OLD | NEW |
1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 import("//build/config/features.gni") | 5 import("//build/config/features.gni") |
6 import("//testing/test.gni") | 6 import("//testing/test.gni") |
7 | 7 |
8 declare_args() { | 8 declare_args() { |
9 compile_suid_client = is_linux | 9 compile_suid_client = is_linux |
10 | 10 |
11 compile_credentials = is_linux | 11 compile_credentials = is_linux |
12 | 12 |
13 # On Android, use plain GTest. | 13 # On Android, use plain GTest. |
14 use_base_test_suite = is_linux | 14 use_base_test_suite = is_linux |
| 15 |
| 16 use_vgem_map = false |
15 } | 17 } |
16 | 18 |
17 # We have two principal targets: sandbox and sandbox_linux_unittests | 19 # We have two principal targets: sandbox and sandbox_linux_unittests |
18 # All other targets are listed as dependencies. | 20 # All other targets are listed as dependencies. |
19 # There is one notable exception: for historical reasons, chrome_sandbox is | 21 # There is one notable exception: for historical reasons, chrome_sandbox is |
20 # the setuid sandbox and is its own target. | 22 # the setuid sandbox and is its own target. |
21 | 23 |
22 group("sandbox") { | 24 group("sandbox") { |
23 deps = [ | 25 deps = [ |
24 ":sandbox_services", | 26 ":sandbox_services", |
(...skipping 205 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
230 "seccomp-bpf-helpers/syscall_sets.cc", | 232 "seccomp-bpf-helpers/syscall_sets.cc", |
231 "seccomp-bpf-helpers/syscall_sets.h", | 233 "seccomp-bpf-helpers/syscall_sets.h", |
232 ] | 234 ] |
233 defines = [ "SANDBOX_IMPLEMENTATION" ] | 235 defines = [ "SANDBOX_IMPLEMENTATION" ] |
234 | 236 |
235 deps = [ | 237 deps = [ |
236 "//base", | 238 "//base", |
237 ":sandbox_services", | 239 ":sandbox_services", |
238 ":seccomp_bpf", | 240 ":seccomp_bpf", |
239 ] | 241 ] |
| 242 |
| 243 if (use_vgem_map) { |
| 244 defines += [ "USE_VGEM_MAP" ] |
| 245 } |
240 } | 246 } |
241 | 247 |
242 if (is_linux) { | 248 if (is_linux) { |
243 # The setuid sandbox for Linux. | 249 # The setuid sandbox for Linux. |
244 executable("chrome_sandbox") { | 250 executable("chrome_sandbox") { |
245 sources = [ | 251 sources = [ |
246 "suid/common/sandbox.h", | 252 "suid/common/sandbox.h", |
247 "suid/common/suid_unsafe_environment_variables.h", | 253 "suid/common/suid_unsafe_environment_variables.h", |
248 "suid/process_util.h", | 254 "suid/process_util.h", |
249 "suid/process_util_linux.c", | 255 "suid/process_util_linux.c", |
(...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
385 # 'type': 'none', | 391 # 'type': 'none', |
386 # 'variables': { | 392 # 'variables': { |
387 # 'test_suite_name': 'sandbox_linux_jni_unittests', | 393 # 'test_suite_name': 'sandbox_linux_jni_unittests', |
388 # }, | 394 # }, |
389 # 'dependencies': [ | 395 # 'dependencies': [ |
390 # 'sandbox_linux_jni_unittests', | 396 # 'sandbox_linux_jni_unittests', |
391 # ], | 397 # ], |
392 # 'includes': [ '../../build/apk_test.gypi' ], | 398 # 'includes': [ '../../build/apk_test.gypi' ], |
393 # } | 399 # } |
394 } | 400 } |
OLD | NEW |