Index: sandbox/src/sandbox_lib.scons |
=================================================================== |
--- sandbox/src/sandbox_lib.scons (revision 12583) |
+++ sandbox/src/sandbox_lib.scons (working copy) |
@@ -1,84 +0,0 @@ |
-# Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
-# Use of this source code is governed by a BSD-style license that can be |
-# found in the LICENSE file. |
- |
-Import('env') |
- |
-env = env.Clone() |
- |
-env.ApplySConscript([ |
- '$GTEST_DIR/../using_gtest.scons', |
-]) |
- |
-if env.Bit('windows'): |
- env.Append( |
- CCFLAGS = [ |
- '/WX', # treat warnings as errors |
- ], |
- ) |
- |
-input_files = [ |
- 'Wow64.cc', |
- 'acl.cc', |
- 'broker_services.cc', |
- 'crosscall_server.cc', |
- 'dep.cc', |
- 'eat_resolver.cc', |
- 'filesystem_dispatcher.cc', |
- 'filesystem_interception.cc', |
- 'filesystem_policy.cc', |
- 'interception.cc', |
- 'interception_agent.cc', |
- 'job.cc', |
- 'named_pipe_dispatcher.cc', |
- 'named_pipe_interception.cc', |
- 'named_pipe_policy.cc', |
- 'pe_image.cc', |
- 'policy_broker.cc', |
- 'policy_engine_opcodes.cc', |
- 'policy_engine_processor.cc', |
- 'policy_low_level.cc', |
- 'policy_target.cc', |
- 'process_thread_dispatcher.cc', |
- 'process_thread_interception.cc', |
- 'process_thread_policy.cc', |
- 'registry_dispatcher.cc', |
- 'registry_interception.cc', |
- 'registry_policy.cc', |
- 'resolver.cc', |
- 'restricted_token.cc', |
- 'restricted_token_utils.cc', |
- 'sandbox.cc', |
- 'sandbox_nt_util.cc', |
- 'sandbox_policy_base.cc', |
- 'sandbox_utils.cc', |
- 'service_resolver.cc', |
- 'shared_handles.cc', |
- 'sharedmem_ipc_client.cc', |
- 'sharedmem_ipc_server.cc', |
- 'sid.cc', |
- 'sidestep/ia32_modrm_map.cpp', |
- 'sidestep/ia32_opcode_map.cpp', |
- 'sidestep/mini_disassembler.cpp', |
- 'sidestep/preamble_patcher_with_stub.cpp', |
- 'sidestep_resolver.cc', |
- 'sync_dispatcher.cc', |
- 'sync_interception.cc', |
- 'sync_policy.cc', |
- 'target_interceptions.cc', |
- 'target_process.cc', |
- 'target_services.cc', |
- 'win2k_threadpool.cc', |
- 'win_utils.cc', |
-] |
- |
-# TODO(bradnelson): This step generates sandbox.pch.ib_tag |
-# SCons doesn't know. |
-env_p = env.Clone() |
-env_p.Append(CCFLAGS='/Ylsandbox') |
-pch, obj = env_p.PCH(['sandbox.pch', 'stdafx.obj'], 'stdafx.cc') |
-env['PCH'] = pch |
-env['PCHSTOP'] = 'stdafx.h' |
-env.Append(CCPCHFLAGS = ['/FIstdafx.h']) |
- |
-env.ChromeLibrary('sandbox', input_files + [obj]) |