mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-24 22:55:23 +00:00
Convert HAVE_SASL to WITH_SASL
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
This commit is contained in:
parent
a38dbf6673
commit
321a7d53f3
@ -1134,11 +1134,11 @@ if test "x$with_sasl" != "xno"; then
|
|||||||
CFLAGS="$old_cflags"
|
CFLAGS="$old_cflags"
|
||||||
LIBS="$old_libs"
|
LIBS="$old_libs"
|
||||||
if test "x$with_sasl" = "xyes" ; then
|
if test "x$with_sasl" = "xyes" ; then
|
||||||
AC_DEFINE_UNQUOTED([HAVE_SASL], 1,
|
AC_DEFINE_UNQUOTED([WITH_SASL], 1,
|
||||||
[whether Cyrus SASL is available for authentication])
|
[whether Cyrus SASL is available for authentication])
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
AM_CONDITIONAL([HAVE_SASL], [test "x$with_sasl" = "xyes"])
|
AM_CONDITIONAL([WITH_SASL], [test "x$with_sasl" = "xyes"])
|
||||||
AC_SUBST([SASL_CFLAGS])
|
AC_SUBST([SASL_CFLAGS])
|
||||||
AC_SUBST([SASL_LIBS])
|
AC_SUBST([SASL_LIBS])
|
||||||
|
|
||||||
|
@ -390,7 +390,7 @@ $(srcdir)/libvirtd.8.in: libvirtd.pod.in
|
|||||||
|
|
||||||
# This is needed for clients too, so can't wrap in
|
# This is needed for clients too, so can't wrap in
|
||||||
# the WITH_LIBVIRTD conditional
|
# the WITH_LIBVIRTD conditional
|
||||||
if HAVE_SASL
|
if WITH_SASL
|
||||||
install-data-sasl:
|
install-data-sasl:
|
||||||
$(MKDIR_P) $(DESTDIR)$(sysconfdir)/sasl2/
|
$(MKDIR_P) $(DESTDIR)$(sysconfdir)/sasl2/
|
||||||
$(INSTALL_DATA) $(srcdir)/libvirtd.sasl $(DESTDIR)$(sysconfdir)/sasl2/libvirt.conf
|
$(INSTALL_DATA) $(srcdir)/libvirtd.sasl $(DESTDIR)$(sysconfdir)/sasl2/libvirt.conf
|
||||||
|
@ -178,7 +178,7 @@ static int remoteConfigGetAuth(virConfPtr conf, const char *key, int *auth, cons
|
|||||||
|
|
||||||
if (STREQ(p->str, "none")) {
|
if (STREQ(p->str, "none")) {
|
||||||
*auth = VIR_NET_SERVER_SERVICE_AUTH_NONE;
|
*auth = VIR_NET_SERVER_SERVICE_AUTH_NONE;
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
} else if (STREQ(p->str, "sasl")) {
|
} else if (STREQ(p->str, "sasl")) {
|
||||||
*auth = VIR_NET_SERVER_SERVICE_AUTH_SASL;
|
*auth = VIR_NET_SERVER_SERVICE_AUTH_SASL;
|
||||||
#endif
|
#endif
|
||||||
@ -263,7 +263,7 @@ daemonConfigNew(bool privileged ATTRIBUTE_UNUSED)
|
|||||||
!data->unix_sock_rw_perms)
|
!data->unix_sock_rw_perms)
|
||||||
goto no_memory;
|
goto no_memory;
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
data->auth_tcp = REMOTE_AUTH_SASL;
|
data->auth_tcp = REMOTE_AUTH_SASL;
|
||||||
#else
|
#else
|
||||||
data->auth_tcp = REMOTE_AUTH_NONE;
|
data->auth_tcp = REMOTE_AUTH_NONE;
|
||||||
|
@ -98,7 +98,7 @@
|
|||||||
|
|
||||||
#include "virdbus.h"
|
#include "virdbus.h"
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
virNetSASLContextPtr saslCtxt = NULL;
|
virNetSASLContextPtr saslCtxt = NULL;
|
||||||
#endif
|
#endif
|
||||||
virNetServerProgramPtr remoteProgram = NULL;
|
virNetServerProgramPtr remoteProgram = NULL;
|
||||||
@ -578,7 +578,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
if (config->auth_unix_rw == REMOTE_AUTH_SASL ||
|
if (config->auth_unix_rw == REMOTE_AUTH_SASL ||
|
||||||
config->auth_unix_ro == REMOTE_AUTH_SASL ||
|
config->auth_unix_ro == REMOTE_AUTH_SASL ||
|
||||||
# if HAVE_GNUTLS
|
# if HAVE_GNUTLS
|
||||||
|
@ -35,7 +35,7 @@
|
|||||||
# include "qemu_protocol.h"
|
# include "qemu_protocol.h"
|
||||||
# include "virlog.h"
|
# include "virlog.h"
|
||||||
# include "virthread.h"
|
# include "virthread.h"
|
||||||
# if HAVE_SASL
|
# if WITH_SASL
|
||||||
# include "virnetsaslcontext.h"
|
# include "virnetsaslcontext.h"
|
||||||
# endif
|
# endif
|
||||||
# include "virnetserverprogram.h"
|
# include "virnetserverprogram.h"
|
||||||
@ -52,7 +52,7 @@ struct daemonClientPrivate {
|
|||||||
|
|
||||||
int domainEventCallbackID[VIR_DOMAIN_EVENT_ID_LAST];
|
int domainEventCallbackID[VIR_DOMAIN_EVENT_ID_LAST];
|
||||||
|
|
||||||
# if HAVE_SASL
|
# if WITH_SASL
|
||||||
virNetSASLSessionPtr sasl;
|
virNetSASLSessionPtr sasl;
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
@ -66,7 +66,7 @@ struct daemonClientPrivate {
|
|||||||
bool keepalive_supported;
|
bool keepalive_supported;
|
||||||
};
|
};
|
||||||
|
|
||||||
# if HAVE_SASL
|
# if WITH_SASL
|
||||||
extern virNetSASLContextPtr saslCtxt;
|
extern virNetSASLContextPtr saslCtxt;
|
||||||
# endif
|
# endif
|
||||||
extern virNetServerProgramPtr remoteProgram;
|
extern virNetServerProgramPtr remoteProgram;
|
||||||
|
@ -2432,7 +2432,7 @@ cleanup:
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#ifdef HAVE_SASL
|
#ifdef WITH_SASL
|
||||||
/*
|
/*
|
||||||
* Initializes the SASL session in prepare for authentication
|
* Initializes the SASL session in prepare for authentication
|
||||||
* and gives the client a list of allowed mechanisms to choose
|
* and gives the client a list of allowed mechanisms to choose
|
||||||
|
@ -1422,7 +1422,7 @@ if WITH_XENXS
|
|||||||
USED_SYM_FILES += $(srcdir)/libvirt_xenxs.syms
|
USED_SYM_FILES += $(srcdir)/libvirt_xenxs.syms
|
||||||
endif
|
endif
|
||||||
|
|
||||||
if HAVE_SASL
|
if WITH_SASL
|
||||||
USED_SYM_FILES += $(srcdir)/libvirt_sasl.syms
|
USED_SYM_FILES += $(srcdir)/libvirt_sasl.syms
|
||||||
endif
|
endif
|
||||||
|
|
||||||
@ -1786,7 +1786,7 @@ else
|
|||||||
EXTRA_DIST += \
|
EXTRA_DIST += \
|
||||||
rpc/virnettlscontext.h rpc/virnettlscontext.c
|
rpc/virnettlscontext.h rpc/virnettlscontext.c
|
||||||
endif
|
endif
|
||||||
if HAVE_SASL
|
if WITH_SASL
|
||||||
libvirt_net_rpc_la_SOURCES += \
|
libvirt_net_rpc_la_SOURCES += \
|
||||||
rpc/virnetsaslcontext.h rpc/virnetsaslcontext.c
|
rpc/virnetsaslcontext.h rpc/virnetsaslcontext.c
|
||||||
else
|
else
|
||||||
|
@ -118,7 +118,7 @@ static int callWithFD(virConnectPtr conn, struct private_data *priv,
|
|||||||
xdrproc_t ret_filter, char *ret);
|
xdrproc_t ret_filter, char *ret);
|
||||||
static int remoteAuthenticate(virConnectPtr conn, struct private_data *priv,
|
static int remoteAuthenticate(virConnectPtr conn, struct private_data *priv,
|
||||||
virConnectAuthPtr auth, const char *authtype);
|
virConnectAuthPtr auth, const char *authtype);
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
static int remoteAuthSASL(virConnectPtr conn, struct private_data *priv,
|
static int remoteAuthSASL(virConnectPtr conn, struct private_data *priv,
|
||||||
virConnectAuthPtr auth, const char *mech);
|
virConnectAuthPtr auth, const char *mech);
|
||||||
#endif
|
#endif
|
||||||
@ -3489,7 +3489,7 @@ remoteAuthenticate(virConnectPtr conn, struct private_data *priv,
|
|||||||
}
|
}
|
||||||
|
|
||||||
switch (type) {
|
switch (type) {
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
case REMOTE_AUTH_SASL: {
|
case REMOTE_AUTH_SASL: {
|
||||||
const char *mech = NULL;
|
const char *mech = NULL;
|
||||||
if (authtype &&
|
if (authtype &&
|
||||||
@ -3532,7 +3532,7 @@ remoteAuthenticate(virConnectPtr conn, struct private_data *priv,
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
static int remoteAuthCredVir2SASL(int vircred)
|
static int remoteAuthCredVir2SASL(int vircred)
|
||||||
{
|
{
|
||||||
switch (vircred) {
|
switch (vircred) {
|
||||||
@ -4072,7 +4072,7 @@ remoteAuthSASL(virConnectPtr conn, struct private_data *priv,
|
|||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
#endif /* HAVE_SASL */
|
#endif /* WITH_SASL */
|
||||||
|
|
||||||
|
|
||||||
#if HAVE_POLKIT
|
#if HAVE_POLKIT
|
||||||
|
@ -81,7 +81,7 @@ struct _virNetClient {
|
|||||||
/* For incoming message packets */
|
/* For incoming message packets */
|
||||||
virNetMessage msg;
|
virNetMessage msg;
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
virNetSASLSessionPtr sasl;
|
virNetSASLSessionPtr sasl;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -632,7 +632,7 @@ void virNetClientDispose(void *obj)
|
|||||||
#if HAVE_GNUTLS
|
#if HAVE_GNUTLS
|
||||||
virObjectUnref(client->tls);
|
virObjectUnref(client->tls);
|
||||||
#endif
|
#endif
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
virObjectUnref(client->sasl);
|
virObjectUnref(client->sasl);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -671,7 +671,7 @@ virNetClientCloseLocked(virNetClientPtr client)
|
|||||||
virObjectUnref(client->tls);
|
virObjectUnref(client->tls);
|
||||||
client->tls = NULL;
|
client->tls = NULL;
|
||||||
#endif
|
#endif
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
virObjectUnref(client->sasl);
|
virObjectUnref(client->sasl);
|
||||||
client->sasl = NULL;
|
client->sasl = NULL;
|
||||||
#endif
|
#endif
|
||||||
@ -739,7 +739,7 @@ void virNetClientClose(virNetClientPtr client)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
void virNetClientSetSASLSession(virNetClientPtr client,
|
void virNetClientSetSASLSession(virNetClientPtr client,
|
||||||
virNetSASLSessionPtr sasl)
|
virNetSASLSessionPtr sasl)
|
||||||
{
|
{
|
||||||
@ -864,7 +864,7 @@ bool virNetClientIsEncrypted(virNetClientPtr client)
|
|||||||
if (client->tls)
|
if (client->tls)
|
||||||
ret = true;
|
ret = true;
|
||||||
#endif
|
#endif
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
if (client->sasl)
|
if (client->sasl)
|
||||||
ret = true;
|
ret = true;
|
||||||
#endif
|
#endif
|
||||||
|
@ -27,7 +27,7 @@
|
|||||||
# include "virnettlscontext.h"
|
# include "virnettlscontext.h"
|
||||||
# endif
|
# endif
|
||||||
# include "virnetmessage.h"
|
# include "virnetmessage.h"
|
||||||
# ifdef HAVE_SASL
|
# ifdef WITH_SASL
|
||||||
# include "virnetsaslcontext.h"
|
# include "virnetsaslcontext.h"
|
||||||
# endif
|
# endif
|
||||||
# include "virnetclientprogram.h"
|
# include "virnetclientprogram.h"
|
||||||
@ -104,7 +104,7 @@ int virNetClientSendWithReplyStream(virNetClientPtr client,
|
|||||||
virNetMessagePtr msg,
|
virNetMessagePtr msg,
|
||||||
virNetClientStreamPtr st);
|
virNetClientStreamPtr st);
|
||||||
|
|
||||||
# ifdef HAVE_SASL
|
# ifdef WITH_SASL
|
||||||
void virNetClientSetSASLSession(virNetClientPtr client,
|
void virNetClientSetSASLSession(virNetClientPtr client,
|
||||||
virNetSASLSessionPtr sasl);
|
virNetSASLSessionPtr sasl);
|
||||||
# endif
|
# endif
|
||||||
|
@ -23,7 +23,7 @@
|
|||||||
|
|
||||||
#include <config.h>
|
#include <config.h>
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
# include <sasl/sasl.h>
|
# include <sasl/sasl.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -70,7 +70,7 @@ struct _virNetServerClient
|
|||||||
virNetTLSContextPtr tlsCtxt;
|
virNetTLSContextPtr tlsCtxt;
|
||||||
virNetTLSSessionPtr tls;
|
virNetTLSSessionPtr tls;
|
||||||
#endif
|
#endif
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
virNetSASLSessionPtr sasl;
|
virNetSASLSessionPtr sasl;
|
||||||
#endif
|
#endif
|
||||||
int sockTimer; /* Timer to be fired upon cached data,
|
int sockTimer; /* Timer to be fired upon cached data,
|
||||||
@ -652,7 +652,7 @@ bool virNetServerClientIsSecure(virNetServerClientPtr client)
|
|||||||
if (client->tls)
|
if (client->tls)
|
||||||
secure = true;
|
secure = true;
|
||||||
#endif
|
#endif
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
if (client->sasl)
|
if (client->sasl)
|
||||||
secure = true;
|
secure = true;
|
||||||
#endif
|
#endif
|
||||||
@ -663,8 +663,7 @@ bool virNetServerClientIsSecure(virNetServerClientPtr client)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#if WITH_SASL
|
||||||
#if HAVE_SASL
|
|
||||||
void virNetServerClientSetSASLSession(virNetServerClientPtr client,
|
void virNetServerClientSetSASLSession(virNetServerClientPtr client,
|
||||||
virNetSASLSessionPtr sasl)
|
virNetSASLSessionPtr sasl)
|
||||||
{
|
{
|
||||||
@ -761,7 +760,7 @@ void virNetServerClientDispose(void *obj)
|
|||||||
client->privateDataFreeFunc(client->privateData);
|
client->privateDataFreeFunc(client->privateData);
|
||||||
|
|
||||||
VIR_FREE(client->identity);
|
VIR_FREE(client->identity);
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
virObjectUnref(client->sasl);
|
virObjectUnref(client->sasl);
|
||||||
#endif
|
#endif
|
||||||
if (client->sockTimer > 0)
|
if (client->sockTimer > 0)
|
||||||
@ -1181,7 +1180,7 @@ virNetServerClientDispatchWrite(virNetServerClientPtr client)
|
|||||||
client->tx->donefds++;
|
client->tx->donefds++;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
/* Completed this 'tx' operation, so now read for all
|
/* Completed this 'tx' operation, so now read for all
|
||||||
* future rx/tx to be under a SASL SSF layer
|
* future rx/tx to be under a SASL SSF layer
|
||||||
*/
|
*/
|
||||||
|
@ -83,7 +83,7 @@ bool virNetServerClientHasTLSSession(virNetServerClientPtr client);
|
|||||||
int virNetServerClientGetTLSKeySize(virNetServerClientPtr client);
|
int virNetServerClientGetTLSKeySize(virNetServerClientPtr client);
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
# ifdef HAVE_SASL
|
# ifdef WITH_SASL
|
||||||
void virNetServerClientSetSASLSession(virNetServerClientPtr client,
|
void virNetServerClientSetSASLSession(virNetServerClientPtr client,
|
||||||
virNetSASLSessionPtr sasl);
|
virNetSASLSessionPtr sasl);
|
||||||
# endif
|
# endif
|
||||||
|
@ -82,7 +82,7 @@ struct _virNetSocket {
|
|||||||
#if HAVE_GNUTLS
|
#if HAVE_GNUTLS
|
||||||
virNetTLSSessionPtr tlsSession;
|
virNetTLSSessionPtr tlsSession;
|
||||||
#endif
|
#endif
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
virNetSASLSessionPtr saslSession;
|
virNetSASLSessionPtr saslSession;
|
||||||
|
|
||||||
const char *saslDecoded;
|
const char *saslDecoded;
|
||||||
@ -1021,7 +1021,7 @@ void virNetSocketDispose(void *obj)
|
|||||||
virNetTLSSessionSetIOCallbacks(sock->tlsSession, NULL, NULL, NULL);
|
virNetTLSSessionSetIOCallbacks(sock->tlsSession, NULL, NULL, NULL);
|
||||||
virObjectUnref(sock->tlsSession);
|
virObjectUnref(sock->tlsSession);
|
||||||
#endif
|
#endif
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
virObjectUnref(sock->saslSession);
|
virObjectUnref(sock->saslSession);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -1217,7 +1217,7 @@ void virNetSocketSetTLSSession(virNetSocketPtr sock,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
void virNetSocketSetSASLSession(virNetSocketPtr sock,
|
void virNetSocketSetSASLSession(virNetSocketPtr sock,
|
||||||
virNetSASLSessionPtr sess)
|
virNetSASLSessionPtr sess)
|
||||||
{
|
{
|
||||||
@ -1239,7 +1239,7 @@ bool virNetSocketHasCachedData(virNetSocketPtr sock ATTRIBUTE_UNUSED)
|
|||||||
hasCached = true;
|
hasCached = true;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
if (sock->saslDecoded)
|
if (sock->saslDecoded)
|
||||||
hasCached = true;
|
hasCached = true;
|
||||||
#endif
|
#endif
|
||||||
@ -1267,7 +1267,7 @@ bool virNetSocketHasPendingData(virNetSocketPtr sock ATTRIBUTE_UNUSED)
|
|||||||
{
|
{
|
||||||
bool hasPending = false;
|
bool hasPending = false;
|
||||||
virMutexLock(&sock->lock);
|
virMutexLock(&sock->lock);
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
if (sock->saslEncoded)
|
if (sock->saslEncoded)
|
||||||
hasPending = true;
|
hasPending = true;
|
||||||
#endif
|
#endif
|
||||||
@ -1378,7 +1378,7 @@ rewrite:
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
static ssize_t virNetSocketReadSASL(virNetSocketPtr sock, char *buf, size_t len)
|
static ssize_t virNetSocketReadSASL(virNetSocketPtr sock, char *buf, size_t len)
|
||||||
{
|
{
|
||||||
ssize_t got;
|
ssize_t got;
|
||||||
@ -1481,7 +1481,7 @@ ssize_t virNetSocketRead(virNetSocketPtr sock, char *buf, size_t len)
|
|||||||
{
|
{
|
||||||
ssize_t ret;
|
ssize_t ret;
|
||||||
virMutexLock(&sock->lock);
|
virMutexLock(&sock->lock);
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
if (sock->saslSession)
|
if (sock->saslSession)
|
||||||
ret = virNetSocketReadSASL(sock, buf, len);
|
ret = virNetSocketReadSASL(sock, buf, len);
|
||||||
else
|
else
|
||||||
@ -1496,7 +1496,7 @@ ssize_t virNetSocketWrite(virNetSocketPtr sock, const char *buf, size_t len)
|
|||||||
ssize_t ret;
|
ssize_t ret;
|
||||||
|
|
||||||
virMutexLock(&sock->lock);
|
virMutexLock(&sock->lock);
|
||||||
#if HAVE_SASL
|
#if WITH_SASL
|
||||||
if (sock->saslSession)
|
if (sock->saslSession)
|
||||||
ret = virNetSocketWriteSASL(sock, buf, len);
|
ret = virNetSocketWriteSASL(sock, buf, len);
|
||||||
else
|
else
|
||||||
|
@ -30,7 +30,7 @@
|
|||||||
# include "virnettlscontext.h"
|
# include "virnettlscontext.h"
|
||||||
# endif
|
# endif
|
||||||
# include "virobject.h"
|
# include "virobject.h"
|
||||||
# ifdef HAVE_SASL
|
# ifdef WITH_SASL
|
||||||
# include "virnetsaslcontext.h"
|
# include "virnetsaslcontext.h"
|
||||||
# endif
|
# endif
|
||||||
# include "virjson.h"
|
# include "virjson.h"
|
||||||
@ -129,7 +129,7 @@ void virNetSocketSetTLSSession(virNetSocketPtr sock,
|
|||||||
virNetTLSSessionPtr sess);
|
virNetTLSSessionPtr sess);
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
# ifdef HAVE_SASL
|
# ifdef WITH_SASL
|
||||||
void virNetSocketSetSASLSession(virNetSocketPtr sock,
|
void virNetSocketSetSASLSession(virNetSocketPtr sock,
|
||||||
virNetSASLSessionPtr sess);
|
virNetSASLSessionPtr sess);
|
||||||
# endif
|
# endif
|
||||||
|
@ -120,7 +120,7 @@ testCorrupt(const void *opaque)
|
|||||||
goto cleanup;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if !HAVE_SASL
|
#if !WITH_SASL
|
||||||
if (strstr(err->message, "unsupported auth sasl")) {
|
if (strstr(err->message, "unsupported auth sasl")) {
|
||||||
VIR_DEBUG("sasl unsupported, skipping this config");
|
VIR_DEBUG("sasl unsupported, skipping this config");
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
Loading…
Reference in New Issue
Block a user