| OLD | NEW |
| (Empty) |
| 1 # Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | |
| 2 # Use of this source code is governed by a BSD-style license that can be | |
| 3 # found in the LICENSE file. | |
| 4 | |
| 5 Import('env') | |
| 6 | |
| 7 env = env.Clone() | |
| 8 | |
| 9 env.ApplySConscript([ | |
| 10 '$GTEST_DIR/../using_gtest.scons', | |
| 11 ]) | |
| 12 | |
| 13 if env.Bit('windows'): | |
| 14 env.Append( | |
| 15 CCFLAGS = [ | |
| 16 '/WX', # treat warnings as errors | |
| 17 ], | |
| 18 ) | |
| 19 | |
| 20 input_files = [ | |
| 21 'Wow64.cc', | |
| 22 'acl.cc', | |
| 23 'broker_services.cc', | |
| 24 'crosscall_server.cc', | |
| 25 'dep.cc', | |
| 26 'eat_resolver.cc', | |
| 27 'filesystem_dispatcher.cc', | |
| 28 'filesystem_interception.cc', | |
| 29 'filesystem_policy.cc', | |
| 30 'interception.cc', | |
| 31 'interception_agent.cc', | |
| 32 'job.cc', | |
| 33 'named_pipe_dispatcher.cc', | |
| 34 'named_pipe_interception.cc', | |
| 35 'named_pipe_policy.cc', | |
| 36 'pe_image.cc', | |
| 37 'policy_broker.cc', | |
| 38 'policy_engine_opcodes.cc', | |
| 39 'policy_engine_processor.cc', | |
| 40 'policy_low_level.cc', | |
| 41 'policy_target.cc', | |
| 42 'process_thread_dispatcher.cc', | |
| 43 'process_thread_interception.cc', | |
| 44 'process_thread_policy.cc', | |
| 45 'registry_dispatcher.cc', | |
| 46 'registry_interception.cc', | |
| 47 'registry_policy.cc', | |
| 48 'resolver.cc', | |
| 49 'restricted_token.cc', | |
| 50 'restricted_token_utils.cc', | |
| 51 'sandbox.cc', | |
| 52 'sandbox_nt_util.cc', | |
| 53 'sandbox_policy_base.cc', | |
| 54 'sandbox_utils.cc', | |
| 55 'service_resolver.cc', | |
| 56 'shared_handles.cc', | |
| 57 'sharedmem_ipc_client.cc', | |
| 58 'sharedmem_ipc_server.cc', | |
| 59 'sid.cc', | |
| 60 'sidestep/ia32_modrm_map.cpp', | |
| 61 'sidestep/ia32_opcode_map.cpp', | |
| 62 'sidestep/mini_disassembler.cpp', | |
| 63 'sidestep/preamble_patcher_with_stub.cpp', | |
| 64 'sidestep_resolver.cc', | |
| 65 'sync_dispatcher.cc', | |
| 66 'sync_interception.cc', | |
| 67 'sync_policy.cc', | |
| 68 'target_interceptions.cc', | |
| 69 'target_process.cc', | |
| 70 'target_services.cc', | |
| 71 'win2k_threadpool.cc', | |
| 72 'win_utils.cc', | |
| 73 ] | |
| 74 | |
| 75 # TODO(bradnelson): This step generates sandbox.pch.ib_tag | |
| 76 # SCons doesn't know. | |
| 77 env_p = env.Clone() | |
| 78 env_p.Append(CCFLAGS='/Ylsandbox') | |
| 79 pch, obj = env_p.PCH(['sandbox.pch', 'stdafx.obj'], 'stdafx.cc') | |
| 80 env['PCH'] = pch | |
| 81 env['PCHSTOP'] = 'stdafx.h' | |
| 82 env.Append(CCPCHFLAGS = ['/FIstdafx.h']) | |
| 83 | |
| 84 env.ChromeLibrary('sandbox', input_files + [obj]) | |
| OLD | NEW |