Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(95)

Side by Side Diff: sandbox/src/sandbox_lib.scons

Issue 53121: Remove the checked-in scons configuration files. (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: Created 11 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « sandbox/sandbox_sln.scons ('k') | sandbox/tests/common/sandbox_common.scons » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 # Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file.
4
5 Import('env')
6
7 env = env.Clone()
8
9 env.ApplySConscript([
10 '$GTEST_DIR/../using_gtest.scons',
11 ])
12
13 if env.Bit('windows'):
14 env.Append(
15 CCFLAGS = [
16 '/WX', # treat warnings as errors
17 ],
18 )
19
20 input_files = [
21 'Wow64.cc',
22 'acl.cc',
23 'broker_services.cc',
24 'crosscall_server.cc',
25 'dep.cc',
26 'eat_resolver.cc',
27 'filesystem_dispatcher.cc',
28 'filesystem_interception.cc',
29 'filesystem_policy.cc',
30 'interception.cc',
31 'interception_agent.cc',
32 'job.cc',
33 'named_pipe_dispatcher.cc',
34 'named_pipe_interception.cc',
35 'named_pipe_policy.cc',
36 'pe_image.cc',
37 'policy_broker.cc',
38 'policy_engine_opcodes.cc',
39 'policy_engine_processor.cc',
40 'policy_low_level.cc',
41 'policy_target.cc',
42 'process_thread_dispatcher.cc',
43 'process_thread_interception.cc',
44 'process_thread_policy.cc',
45 'registry_dispatcher.cc',
46 'registry_interception.cc',
47 'registry_policy.cc',
48 'resolver.cc',
49 'restricted_token.cc',
50 'restricted_token_utils.cc',
51 'sandbox.cc',
52 'sandbox_nt_util.cc',
53 'sandbox_policy_base.cc',
54 'sandbox_utils.cc',
55 'service_resolver.cc',
56 'shared_handles.cc',
57 'sharedmem_ipc_client.cc',
58 'sharedmem_ipc_server.cc',
59 'sid.cc',
60 'sidestep/ia32_modrm_map.cpp',
61 'sidestep/ia32_opcode_map.cpp',
62 'sidestep/mini_disassembler.cpp',
63 'sidestep/preamble_patcher_with_stub.cpp',
64 'sidestep_resolver.cc',
65 'sync_dispatcher.cc',
66 'sync_interception.cc',
67 'sync_policy.cc',
68 'target_interceptions.cc',
69 'target_process.cc',
70 'target_services.cc',
71 'win2k_threadpool.cc',
72 'win_utils.cc',
73 ]
74
75 # TODO(bradnelson): This step generates sandbox.pch.ib_tag
76 # SCons doesn't know.
77 env_p = env.Clone()
78 env_p.Append(CCFLAGS='/Ylsandbox')
79 pch, obj = env_p.PCH(['sandbox.pch', 'stdafx.obj'], 'stdafx.cc')
80 env['PCH'] = pch
81 env['PCHSTOP'] = 'stdafx.h'
82 env.Append(CCPCHFLAGS = ['/FIstdafx.h'])
83
84 env.ChromeLibrary('sandbox', input_files + [obj])
OLDNEW
« no previous file with comments | « sandbox/sandbox_sln.scons ('k') | sandbox/tests/common/sandbox_common.scons » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698