| OLD | NEW |
| 1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
| 3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
| 4 | 4 |
| 5 import("//build/config/features.gni") | 5 import("//build/config/features.gni") |
| 6 import("//testing/test.gni") | 6 import("//testing/test.gni") |
| 7 | 7 |
| 8 declare_args() { | 8 declare_args() { |
| 9 compile_suid_client = is_linux | 9 compile_suid_client = is_linux |
| 10 | 10 |
| 11 compile_credentials = is_linux | 11 compile_credentials = is_linux |
| 12 | 12 |
| 13 # On Android, use plain GTest. | 13 # On Android, use plain GTest. |
| 14 use_base_test_suite = is_linux | 14 use_base_test_suite = is_linux |
| 15 |
| 16 use_vgem_map = false |
| 15 } | 17 } |
| 16 | 18 |
| 17 # We have two principal targets: sandbox and sandbox_linux_unittests | 19 # We have two principal targets: sandbox and sandbox_linux_unittests |
| 18 # All other targets are listed as dependencies. | 20 # All other targets are listed as dependencies. |
| 19 # There is one notable exception: for historical reasons, chrome_sandbox is | 21 # There is one notable exception: for historical reasons, chrome_sandbox is |
| 20 # the setuid sandbox and is its own target. | 22 # the setuid sandbox and is its own target. |
| 21 | 23 |
| 22 group("sandbox") { | 24 group("sandbox") { |
| 23 deps = [ | 25 deps = [ |
| 24 ":sandbox_services", | 26 ":sandbox_services", |
| (...skipping 205 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 230 "seccomp-bpf-helpers/syscall_sets.cc", | 232 "seccomp-bpf-helpers/syscall_sets.cc", |
| 231 "seccomp-bpf-helpers/syscall_sets.h", | 233 "seccomp-bpf-helpers/syscall_sets.h", |
| 232 ] | 234 ] |
| 233 defines = [ "SANDBOX_IMPLEMENTATION" ] | 235 defines = [ "SANDBOX_IMPLEMENTATION" ] |
| 234 | 236 |
| 235 deps = [ | 237 deps = [ |
| 236 "//base", | 238 "//base", |
| 237 ":sandbox_services", | 239 ":sandbox_services", |
| 238 ":seccomp_bpf", | 240 ":seccomp_bpf", |
| 239 ] | 241 ] |
| 242 |
| 243 if (use_vgem_map) { |
| 244 defines += [ "USE_VGEM_MAP" ] |
| 245 } |
| 240 } | 246 } |
| 241 | 247 |
| 242 if (is_linux) { | 248 if (is_linux) { |
| 243 # The setuid sandbox for Linux. | 249 # The setuid sandbox for Linux. |
| 244 executable("chrome_sandbox") { | 250 executable("chrome_sandbox") { |
| 245 sources = [ | 251 sources = [ |
| 246 "suid/common/sandbox.h", | 252 "suid/common/sandbox.h", |
| 247 "suid/common/suid_unsafe_environment_variables.h", | 253 "suid/common/suid_unsafe_environment_variables.h", |
| 248 "suid/process_util.h", | 254 "suid/process_util.h", |
| 249 "suid/process_util_linux.c", | 255 "suid/process_util_linux.c", |
| (...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 385 # 'type': 'none', | 391 # 'type': 'none', |
| 386 # 'variables': { | 392 # 'variables': { |
| 387 # 'test_suite_name': 'sandbox_linux_jni_unittests', | 393 # 'test_suite_name': 'sandbox_linux_jni_unittests', |
| 388 # }, | 394 # }, |
| 389 # 'dependencies': [ | 395 # 'dependencies': [ |
| 390 # 'sandbox_linux_jni_unittests', | 396 # 'sandbox_linux_jni_unittests', |
| 391 # ], | 397 # ], |
| 392 # 'includes': [ '../../build/apk_test.gypi' ], | 398 # 'includes': [ '../../build/apk_test.gypi' ], |
| 393 # } | 399 # } |
| 394 } | 400 } |
| OLD | NEW |