Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(198)

Side by Side Diff: sandbox/linux/BUILD.gn

Issue 862133002: Update from https://crrev.com/312398 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright 2014 The Chromium Authors. All rights reserved. 1 # Copyright 2014 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/config/features.gni") 5 import("//build/config/features.gni")
6 import("//testing/test.gni")
6 7
7 declare_args() { 8 declare_args() {
8 compile_suid_client = is_linux 9 compile_suid_client = is_linux
9 10
10 compile_credentials = is_linux 11 compile_credentials = is_linux
11 12
12 compile_seccomp_bpf_demo = 13 compile_seccomp_bpf_demo =
13 is_linux && (cpu_arch == "x86" || cpu_arch == "x64") 14 is_linux && (cpu_arch == "x86" || cpu_arch == "x64")
14 } 15 }
15 16
(...skipping 170 matching lines...) Expand 10 before | Expand all | Expand 10 after
186 "seccomp-bpf-helpers/sigsys_handlers.h", 187 "seccomp-bpf-helpers/sigsys_handlers.h",
187 "seccomp-bpf-helpers/syscall_parameters_restrictions.cc", 188 "seccomp-bpf-helpers/syscall_parameters_restrictions.cc",
188 "seccomp-bpf-helpers/syscall_parameters_restrictions.h", 189 "seccomp-bpf-helpers/syscall_parameters_restrictions.h",
189 "seccomp-bpf-helpers/syscall_sets.cc", 190 "seccomp-bpf-helpers/syscall_sets.cc",
190 "seccomp-bpf-helpers/syscall_sets.h", 191 "seccomp-bpf-helpers/syscall_sets.h",
191 ] 192 ]
192 defines = [ "SANDBOX_IMPLEMENTATION" ] 193 defines = [ "SANDBOX_IMPLEMENTATION" ]
193 194
194 deps = [ 195 deps = [
195 "//base", 196 "//base",
197 ":sandbox_services",
196 ":seccomp_bpf", 198 ":seccomp_bpf",
197 ] 199 ]
198 } 200 }
199 201
200 if (is_linux) { 202 if (is_linux) {
201 # The setuid sandbox for Linux. 203 # The setuid sandbox for Linux.
202 executable("chrome_sandbox") { 204 executable("chrome_sandbox") {
203 sources = [ 205 sources = [
204 "suid/common/sandbox.h", 206 "suid/common/sandbox.h",
205 "suid/common/suid_unsafe_environment_variables.h", 207 "suid/common/suid_unsafe_environment_variables.h",
(...skipping 127 matching lines...) Expand 10 before | Expand all | Expand 10 after
333 # 'type': 'none', 335 # 'type': 'none',
334 # 'variables': { 336 # 'variables': {
335 # 'test_suite_name': 'sandbox_linux_jni_unittests', 337 # 'test_suite_name': 'sandbox_linux_jni_unittests',
336 # }, 338 # },
337 # 'dependencies': [ 339 # 'dependencies': [
338 # 'sandbox_linux_jni_unittests', 340 # 'sandbox_linux_jni_unittests',
339 # ], 341 # ],
340 # 'includes': [ '../../build/apk_test.gypi' ], 342 # 'includes': [ '../../build/apk_test.gypi' ],
341 # } 343 # }
342 } 344 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698