Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(45)

Side by Side Diff: sandbox/linux/BUILD.gn

Issue 704363002: XXX test gn format everything (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: . Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « sandbox/BUILD.gn ('k') | sandbox/mac/BUILD.gn » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright 2014 The Chromium Authors. All rights reserved. 1 # Copyright 2014 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/config/features.gni") 5 import("//build/config/features.gni")
6 6
7 declare_args() { 7 declare_args() {
8 compile_suid_client = is_linux 8 compile_suid_client = is_linux
9 9
10 compile_credentials = is_linux 10 compile_credentials = is_linux
11 11
12 compile_seccomp_bpf_demo = 12 compile_seccomp_bpf_demo =
13 (is_linux && (cpu_arch == "x86" || cpu_arch == "x64")) 13 is_linux && (cpu_arch == "x86" || cpu_arch == "x64")
14 } 14 }
15 15
16 # We have two principal targets: sandbox and sandbox_linux_unittests 16 # We have two principal targets: sandbox and sandbox_linux_unittests
17 # All other targets are listed as dependencies. 17 # All other targets are listed as dependencies.
18 # There is one notable exception: for historical reasons, chrome_sandbox is 18 # There is one notable exception: for historical reasons, chrome_sandbox is
19 # the setuid sandbox and is its own target. 19 # the setuid sandbox and is its own target.
20 20
21 group("sandbox") { 21 group("sandbox") {
22 deps = [ 22 deps = [
23 ":sandbox_services", 23 ":sandbox_services",
(...skipping 27 matching lines...) Expand all
51 "//testing/gtest", 51 "//testing/gtest",
52 ] 52 ]
53 53
54 if (use_seccomp_bpf) { 54 if (use_seccomp_bpf) {
55 sources += [ 55 sources += [
56 "seccomp-bpf/bpf_tester_compatibility_delegate.h", 56 "seccomp-bpf/bpf_tester_compatibility_delegate.h",
57 "seccomp-bpf/bpf_tests.h", 57 "seccomp-bpf/bpf_tests.h",
58 "seccomp-bpf/sandbox_bpf_test_runner.cc", 58 "seccomp-bpf/sandbox_bpf_test_runner.cc",
59 "seccomp-bpf/sandbox_bpf_test_runner.h", 59 "seccomp-bpf/sandbox_bpf_test_runner.h",
60 ] 60 ]
61 deps += [ 61 deps += [ ":seccomp_bpf" ]
62 ":seccomp_bpf",
63 ]
64 } 62 }
65 } 63 }
66 64
67 # The main sandboxing test target. 65 # The main sandboxing test target.
68 test("sandbox_linux_unittests") { 66 test("sandbox_linux_unittests") {
69 sources = [ 67 sources = [
70 "services/scoped_process_unittest.cc", 68 "services/scoped_process_unittest.cc",
71 "services/syscall_wrappers_unittest.cc", 69 "services/syscall_wrappers_unittest.cc",
72 "services/thread_helpers_unittests.cc", 70 "services/thread_helpers_unittests.cc",
73 "services/yama_unittests.cc", 71 "services/yama_unittests.cc",
(...skipping 13 matching lines...) Expand all
87 "//base/test:test_support", 85 "//base/test:test_support",
88 "//testing/gtest", 86 "//testing/gtest",
89 ] 87 ]
90 88
91 if (is_linux) { 89 if (is_linux) {
92 # Don't use this on Android. 90 # Don't use this on Android.
93 libs = [ "rt" ] 91 libs = [ "rt" ]
94 } 92 }
95 93
96 if (compile_suid_client) { 94 if (compile_suid_client) {
97 sources += [ 95 sources += [ "suid/client/setuid_sandbox_client_unittest.cc" ]
98 "suid/client/setuid_sandbox_client_unittest.cc",
99 ]
100 } 96 }
101 if (use_seccomp_bpf) { 97 if (use_seccomp_bpf) {
102 sources += [ 98 sources += [
103 "bpf_dsl/bpf_dsl_more_unittest.cc", 99 "bpf_dsl/bpf_dsl_more_unittest.cc",
104 "bpf_dsl/bpf_dsl_unittest.cc", 100 "bpf_dsl/bpf_dsl_unittest.cc",
105 "bpf_dsl/cons_unittest.cc", 101 "bpf_dsl/cons_unittest.cc",
106 "seccomp-bpf-helpers/baseline_policy_unittest.cc", 102 "seccomp-bpf-helpers/baseline_policy_unittest.cc",
107 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc", 103 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc",
108 "seccomp-bpf/bpf_tests_unittest.cc", 104 "seccomp-bpf/bpf_tests_unittest.cc",
109 "seccomp-bpf/codegen_unittest.cc", 105 "seccomp-bpf/codegen_unittest.cc",
(...skipping 83 matching lines...) Expand 10 before | Expand all | Expand 10 after
193 ] 189 ]
194 defines = [ "SANDBOX_IMPLEMENTATION" ] 190 defines = [ "SANDBOX_IMPLEMENTATION" ]
195 191
196 deps = [ 192 deps = [
197 "//base", 193 "//base",
198 ":seccomp_bpf", 194 ":seccomp_bpf",
199 ] 195 ]
200 } 196 }
201 197
202 if (is_linux) { 198 if (is_linux) {
203 # The setuid sandbox for Linux. 199 # The setuid sandbox for Linux.
204 executable("chrome_sandbox") { 200 executable("chrome_sandbox") {
205 sources = [ 201 sources = [
206 "suid/common/sandbox.h", 202 "suid/common/sandbox.h",
207 "suid/common/suid_unsafe_environment_variables.h", 203 "suid/common/suid_unsafe_environment_variables.h",
208 "suid/process_util.h", 204 "suid/process_util.h",
209 "suid/process_util_linux.c", 205 "suid/process_util_linux.c",
210 "suid/sandbox.c", 206 "suid/sandbox.c",
211 ] 207 ]
212 208
213 cflags = [ 209 cflags = [
214 # For ULLONG_MAX 210 # For ULLONG_MAX
215 "-std=gnu99", 211 "-std=gnu99",
212
216 # These files have a suspicious comparison. 213 # These files have a suspicious comparison.
217 # TODO fix this and re-enable this warning. 214 # TODO fix this and re-enable this warning.
218 "-Wno-sign-compare", 215 "-Wno-sign-compare",
219 ] 216 ]
220 } 217 }
221 } 218 }
222 219
223 component("sandbox_services") { 220 component("sandbox_services") {
224 sources = [ 221 sources = [
225 "services/init_process_reaper.cc", 222 "services/init_process_reaper.cc",
(...skipping 21 matching lines...) Expand all
247 244
248 defines = [ "SANDBOX_IMPLEMENTATION" ] 245 defines = [ "SANDBOX_IMPLEMENTATION" ]
249 246
250 if (compile_credentials) { 247 if (compile_credentials) {
251 sources += [ 248 sources += [
252 "services/credentials.cc", 249 "services/credentials.cc",
253 "services/credentials.h", 250 "services/credentials.h",
254 "services/proc_util.cc", 251 "services/proc_util.cc",
255 "services/proc_util.h", 252 "services/proc_util.h",
256 ] 253 ]
254
257 # For capabilities.cc. 255 # For capabilities.cc.
258 configs += [ "//build/config/linux:libcap" ] 256 configs += [ "//build/config/linux:libcap" ]
259 } 257 }
260 258
261 deps = [ 259 deps = [
262 "//base", 260 "//base",
263 ] 261 ]
264 } 262 }
265 263
266 source_set("sandbox_services_headers") { 264 source_set("sandbox_services_headers") {
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after
318 # 316 #
319 # args = [ 317 # args = [
320 # rebase_path(in_file, root_build_dir), 318 # rebase_path(in_file, root_build_dir),
321 # "-o", rebase_path(out_file, root_build_dir), 319 # "-o", rebase_path(out_file, root_build_dir),
322 # ] 320 # ]
323 # 321 #
324 # deps = [ 322 # deps = [
325 # ":sandbox_linux_unittests", 323 # ":sandbox_linux_unittests",
326 # ] 324 # ]
327 #} 325 #}
328
329 # TODO(GYP) convert this. 326 # TODO(GYP) convert this.
330 # { 327 # {
331 # 'target_name': 'sandbox_linux_jni_unittests_apk', 328 # 'target_name': 'sandbox_linux_jni_unittests_apk',
332 # 'type': 'none', 329 # 'type': 'none',
333 # 'variables': { 330 # 'variables': {
334 # 'test_suite_name': 'sandbox_linux_jni_unittests', 331 # 'test_suite_name': 'sandbox_linux_jni_unittests',
335 # }, 332 # },
336 # 'dependencies': [ 333 # 'dependencies': [
337 # 'sandbox_linux_jni_unittests', 334 # 'sandbox_linux_jni_unittests',
338 # ], 335 # ],
339 # 'includes': [ '../../build/apk_test.gypi' ], 336 # 'includes': [ '../../build/apk_test.gypi' ],
340 # } 337 # }
341 } 338 }
OLDNEW
« no previous file with comments | « sandbox/BUILD.gn ('k') | sandbox/mac/BUILD.gn » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698