OLD | NEW |
1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 import("//build/config/features.gni") | 5 import("//build/config/features.gni") |
6 | 6 |
7 declare_args() { | 7 declare_args() { |
8 compile_suid_client = is_linux | 8 compile_suid_client = is_linux |
9 | 9 |
10 compile_credentials = is_linux | 10 compile_credentials = is_linux |
(...skipping 72 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
83 ] | 83 ] |
84 | 84 |
85 if (compile_suid_client) { | 85 if (compile_suid_client) { |
86 sources += [ | 86 sources += [ |
87 "suid/client/setuid_sandbox_client_unittest.cc", | 87 "suid/client/setuid_sandbox_client_unittest.cc", |
88 ] | 88 ] |
89 } | 89 } |
90 if (use_seccomp_bpf) { | 90 if (use_seccomp_bpf) { |
91 sources += [ | 91 sources += [ |
92 "seccomp-bpf-helpers/baseline_policy_unittest.cc", | 92 "seccomp-bpf-helpers/baseline_policy_unittest.cc", |
| 93 "seccomp-bpf-helpers/bpf_dsl_unittest.cc", |
| 94 "seccomp-bpf-helpers/cons_unittest.cc", |
93 "seccomp-bpf/bpf_tests_unittest.cc", | 95 "seccomp-bpf/bpf_tests_unittest.cc", |
94 "seccomp-bpf/codegen_unittest.cc", | 96 "seccomp-bpf/codegen_unittest.cc", |
95 "seccomp-bpf/errorcode_unittest.cc", | 97 "seccomp-bpf/errorcode_unittest.cc", |
96 "seccomp-bpf/sandbox_bpf_unittest.cc", | 98 "seccomp-bpf/sandbox_bpf_unittest.cc", |
97 "seccomp-bpf/syscall_iterator_unittest.cc", | 99 "seccomp-bpf/syscall_iterator_unittest.cc", |
98 "seccomp-bpf/syscall_unittest.cc", | 100 "seccomp-bpf/syscall_unittest.cc", |
99 ] | 101 ] |
100 } | 102 } |
101 if (compile_credentials) { | 103 if (compile_credentials) { |
102 sources += [ | 104 sources += [ |
(...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
155 deps = [ | 157 deps = [ |
156 ":sandbox_services_headers", | 158 ":sandbox_services_headers", |
157 "//base", | 159 "//base", |
158 ] | 160 ] |
159 } | 161 } |
160 | 162 |
161 component("seccomp_bpf_helpers") { | 163 component("seccomp_bpf_helpers") { |
162 sources = [ | 164 sources = [ |
163 "seccomp-bpf-helpers/baseline_policy.cc", | 165 "seccomp-bpf-helpers/baseline_policy.cc", |
164 "seccomp-bpf-helpers/baseline_policy.h", | 166 "seccomp-bpf-helpers/baseline_policy.h", |
| 167 "seccomp-bpf-helpers/bpf_dsl.cc", |
| 168 "seccomp-bpf-helpers/bpf_dsl.h", |
| 169 "seccomp-bpf-helpers/cons.h", |
165 "seccomp-bpf-helpers/sigsys_handlers.cc", | 170 "seccomp-bpf-helpers/sigsys_handlers.cc", |
166 "seccomp-bpf-helpers/sigsys_handlers.h", | 171 "seccomp-bpf-helpers/sigsys_handlers.h", |
167 "seccomp-bpf-helpers/syscall_parameters_restrictions.cc", | 172 "seccomp-bpf-helpers/syscall_parameters_restrictions.cc", |
168 "seccomp-bpf-helpers/syscall_parameters_restrictions.h", | 173 "seccomp-bpf-helpers/syscall_parameters_restrictions.h", |
169 "seccomp-bpf-helpers/syscall_sets.cc", | 174 "seccomp-bpf-helpers/syscall_sets.cc", |
170 "seccomp-bpf-helpers/syscall_sets.h", | 175 "seccomp-bpf-helpers/syscall_sets.h", |
171 ] | 176 ] |
172 defines = [ "SANDBOX_IMPLEMENTATION" ] | 177 defines = [ "SANDBOX_IMPLEMENTATION" ] |
173 | 178 |
174 deps = [ | 179 deps = [ |
(...skipping 130 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
305 # 'type': 'none', | 310 # 'type': 'none', |
306 # 'variables': { | 311 # 'variables': { |
307 # 'test_suite_name': 'sandbox_linux_jni_unittests', | 312 # 'test_suite_name': 'sandbox_linux_jni_unittests', |
308 # }, | 313 # }, |
309 # 'dependencies': [ | 314 # 'dependencies': [ |
310 # 'sandbox_linux_jni_unittests', | 315 # 'sandbox_linux_jni_unittests', |
311 # ], | 316 # ], |
312 # 'includes': [ '../../build/apk_test.gypi' ], | 317 # 'includes': [ '../../build/apk_test.gypi' ], |
313 # } | 318 # } |
314 } | 319 } |
OLD | NEW |