OLD | NEW |
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 { | 5 { |
6 'variables': { | 6 'variables': { |
7 'conditions': [ | 7 'conditions': [ |
8 ['OS=="linux"', { | 8 ['OS=="linux"', { |
9 'compile_suid_client': 1, | 9 'compile_suid_client': 1, |
10 'compile_credentials': 1, | 10 'compile_credentials': 1, |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
47 'conditions': [ | 47 'conditions': [ |
48 [ 'compile_suid_client==1', { | 48 [ 'compile_suid_client==1', { |
49 'dependencies': [ | 49 'dependencies': [ |
50 'suid_sandbox_client', | 50 'suid_sandbox_client', |
51 ], | 51 ], |
52 }], | 52 }], |
53 # Compile seccomp BPF when we support it. | 53 # Compile seccomp BPF when we support it. |
54 [ 'use_seccomp_bpf==1', { | 54 [ 'use_seccomp_bpf==1', { |
55 'dependencies': [ | 55 'dependencies': [ |
56 'seccomp_bpf', | 56 'seccomp_bpf', |
57 'seccomp_bpf_helpers', | |
58 ], | 57 ], |
59 }], | 58 }], |
60 ], | 59 ], |
61 }, | 60 }, |
62 { | 61 { |
63 'target_name': 'sandbox_linux_test_utils', | 62 'target_name': 'sandbox_linux_test_utils', |
64 'type': 'static_library', | 63 'type': 'static_library', |
65 'dependencies': [ | 64 'dependencies': [ |
66 '../testing/gtest.gyp:gtest', | 65 '../testing/gtest.gyp:gtest', |
67 ], | 66 ], |
(...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
134 'bpf_dsl/linux_syscall_ranges.h', | 133 'bpf_dsl/linux_syscall_ranges.h', |
135 'bpf_dsl/policy.cc', | 134 'bpf_dsl/policy.cc', |
136 'bpf_dsl/policy.h', | 135 'bpf_dsl/policy.h', |
137 'bpf_dsl/policy_compiler.cc', | 136 'bpf_dsl/policy_compiler.cc', |
138 'bpf_dsl/policy_compiler.h', | 137 'bpf_dsl/policy_compiler.h', |
139 'bpf_dsl/seccomp_macros.h', | 138 'bpf_dsl/seccomp_macros.h', |
140 'bpf_dsl/seccomp_macros.h', | 139 'bpf_dsl/seccomp_macros.h', |
141 'bpf_dsl/syscall_set.cc', | 140 'bpf_dsl/syscall_set.cc', |
142 'bpf_dsl/syscall_set.h', | 141 'bpf_dsl/syscall_set.h', |
143 'bpf_dsl/trap_registry.h', | 142 'bpf_dsl/trap_registry.h', |
| 143 'seccomp-bpf-helpers/baseline_policy.cc', |
| 144 'seccomp-bpf-helpers/baseline_policy.h', |
| 145 'seccomp-bpf-helpers/sigsys_handlers.cc', |
| 146 'seccomp-bpf-helpers/sigsys_handlers.h', |
| 147 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc', |
| 148 'seccomp-bpf-helpers/syscall_parameters_restrictions.h', |
| 149 'seccomp-bpf-helpers/syscall_sets.cc', |
| 150 'seccomp-bpf-helpers/syscall_sets.h', |
144 'seccomp-bpf/die.cc', | 151 'seccomp-bpf/die.cc', |
145 'seccomp-bpf/die.h', | 152 'seccomp-bpf/die.h', |
146 'seccomp-bpf/sandbox_bpf.cc', | 153 'seccomp-bpf/sandbox_bpf.cc', |
147 'seccomp-bpf/sandbox_bpf.h', | 154 'seccomp-bpf/sandbox_bpf.h', |
148 'seccomp-bpf/syscall.cc', | 155 'seccomp-bpf/syscall.cc', |
149 'seccomp-bpf/syscall.h', | 156 'seccomp-bpf/syscall.h', |
150 'seccomp-bpf/trap.cc', | 157 'seccomp-bpf/trap.cc', |
151 'seccomp-bpf/trap.h', | 158 'seccomp-bpf/trap.h', |
152 ], | 159 ], |
153 'dependencies': [ | 160 'dependencies': [ |
154 '../base/base.gyp:base', | 161 '../base/base.gyp:base', |
155 'sandbox_services', | 162 'sandbox_services', |
156 'sandbox_services_headers', | 163 'sandbox_services_headers', |
157 ], | 164 ], |
158 'defines': [ | 165 'defines': [ |
159 'SANDBOX_IMPLEMENTATION', | 166 'SANDBOX_IMPLEMENTATION', |
160 ], | 167 ], |
161 'includes': [ | 168 'includes': [ |
162 # Disable LTO due to compiler bug | 169 # Disable LTO due to compiler bug |
163 # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703 | 170 # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703 |
164 '../../build/android/disable_gcc_lto.gypi', | 171 '../../build/android/disable_gcc_lto.gypi', |
165 ], | 172 ], |
166 'include_dirs': [ | 173 'include_dirs': [ |
167 '../..', | 174 '../..', |
168 ], | 175 ], |
169 }, | 176 }, |
170 { | 177 { |
171 'target_name': 'seccomp_bpf_helpers', | |
172 'type': '<(component)', | |
173 'sources': [ | |
174 'seccomp-bpf-helpers/baseline_policy.cc', | |
175 'seccomp-bpf-helpers/baseline_policy.h', | |
176 'seccomp-bpf-helpers/sigsys_handlers.cc', | |
177 'seccomp-bpf-helpers/sigsys_handlers.h', | |
178 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc', | |
179 'seccomp-bpf-helpers/syscall_parameters_restrictions.h', | |
180 'seccomp-bpf-helpers/syscall_sets.cc', | |
181 'seccomp-bpf-helpers/syscall_sets.h', | |
182 ], | |
183 'dependencies': [ | |
184 '../base/base.gyp:base', | |
185 'sandbox_services', | |
186 'seccomp_bpf', | |
187 ], | |
188 'defines': [ | |
189 'SANDBOX_IMPLEMENTATION', | |
190 ], | |
191 'include_dirs': [ | |
192 '../..', | |
193 ], | |
194 }, | |
195 { | |
196 # The setuid sandbox, for Linux | 178 # The setuid sandbox, for Linux |
197 'target_name': 'chrome_sandbox', | 179 'target_name': 'chrome_sandbox', |
198 'type': 'executable', | 180 'type': 'executable', |
199 'sources': [ | 181 'sources': [ |
200 'suid/common/sandbox.h', | 182 'suid/common/sandbox.h', |
201 'suid/common/suid_unsafe_environment_variables.h', | 183 'suid/common/suid_unsafe_environment_variables.h', |
202 'suid/process_util.h', | 184 'suid/process_util.h', |
203 'suid/process_util_linux.c', | 185 'suid/process_util_linux.c', |
204 'suid/sandbox.c', | 186 'suid/sandbox.c', |
205 ], | 187 ], |
(...skipping 219 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
425 '../../build/isolate.gypi', | 407 '../../build/isolate.gypi', |
426 ], | 408 ], |
427 'sources': [ | 409 'sources': [ |
428 '../sandbox_linux_unittests.isolate', | 410 '../sandbox_linux_unittests.isolate', |
429 ], | 411 ], |
430 }, | 412 }, |
431 ], | 413 ], |
432 }], | 414 }], |
433 ], | 415 ], |
434 } | 416 } |
OLD | NEW |