Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2)

Side by Side Diff: sandbox/linux/BUILD.gn

Issue 761903003: Update from https://crrev.com/306655 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/websockets/websocket_basic_handshake_stream.cc ('k') | sandbox/linux/bpf_dsl/bpf_dsl.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright 2014 The Chromium Authors. All rights reserved. 1 # Copyright 2014 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/config/features.gni") 5 import("//build/config/features.gni")
6 6
7 declare_args() { 7 declare_args() {
8 compile_suid_client = is_linux 8 compile_suid_client = is_linux
9 9
10 compile_credentials = is_linux 10 compile_credentials = is_linux
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after
64 } 64 }
65 } 65 }
66 66
67 # The main sandboxing test target. 67 # The main sandboxing test target.
68 test("sandbox_linux_unittests") { 68 test("sandbox_linux_unittests") {
69 sources = [ 69 sources = [
70 "services/scoped_process_unittest.cc", 70 "services/scoped_process_unittest.cc",
71 "services/syscall_wrappers_unittest.cc", 71 "services/syscall_wrappers_unittest.cc",
72 "services/thread_helpers_unittests.cc", 72 "services/thread_helpers_unittests.cc",
73 "services/yama_unittests.cc", 73 "services/yama_unittests.cc",
74 "syscall_broker/broker_file_permission_unittest.cc",
74 "syscall_broker/broker_process_unittest.cc", 75 "syscall_broker/broker_process_unittest.cc",
75 "tests/main.cc", 76 "tests/main.cc",
76 "tests/scoped_temporary_file.cc", 77 "tests/scoped_temporary_file.cc",
77 "tests/scoped_temporary_file.h", 78 "tests/scoped_temporary_file.h",
78 "tests/scoped_temporary_file_unittest.cc", 79 "tests/scoped_temporary_file_unittest.cc",
79 "tests/test_utils_unittest.cc", 80 "tests/test_utils_unittest.cc",
80 "tests/unit_tests_unittest.cc", 81 "tests/unit_tests_unittest.cc",
81 ] 82 ]
82 83
83 deps = [ 84 deps = [
(...skipping 17 matching lines...) Expand all
101 if (use_seccomp_bpf) { 102 if (use_seccomp_bpf) {
102 sources += [ 103 sources += [
103 "bpf_dsl/bpf_dsl_more_unittest.cc", 104 "bpf_dsl/bpf_dsl_more_unittest.cc",
104 "bpf_dsl/bpf_dsl_unittest.cc", 105 "bpf_dsl/bpf_dsl_unittest.cc",
105 "bpf_dsl/cons_unittest.cc", 106 "bpf_dsl/cons_unittest.cc",
106 "seccomp-bpf-helpers/baseline_policy_unittest.cc", 107 "seccomp-bpf-helpers/baseline_policy_unittest.cc",
107 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc", 108 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc",
108 "seccomp-bpf/bpf_tests_unittest.cc", 109 "seccomp-bpf/bpf_tests_unittest.cc",
109 "seccomp-bpf/codegen_unittest.cc", 110 "seccomp-bpf/codegen_unittest.cc",
110 "seccomp-bpf/errorcode_unittest.cc", 111 "seccomp-bpf/errorcode_unittest.cc",
112 "seccomp-bpf/sandbox_bpf_unittest.cc",
111 "seccomp-bpf/syscall_iterator_unittest.cc", 113 "seccomp-bpf/syscall_iterator_unittest.cc",
112 "seccomp-bpf/syscall_unittest.cc", 114 "seccomp-bpf/syscall_unittest.cc",
113 ] 115 ]
114 } 116 }
115 if (compile_credentials) { 117 if (compile_credentials) {
116 sources += [ 118 sources += [
117 "services/credentials_unittest.cc", 119 "services/credentials_unittest.cc",
120 "services/proc_util_unittest.cc",
118 "services/unix_domain_socket_unittest.cc", 121 "services/unix_domain_socket_unittest.cc",
119 ] 122 ]
120 } 123 }
121 } 124 }
122 125
123 # TODO(GYP) Android version of this test. 126 # TODO(GYP) Android version of this test.
124 # { 127 # {
125 # # This target is the shared library used by Android APK (i.e. 128 # # This target is the shared library used by Android APK (i.e.
126 # # JNI-friendly) tests. 129 # # JNI-friendly) tests.
127 # "target_name": "sandbox_linux_jni_unittests", 130 # "target_name": "sandbox_linux_jni_unittests",
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after
166 "seccomp-bpf/syscall_iterator.cc", 169 "seccomp-bpf/syscall_iterator.cc",
167 "seccomp-bpf/syscall_iterator.h", 170 "seccomp-bpf/syscall_iterator.h",
168 "seccomp-bpf/trap.cc", 171 "seccomp-bpf/trap.cc",
169 "seccomp-bpf/trap.h", 172 "seccomp-bpf/trap.h",
170 "seccomp-bpf/verifier.cc", 173 "seccomp-bpf/verifier.cc",
171 "seccomp-bpf/verifier.h", 174 "seccomp-bpf/verifier.h",
172 ] 175 ]
173 defines = [ "SANDBOX_IMPLEMENTATION" ] 176 defines = [ "SANDBOX_IMPLEMENTATION" ]
174 177
175 deps = [ 178 deps = [
179 ":sandbox_services",
176 ":sandbox_services_headers", 180 ":sandbox_services_headers",
177 "//base", 181 "//base",
178 ] 182 ]
179 } 183 }
180 184
181 component("seccomp_bpf_helpers") { 185 component("seccomp_bpf_helpers") {
182 sources = [ 186 sources = [
183 "seccomp-bpf-helpers/baseline_policy.cc", 187 "seccomp-bpf-helpers/baseline_policy.cc",
184 "seccomp-bpf-helpers/baseline_policy.h", 188 "seccomp-bpf-helpers/baseline_policy.h",
185 "seccomp-bpf-helpers/sigsys_handlers.cc", 189 "seccomp-bpf-helpers/sigsys_handlers.cc",
(...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after
228 "services/syscall_wrappers.h", 232 "services/syscall_wrappers.h",
229 "services/thread_helpers.cc", 233 "services/thread_helpers.cc",
230 "services/thread_helpers.h", 234 "services/thread_helpers.h",
231 "services/yama.h", 235 "services/yama.h",
232 "services/yama.cc", 236 "services/yama.cc",
233 "syscall_broker/broker_channel.cc", 237 "syscall_broker/broker_channel.cc",
234 "syscall_broker/broker_channel.h", 238 "syscall_broker/broker_channel.h",
235 "syscall_broker/broker_client.cc", 239 "syscall_broker/broker_client.cc",
236 "syscall_broker/broker_client.h", 240 "syscall_broker/broker_client.h",
237 "syscall_broker/broker_common.h", 241 "syscall_broker/broker_common.h",
242 "syscall_broker/broker_file_permission.cc",
243 "syscall_broker/broker_file_permission.h",
238 "syscall_broker/broker_host.cc", 244 "syscall_broker/broker_host.cc",
239 "syscall_broker/broker_host.h", 245 "syscall_broker/broker_host.h",
240 "syscall_broker/broker_policy.cc", 246 "syscall_broker/broker_policy.cc",
241 "syscall_broker/broker_policy.h", 247 "syscall_broker/broker_policy.h",
242 "syscall_broker/broker_process.cc", 248 "syscall_broker/broker_process.cc",
243 "syscall_broker/broker_process.h", 249 "syscall_broker/broker_process.h",
244 ] 250 ]
245 251
246 defines = [ "SANDBOX_IMPLEMENTATION" ] 252 defines = [ "SANDBOX_IMPLEMENTATION" ]
247 253
248 if (compile_credentials) { 254 if (compile_credentials) {
249 sources += [ 255 sources += [
250 "services/credentials.cc", 256 "services/credentials.cc",
251 "services/credentials.h", 257 "services/credentials.h",
258 "services/proc_util.cc",
259 "services/proc_util.h",
252 ] 260 ]
253 # For capabilities.cc. 261 # For capabilities.cc.
254 configs += [ "//build/config/linux:libcap" ] 262 configs += [ "//build/config/linux:libcap" ]
255 } 263 }
256 264
257 deps = [ 265 deps = [
258 "//base", 266 "//base",
259 ] 267 ]
260 } 268 }
261 269
(...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after
328 # 'type': 'none', 336 # 'type': 'none',
329 # 'variables': { 337 # 'variables': {
330 # 'test_suite_name': 'sandbox_linux_jni_unittests', 338 # 'test_suite_name': 'sandbox_linux_jni_unittests',
331 # }, 339 # },
332 # 'dependencies': [ 340 # 'dependencies': [
333 # 'sandbox_linux_jni_unittests', 341 # 'sandbox_linux_jni_unittests',
334 # ], 342 # ],
335 # 'includes': [ '../../build/apk_test.gypi' ], 343 # 'includes': [ '../../build/apk_test.gypi' ],
336 # } 344 # }
337 } 345 }
OLDNEW
« no previous file with comments | « net/websockets/websocket_basic_handshake_stream.cc ('k') | sandbox/linux/bpf_dsl/bpf_dsl.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698