]> xenbits.xensource.com Git - libvirt.git/commitdiff
Convert HAVE_SASL to WITH_SASL
authorDaniel P. Berrange <berrange@redhat.com>
Thu, 20 Sep 2012 11:58:29 +0000 (12:58 +0100)
committerDaniel P. Berrange <berrange@redhat.com>
Fri, 11 Jan 2013 11:03:23 +0000 (11:03 +0000)
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
15 files changed:
configure.ac
daemon/Makefile.am
daemon/libvirtd-config.c
daemon/libvirtd.c
daemon/libvirtd.h
daemon/remote.c
src/Makefile.am
src/remote/remote_driver.c
src/rpc/virnetclient.c
src/rpc/virnetclient.h
src/rpc/virnetserverclient.c
src/rpc/virnetserverclient.h
src/rpc/virnetsocket.c
src/rpc/virnetsocket.h
tests/libvirtdconftest.c

index 055cd3ac649870b60ad45764ae6e23af8dca5c52..b3e575dc3cee1623cb7bd1be03f8c555fb361ac3 100644 (file)
@@ -1134,11 +1134,11 @@ if test "x$with_sasl" != "xno"; then
   CFLAGS="$old_cflags"
   LIBS="$old_libs"
   if test "x$with_sasl" = "xyes" ; then
-    AC_DEFINE_UNQUOTED([HAVE_SASL], 1,
+    AC_DEFINE_UNQUOTED([WITH_SASL], 1,
       [whether Cyrus SASL is available for authentication])
   fi
 fi
-AM_CONDITIONAL([HAVE_SASL], [test "x$with_sasl" = "xyes"])
+AM_CONDITIONAL([WITH_SASL], [test "x$with_sasl" = "xyes"])
 AC_SUBST([SASL_CFLAGS])
 AC_SUBST([SASL_LIBS])
 
index 95ff8cf56438e5fe2ba69d8daed4c2eff60f01a4..c4faa11783752c7ec58653c5512ea30ea2715a8b 100644 (file)
@@ -390,7 +390,7 @@ $(srcdir)/libvirtd.8.in: libvirtd.pod.in
 
 # This is needed for clients too, so can't wrap in
 # the WITH_LIBVIRTD conditional
-if HAVE_SASL
+if WITH_SASL
 install-data-sasl:
        $(MKDIR_P) $(DESTDIR)$(sysconfdir)/sasl2/
        $(INSTALL_DATA) $(srcdir)/libvirtd.sasl $(DESTDIR)$(sysconfdir)/sasl2/libvirt.conf
index 8b74bf1bb3f3a3671520ddc8b060d081c492d396..fe9fc10a59f54ed5201b801a832843e583df7bdb 100644 (file)
@@ -178,7 +178,7 @@ static int remoteConfigGetAuth(virConfPtr conf, const char *key, int *auth, cons
 
     if (STREQ(p->str, "none")) {
         *auth = VIR_NET_SERVER_SERVICE_AUTH_NONE;
-#if HAVE_SASL
+#if WITH_SASL
     } else if (STREQ(p->str, "sasl")) {
         *auth = VIR_NET_SERVER_SERVICE_AUTH_SASL;
 #endif
@@ -263,7 +263,7 @@ daemonConfigNew(bool privileged ATTRIBUTE_UNUSED)
         !data->unix_sock_rw_perms)
         goto no_memory;
 
-#if HAVE_SASL
+#if WITH_SASL
     data->auth_tcp = REMOTE_AUTH_SASL;
 #else
     data->auth_tcp = REMOTE_AUTH_NONE;
index ff54af38b4dc99b657de8ec332f004089628a1ea..7a51387fe80ac01365ab3a514bc149681d4574e1 100644 (file)
@@ -98,7 +98,7 @@
 
 #include "virdbus.h"
 
-#if HAVE_SASL
+#if WITH_SASL
 virNetSASLContextPtr saslCtxt = NULL;
 #endif
 virNetServerProgramPtr remoteProgram = NULL;
@@ -578,7 +578,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
 #endif
     }
 
-#if HAVE_SASL
+#if WITH_SASL
     if (config->auth_unix_rw == REMOTE_AUTH_SASL ||
         config->auth_unix_ro == REMOTE_AUTH_SASL ||
 # if HAVE_GNUTLS
index 69a77ea225cf95272589ca547db5e8cffeb82a9a..6b5ceb7ae9cfd9b2c6401333ecec6f41a60a4296 100644 (file)
@@ -35,7 +35,7 @@
 # include "qemu_protocol.h"
 # include "virlog.h"
 # include "virthread.h"
-# if HAVE_SASL
+# if WITH_SASL
 #  include "virnetsaslcontext.h"
 # endif
 # include "virnetserverprogram.h"
@@ -52,7 +52,7 @@ struct daemonClientPrivate {
 
     int domainEventCallbackID[VIR_DOMAIN_EVENT_ID_LAST];
 
-# if HAVE_SASL
+# if WITH_SASL
     virNetSASLSessionPtr sasl;
 # endif
 
@@ -66,7 +66,7 @@ struct daemonClientPrivate {
     bool keepalive_supported;
 };
 
-# if HAVE_SASL
+# if WITH_SASL
 extern virNetSASLContextPtr saslCtxt;
 # endif
 extern virNetServerProgramPtr remoteProgram;
index 67fe33500a41a688c51e95e1af8df9a23b7eea88..1a0af7e3085a2c82bcded8e2306078277bc307c2 100644 (file)
@@ -2432,7 +2432,7 @@ cleanup:
 }
 
 
-#ifdef HAVE_SASL
+#ifdef WITH_SASL
 /*
  * Initializes the SASL session in prepare for authentication
  * and gives the client a list of allowed mechanisms to choose
index fcd92ae8e41c4082857411c52c67c57514b02a51..e9726716d85785d9d70e2d6b15d09388d6286f51 100644 (file)
@@ -1422,7 +1422,7 @@ if WITH_XENXS
 USED_SYM_FILES += $(srcdir)/libvirt_xenxs.syms
 endif
 
-if HAVE_SASL
+if WITH_SASL
 USED_SYM_FILES += $(srcdir)/libvirt_sasl.syms
 endif
 
@@ -1786,7 +1786,7 @@ else
 EXTRA_DIST += \
        rpc/virnettlscontext.h rpc/virnettlscontext.c
 endif
-if HAVE_SASL
+if WITH_SASL
 libvirt_net_rpc_la_SOURCES += \
        rpc/virnetsaslcontext.h rpc/virnetsaslcontext.c
 else
index 43c118645a72218b18be5af255d0f301627b4886..862e4742de1713ee10bf32fb4a1a7fff8639a96e 100644 (file)
@@ -118,7 +118,7 @@ static int callWithFD(virConnectPtr conn, struct private_data *priv,
                       xdrproc_t ret_filter, char *ret);
 static int remoteAuthenticate(virConnectPtr conn, struct private_data *priv,
                               virConnectAuthPtr auth, const char *authtype);
-#if HAVE_SASL
+#if WITH_SASL
 static int remoteAuthSASL(virConnectPtr conn, struct private_data *priv,
                           virConnectAuthPtr auth, const char *mech);
 #endif
@@ -3489,7 +3489,7 @@ remoteAuthenticate(virConnectPtr conn, struct private_data *priv,
     }
 
     switch (type) {
-#if HAVE_SASL
+#if WITH_SASL
     case REMOTE_AUTH_SASL: {
         const char *mech = NULL;
         if (authtype &&
@@ -3532,7 +3532,7 @@ remoteAuthenticate(virConnectPtr conn, struct private_data *priv,
 
 
 
-#if HAVE_SASL
+#if WITH_SASL
 static int remoteAuthCredVir2SASL(int vircred)
 {
     switch (vircred) {
@@ -4072,7 +4072,7 @@ remoteAuthSASL(virConnectPtr conn, struct private_data *priv,
 
     return ret;
 }
-#endif /* HAVE_SASL */
+#endif /* WITH_SASL */
 
 
 #if HAVE_POLKIT
index a79b79b33030138ceef474056fd96a40c5c8e2a9..10ed4f00a1acb2345fb75894b8c7bd4bd2455124 100644 (file)
@@ -81,7 +81,7 @@ struct _virNetClient {
     /* For incoming message packets */
     virNetMessage msg;
 
-#if HAVE_SASL
+#if WITH_SASL
     virNetSASLSessionPtr sasl;
 #endif
 
@@ -632,7 +632,7 @@ void virNetClientDispose(void *obj)
 #if HAVE_GNUTLS
     virObjectUnref(client->tls);
 #endif
-#if HAVE_SASL
+#if WITH_SASL
     virObjectUnref(client->sasl);
 #endif
 
@@ -671,7 +671,7 @@ virNetClientCloseLocked(virNetClientPtr client)
     virObjectUnref(client->tls);
     client->tls = NULL;
 #endif
-#if HAVE_SASL
+#if WITH_SASL
     virObjectUnref(client->sasl);
     client->sasl = NULL;
 #endif
@@ -739,7 +739,7 @@ void virNetClientClose(virNetClientPtr client)
 }
 
 
-#if HAVE_SASL
+#if WITH_SASL
 void virNetClientSetSASLSession(virNetClientPtr client,
                                 virNetSASLSessionPtr sasl)
 {
@@ -864,7 +864,7 @@ bool virNetClientIsEncrypted(virNetClientPtr client)
     if (client->tls)
         ret = true;
 #endif
-#if HAVE_SASL
+#if WITH_SASL
     if (client->sasl)
         ret = true;
 #endif
index d594addf442249b48e92dad972b022d59907374d..7e35b9c0c90f3a90fce364f29cca48cd0c82110f 100644 (file)
@@ -27,7 +27,7 @@
 #  include "virnettlscontext.h"
 # endif
 # include "virnetmessage.h"
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
 #  include "virnetsaslcontext.h"
 # endif
 # include "virnetclientprogram.h"
@@ -104,7 +104,7 @@ int virNetClientSendWithReplyStream(virNetClientPtr client,
                                     virNetMessagePtr msg,
                                     virNetClientStreamPtr st);
 
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
 void virNetClientSetSASLSession(virNetClientPtr client,
                                 virNetSASLSessionPtr sasl);
 # endif
index bf23d240303d9230cd1777335b868382557a6720..05e0e06ced4bac84cec44cd70d907710b4ee1b7c 100644 (file)
@@ -23,7 +23,7 @@
 
 #include <config.h>
 
-#if HAVE_SASL
+#if WITH_SASL
 # include <sasl/sasl.h>
 #endif
 
@@ -70,7 +70,7 @@ struct _virNetServerClient
     virNetTLSContextPtr tlsCtxt;
     virNetTLSSessionPtr tls;
 #endif
-#if HAVE_SASL
+#if WITH_SASL
     virNetSASLSessionPtr sasl;
 #endif
     int sockTimer; /* Timer to be fired upon cached data,
@@ -652,7 +652,7 @@ bool virNetServerClientIsSecure(virNetServerClientPtr client)
     if (client->tls)
         secure = true;
 #endif
-#if HAVE_SASL
+#if WITH_SASL
     if (client->sasl)
         secure = true;
 #endif
@@ -663,8 +663,7 @@ bool virNetServerClientIsSecure(virNetServerClientPtr client)
 }
 
 
-
-#if HAVE_SASL
+#if WITH_SASL
 void virNetServerClientSetSASLSession(virNetServerClientPtr client,
                                       virNetSASLSessionPtr sasl)
 {
@@ -761,7 +760,7 @@ void virNetServerClientDispose(void *obj)
         client->privateDataFreeFunc(client->privateData);
 
     VIR_FREE(client->identity);
-#if HAVE_SASL
+#if WITH_SASL
     virObjectUnref(client->sasl);
 #endif
     if (client->sockTimer > 0)
@@ -1181,7 +1180,7 @@ virNetServerClientDispatchWrite(virNetServerClientPtr client)
                 client->tx->donefds++;
             }
 
-#if HAVE_SASL
+#if WITH_SASL
             /* Completed this 'tx' operation, so now read for all
              * future rx/tx to be under a SASL SSF layer
              */
index b11b9a9f477d1b34a3665b9bcecb3b7338c087ed..40010c8a1d1169c6e40ee97d3d77bb434a1102cf 100644 (file)
@@ -83,7 +83,7 @@ bool virNetServerClientHasTLSSession(virNetServerClientPtr client);
 int virNetServerClientGetTLSKeySize(virNetServerClientPtr client);
 # endif
 
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
 void virNetServerClientSetSASLSession(virNetServerClientPtr client,
                                       virNetSASLSessionPtr sasl);
 # endif
index a8179999ced92a71e94a4ce8c5165d0a7bba878f..549aabebc50b3562d9a35ea4751b4b0dc0bc94cf 100644 (file)
@@ -82,7 +82,7 @@ struct _virNetSocket {
 #if HAVE_GNUTLS
     virNetTLSSessionPtr tlsSession;
 #endif
-#if HAVE_SASL
+#if WITH_SASL
     virNetSASLSessionPtr saslSession;
 
     const char *saslDecoded;
@@ -1021,7 +1021,7 @@ void virNetSocketDispose(void *obj)
         virNetTLSSessionSetIOCallbacks(sock->tlsSession, NULL, NULL, NULL);
     virObjectUnref(sock->tlsSession);
 #endif
-#if HAVE_SASL
+#if WITH_SASL
     virObjectUnref(sock->saslSession);
 #endif
 
@@ -1217,7 +1217,7 @@ void virNetSocketSetTLSSession(virNetSocketPtr sock,
 }
 #endif
 
-#if HAVE_SASL
+#if WITH_SASL
 void virNetSocketSetSASLSession(virNetSocketPtr sock,
                                 virNetSASLSessionPtr sess)
 {
@@ -1239,7 +1239,7 @@ bool virNetSocketHasCachedData(virNetSocketPtr sock ATTRIBUTE_UNUSED)
         hasCached = true;
 #endif
 
-#if HAVE_SASL
+#if WITH_SASL
     if (sock->saslDecoded)
         hasCached = true;
 #endif
@@ -1267,7 +1267,7 @@ bool virNetSocketHasPendingData(virNetSocketPtr sock ATTRIBUTE_UNUSED)
 {
     bool hasPending = false;
     virMutexLock(&sock->lock);
-#if HAVE_SASL
+#if WITH_SASL
     if (sock->saslEncoded)
         hasPending = true;
 #endif
@@ -1378,7 +1378,7 @@ rewrite:
 }
 
 
-#if HAVE_SASL
+#if WITH_SASL
 static ssize_t virNetSocketReadSASL(virNetSocketPtr sock, char *buf, size_t len)
 {
     ssize_t got;
@@ -1481,7 +1481,7 @@ ssize_t virNetSocketRead(virNetSocketPtr sock, char *buf, size_t len)
 {
     ssize_t ret;
     virMutexLock(&sock->lock);
-#if HAVE_SASL
+#if WITH_SASL
     if (sock->saslSession)
         ret = virNetSocketReadSASL(sock, buf, len);
     else
@@ -1496,7 +1496,7 @@ ssize_t virNetSocketWrite(virNetSocketPtr sock, const char *buf, size_t len)
     ssize_t ret;
 
     virMutexLock(&sock->lock);
-#if HAVE_SASL
+#if WITH_SASL
     if (sock->saslSession)
         ret = virNetSocketWriteSASL(sock, buf, len);
     else
index ce15bb8cf6f017c4dda42624553bae436de844e5..f1cb2ab949bfab29d6d257761efd617f9c54c214 100644 (file)
@@ -30,7 +30,7 @@
 #  include "virnettlscontext.h"
 # endif
 # include "virobject.h"
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
 #  include "virnetsaslcontext.h"
 # endif
 # include "virjson.h"
@@ -129,7 +129,7 @@ void virNetSocketSetTLSSession(virNetSocketPtr sock,
                                virNetTLSSessionPtr sess);
 # endif
 
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
 void virNetSocketSetSASLSession(virNetSocketPtr sock,
                                 virNetSASLSessionPtr sess);
 # endif
index fd033f8f0c7c3446508dbf8d742b963731fba07d..01e94153c6ecef54525706e1a2a37ea08a3fd13d 100644 (file)
@@ -120,7 +120,7 @@ testCorrupt(const void *opaque)
         goto cleanup;
     }
 
-#if !HAVE_SASL
+#if !WITH_SASL
     if (strstr(err->message, "unsupported auth sasl")) {
         VIR_DEBUG("sasl unsupported, skipping this config");
         goto cleanup;