Skip to content

Build projects required for OMI (Open Management Infrastructure)

License

Notifications You must be signed in to change notification settings

microsoft/Build-omi

Repository files navigation

Open Management Infrastructure (OMI)

Table of Contents

If you are an active contributor to the OMI project, you should set up your system and follow our common workflow. New to git? Read guidelines for development.


Glossary of Terms

A short glossary might be helpful if this project is new to you:

Term Meaning
ULinux A "Universal Linux" build is a type of build that will install and run on any Linux system that we support. We have two universal builds for Linux: One for 32-bit systems, and one for 64-bit systems.

Setting up a machine to build OMI

There are two ways to build OMI:

  1. As an RPM or DEB package that can be installed on the local system, or

  2. As a universal package (installable on any system).

Building a universal package (actually, a set of packages) is a superset of a local installation, so we will cover building locally first.

Dependencies to build a native package

Note that it's very nice to be able to use the updatedns project to use host names rather than IP numbers in a Hyper-V environment. On CentOS systems, this requires the bind-utils package (updatedns requires the 'dig' program). The bind-utils package isn't otherwise necessary.

  • On CentOS 7.x
 sudo yum install git bind-utils gcc-c++ rpm-devel pam-devel openssl-devel rpm-build krb5-devel redhat-lsb-core

On CentOS 7.x, you must install gssntlmssp to do enhanced authentication (beyond basic authorization). This is necessary for the unit tests, but is not needed for basic building of OMI. To install gssntlmssp, do:

sudo rpm -Uvh https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm
sudo yum install gssntlmssp
  • On Ubuntu 14.04 and 16.04
 sudo apt-get install git pkg-config make g++ rpm librpm-dev libpam0g-dev libssl-dev libkrb5-dev gawk
 

for NTLM with SPNEGO functionality (including regression tests) you must use updated packages. Until the corrected packages are available in the regular update distribution, you must add the proposed repos into /etc/apt/sources.list.

deb http://archive.ubuntu.com/ubuntu/ xenial-proposed restricted main multiverse universe

The package libgssapi-krb5-2 from the proposed ppa will be version 1.14 or later. In addition, you will need to add the proposed gss-ntlmssp package for xenial. It must be version 0.7.0 or later.

  • On Mac OS/X:

On Mac OS/X, OMI dependencies are installed via Homebrew. Once a Mac OS/X machine is set up properly, use a command like:

brew install pkg-config openssl

to install necessary bits to build OMI for Mac OS/X.

  • Notes on other platforms

When building a machine for ULINUX builds (such as SuSE 10), we suggest using the O/S distribution CD to install the packages. It's not as easy, but that's the only way to guarantee that packages aren't updated such that generated binaries are not backwards compatible. (See notes on building a universal package, elsewhere in this document.) Note that ULinux builds are controlled via the configure script, discussed below.

Also note that since you won't use 'yum', you must also handle the dependent packages manually (keep adding lines to the 'rpm install' command line until all dependencies are satisfied).

Similar methods would be utilized if building a Redhat system that is not registered for use for up2date.

For universal builds, we recommend the use of a SuSE 10 system. The SuSE 10 release is slightly older than RedHat 5.0, and thus builds backwards compatibility binaries for all of the Linux platforms that we support.

Setting up a system to build a universal package

To build a universal package, we need and older Linux system (we typically use SuSE 10.0 for this), as binary images created with older Linux systems are generally upwards compatible when installed on newer Linux systems.

A notable exception: We use the OpenSSL package, and we can't tell if we need OpenSSL v0.9.8 or OpenSSL v1.0.x. As a result, we have a special process to build both versions of OpenSSL that we can link against.

Once OpenSSL is set up, you need to configure omsagent to include the --enable-ulinux qualifier, like this:
./configure --enable-ulinux

Setting Up Authentication Test Account

Create an account on the system to run the authentication tests. This is only needed if you plan to run unit tests or the regress script, and the system supports NTLM authentication (only recent Linux systems have NTLM support). The account does not require sudo access, so it does not (and should not) belong to the scxdev group.

By convention, this account is named omi_test. If you find that the account already exists in the /etc/passwd file, then you don't need to do this again.

Set up environment variables for Authentication Tests

Authentication tests use the environment variables OMI_USER and OMI_PASSWORD. These need to be set up prior to running the tests. The easiest way to do this for all developers is to modify /etc/profile, which is executed for all users. Use your favorite editor and modify /etc/profile. Append following lines at end of /etc/profile:

OMI_USER=omi_test
OMI_PASSWORD=`xxxxx
export OMI_USER
export OMI_PASSWORD

where xxxxx above is the actual password of account omi_test. These lines could also go in your ~/.bash_profile or ~/.bashrc file if you prefer.

Additional Packages needed by Authentication Tests

Additional software packages may be required on some platforms.

Cloning the repository

Note that there are several subprojects, and authentication is a hassle unless you set up an SSH key via your GitHub account. Set up your machine properly for a much easier workflow.

To clone the repository to build OMI, issue the following command:

git clone --recursive git@github.com:Microsoft/Build-omi.git bld-omi

After this, you need to make sure that you're on the master branch for each of the subprojects. To do this, issue the following commands:

cd bld-omi
git checkout master
git submodule foreach git checkout master

You can also use an alias like git co-master if you followed Configuring git recommendations.

Building the Agent

There are multiple ways to build OMI:

  • Build for development purposes, enabling unit tests, and
  • Build for release purposes
Building Test Agents
  • To build OMI in developer mode:
cd bld-omi
pushd bld-omi/omi/Unix
./configure --dev
make -j
popd
  • Run regression tests
pushd bld-omi/omi/Unix
./regress
popd
Building Release Agents

From the bld-omi directory (created above from 'git clone'), do the following:

cd omi/Unix
./configure
make

Note that the configure script takes a variety of options. You can use configure --help to see the options available.

When the build completes, you should have a native package that you can install on your system. The native package should be in a subdirectory off of bld-omi/omi/Unix/output.

To build a universal build, the configure line must be modified to include the --enable-ulinux qualifier, like this:

./configure --enable-ulinux

As mentioned earlier in this document, the system must be configured via this special process in order to build universal images for any of our supported platforms.

Finally, note that Microsoft builds OMI to use a special set of directories and features to support Microsoft providers. If you wish to build OMI as Microsoft normally does, the configure line should be:

./configure --enable-microsoft

Building packages

For universal linux packages, be sure to build on SUSE 10.

The configure line for building packages is

./configure --enable-system-build --enable-native-kits

followed by

make

the linux packages will be located under the directories output_openssl_0.9.8, output_openssl_1.0.0, and open_ssl_1.1.0. Both .deb and .rpm packages are built on linux.

Code of Conduct

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

About

Build projects required for OMI (Open Management Infrastructure)

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published