Let PDFium handle event when there is not yet a visible page.
[chromium-blink-merge.git] / sandbox / linux / sandbox_linux.gypi
blob4a2b0b0de843dbf528a87955270dfcd075f6b60e
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file.
6   'variables': {
7     'conditions': [
8       ['OS=="linux"', {
9         'compile_suid_client': 1,
10         'compile_credentials': 1,
11       }, {
12         'compile_suid_client': 0,
13         'compile_credentials': 0,
14       }],
15       ['OS=="linux" and (target_arch=="ia32" or target_arch=="x64" or '
16          'target_arch=="mipsel")', {
17         'compile_seccomp_bpf_demo': 1,
18       }, {
19         'compile_seccomp_bpf_demo': 0,
20       }],
21     ],
22   },
23   'target_defaults': {
24     'target_conditions': [
25       # All linux/ files will automatically be excluded on Android
26       # so make sure we re-include them explicitly.
27       ['OS == "android"', {
28         'sources/': [
29           ['include', '^linux/'],
30         ],
31       }],
32     ],
33   },
34   'targets': [
35     # We have two principal targets: sandbox and sandbox_linux_unittests
36     # All other targets are listed as dependencies.
37     # There is one notable exception: for historical reasons, chrome_sandbox is
38     # the setuid sandbox and is its own target.
39     {
40       'target_name': 'sandbox',
41       'type': 'none',
42       'dependencies': [
43         'sandbox_services',
44       ],
45       'conditions': [
46         [ 'compile_suid_client==1', {
47           'dependencies': [
48             'suid_sandbox_client',
49           ],
50         }],
51         # Compile seccomp BPF when we support it.
52         [ 'use_seccomp_bpf==1', {
53           'dependencies': [
54             'seccomp_bpf',
55             'seccomp_bpf_helpers',
56           ],
57         }],
58       ],
59     },
60     {
61       'target_name': 'sandbox_linux_test_utils',
62       'type': 'static_library',
63       'dependencies': [
64         '../testing/gtest.gyp:gtest',
65       ],
66       'include_dirs': [
67         '../..',
68       ],
69       'sources': [
70         'tests/sandbox_test_runner.cc',
71         'tests/sandbox_test_runner.h',
72         'tests/sandbox_test_runner_function_pointer.cc',
73         'tests/sandbox_test_runner_function_pointer.h',
74         'tests/test_utils.cc',
75         'tests/test_utils.h',
76         'tests/unit_tests.cc',
77         'tests/unit_tests.h',
78       ],
79       'conditions': [
80         [ 'use_seccomp_bpf==1', {
81           'sources': [
82             'seccomp-bpf/bpf_tester_compatibility_delegate.h',
83             'seccomp-bpf/bpf_tests.h',
84             'seccomp-bpf/sandbox_bpf_test_runner.cc',
85             'seccomp-bpf/sandbox_bpf_test_runner.h',
86           ],
87           'dependencies': [
88             'seccomp_bpf',
89           ]
90         }],
91       ],
92     },
93     {
94       # The main sandboxing test target.
95       'target_name': 'sandbox_linux_unittests',
96       'includes': [
97         'sandbox_linux_test_sources.gypi',
98       ],
99       'type': 'executable',
100     },
101     {
102       # This target is the shared library used by Android APK (i.e.
103       # JNI-friendly) tests.
104       'target_name': 'sandbox_linux_jni_unittests',
105       'includes': [
106         'sandbox_linux_test_sources.gypi',
107       ],
108       'type': 'shared_library',
109       'conditions': [
110         [ 'OS == "android"', {
111           'dependencies': [
112             '../testing/android/native_test.gyp:native_test_native_code',
113           ],
114         }],
115       ],
116     },
117     {
118       'target_name': 'seccomp_bpf',
119       'type': '<(component)',
120       'sources': [
121         'bpf_dsl/bpf_dsl.cc',
122         'bpf_dsl/bpf_dsl.h',
123         'bpf_dsl/cons.h',
124         'seccomp-bpf/basicblock.cc',
125         'seccomp-bpf/basicblock.h',
126         'seccomp-bpf/codegen.cc',
127         'seccomp-bpf/codegen.h',
128         'seccomp-bpf/die.cc',
129         'seccomp-bpf/die.h',
130         'seccomp-bpf/errorcode.cc',
131         'seccomp-bpf/errorcode.h',
132         'seccomp-bpf/instruction.h',
133         'seccomp-bpf/linux_seccomp.h',
134         'seccomp-bpf/sandbox_bpf.cc',
135         'seccomp-bpf/sandbox_bpf.h',
136         'seccomp-bpf/sandbox_bpf_compatibility_policy.h',
137         'seccomp-bpf/sandbox_bpf_policy.cc',
138         'seccomp-bpf/sandbox_bpf_policy.h',
139         'seccomp-bpf/syscall.cc',
140         'seccomp-bpf/syscall.h',
141         'seccomp-bpf/syscall_iterator.cc',
142         'seccomp-bpf/syscall_iterator.h',
143         'seccomp-bpf/trap.cc',
144         'seccomp-bpf/trap.h',
145         'seccomp-bpf/verifier.cc',
146         'seccomp-bpf/verifier.h',
147       ],
148       'dependencies': [
149         '../base/base.gyp:base',
150         'sandbox_services_headers',
151       ],
152       'defines': [
153         'SANDBOX_IMPLEMENTATION',
154       ],
155       'include_dirs': [
156         '../..',
157       ],
158     },
159     {
160       'target_name': 'seccomp_bpf_helpers',
161       'type': '<(component)',
162       'sources': [
163         'seccomp-bpf-helpers/baseline_policy.cc',
164         'seccomp-bpf-helpers/baseline_policy.h',
165         'seccomp-bpf-helpers/sigsys_handlers.cc',
166         'seccomp-bpf-helpers/sigsys_handlers.h',
167         'seccomp-bpf-helpers/syscall_parameters_restrictions.cc',
168         'seccomp-bpf-helpers/syscall_parameters_restrictions.h',
169         'seccomp-bpf-helpers/syscall_sets.cc',
170         'seccomp-bpf-helpers/syscall_sets.h',
171       ],
172       'dependencies': [
173         '../base/base.gyp:base',
174         'seccomp_bpf',
175       ],
176       'defines': [
177         'SANDBOX_IMPLEMENTATION',
178       ],
179       'include_dirs': [
180         '../..',
181       ],
182     },
183     {
184       # The setuid sandbox, for Linux
185       'target_name': 'chrome_sandbox',
186       'type': 'executable',
187       'sources': [
188         'suid/common/sandbox.h',
189         'suid/common/suid_unsafe_environment_variables.h',
190         'suid/process_util.h',
191         'suid/process_util_linux.c',
192         'suid/sandbox.c',
193       ],
194       'cflags': [
195         # For ULLONG_MAX
196         '-std=gnu99',
197       ],
198       'include_dirs': [
199         '../..',
200       ],
201       # Do not use any sanitizer tools with this binary. http://crbug.com/382766
202       'cflags/': [
203         ['exclude', '-fsanitize'],
204       ],
205       'ldflags/': [
206         ['exclude', '-fsanitize'],
207       ],
208     },
209     { 'target_name': 'sandbox_services',
210       'type': '<(component)',
211       'sources': [
212         'services/broker_process.cc',
213         'services/broker_process.h',
214         'services/init_process_reaper.cc',
215         'services/init_process_reaper.h',
216         'services/scoped_process.cc',
217         'services/scoped_process.h',
218         'services/thread_helpers.cc',
219         'services/thread_helpers.h',
220         'services/yama.h',
221         'services/yama.cc',
222       ],
223       'dependencies': [
224         '../base/base.gyp:base',
225       ],
226       'defines': [
227         'SANDBOX_IMPLEMENTATION',
228       ],
229       'conditions': [
230         ['compile_credentials==1', {
231           'sources': [
232             'services/credentials.cc',
233             'services/credentials.h',
234           ],
235           'dependencies': [
236             # for capabilities.cc.
237             '../build/linux/system.gyp:libcap',
238           ],
239         }],
240       ],
241       'include_dirs': [
242         '..',
243       ],
244     },
245     { 'target_name': 'sandbox_services_headers',
246       'type': 'none',
247       'sources': [
248         'services/android_arm_ucontext.h',
249         'services/android_arm64_ucontext.h',
250         'services/android_futex.h',
251         'services/android_ucontext.h',
252         'services/android_i386_ucontext.h',
253         'services/android_mips_ucontext.h',
254         'services/arm_linux_syscalls.h',
255         'services/arm64_linux_syscalls.h',
256         'services/mips_linux_syscalls.h',
257         'services/linux_syscalls.h',
258         'services/x86_32_linux_syscalls.h',
259         'services/x86_64_linux_syscalls.h',
260       ],
261       'include_dirs': [
262         '..',
263       ],
264     },
265     {
266       # We make this its own target so that it does not interfere
267       # with our tests.
268       'target_name': 'libc_urandom_override',
269       'type': 'static_library',
270       'sources': [
271         'services/libc_urandom_override.cc',
272         'services/libc_urandom_override.h',
273       ],
274       'dependencies': [
275         '../base/base.gyp:base',
276       ],
277       'include_dirs': [
278         '..',
279       ],
280     },
281     {
282       'target_name': 'suid_sandbox_client',
283       'type': '<(component)',
284       'sources': [
285         'suid/common/sandbox.h',
286         'suid/common/suid_unsafe_environment_variables.h',
287         'suid/client/setuid_sandbox_client.cc',
288         'suid/client/setuid_sandbox_client.h',
289       ],
290       'defines': [
291         'SANDBOX_IMPLEMENTATION',
292       ],
293       'dependencies': [
294         '../base/base.gyp:base',
295         'sandbox_services',
296       ],
297       'include_dirs': [
298         '..',
299       ],
300     },
301   ],
302   'conditions': [
303     [ 'OS=="android"', {
304       'targets': [
305         {
306         'target_name': 'sandbox_linux_unittests_stripped',
307         'type': 'none',
308         'dependencies': [ 'sandbox_linux_unittests' ],
309         'actions': [{
310           'action_name': 'strip sandbox_linux_unittests',
311           'inputs': [ '<(PRODUCT_DIR)/sandbox_linux_unittests' ],
312           'outputs': [ '<(PRODUCT_DIR)/sandbox_linux_unittests_stripped' ],
313           'action': [ '<(android_strip)', '<@(_inputs)', '-o', '<@(_outputs)' ],
314           }],
315         }
316       ],
317     }],
318     [ 'OS=="android"', {
319       'targets': [
320         {
321         'target_name': 'sandbox_linux_jni_unittests_apk',
322         'type': 'none',
323         'variables': {
324           'test_suite_name': 'sandbox_linux_jni_unittests',
325         },
326         'dependencies': [
327           'sandbox_linux_jni_unittests',
328         ],
329         'includes': [ '../../build/apk_test.gypi' ],
330         }
331       ],
332     }],
333     ['test_isolation_mode != "noop"', {
334       'targets': [
335         {
336           'target_name': 'sandbox_linux_unittests_run',
337           'type': 'none',
338           'dependencies': [
339             'sandbox_linux_unittests',
340           ],
341           'includes': [
342             '../../build/isolate.gypi',
343             '../sandbox_linux_unittests.isolate',
344           ],
345           'sources': [
346             '../sandbox_linux_unittests.isolate',
347           ],
348         },
349       ],
350     }],
351   ],