Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(248)

Side by Side Diff: sandbox/linux/BUILD.gn

Issue 903273002: Update from https://crrev.com/315085 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/websockets/websocket_end_to_end_test.cc ('k') | sandbox/linux/bpf_dsl/codegen.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright 2014 The Chromium Authors. All rights reserved. 1 # Copyright 2014 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/config/features.gni") 5 import("//build/config/features.gni")
6 import("//testing/test.gni") 6 import("//testing/test.gni")
7 7
8 declare_args() { 8 declare_args() {
9 compile_suid_client = is_linux 9 compile_suid_client = is_linux
10 10
(...skipping 76 matching lines...) Expand 10 before | Expand all | Expand 10 after
87 "//base/test:test_support", 87 "//base/test:test_support",
88 "//testing/gtest", 88 "//testing/gtest",
89 ] 89 ]
90 90
91 if (is_linux) { 91 if (is_linux) {
92 # Don't use this on Android. 92 # Don't use this on Android.
93 libs = [ "rt" ] 93 libs = [ "rt" ]
94 } 94 }
95 95
96 if (compile_suid_client) { 96 if (compile_suid_client) {
97 sources += [ "suid/client/setuid_sandbox_client_unittest.cc" ] 97 sources += [
98 "suid/client/setuid_sandbox_client_unittest.cc",
99 "suid/client/setuid_sandbox_host_unittest.cc",
100 ]
98 } 101 }
99 if (use_seccomp_bpf) { 102 if (use_seccomp_bpf) {
100 sources += [ 103 sources += [
101 "bpf_dsl/bpf_dsl_more_unittest.cc", 104 "bpf_dsl/bpf_dsl_more_unittest.cc",
102 "bpf_dsl/bpf_dsl_unittest.cc", 105 "bpf_dsl/bpf_dsl_unittest.cc",
106 "bpf_dsl/codegen_unittest.cc",
103 "bpf_dsl/cons_unittest.cc", 107 "bpf_dsl/cons_unittest.cc",
108 "bpf_dsl/syscall_set_unittest.cc",
104 "seccomp-bpf-helpers/baseline_policy_unittest.cc", 109 "seccomp-bpf-helpers/baseline_policy_unittest.cc",
105 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc", 110 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc",
106 "seccomp-bpf/bpf_tests_unittest.cc", 111 "seccomp-bpf/bpf_tests_unittest.cc",
107 "seccomp-bpf/codegen_unittest.cc",
108 "seccomp-bpf/errorcode_unittest.cc", 112 "seccomp-bpf/errorcode_unittest.cc",
109 "seccomp-bpf/sandbox_bpf_unittest.cc", 113 "seccomp-bpf/sandbox_bpf_unittest.cc",
110 "seccomp-bpf/syscall_iterator_unittest.cc",
111 "seccomp-bpf/syscall_unittest.cc", 114 "seccomp-bpf/syscall_unittest.cc",
112 ] 115 ]
113 } 116 }
114 if (compile_credentials) { 117 if (compile_credentials) {
115 sources += [ 118 sources += [
116 "services/credentials_unittest.cc", 119 "services/credentials_unittest.cc",
117 "services/namespace_sandbox_unittest.cc", 120 "services/namespace_sandbox_unittest.cc",
118 "services/namespace_utils_unittest.cc", 121 "services/namespace_utils_unittest.cc",
119 "services/proc_util_unittest.cc", 122 "services/proc_util_unittest.cc",
120 "services/unix_domain_socket_unittest.cc", 123 "services/unix_domain_socket_unittest.cc",
(...skipping 18 matching lines...) Expand all
139 # }], 142 # }],
140 # ], 143 # ],
141 # }, 144 # },
142 145
143 component("seccomp_bpf") { 146 component("seccomp_bpf") {
144 sources = [ 147 sources = [
145 "bpf_dsl/bpf_dsl.cc", 148 "bpf_dsl/bpf_dsl.cc",
146 "bpf_dsl/bpf_dsl.h", 149 "bpf_dsl/bpf_dsl.h",
147 "bpf_dsl/bpf_dsl_forward.h", 150 "bpf_dsl/bpf_dsl_forward.h",
148 "bpf_dsl/bpf_dsl_impl.h", 151 "bpf_dsl/bpf_dsl_impl.h",
152 "bpf_dsl/codegen.cc",
153 "bpf_dsl/codegen.h",
149 "bpf_dsl/cons.h", 154 "bpf_dsl/cons.h",
150 "bpf_dsl/dump_bpf.cc", 155 "bpf_dsl/dump_bpf.cc",
151 "bpf_dsl/dump_bpf.h", 156 "bpf_dsl/dump_bpf.h",
152 "bpf_dsl/policy.cc", 157 "bpf_dsl/policy.cc",
153 "bpf_dsl/policy.h", 158 "bpf_dsl/policy.h",
154 "bpf_dsl/policy_compiler.cc", 159 "bpf_dsl/policy_compiler.cc",
155 "bpf_dsl/policy_compiler.h", 160 "bpf_dsl/policy_compiler.h",
161 "bpf_dsl/syscall_set.cc",
162 "bpf_dsl/syscall_set.h",
156 "bpf_dsl/trap_registry.h", 163 "bpf_dsl/trap_registry.h",
157 "seccomp-bpf/codegen.cc",
158 "seccomp-bpf/codegen.h",
159 "seccomp-bpf/die.cc", 164 "seccomp-bpf/die.cc",
160 "seccomp-bpf/die.h", 165 "seccomp-bpf/die.h",
161 "seccomp-bpf/errorcode.cc", 166 "seccomp-bpf/errorcode.cc",
162 "seccomp-bpf/errorcode.h", 167 "seccomp-bpf/errorcode.h",
163 "seccomp-bpf/linux_seccomp.h", 168 "seccomp-bpf/linux_seccomp.h",
164 "seccomp-bpf/sandbox_bpf.cc", 169 "seccomp-bpf/sandbox_bpf.cc",
165 "seccomp-bpf/sandbox_bpf.h", 170 "seccomp-bpf/sandbox_bpf.h",
166 "seccomp-bpf/syscall.cc", 171 "seccomp-bpf/syscall.cc",
167 "seccomp-bpf/syscall.h", 172 "seccomp-bpf/syscall.h",
168 "seccomp-bpf/syscall_iterator.cc",
169 "seccomp-bpf/syscall_iterator.h",
170 "seccomp-bpf/trap.cc", 173 "seccomp-bpf/trap.cc",
171 "seccomp-bpf/trap.h", 174 "seccomp-bpf/trap.h",
172 "seccomp-bpf/verifier.cc", 175 "seccomp-bpf/verifier.cc",
173 "seccomp-bpf/verifier.h", 176 "seccomp-bpf/verifier.h",
174 ] 177 ]
175 defines = [ "SANDBOX_IMPLEMENTATION" ] 178 defines = [ "SANDBOX_IMPLEMENTATION" ]
176 179
177 deps = [ 180 deps = [
178 ":sandbox_services", 181 ":sandbox_services",
179 ":sandbox_services_headers", 182 ":sandbox_services_headers",
(...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after
299 ] 302 ]
300 } 303 }
301 304
302 if (compile_suid_client) { 305 if (compile_suid_client) {
303 component("suid_sandbox_client") { 306 component("suid_sandbox_client") {
304 sources = [ 307 sources = [
305 "suid/common/sandbox.h", 308 "suid/common/sandbox.h",
306 "suid/common/suid_unsafe_environment_variables.h", 309 "suid/common/suid_unsafe_environment_variables.h",
307 "suid/client/setuid_sandbox_client.cc", 310 "suid/client/setuid_sandbox_client.cc",
308 "suid/client/setuid_sandbox_client.h", 311 "suid/client/setuid_sandbox_client.h",
312 "suid/client/setuid_sandbox_host.cc",
313 "suid/client/setuid_sandbox_host.h",
309 ] 314 ]
310 defines = [ "SANDBOX_IMPLEMENTATION" ] 315 defines = [ "SANDBOX_IMPLEMENTATION" ]
311 316
312 deps = [ 317 deps = [
313 ":sandbox_services", 318 ":sandbox_services",
314 "//base", 319 "//base",
315 ] 320 ]
316 } 321 }
317 } 322 }
318 323
(...skipping 22 matching lines...) Expand all
341 # 'type': 'none', 346 # 'type': 'none',
342 # 'variables': { 347 # 'variables': {
343 # 'test_suite_name': 'sandbox_linux_jni_unittests', 348 # 'test_suite_name': 'sandbox_linux_jni_unittests',
344 # }, 349 # },
345 # 'dependencies': [ 350 # 'dependencies': [
346 # 'sandbox_linux_jni_unittests', 351 # 'sandbox_linux_jni_unittests',
347 # ], 352 # ],
348 # 'includes': [ '../../build/apk_test.gypi' ], 353 # 'includes': [ '../../build/apk_test.gypi' ],
349 # } 354 # }
350 } 355 }
OLDNEW
« no previous file with comments | « net/websockets/websocket_end_to_end_test.cc ('k') | sandbox/linux/bpf_dsl/codegen.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698