OLD | NEW |
---|---|
1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 import("//build/config/features.gni") | 5 import("//build/config/features.gni") |
6 import("//build/config/ui.gni") | |
7 import("//build/config/linux/pkg_config.gni") | |
6 import("//testing/test.gni") | 8 import("//testing/test.gni") |
7 | 9 |
8 declare_args() { | 10 declare_args() { |
9 compile_suid_client = is_linux | 11 compile_suid_client = is_linux |
10 | 12 |
11 compile_credentials = is_linux | 13 compile_credentials = is_linux |
12 | 14 |
13 # On Android, use plain GTest. | 15 # On Android, use plain GTest. |
14 use_base_test_suite = is_linux | 16 use_base_test_suite = is_linux |
15 } | 17 } |
(...skipping 202 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
218 "seccomp-bpf-helpers/syscall_sets.cc", | 220 "seccomp-bpf-helpers/syscall_sets.cc", |
219 "seccomp-bpf-helpers/syscall_sets.h", | 221 "seccomp-bpf-helpers/syscall_sets.h", |
220 ] | 222 ] |
221 defines = [ "SANDBOX_IMPLEMENTATION" ] | 223 defines = [ "SANDBOX_IMPLEMENTATION" ] |
222 | 224 |
223 deps = [ | 225 deps = [ |
224 "//base", | 226 "//base", |
225 ":sandbox_services", | 227 ":sandbox_services", |
226 ":seccomp_bpf", | 228 ":seccomp_bpf", |
227 ] | 229 ] |
230 | |
231 if (use_ozone) { | |
232 pkg_config("libdrm") { | |
spang
2015/07/24 22:08:25
This isn't needed.
<drm.h> is provided by libc. P
spang
2015/07/24 22:42:21
Er, it's actually <drm/drm.h>.
dshwang
2015/07/28 15:23:12
actually we need vgem_drm.h, so I add <libdrm/vgem
| |
233 packages = [ "libdrm" ] | |
234 } | |
235 public_configs = [ ":libdrm" ] | |
236 } | |
228 } | 237 } |
229 | 238 |
230 if (is_linux) { | 239 if (is_linux) { |
231 # The setuid sandbox for Linux. | 240 # The setuid sandbox for Linux. |
232 executable("chrome_sandbox") { | 241 executable("chrome_sandbox") { |
233 sources = [ | 242 sources = [ |
234 "suid/common/sandbox.h", | 243 "suid/common/sandbox.h", |
235 "suid/common/suid_unsafe_environment_variables.h", | 244 "suid/common/suid_unsafe_environment_variables.h", |
236 "suid/process_util.h", | 245 "suid/process_util.h", |
237 "suid/process_util_linux.c", | 246 "suid/process_util_linux.c", |
(...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
373 # 'type': 'none', | 382 # 'type': 'none', |
374 # 'variables': { | 383 # 'variables': { |
375 # 'test_suite_name': 'sandbox_linux_jni_unittests', | 384 # 'test_suite_name': 'sandbox_linux_jni_unittests', |
376 # }, | 385 # }, |
377 # 'dependencies': [ | 386 # 'dependencies': [ |
378 # 'sandbox_linux_jni_unittests', | 387 # 'sandbox_linux_jni_unittests', |
379 # ], | 388 # ], |
380 # 'includes': [ '../../build/apk_test.gypi' ], | 389 # 'includes': [ '../../build/apk_test.gypi' ], |
381 # } | 390 # } |
382 } | 391 } |
OLD | NEW |