:26:49 +03:00
conf.CHECK_HEADERS('security/pam_ext.h security/_pam_macros.h')
conf.CHECK_HEADERS('pam/pam_ext.h pam/_pam_macros.h')
conf.CHECK_FUNCS_IN('pam_vsyslog', 'pam')
2012-02-01 01:30:45 +04:00
conf.CHECK_CODE('''
2010-12-01 23:26:49 +03:00
#if defined(HAVE_SECURITY_PAM_APPL_H)
#include <security/pam_appl.h>
#elif defined(HAVE_PAM_PAM_APPL_H)
#include <pam/pam_appl.h>
#endif
pam_set_item(0, PAM_RHOST, 0);
''',
'HAVE_PAM_RHOST',
lib='pam',
msg="Checking whether PAM_RHOST is available");
2012-02-01 01:30:45 +04:00
conf.CHECK_CODE('''
2010-12-01 23:26:49 +03:00
#if defined(HAVE_SECURITY_PAM_APPL_H)
#include <security/pam_appl.h>
#elif defined(HAVE_PAM_PAM_APPL_H)
#include <pam/pam_appl.h>
#endif
pam_set_item(0, PAM_TTY, 0);
''',
'HAVE_PAM_TTY',
lib='pam',
msg="Checking whether PAM_TTY is available");
2012-02-01 01:30:45 +04:00
conf.CHECK_CODE('''
2010-12-01 23:26:49 +03:00
#if (!defined(LINUX))
#define PAM_EXTERN extern
#if defined(HAVE_SECURITY_PAM_APPL_H)
#include <security/pam_appl.h>
#elif defined(HAVE_PAM_PAM_APPL_H)
#include <pam/pam_appl.h>
#endif
#endif
#if defined(HAVE_SECURITY_PAM_MODULES_H)
#include <security/pam_modules.h>
#elif defined(HAVE_PAM_PAM_MODULES_H)
#include <pam/pam_modules.h>
#endif
#if defined(HAVE_SECURITY__PAM_MACROS_H)
#include <security/_pam_macros.h>
#elif defined(HAVE_PAM__PAM_MACROS_H)
#include <pam/_pam_macros.h>
#endif
#ifdef HAVE_SECURITY_PAM_EXT_H
#include <security/pam_ext.h>
#endif
int i; i = PAM_RADIO_TYPE;
''',
'HAVE_PAM_RADIO_TYPE',
lib='pam',
msg="Checking whether PAM_RADIO_TYPE is available");
2011-02-10 23:10:53 +03:00
if use_pam:
conf.DEFINE('WITH_PAM', 1)
conf.DEFINE('WITH_PAM_MODULES', 1)
2017-04-12 10:32:39 +03:00
else:
conf.fatal("PAM support is enabled but prerequisite libraries "
"or headers not found. Use --without-pam to disable "
"PAM support.");
2010-09-28 10:54:39 +04:00
2012-07-11 17:39:18 +04:00
seteuid = False
2012-07-02 02:32:44 +04:00
#
2012-07-03 01:08:41 +04:00
# Ensure we select the correct set of system calls on Linux.
2012-07-02 02:32:44 +04:00
#
2012-07-03 01:08:41 +04:00
if (host_os.rfind('linux') > -1):
conf.CHECK_CODE('''
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#include <stdlib.h>
#include <stdio.h>
#include <sys/types.h>
#include <errno.h>
#ifdef HAVE_SYS_PRIV_H
#include <sys/priv.h>
#endif
#ifdef HAVE_SYS_ID_H
#include <sys/id.h>
#endif
#if defined(HAVE_SYSCALL_H)
#include <syscall.h>
#endif
#if defined(HAVE_SYS_SYSCALL_H)
#include <sys/syscall.h>
#endif
syscall(SYS_setresuid32, -1, -1, -1);
syscall(SYS_setresgid32, -1, -1, -1);
syscall(SYS_setreuid32, -1, -1);
syscall(SYS_setregid32, -1, -1);
syscall(SYS_setuid32, -1);
syscall(SYS_setgid32, -1);
syscall(SYS_setgroups32, 0, NULL);
''',
'USE_LINUX_32BIT_SYSCALLS',
msg="Checking whether Linux should use 32-bit credential calls");
2012-07-11 17:39:18 +04:00
if (conf.CONFIG_SET('USE_LINUX_32BIT_SYSCALLS')):
2012-07-11 17:54:29 +04:00
seteuid = conf.CHECK_CODE('''
2012-07-03 01:08:41 +04:00
#define AUTOCONF_TEST 1
2018-06-28 15:28:34 +03:00
#define HAVE_LINUX_THREAD_CREDENTIALS 1
2012-07-03 01:08:41 +04:00
#define USE_LINUX_32BIT_SYSCALLS 1
#include "../lib/util/setid.c"
#include "./lib/util_sec.c"
''',
2018-06-28 15:28:34 +03:00
'HAVE_LINUX_THREAD_CREDENTIALS',
2012-07-03 01:08:41 +04:00
addmain=False,
execute=True,
msg="Checking whether we can use Linux thread-specific credentials with 32-bit system calls")
2012-07-11 17:39:18 +04:00
else:
2012-07-11 17:54:29 +04:00
seteuid = conf.CHECK_CODE('''
2012-07-03 01:08:41 +04:00
#define AUTOCONF_TEST 1
2018-06-28 15:28:34 +03:00
#define HAVE_LINUX_THREAD_CREDENTIALS 1
2012-07-03 01:08:41 +04:00
#include "../lib/util/setid.c"
#include "./lib/util_sec.c"
''',
2018-06-28 15:28:34 +03:00
'HAVE_LINUX_THREAD_CREDENTIALS',
2012-07-03 01:08:41 +04:00
addmain=False,
execute=True,
msg="Checking whether we can use Linux thread-specific credentials")
2010-09-24 05:15:09 +04:00
if not seteuid:
seteuid = conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#define AUTOCONF_TEST 1
#define USE_SETREUID 1
2012-06-30 00:46:23 +04:00
#include "../lib/util/setid.c"
2012-02-01 01:30:45 +04:00
#include "./lib/util_sec.c"
''',
'USE_SETREUID',
addmain=False,
execute=True,
msg="Checking whether setreuid is available")
2010-09-24 05:15:09 +04:00
if not seteuid:
seteuid = conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#define AUTOCONF_TEST 1
#define USE_SETRESUID 1
2012-06-30 00:46:23 +04:00
#include "../lib/util/setid.c"
2012-02-01 01:30:45 +04:00
#include "./lib/util_sec.c"
''',
'USE_SETRESUID',
addmain=False,
execute=True,
msg="Checking whether setresuid is available")
2010-09-24 05:15:09 +04:00
if not seteuid:
seteuid = conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#define AUTOCONF_TEST 1
#define USE_SETEUID 1
2012-06-30 00:46:23 +04:00
#include "../lib/util/setid.c"
2012-02-01 01:30:45 +04:00
#include "./lib/util_sec.c"
''',
'USE_SETEUID',
addmain=False,
execute=True,
msg="Checking whether seteuid is available")
2010-09-24 05:15:09 +04:00
if not seteuid:
seteuid = conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#define AUTOCONF_TEST 1
#define USE_SETUIDX 1
2012-06-30 00:46:23 +04:00
#include "../lib/util/setid.c"
2012-02-01 01:30:45 +04:00
#include "./lib/util_sec.c"
''',
'USE_SETUIDX',
addmain=False,
execute=True,
mandatory=True,
msg="Checking whether setuidx is available")
2010-12-07 14:20:09 +03:00
if Options.options.with_dnsupdate:
2012-05-27 00:41:16 +04:00
if not conf.CONFIG_SET('HAVE_KRB5'):
2011-02-21 04:16:03 +03:00
Logs.warn("--with-dnsupdate=yes but gssapi support not sufficient")
2011-02-09 22:51:12 +03:00
else:
conf.DEFINE('WITH_DNS_UPDATES', 1)
2018-06-21 13:46:06 +03:00
# valgrind.h or valgrind/valgrind.h is checked in lib/replace/wscript
2010-12-07 16:59:53 +03:00
if Options.options.developer:
if conf.CONFIG_SET('HAVE_VALGRIND_H') or conf.CONFIG_SET('HAVE_VALGRIND_VALGRIND_H'):
conf.DEFINE('VALGRIND', '1')
2010-09-24 05:15:09 +04:00
2011-02-01 21:22:04 +03:00
if conf.CHECK_CODE('''
#include <bits/sockaddr.h>
#include <linux/netlink.h>
''',
2012-02-01 01:30:45 +04:00
'HAVE_LINUX_NETLINK_H',
2011-02-01 21:22:04 +03:00
msg="Checking whether Linux netlink is available"):
2012-06-05 08:39:15 +04:00
2011-02-01 21:22:04 +03:00
conf.CHECK_CODE('''
#include <bits/sockaddr.h>
#include <linux/netlink.h>
#include <linux/rtnetlink.h>
''',
2012-02-01 01:30:45 +04:00
'HAVE_LINUX_RTNETLINK_H',
msg='Checking whether Linux rtnetlink is available')
2012-06-05 08:39:15 +04:00
2011-02-16 18:51:14 +03:00
conf.CHECK_CODE('''
#include "../tests/fcntl_lock.c"
''',
2012-02-01 01:30:45 +04:00
'HAVE_FCNTL_LOCK',
addmain=False,
execute=True,
msg='Checking whether fcntl locking is available')
2011-02-16 18:51:14 +03:00
2016-05-12 22:46:50 +03:00
conf.CHECK_CODE('''
#include <unistd.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <errno.h>
#define DATA "ofdtest.fcntl"
int main() {
struct flock lck = {
.l_whence = SEEK_SET,
.l_type = F_WRLCK,
.l_start = 0,
.l_len = 1,
.l_pid = 0,
};
int ret;
int fd1;
int fd2;
char *testdir = getenv("TESTDIR");
if (testdir) {
if (chdir(testdir) != 0) {
goto err;
}
}
unlink(DATA);
fd1 = open(DATA, O_RDWR|O_CREAT|O_EXCL, 0600);
fd2 = open(DATA, O_RDWR);
if (fd1 == -1 || fd2 == -1) {
goto err;
}
ret = fcntl(fd1,F_OFD_SETLKW,&lck);
if (ret == -1) {
goto err;
}
ret = fcntl(fd2,F_OFD_SETLK,&lck);
if (ret != -1) {
goto err;
}
if (errno != EAGAIN) {
goto err;
}
ret = fcntl(fd2,F_OFD_GETLK,&lck);
if (ret == -1) {
goto err;
}
unlink(DATA);
exit(0);
err:
unlink(DATA);
exit(1);
}''',
'HAVE_OFD_LOCKS',
addmain=False,
execute=True,
msg="Checking whether fcntl lock supports open file description locks")
2019-09-27 08:49:37 +03:00
conf.CHECK_CODE('''
#include <fcntl.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/socket.h>
int main(void)
{
int sockfd, ret;
struct f_owner_ex owner, get_owner;
sockfd = socket(AF_UNIX, SOCK_STREAM, 0);
if (sockfd == -1) {
goto err;
}
owner.type = F_OWNER_PID;
owner.pid = getpid();
ret = fcntl(sockfd, F_SETOWN_EX, &owner);
if (ret == -1) {
goto err;
}
ret = fcntl(sockfd, F_GETOWN_EX, &get_owner);
if (ret == -1) {
goto err;
}
if (get_owner.type != F_OWNER_PID) {
goto err;
}
if (get_owner.pid != getpid()) {
goto err;
}
close(sockfd);
exit(0);
err:
close(sockfd);
exit(1);
}''',
'HAVE_F_OWNER_EX',
addmain=False,
execute=True,
msg="Checking whether fcntl supports flags to send direct I/O availability signals")
conf.CHECK_CODE('''
#include <fcntl.h>
#include <unistd.h>
#include <stdlib.h>
#include <stdint.h>
#define DATA "hinttest.fcntl"
int main(void)
{
uint64_t *hint, get_hint;
int fd;
fd = open(DATA, O_RDONLY | O_CREAT | O_EXCL);
if (fd == -1) {
goto err;
}
*hint = RWH_WRITE_LIFE_SHORT;
int ret = fcntl(fd, F_SET_RW_HINT, hint);
if (ret == -1) {
goto err;
}
ret = fcntl(fd, F_GET_RW_HINT, &get_hint);
if (ret == -1) {
goto err;
}
if (get_hint != RWH_WRITE_LIFE_SHORT) {
goto err;
}
*hint = RWH_WRITE_LIFE_EXTREME;
ret = fcntl(fd, F_SET_FILE_RW_HINT, hint);
if (ret == -1) {
goto err;
}
ret = fcntl(fd, F_GET_FILE_RW_HINT, &get_hint);
if (ret == -1) {
goto err;
}
if (get_hint != RWH_WRITE_LIFE_EXTREME) {
goto err;
}
close(fd);
unlink(DATA);
exit(0);
err:
close(fd);
unlink(DATA);
exit(1);
}''',
'HAVE_RW_HINTS',
addmain=False,
execute=True,
msg="Checking whether fcntl supports setting/geting hints")
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtim.tv_nsec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') # Linux, Solaris
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimensec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_MTIMENSEC') # BSD, if defined _POSIX_SOURCE
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtimespec.tv_nsec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') # BSD, if not defined _POSIX_SOURCE
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_mtime_n',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_MTIME_N') # AIX
2011-02-16 19:33:05 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_umtime',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_UMTIME') # Tru64
2011-02-16 19:33:05 +03:00
if conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC') or \
conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMENSEC') or \
conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC') or \
conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_MTIME_N') or \
conf.CONFIG_SET('HAVE_STRUCT_STAT_ST_UMTIME'):
conf.DEFINE('HAVE_STAT_HIRES_TIMESTAMPS', '1')
2011-02-16 23:58:47 +03:00
# recent FreeBSD, NetBSD have creation timestamps called birthtime:
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtime',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_BIRTHTIME')
2011-02-16 23:58:47 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimespec.tv_nsec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC')
2011-02-16 23:58:47 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct stat', 'st_birthtimensec',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC')
2011-02-16 23:58:47 +03:00
2011-02-16 19:55:26 +03:00
conf.CHECK_CODE('''
ssize_t err = posix_fadvise(0,0,0x80000,POSIX_FADV_WILLNEED);
''',
2012-02-01 01:30:45 +04:00
'HAVE_POSIX_FADVISE',
msg='Checking whether posix_fadvise is available',
headers='unistd.h fcntl.h')
2011-02-16 19:55:26 +03:00
2011-02-16 20:29:33 +03:00
for v in ['_SC_NGROUPS_MAX', '_SC_NPROC_ONLN', '_SC_NPROCESSORS_ONLN', '_SC_PAGESIZE' ]:
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <unistd.h>
return sysconf(%s) == -1 ? 1 : 0;
''' % v,
'SYSCONF%s' % v,
msg='Checking whether sysconf(%s) is available' % v)
2011-02-16 20:29:33 +03:00
2011-02-16 23:58:47 +03:00
conf.CHECK_CODE('''
#include <sys/syscall.h>
#include <unistd.h>
syscall(SYS_initgroups, 16, NULL, NULL, 0);
2012-02-01 01:30:45 +04:00
''',
'HAVE_DARWIN_INITGROUPS',
msg='Checking whether to use the Darwin-specific initgroups system call')
2011-02-16 23:58:47 +03:00
2011-02-17 12:53:25 +03:00
conf.CHECK_CODE('''struct utimbuf tbuf; tbuf.actime = 0; tbuf.modtime = 1; exit(utime("foo.c",&tbuf));''',
2012-02-01 01:30:45 +04:00
'HAVE_UTIMBUF',
headers='sys/types.h utime.h',
msg='Checking whether struct utimbuf is available')
2011-02-17 12:53:25 +03:00
2011-02-17 12:59:44 +03:00
if conf.CHECK_CODE('''struct sigevent s;''',
2012-02-01 01:30:45 +04:00
'HAVE_STRUCT_SIGEVENT',
headers='sys/types.h stdlib.h stddef.h signal.h',
msg='Checking whether we have the struct sigevent'):
2011-02-17 12:59:44 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sival_ptr',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIVAL_PTR',
headers='signal.h');
2011-02-17 12:59:44 +03:00
conf.CHECK_STRUCTURE_MEMBER('struct sigevent', 'sigev_value.sigval_ptr',
2012-02-01 01:30:45 +04:00
define='HAVE_STRUCT_SIGEVENT_SIGEV_VALUE_SIGVAL_PTR',
headers='signal.h');
2011-02-17 12:59:44 +03:00
2011-02-22 13:41:06 +03:00
if os.path.exists('/proc/sys/kernel/core_pattern'):
conf.DEFINE('HAVE_SYS_KERNEL_PROC_CORE_PATTERN', '1')
2011-02-22 13:49:52 +03:00
if conf.CHECK_CODE('''
#include <time.h>
main() {
2012-02-01 01:30:45 +04:00
struct tm *tm;
if (sizeof(time_t) == 8) {
time_t max_time = 0x7fffffffffffffffll;
tm = gmtime(&max_time);
/* This should fail with 32-bit tm_year. */
if (tm == NULL) {
/* Max time_t that works with 32-bit int tm_year in struct tm. */
max_time = 67768036191676799ll;
tm = gmtime(&max_time);
if (tm) {
exit(0);
}
}
}
exit(1);
2011-02-22 13:49:52 +03:00
}''',
2012-02-01 01:30:45 +04:00
'__TIME_T_MAX',
addmain=False,
execute=True,
msg="Checking for the maximum value of the 'time_t' type"):
2011-02-22 13:49:52 +03:00
conf.DEFINE('TIME_T_MAX', '67768036191676799ll')
2011-02-22 13:53:51 +03:00
conf.CHECK_CODE('''
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#include <sys/types.h>
2019-03-21 13:55:46 +03:00
#if defined(HAVE_SYS_SYSMACROS_H)
#include <sys/sysmacros.h>
#endif
2011-02-22 13:53:51 +03:00
main() { dev_t dev = makedev(1,2); return 0; }
''',
2012-02-01 01:30:45 +04:00
'HAVE_MAKEDEV',
addmain=False,
msg='Checking whether the macro for makedev is available')
2011-02-22 13:53:51 +03:00
2011-02-22 13:57:23 +03:00
conf.CHECK_CODE('''
#include <stdio.h>
#include <limits.h>
#include <signal.h>
void exit_on_core(int ignored) {
2012-02-01 01:30:45 +04:00
exit(1);
2011-02-22 13:57:23 +03:00
}
main() {
2012-02-01 01:30:45 +04:00
char *newpath;
signal(SIGSEGV, exit_on_core);
newpath = realpath("/tmp", NULL);
exit((newpath != NULL) ? 0 : 1);
2011-02-22 13:57:23 +03:00
}
''',
2012-02-01 01:30:45 +04:00
'REALPATH_TAKES_NULL',
addmain=False,
execute=True,
msg='Checking whether the realpath function allows a NULL argument')
2011-02-22 13:57:23 +03:00
2011-02-22 14:43:12 +03:00
conf.CHECK_CODE('''#include "../tests/ftruncate.c"''',
2012-02-01 01:30:45 +04:00
'HAVE_FTRUNCATE_EXTEND',
msg='Checking for ftruncate extend',
addmain=False,
execute=True)
2011-02-22 22:43:23 +03:00
2019-02-11 00:38:49 +03:00
conf.SET_TARGET_TYPE('sendfile', 'EMPTY')
conf.CHECK_LIB('sendfile')
2019-01-07 03:05:19 +03:00
if not Options.options.with_sendfile_support == False:
2011-02-22 23:11:15 +03:00
if (host_os.rfind('linux') > -1) or (host_os.rfind('gnu') > -1) or (host_os.rfind('k*bsd*-gnu') > -1) or (host_os.rfind('kopensolaris*-gnu') > -1):
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
int tofd, fromfd;
off_t offset;
size_t total;
ssize_t nwritten = sendfile(tofd, fromfd, &offset, total);
''',
'_HAVE_SENDFILE',
2012-06-02 07:02:21 +04:00
headers='sys/sendfile.h',
2012-02-01 01:30:45 +04:00
msg='Checking for linux sendfile support')
2011-02-22 23:11:15 +03:00
2012-03-28 02:39:57 +04:00
if conf.CONFIG_SET('_HAVE_SENDFILE'):
2011-02-22 23:11:15 +03:00
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('LINUX_SENDFILE_API', '1')
2012-02-01 01:30:45 +04:00
elif (host_os.rfind('freebsd') > -1) or (host_os.rfind('dragonfly') > -1):
2011-02-22 23:16:39 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <sys/types.h>
#include <unistd.h>
#include <sys/socket.h>
#include <sys/uio.h>
int fromfd, tofd, ret, total=0;
off_t offset, nwritten;
struct sf_hdtr hdr;
struct iovec hdtrl;
hdr.headers = &hdtrl;
hdr.hdr_cnt = 1;
hdr.trailers = NULL;
hdr.trl_cnt = 0;
hdtrl.iov_base = NULL;
hdtrl.iov_len = 0;
ret = sendfile(fromfd, tofd, offset, total, &hdr, &nwritten, 0)
''',
'_HAVE_SENDFILE',
msg='Checking for freebsd sendfile support')
2011-02-22 23:16:39 +03:00
if conf.CONFIG_SET('_HAVE_SENDFILE'):
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('FREEBSD_SENDFILE_API', '1')
2012-07-02 14:47:06 +04:00
elif (host_os.rfind('darwin') > -1):
conf.CHECK_CODE('''
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/uio.h>
int fromfd, tofd, ret;
off_t offset, nwritten;
struct sf_hdtr hdr;
struct iovec hdtrl;
hdr.headers = &hdtrl;
hdr.hdr_cnt = 1;
hdr.trailers = (void *)0;
hdr.trl_cnt = 0;
hdtrl.iov_base = (void *)0;
hdtrl.iov_len = 0;
2016-01-11 02:02:49 +03:00
ret = sendfile(fromfd, tofd, offset, &nwritten, &hdr, 0);
2012-07-02 14:47:06 +04:00
''',
'_HAVE_SENDFILE',
msg='Checking for darwin sendfile support')
if conf.CONFIG_SET('_HAVE_SENDFILE'):
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('DARWIN_SENDFILE_API', '1')
2012-06-30 01:43:56 +04:00
elif (host_os.rfind('hpux') > -1) or (host_os.rfind('osf') > -1):
2011-02-22 23:24:39 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <sys/socket.h>
#include <sys/uio.h>
int fromfd, tofd;
size_t total=0;
struct iovec hdtrl[2];
ssize_t nwritten;
off_t offset;
hdtrl[0].iov_base = 0;
hdtrl[0].iov_len = 0;
nwritten = sendfile(tofd, fromfd, offset, total, &hdtrl[0], 0);
''',
'_HAVE_SENDFILE',
2012-06-30 01:43:56 +04:00
msg='Checking for osf/hpux sendfile support')
2012-03-28 02:39:57 +04:00
if conf.CONFIG_SET('_HAVE_SENDFILE'):
2011-02-22 23:24:39 +03:00
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('HPUX_SENDFILE_API', '1')
2019-01-07 02:28:34 +03:00
elif (host_os.rfind('sunos') > -1):
conf.CHECK_FUNCS_IN('sendfilev', 'sendfile')
2011-02-22 23:33:06 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <sys/sendfile.h>,
int sfvcnt;
size_t xferred;
struct sendfilevec vec[2];
ssize_t nwritten;
int tofd;
sfvcnt = 2;
vec[0].sfv_fd = SFV_FD_SELF;
vec[0].sfv_flag = 0;
vec[0].sfv_off = 0;
vec[0].sfv_len = 0;
vec[1].sfv_fd = 0;
vec[1].sfv_flag = 0;
vec[1].sfv_off = 0;
vec[1].sfv_len = 0;
nwritten = sendfilev(tofd, vec, sfvcnt, &xferred);
''',
'_HAVE_SENDFILEV',
2019-01-07 02:28:34 +03:00
msg='Checking for solaris sendfilev support',
lib='sendfile')
2012-03-28 02:39:57 +04:00
if conf.CONFIG_SET('_HAVE_SENDFILEV'):
2011-02-22 23:33:06 +03:00
conf.DEFINE('HAVE_SENDFILEV', '1')
conf.DEFINE('SOLARIS_SENDFILE_API', '1')
2012-02-01 01:30:45 +04:00
elif (host_os.rfind('aix') > -1):
2011-02-22 23:36:35 +03:00
conf.CHECK_CODE('''
2012-02-01 01:30:45 +04:00
#include <sys/socket.h>
int fromfd, tofd;
size_t total=0;
struct sf_parms hdtrl;
ssize_t nwritten;
hdtrl.header_data = 0;
hdtrl.header_length = 0;
hdtrl.file_descriptor = fromfd;
hdtrl.file_offset = 0;
hdtrl.file_bytes = 0;
hdtrl.trailer_data = 0;
hdtrl.trailer_length = 0;
nwritten = send_file(&tofd, &hdtrl, 0);
''',
'_HAVE_SENDFILE',
msg='Checking for AIX send_file support')
2011-02-22 23:36:35 +03:00
if conf.CONFIG_SET('_HAVE_SENDFILE'):
conf.DEFINE('HAVE_SENDFILE', '1')
conf.DEFINE('AIX_SENDFILE_API', '1')
2011-02-22 23:11:15 +03:00
2019-01-07 03:05:19 +03:00
if Options.options.with_sendfile_support == True and not conf.CONFIG_SET('HAVE_SENDFILE'):
conf.fatal('sendfile support not found but it was requested !')
2011-06-01 02:38:55 +04:00
# Check for getcwd allowing a NULL arg.
conf.CHECK_CODE('''
#include <unistd.h>
main() {
2012-02-01 01:30:45 +04:00
char *s = getcwd(NULL,0);
2011-06-01 02:38:55 +04:00
exit(s != NULL ? 0 : 1);
}''', 'GETCWD_TAKES_NULL', addmain=False, execute=True,
msg="getcwd takes a NULL argument")
2011-02-23 00:56:23 +03:00
# UnixWare 7.x has its getspnam in -lgen
conf.CHECK_FUNCS_IN('getspnam', 'gen')
conf.CHECK_FUNCS_IN('getspnam', 'security')
conf.CHECK_FUNCS_IN('getspnam', 'sec')
2016-03-16 21:20:02 +03:00
legacy_quota_libs = ''
2019-02-07 06:39:04 +03:00
if not Options.options.with_quotas == False:
2011-02-23 14:29:24 +03:00
# For quotas on Veritas VxFS filesystems
conf.CHECK_HEADERS('sys/fs/vx_quota.h')
# For sys/quota.h and linux/quota.h
conf.CHECK_HEADERS('sys/quota.h')
2012-09-02 23:45:53 +04:00
# For quotas on BSD systems
conf.CHECK_HEADERS('ufs/ufs/quota.h')
2019-01-31 03:27:12 +03:00
# For quotas on AIX systems
conf.CHECK_HEADERS('jfs/quota.h')
2012-09-07 21:49:25 +04:00
# For quotas on Linux XFS filesystems
if conf.CHECK_HEADERS('xfs/xqm.h'):
conf.DEFINE('HAVE_XFS_QUOTAS', '1')
else:
# For Irix XFS
conf.CHECK_CODE('''
#include "confdefs.h"
#ifdef HAVE_SYS_TYPES_H
#include <sys/types.h>
#endif
#ifdef HAVE_ASM_TYPES_H
#include <asm/types.h>
#endif
#include <sys/quota.h>
int i = Q_XGETQUOTA;''',
define='HAVE_XFS_QUOTAS',
msg='for XFS QUOTA in <sys/quota.h>',
execute=False,
local_include=False)
2016-01-11 02:02:49 +03:00
2012-09-07 22:02:03 +04:00
# For IRIX like dqb_isoftlimit instead of dqb_fsoftlimit in struc dqblk
conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_fsoftlimit', define='HAVE_DQB_FSOFTLIMIT',
headers='sys/quota.h')
2012-09-26 06:33:13 +04:00
#darwin style quota bytecount
conf.CHECK_STRUCTURE_MEMBER('struct dqblk', 'dqb_curbytes', define='HAVE_STRUCT_DQBLK_DQB_CURBYTES',
headers='sys/quota.h')
2019-07-31 13:14:03 +03:00
conf.CHECK_HEADERS('rpc/types.h rpc/xdr.h', together=True)
2018-01-16 19:48:10 +03:00
if conf.CHECK_HEADERS('rpcsvc/rquota.h', lib='tirpc'):
2018-01-19 16:30:20 +03:00
# Optional structure member
2012-09-07 22:41:58 +04:00
conf.CHECK_STRUCTURE_MEMBER('struct getquota_rslt', 'getquota_rslt_u',
define='HAVE_GETQUOTA_RSLT_GETQUOTA_RSLT_U',
2018-01-19 16:30:20 +03:00
headers='rpcsvc/rquota.h',
lib='tirpc')
2019-07-31 12:45:31 +03:00
# Required function for NFS quota support
2018-01-19 16:30:20 +03:00
conf.CHECK_CODE('''
clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
''',
headers="rpc/rpc.h rpc/types.h rpcsvc/rquota.h rpc/nettype.h rpc/xdr.h",
define='HAVE_NFS_QUOTAS',
msg='checking for clnt_create()',
execute=True,
local_include=False,
lib='tirpc')
2011-04-02 04:20:49 +04:00
2012-09-10 14:35:40 +04:00
if (host_os.rfind('linux') > -1):
conf.DEFINE('HAVE_QUOTACTL_LINUX', '1')
2012-09-26 06:33:13 +04:00
elif not conf.CONFIG_SET("HAVE_XFS_QUOTAS"):
if not conf.CHECK_CODE('''
#define HAVE_QUOTACTL_4A 1
#define AUTOCONF_TEST 1
2012-09-29 08:28:57 +04:00
#include "../tests/sysquotas.c"
2012-09-26 06:33:13 +04:00
''',
2012-09-29 08:28:57 +04:00
cflags=conf.env['WERROR_CFLAGS'],
2012-09-26 06:33:13 +04:00
define='HAVE_QUOTACTL_4A',
msg='for QUOTACTL_4A: long quotactl(int cmd, char *special, qid_t id, caddr_t addr)',
execute=True,
2012-09-29 08:28:57 +04:00
addmain=False):
2012-09-26 06:33:13 +04:00
conf.CHECK_CODE('''
#define HAVE_QUOTACTL_4B 1
#define AUTOCONF_TEST 1
2012-09-29 08:28:57 +04:00
#include "../tests/sysquotas.c"
2012-09-26 06:33:13 +04:00
''',
2012-09-29 08:28:57 +04:00
cflags=conf.env['WERROR_CFLAGS'],
2012-09-26 06:33:13 +04:00
define='HAVE_QUOTACTL_4B',
msg='for QUOTACTL_4B: int quotactl(const char *path, int cmd, int id, char *addr)',
execute=True,
2012-09-29 08:28:57 +04:00
addmain=False)
2012-09-26 06:33:13 +04:00
2012-09-10 14:35:40 +04:00
if conf.CONFIG_SET('HAVE_QUOTACTL_LINUX') or \
conf.CONFIG_SET('HAVE_QUOTACTL_4A') or \
2012-09-26 06:42:15 +04:00
conf.CONFIG_SET('HAVE_QUOTACTL_4B') or \
conf.CONFIG_SET('HAVE_XFS_QUOTAS'):
2012-09-10 14:35:40 +04:00
conf.DEFINE('HAVE_SYS_QUOTAS', '1')
2012-09-26 06:42:15 +04:00
conf.DEFINE('WITH_QUOTAS', '1')
2012-09-10 14:35:40 +04:00
2016-02-03 07:41:42 +03:00
#
# check if Legacy quota code can be brought in
# if standard interfaces are not supported
#
if not conf.CONFIG_SET('WITH_QUOTAS'):
if host_os.rfind('sunos5') > -1:
conf.DEFINE('SUNOS5', '1')
legacy_quota_libs = 'nsl'
conf.CHECK_CODE('''
#define WITH_QUOTAS 1
#define AUTOCONF_TEST 1
#include "../tests/oldquotas.c"
''',
cflags=conf.env['WERROR_CFLAGS'],
define='WITH_QUOTAS',
lib=legacy_quota_libs,
msg='Checking whether legacy quota code can be used',
execute=False,
addmain=False)
if not conf.CONFIG_SET('WITH_QUOTAS'):
legacy_quota_libs = ''
2016-03-16 21:20:02 +03:00
conf.env['legacy_quota_libs'] = legacy_quota_libs
2016-02-03 07:41:42 +03:00
2019-02-07 06:39:04 +03:00
if Options.options.with_quotas == True and not conf.CONFIG_SET('WITH_QUOTAS'):
conf.fatal('quota support not found but it was equested !')
2018-03-13 18:58:49 +03:00
conf.CHECK_CODE('(void)unshare(CLONE_FS);',
headers='sched.h',
define='HAVE_UNSHARE_CLONE_FS',
msg='for Linux unshare(CLONE_FS)')
2019-03-29 14:44:50 +03:00
# Check for mallinfo
conf.CHECK_CODE('''
struct mallinfo mi;
int tmp;
mi = mallinfo();
tmp = mi.arena + mi.ordblks + mi.smblks + mi.hblks +
mi.hblkhd + mi.usmblks + mi.fsmblks + mi.uordblks +
mi.fordblks + mi.keepcost;
return tmp;
''', 'HAVE_MALLINFO', msg="Checking for mallinfo()", headers='malloc.h')
2011-04-02 04:20:49 +04:00
#
2014-10-24 19:55:17 +04:00
# cluster support (CTDB)
2011-04-02 04:20:49 +04:00
#
2014-10-10 07:29:51 +04:00
if not Options.options.with_cluster_support:
Logs.info("building without cluster support (--without-cluster-support)")
conf.env.with_ctdb = False
2011-04-02 04:20:49 +04:00
else:
Logs.info("building with cluster support")
2014-10-10 07:29:51 +04:00
conf.env.with_ctdb = True
2015-11-07 15:21:34 +03:00
conf.DEFINE('CLUSTER_SUPPORT', 1)
2011-04-02 04:20:49 +04:00
2011-03-04 00:55:09 +03:00
conf.CHECK_CODE('void seekdir(DIR *d, long loc) { return; }',
2012-02-01 01:30:45 +04:00
'SEEKDIR_RETURNS_VOID',
headers='sys/types.h dirent.h',
msg='Checking whether seekdir returns void')
2011-03-04 00:55:09 +03:00
2011-04-14 02:17:29 +04:00
if Options.options.with_profiling_data:
conf.DEFINE('WITH_PROFILE', 1);
2014-11-14 14:52:33 +03:00
conf.CHECK_FUNCS('getrusage', headers="sys/time.h sys/resource.h")
2011-04-14 02:17:29 +04:00
2013-11-27 17:04:34 +04:00
if (conf.CHECK_HEADERS('linux/ioctl.h sys/ioctl.h linux/fs.h') and
2016-01-11 02:02:49 +03:00
conf.CHECK_DECLS('FS_IOC_GETFLAGS FS_COMPR_FL', headers='linux/fs.h')):
conf.DEFINE('HAVE_LINUX_IOCTL', '1')
2013-03-08 14:47:55 +04:00
2016-03-26 15:18:07 +03:00
conf.env['CFLAGS_CEPHFS'] = "-D_FILE_OFFSET_BITS=64"
2013-04-24 23:52:57 +04:00
if Options.options.libcephfs_dir:
2019-06-18 15:35:02 +03:00
Logs.error('''--with-libcephfs no longer supported, please use compiler
flags instead, e.g. GCC LIBRARY_PATH and C_INCLUDE_PATH''')
sys.exit(1)
2013-04-24 23:52:57 +04:00
2017-07-20 12:10:57 +03:00
if (Options.options.with_cephfs and
conf.CHECK_HEADERS('cephfs/libcephfs.h', False, False, 'cephfs') and
2018-01-16 01:20:39 +03:00
conf.CHECK_LIB('cephfs', shlib=True)):
2016-07-26 18:44:47 +03:00
if Options.options.with_acl_support:
conf.DEFINE('HAVE_CEPH', '1')
2019-06-13 18:20:02 +03:00
if conf.CHECK_FUNCS_IN('ceph_statx', 'cephfs',
2017-07-20 12:10:57 +03:00
headers='cephfs/libcephfs.h'):
2016-11-17 21:13:57 +03:00
conf.DEFINE('HAVE_CEPH_STATX', '1')
2016-07-26 18:44:47 +03:00
else:
Logs.warn("ceph support disabled due to --without-acl-support")
conf.undefine('HAVE_CEPH')
2013-04-24 23:52:57 +04:00
2013-05-29 15:21:46 +04:00
if Options.options.with_glusterfs:
2015-03-07 17:31:19 +03:00
conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 4" --cflags --libs',
2013-05-29 15:21:46 +04:00
msg='Checking for glusterfs-api >= 4', uselib_store="GFAPI")
2017-10-31 17:52:49 +03:00
conf.CHECK_HEADERS('glusterfs/api/glfs.h', lib='gfapi')
2013-05-29 15:21:46 +04:00
conf.CHECK_LIB('gfapi', shlib=True)
2017-10-31 17:52:49 +03:00
if conf.CONFIG_SET('HAVE_GLUSTERFS_API_GLFS_H'):
2016-07-26 18:44:47 +03:00
if Options.options.with_acl_support:
conf.DEFINE('HAVE_GLUSTERFS', '1')
else:
Logs.warn("GlusterFS support disabled due to --without-acl-support")
conf.undefine('HAVE_GLUSTERFS')
2013-05-29 15:21:46 +04:00
else:
conf.undefine('HAVE_GLUSTERFS')
2017-11-14 13:21:44 +03:00
conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 6" --cflags --libs',
msg='Checking for glusterfs-api >= 6',
uselib_store="GFAPI_VER_6")
2018-03-20 09:02:20 +03:00
conf.CHECK_CFG(package='glusterfs-api', args='"glusterfs-api >= 7.6" --cflags --libs',
msg='Checking for glusterfs-api >= 7.6',
uselib_store="GFAPI_VER_7_6")
2013-05-29 15:21:46 +04:00
else:
conf.SET_TARGET_TYPE('gfapi', 'EMPTY')
conf.undefine('HAVE_GLUSTERFS')
2014-09-01 12:40:10 +04:00
if Options.options.enable_vxfs:
2016-01-11 02:02:49 +03:00
conf.DEFINE('HAVE_VXFS', '1')
2014-09-01 12:40:10 +04:00
2015-03-07 17:31:19 +03:00
if conf.CHECK_CFG(package='dbus-1', args='--cflags --libs',
2014-06-27 17:31:35 +04:00
msg='Checking for dbus', uselib_store="DBUS-1"):
if (conf.CHECK_HEADERS('dbus/dbus.h', lib='dbus-1')
and conf.CHECK_LIB('dbus-1', shlib=True)):
conf.DEFINE('HAVE_DBUS', '1')
2013-05-06 16:14:02 +04:00
conf.env.build_regedit = False
if not Options.options.with_regedit == False:
2012-08-02 13:29:10 +04:00
conf.PROCESS_SEPARATE_RULE('system_ncurses')
2013-05-06 16:14:02 +04:00
if conf.CONFIG_SET('HAVE_NCURSES'):
conf.env.build_regedit = True
if conf.env.build_regedit:
Logs.info("building regedit")
else:
if Options.options.with_regedit == False:
Logs.info("not building regedit (--without-regedit)")
elif Options.options.with_regedit == True:
Logs.error("ncurses not available, cannot build regedit")
conf.fatal("ncurses not available, but --with-regedit was specified")
else:
Logs.info("ncurses not available, not building regedit")
2017-02-03 16:57:45 +03:00
if conf.CHECK_HEADERS('ftw.h') and conf.CHECK_FUNCS('nftw'):
conf.env.build_mvxattr = True
2014-04-16 02:36:25 +04:00
conf.CHECK_FUNCS_IN('DES_pcbc_encrypt', 'crypto')
if Options.options.with_fake_kaserver == True:
conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
conf.CHECK_HEADERS('afs/param.h afs/stds.h', together=True)
if (conf.CONFIG_SET('HAVE_AFS_PARAM_H') and conf.CONFIG_SET('HAVE_AFS_STDS_H') and conf.CONFIG_SET('HAVE_DES_PCBC_ENCRYPT')):
conf.DEFINE('WITH_FAKE_KASERVER', '1')
else:
conf.fatal('AFS headers not available, but --with-fake-kaserver was specified')
2016-01-20 17:08:31 +03:00
if conf.CHECK_CFG(package='glib-2.0',
args='--cflags --libs',
msg='Checking for glib-2.0',
uselib_store="GLIB-2.0"):
if (conf.CHECK_HEADERS('glib.h', lib='glib-2.0') and conf.CHECK_LIB('glib-2.0', shlib=True)):
conf.DEFINE('HAVE_GLIB', 1)
if conf.CONFIG_SET('HAVE_GLIB'):
conf.DEFINE('WITH_TEVENT_GLIB_GLUE', '1')
2014-07-23 09:15:50 +04:00
conf.env['libtracker']=''
2016-02-15 12:42:52 +03:00
tracker_versions = ['2.0', '1.0', '0.16', '0.14']
for version in tracker_versions:
testlib = 'tracker-sparql-' + version
if conf.CHECK_CFG(package=testlib,
args='--cflags --libs',
mandatory=False):
conf.SET_TARGET_TYPE(testlib, 'SYSLIB')
conf.env['libtracker'] = testlib
conf.DEFINE('HAVE_TRACKER', '1')
break
Logs.info("Checking for bison")
bison.configure(conf)
2019-03-29 20:20:52 +03:00
if conf.env['BISON']:
2019-03-29 20:40:51 +03:00
conf.CHECK_COMMAND('%s --version | head -n1' % conf.env.BISON[0],
2019-03-29 20:20:52 +03:00
msg='Using bison version',
define=None,
on_target=False)
2016-02-15 12:42:52 +03:00
Logs.info("Checking for flex")
conf.find_program('flex', var='FLEX')
2019-03-29 20:20:52 +03:00
if conf.env['FLEX']:
conf.env.FLEXFLAGS = ['-t']
2019-03-29 20:40:51 +03:00
conf.CHECK_COMMAND('%s --version' % conf.env.FLEX[0],
2019-03-29 20:20:52 +03:00
msg='Using flex version',
define=None,
on_target=False)
2016-02-15 12:42:52 +03:00
2019-04-17 17:42:20 +03:00
with_spotlight_tracker_backend = (
conf.CONFIG_SET('HAVE_TRACKER')
and conf.CONFIG_SET('HAVE_GLIB')
and conf.env['BISON']
and conf.env['FLEX']
and conf.CONFIG_GET('HAVE_UTF8_NORMALISATION')
)
2019-08-05 17:25:01 +03:00
with_spotlight_es_backend = (
conf.CONFIG_SET('HAVE_JSON_OBJECT')
and conf.env['BISON']
and conf.env['FLEX']
and conf.CONFIG_GET('HAVE_UTF8_NORMALISATION')
)
2014-07-23 09:15:50 +04:00
conf.env.with_spotlight = False
2019-04-17 17:42:20 +03:00
if Options.options.with_spotlight is not False:
2019-04-17 12:00:52 +03:00
backends = ['noindex']
2019-05-06 16:03:02 +03:00
2019-04-17 17:42:20 +03:00
if not conf.env['BISON']:
Logs.warn("Spotlight support requested but bison missing")
if not conf.env['FLEX']:
Logs.warn("Spotlight support requested but flex missing")
if not conf.CONFIG_GET('HAVE_UTF8_NORMALISATION'):
Logs.warn("Missing support for Unicode normalisation. "
"Try installing icu-dev or libicu-devel.")
2019-04-17 12:00:52 +03:00
if not conf.CONFIG_SET('HAVE_TRACKER'):
Logs.warn('Missing libtracker-sparql development files for Spotlight backend "tracker"')
if not conf.CONFIG_SET('HAVE_GLIB'):
Logs.warn('Missing glib-2.0 development files for Spotlight backend "tracker"')
2019-08-05 17:25:01 +03:00
if not conf.CONFIG_GET('HAVE_JSON_OBJECT'):
Logs.warn('Missing libjansson development files for Spotlight backend "elasticsearch"')
2019-05-06 16:03:02 +03:00
2019-04-17 17:42:20 +03:00
if with_spotlight_tracker_backend:
conf.env.spotlight_backend_tracker = True
backends.append('tracker')
conf.DEFINE('HAVE_SPOTLIGHT_BACKEND_TRACKER', '1')
2019-08-05 17:25:01 +03:00
if with_spotlight_es_backend:
conf.env.spotlight_backend_es = True
backends.append('elasticsearch')
conf.DEFINE('HAVE_SPOTLIGHT_BACKEND_ES', '1')
if (Options.options.with_spotlight is True
and not conf.env.spotlight_backend_tracker
and not conf.env.spotlight_backend_es):
conf.fatal("Unmet dependencies for Spotlight backends")
2019-04-17 17:42:20 +03:00
2019-05-06 16:03:02 +03:00
Logs.info("Building with Spotlight support, available backends: %s" % ', '.join(backends))
2015-10-06 14:45:33 +03:00
default_static_modules.extend(TO_LIST('rpc_mdssvc_module'))
2016-02-15 12:42:52 +03:00
conf.DEFINE('WITH_SPOTLIGHT', '1')
conf.env.with_spotlight = True
2012-07-10 17:16:35 +04:00
2019-07-31 13:19:24 +03:00
if not conf.CONFIG_SET('HAVE_RPC_XDR_H'):
conf.CHECK_HEADERS('rpc/xdr.h', lib='tirpc')
2017-10-18 21:48:37 +03:00
2019-02-12 22:28:32 +03:00
if conf.CHECK_FUNCS_IN('nscd_flush_cache', 'nscd', headers='libnscd.h'):
conf.DEFINE('HAVE_NSCD_FLUSH_CACHE', '1')
2017-09-20 19:18:33 +03:00
forced_static_modules.extend(TO_LIST('auth_builtin auth_sam auth_winbind'))
2017-01-03 10:04:59 +03:00
default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam
2017-01-03 10:04:59 +03:00
auth_unix
2011-02-11 03:31:37 +03:00
nss_info_template idmap_tdb idmap_passdb
2012-09-04 14:15:28 +04:00
idmap_nss'''))
2011-02-11 03:31:37 +03:00
2015-08-13 15:22:45 +03:00
default_shared_modules.extend(TO_LIST('''
2019-09-18 02:08:17 +03:00
vfs_recycle vfs_audit vfs_extd_audit vfs_full_audit
2011-02-11 03:31:37 +03:00
vfs_fake_perms vfs_default_quota vfs_readonly vfs_cap
2015-08-13 15:22:45 +03:00
vfs_expand_msdfs vfs_shadow_copy vfs_shadow_copy2
2017-01-30 13:18:12 +03:00
vfs_readahead vfs_xattr_tdb
2011-02-11 03:31:37 +03:00
vfs_streams_xattr vfs_streams_depot vfs_acl_xattr vfs_acl_tdb
2015-11-09 12:14:26 +03:00
vfs_preopen vfs_catia
2015-08-13 15:22:45 +03:00
vfs_media_harmony vfs_unityed_media vfs_fruit vfs_shell_snap
vfs_commit vfs_worm vfs_crossrename vfs_linux_xfs_sgid
2016-10-18 22:34:53 +03:00
vfs_time_audit vfs_offline vfs_virusfilter
2015-08-13 15:22:45 +03:00
'''))
default_shared_modules.extend(TO_LIST('auth_script idmap_tdb2 idmap_script'))
# these have broken dependencies
forced_shared_modules.extend(TO_LIST('idmap_autorid idmap_rid idmap_hash'))
2011-02-11 03:31:37 +03:00
if Options.options.developer:
2012-06-03 04:56:46 +04:00
default_static_modules.extend(TO_LIST('charset_weird'))
2011-09-09 17:51:06 +04:00
default_shared_modules.extend(TO_LIST('perfcount_test'))
2011-10-11 21:20:05 +04:00
default_shared_modules.extend(TO_LIST('vfs_skel_opaque vfs_skel_transparent vfs_shadow_copy_test'))
2011-10-17 18:08:50 +04:00
default_shared_modules.extend(TO_LIST('auth_skel pdb_test'))
2016-01-05 22:12:00 +03:00
default_shared_modules.extend(TO_LIST('vfs_fake_dfq'))
2017-05-04 16:07:14 +03:00
default_shared_modules.extend(TO_LIST('gpext_security gpext_registry gpext_scripts'))
2011-09-09 17:51:06 +04:00
2012-08-15 14:34:41 +04:00
if Options.options.enable_selftest or Options.options.developer:
2016-01-11 02:02:49 +03:00
default_shared_modules.extend(TO_LIST('vfs_fake_acls vfs_nfs4acl_xattr'))
2017-12-09 01:29:07 +03:00
default_shared_modules.extend(TO_LIST('vfs_error_inject'))
2018-08-30 18:27:08 +03:00
default_shared_modules.extend(TO_LIST('vfs_delay_inject'))
2012-08-15 14:34:41 +04:00
2012-05-21 13:45:12 +04:00
if conf.CONFIG_SET('AD_DC_BUILD_IS_ENABLED'):
2012-09-04 04:27:50 +04:00
default_static_modules.extend(TO_LIST('pdb_samba_dsdb auth_samba4 vfs_dfs_samba4'))
2017-06-20 17:47:57 +03:00
default_shared_modules.extend(TO_LIST('vfs_posix_eadb'))
2011-05-06 18:50:04 +04:00
2011-02-11 03:31:37 +03:00
if conf.CONFIG_SET('HAVE_FREEBSD_SUNACL_H'):
2012-02-01 01:30:45 +04:00
default_shared_modules.extend(TO_LIST('vfs_zfsacl'))
2011-02-11 03:31:37 +03:00
if conf.CONFIG_SET('HAVE_DIRFD_DECL'):
2012-02-01 01:30:45 +04:00
default_shared_modules.extend(TO_LIST('vfs_syncops vfs_dirsort'))
2011-02-11 03:31:37 +03:00
if conf.CONFIG_SET('HAVE_STATFS_F_FSID'):
2012-02-01 01:30:45 +04:00
default_shared_modules.extend(TO_LIST('vfs_fileid'))
2011-02-11 03:31:37 +03:00
2014-06-14 02:55:02 +04:00
if (conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_CONTROL') or conf.CONFIG_SET('HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS')):
2012-02-01 01:30:45 +04:00
default_shared_modules.extend(TO_LIST('vfs_aio_fork'))
2011-02-11 03:31:37 +03:00
2012-07-16 14:44:42 +04:00
if Options.options.with_pthreadpool:
2012-02-01 01:30:45 +04:00
default_shared_modules.extend(TO_LIST('vfs_aio_pthread'))
2012-07-16 14:44:42 +04:00
2011-02-11 03:31:37 +03:00
if conf.CONFIG_SET('HAVE_LDAP'):
2013-01-28 19:16:42 +04:00
default_static_modules.extend(TO_LIST('pdb_ldapsam idmap_ldap'))
2011-02-11 03:31:37 +03:00
2011-02-16 23:58:47 +03:00
if conf.CONFIG_SET('DARWINOS'):
2012-02-01 01:30:45 +04:00
default_static_modules.extend(TO_LIST('charset_macosxfs'))
2011-02-16 23:58:47 +03:00
2011-05-04 20:01:04 +04:00
if conf.CONFIG_SET('HAVE_GPFS'):
2015-07-27 14:20:43 +03:00
default_shared_modules.extend(TO_LIST('vfs_gpfs'))
2011-05-04 20:01:04 +04:00
2012-09-04 17:29:58 +04:00
if (conf.CONFIG_SET('HAVE_LINUX_IOCTL')
and conf.CONFIG_SET('HAVE_BASENAME') and conf.CONFIG_SET('HAVE_DIRNAME')):
2016-01-11 02:02:49 +03:00
default_shared_modules.extend(TO_LIST('vfs_btrfs'))
2013-03-08 14:47:55 +04:00
2013-04-24 23:52:57 +04:00
if conf.CONFIG_SET("HAVE_CEPH"):
default_shared_modules.extend(TO_LIST('vfs_ceph'))
2019-03-26 18:35:18 +03:00
# Unlike vfs_ceph, vfs_ceph_snapshots doesn't depend on libcephfs, so
# can be enabled atop a kernel CephFS share (with vfs_default) in
# addition to vfs_ceph. Still, only enable vfs_ceph_snapshots builds
# if we're building with libcephfs for now.
default_shared_modules.extend(TO_LIST('vfs_ceph_snapshots'))
2013-04-24 23:52:57 +04:00
2013-05-29 15:21:46 +04:00
if conf.CONFIG_SET('HAVE_GLUSTERFS'):
default_shared_modules.extend(TO_LIST('vfs_glusterfs'))
2019-08-01 01:47:29 +03:00
if conf.CONFIG_SET('HAVE_SETMNTENT'):
default_shared_modules.extend(TO_LIST('vfs_glusterfs_fuse'))
2014-09-01 12:40:10 +04:00
if conf.CONFIG_SET('HAVE_VXFS'):
default_shared_modules.extend(TO_LIST('vfs_vxfs'))
2014-06-27 17:31:35 +04:00
if conf.CONFIG_SET('HAVE_DBUS'):
2016-01-11 02:02:49 +03:00
default_shared_modules.extend(TO_LIST('vfs_snapper'))
2014-06-27 17:31:35 +04:00
2011-02-11 03:31:37 +03:00
explicit_shared_modules = TO_LIST(Options.options.shared_modules, delimiter=',')
explicit_static_modules = TO_LIST(Options.options.static_modules, delimiter=',')
2013-02-06 12:43:16 +04:00
def replace_list_item(lst, item, value):
try:
idx = lst.index(item)
lst[idx] = value
except:
pass
# PDB module file name should have the same name as module registers itself
# In Autoconf build we export LDAP passdb module as ldapsam but WAF build
# was always exporting pdb_ldap. In order to support existing packages
# allow referring to pdb_ldapsam as pdb_ldap but use proper name internally.
replace_list_item(explicit_shared_modules, 'pdb_ldap', 'pdb_ldapsam')
replace_list_item(explicit_static_modules, 'pdb_ldap', 'pdb_ldapsam')
2015-08-13 15:22:45 +03:00
final_static_modules = []
final_static_modules.extend(TO_LIST(required_static_modules))
final_shared_modules = []
if '!FORCED' not in explicit_static_modules:
final_static_modules.extend(TO_LIST(forced_static_modules))
if '!FORCED' not in explicit_shared_modules:
final_shared_modules.extend(TO_LIST(forced_shared_modules))
if '!DEFAULT' not in explicit_static_modules:
final_static_modules.extend(TO_LIST(default_static_modules))
if '!DEFAULT' not in explicit_shared_modules:
final_shared_modules.extend(TO_LIST(default_shared_modules))
if 'ALL' in explicit_static_modules:
for m in default_shared_modules:
if m in final_shared_modules:
final_shared_modules.remove(m)
final_static_modules.append(m)
if 'ALL' in explicit_shared_modules:
for m in default_static_modules:
if m in final_static_modules:
final_static_modules.remove(m)
final_shared_modules.append(m)
2011-02-11 03:31:37 +03:00
for m in explicit_static_modules:
2015-08-13 15:22:45 +03:00
if m in ['ALL','!DEFAULT','!FORCED']:
continue
if m.startswith('!'):
m = m[1:]
if m in required_static_modules:
2018-02-02 17:34:32 +03:00
raise Errors.WafError('These modules are REQUIRED as static modules: %s' %
2015-08-13 15:22:45 +03:00
' '.join(required_static_modules))
if m in final_static_modules:
final_static_modules.remove(m)
continue
if m in forced_shared_modules:
2018-02-02 17:34:32 +03:00
raise Errors.WafError('These modules MUST be configured as shared modules: %s' %
2015-08-13 15:22:45 +03:00
' '.join(forced_shared_modules))
2011-02-11 03:31:37 +03:00
if m in final_shared_modules:
final_shared_modules.remove(m)
2015-08-13 15:22:45 +03:00
if m not in final_static_modules:
final_static_modules.append(m)
2011-02-11 03:31:37 +03:00
for m in explicit_shared_modules:
2015-08-13 15:22:45 +03:00
if m in ['ALL','!DEFAULT','!FORCED']:
continue
if m.startswith('!'):
m = m[1:]
if m in final_shared_modules:
final_shared_modules.remove(m)
continue
if m in required_static_modules:
2018-02-02 17:34:32 +03:00
raise Errors.WafError('These modules are REQUIRED as static modules: %s' %
2015-08-13 15:22:45 +03:00
' '.join(required_static_modules))
if m in forced_static_modules:
2018-02-02 17:34:32 +03:00
raise Errors.WafError('These module MUST be configured as static modules: %s' %
2015-08-13 15:22:45 +03:00
' '.join(forced_static_modules))
2011-02-11 03:31:37 +03:00
if m in final_static_modules:
final_static_modules.remove(m)
2015-08-13 15:22:45 +03:00
if m not in final_shared_modules:
final_shared_modules.append(m)
2012-10-18 12:58:04 +04:00
2011-02-11 03:31:37 +03:00
conf.env['static_modules'] = final_static_modules
conf.env['shared_modules'] = final_shared_modules
conf.DEFINE('STRING_STATIC_MODULES', ' '.join(final_static_modules), quote=True)
static_list = {}
shared_list = {}
2015-10-24 11:50:43 +03:00
prefixes = ['vfs', 'pdb', 'auth', 'nss_info', 'charset', 'idmap', 'gpext', 'perfcount', 'rpc']
2011-02-11 03:31:37 +03:00
conf.env['MODULE_PREFIXES'] = prefixes
for p in prefixes:
for m in final_static_modules:
if m.find(p) == 0:
if not p in static_list:
static_list[p] = []
static_list[p].append(m)
for m in final_shared_modules:
if m.find(p) == 0:
if not p in shared_list:
shared_list[p] = []
shared_list[p].append(m)
for p in prefixes:
static_env = "%s_STATIC" % p.upper()
shared_env = "%s_SHARED" % p.upper()
conf.env[static_env] = []
conf.env[shared_env] = []
if p in static_list:
2019-08-26 00:08:18 +03:00
decl_list = " ".join("extern NTSTATUS %s_init(TALLOC_CTX *mem_ctx); " % entry for entry in static_list[p])
2011-02-11 03:31:37 +03:00
for entry in static_list[p]:
conf.env[static_env].append('%s' % entry)
conf.DEFINE('static_decl_%s' % p, decl_list)
2017-04-20 22:24:43 +03:00
conf.DEFINE('static_init_%s(mem_ctx)' % p, '{ %s_init((mem_ctx)); }' % '_init((mem_ctx)); '.join(static_list[p]))
2011-02-11 03:31:37 +03:00
else:
conf.DEFINE('static_decl_%s' % p, '')
2017-04-20 22:24:43 +03:00
conf.DEFINE('static_init_%s(mem_ctx)' % p, '{}')
2011-02-11 03:31:37 +03:00
if p in shared_list:
for entry in shared_list[p]:
2011-12-03 10:03:35 +04:00
conf.DEFINE('%s_init' % entry, 'samba_init_module')
2011-02-11 03:31:37 +03:00
conf.env[shared_env].append('%s' % entry)
2015-08-13 15:22:45 +03:00
Logs.info("%s: %s" % (static_env, ','.join(conf.env[static_env])))
Logs.info("%s: %s" % (shared_env, ','.join(conf.env[shared_env])))
2011-02-11 03:31:37 +03:00
2010-03-20 18:37:03 +03:00
conf.SAMBA_CONFIG_H('include/config.h')