| Index: sandbox/src/sandbox_lib.scons | 
| =================================================================== | 
| --- sandbox/src/sandbox_lib.scons	(revision 12583) | 
| +++ sandbox/src/sandbox_lib.scons	(working copy) | 
| @@ -1,84 +0,0 @@ | 
| -# Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 
| -# Use of this source code is governed by a BSD-style license that can be | 
| -# found in the LICENSE file. | 
| - | 
| -Import('env') | 
| - | 
| -env = env.Clone() | 
| - | 
| -env.ApplySConscript([ | 
| -    '$GTEST_DIR/../using_gtest.scons', | 
| -]) | 
| - | 
| -if env.Bit('windows'): | 
| -  env.Append( | 
| -      CCFLAGS = [ | 
| -          '/WX',          # treat warnings as errors | 
| -      ], | 
| -  ) | 
| - | 
| -input_files = [ | 
| -    'Wow64.cc', | 
| -    'acl.cc', | 
| -    'broker_services.cc', | 
| -    'crosscall_server.cc', | 
| -    'dep.cc', | 
| -    'eat_resolver.cc', | 
| -    'filesystem_dispatcher.cc', | 
| -    'filesystem_interception.cc', | 
| -    'filesystem_policy.cc', | 
| -    'interception.cc', | 
| -    'interception_agent.cc', | 
| -    'job.cc', | 
| -    'named_pipe_dispatcher.cc', | 
| -    'named_pipe_interception.cc', | 
| -    'named_pipe_policy.cc', | 
| -    'pe_image.cc', | 
| -    'policy_broker.cc', | 
| -    'policy_engine_opcodes.cc', | 
| -    'policy_engine_processor.cc', | 
| -    'policy_low_level.cc', | 
| -    'policy_target.cc', | 
| -    'process_thread_dispatcher.cc', | 
| -    'process_thread_interception.cc', | 
| -    'process_thread_policy.cc', | 
| -    'registry_dispatcher.cc', | 
| -    'registry_interception.cc', | 
| -    'registry_policy.cc', | 
| -    'resolver.cc', | 
| -    'restricted_token.cc', | 
| -    'restricted_token_utils.cc', | 
| -    'sandbox.cc', | 
| -    'sandbox_nt_util.cc', | 
| -    'sandbox_policy_base.cc', | 
| -    'sandbox_utils.cc', | 
| -    'service_resolver.cc', | 
| -    'shared_handles.cc', | 
| -    'sharedmem_ipc_client.cc', | 
| -    'sharedmem_ipc_server.cc', | 
| -    'sid.cc', | 
| -    'sidestep/ia32_modrm_map.cpp', | 
| -    'sidestep/ia32_opcode_map.cpp', | 
| -    'sidestep/mini_disassembler.cpp', | 
| -    'sidestep/preamble_patcher_with_stub.cpp', | 
| -    'sidestep_resolver.cc', | 
| -    'sync_dispatcher.cc', | 
| -    'sync_interception.cc', | 
| -    'sync_policy.cc', | 
| -    'target_interceptions.cc', | 
| -    'target_process.cc', | 
| -    'target_services.cc', | 
| -    'win2k_threadpool.cc', | 
| -    'win_utils.cc', | 
| -] | 
| - | 
| -# TODO(bradnelson): This step generates sandbox.pch.ib_tag | 
| -#                   SCons doesn't know. | 
| -env_p = env.Clone() | 
| -env_p.Append(CCFLAGS='/Ylsandbox') | 
| -pch, obj = env_p.PCH(['sandbox.pch', 'stdafx.obj'], 'stdafx.cc') | 
| -env['PCH'] = pch | 
| -env['PCHSTOP'] = 'stdafx.h' | 
| -env.Append(CCPCHFLAGS = ['/FIstdafx.h']) | 
| - | 
| -env.ChromeLibrary('sandbox', input_files + [obj]) | 
|  |