1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file.
9 'compile_suid_client': 1,
10 'compile_credentials': 1,
12 'compile_suid_client': 0,
13 'compile_credentials': 0,
15 ['OS=="linux" and (target_arch=="ia32" or target_arch=="x64" or '
16 'target_arch=="mipsel")', {
17 'compile_seccomp_bpf_demo': 1,
19 'compile_seccomp_bpf_demo': 0,
24 'target_conditions': [
25 # All linux/ files will automatically be excluded on Android
26 # so make sure we re-include them explicitly.
29 ['include', '^linux/'],
35 # We have two principal targets: sandbox and sandbox_linux_unittests
36 # All other targets are listed as dependencies.
37 # There is one notable exception: for historical reasons, chrome_sandbox is
38 # the setuid sandbox and is its own target.
40 'target_name': 'sandbox',
46 [ 'compile_suid_client==1', {
48 'suid_sandbox_client',
51 # Compile seccomp BPF when we support it.
52 [ 'use_seccomp_bpf==1', {
55 'seccomp_bpf_helpers',
61 'target_name': 'sandbox_linux_test_utils',
62 'type': 'static_library',
64 '../testing/gtest.gyp:gtest',
70 'tests/sandbox_test_runner.cc',
71 'tests/sandbox_test_runner.h',
72 'tests/sandbox_test_runner_function_pointer.cc',
73 'tests/sandbox_test_runner_function_pointer.h',
74 'tests/test_utils.cc',
76 'tests/unit_tests.cc',
80 [ 'use_seccomp_bpf==1', {
82 'seccomp-bpf/bpf_tester_compatibility_delegate.h',
83 'seccomp-bpf/bpf_tests.h',
84 'seccomp-bpf/sandbox_bpf_test_runner.cc',
85 'seccomp-bpf/sandbox_bpf_test_runner.h',
94 # The main sandboxing test target.
95 'target_name': 'sandbox_linux_unittests',
97 'sandbox_linux_test_sources.gypi',
102 # This target is the shared library used by Android APK (i.e.
103 # JNI-friendly) tests.
104 'target_name': 'sandbox_linux_jni_unittests',
106 'sandbox_linux_test_sources.gypi',
108 'type': 'shared_library',
110 [ 'OS == "android"', {
112 '../testing/android/native_test.gyp:native_test_native_code',
118 'target_name': 'seccomp_bpf',
119 'type': '<(component)',
121 'bpf_dsl/bpf_dsl.cc',
123 'bpf_dsl/bpf_dsl_forward.h',
124 'bpf_dsl/bpf_dsl_impl.h',
126 'bpf_dsl/dump_bpf.cc',
127 'bpf_dsl/dump_bpf.h',
130 'bpf_dsl/policy_compiler.cc',
131 'bpf_dsl/policy_compiler.h',
132 'bpf_dsl/trap_registry.h',
133 'seccomp-bpf/codegen.cc',
134 'seccomp-bpf/codegen.h',
135 'seccomp-bpf/die.cc',
137 'seccomp-bpf/errorcode.cc',
138 'seccomp-bpf/errorcode.h',
139 'seccomp-bpf/linux_seccomp.h',
140 'seccomp-bpf/sandbox_bpf.cc',
141 'seccomp-bpf/sandbox_bpf.h',
142 'seccomp-bpf/syscall.cc',
143 'seccomp-bpf/syscall.h',
144 'seccomp-bpf/syscall_iterator.cc',
145 'seccomp-bpf/syscall_iterator.h',
146 'seccomp-bpf/trap.cc',
147 'seccomp-bpf/trap.h',
148 'seccomp-bpf/verifier.cc',
149 'seccomp-bpf/verifier.h',
152 '../base/base.gyp:base',
154 'sandbox_services_headers',
157 'SANDBOX_IMPLEMENTATION',
160 # Disable LTO due to compiler bug
161 # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703
162 '../../build/android/disable_lto.gypi',
169 'target_name': 'seccomp_bpf_helpers',
170 'type': '<(component)',
172 'seccomp-bpf-helpers/baseline_policy.cc',
173 'seccomp-bpf-helpers/baseline_policy.h',
174 'seccomp-bpf-helpers/sigsys_handlers.cc',
175 'seccomp-bpf-helpers/sigsys_handlers.h',
176 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc',
177 'seccomp-bpf-helpers/syscall_parameters_restrictions.h',
178 'seccomp-bpf-helpers/syscall_sets.cc',
179 'seccomp-bpf-helpers/syscall_sets.h',
182 '../base/base.gyp:base',
187 'SANDBOX_IMPLEMENTATION',
194 # The setuid sandbox, for Linux
195 'target_name': 'chrome_sandbox',
196 'type': 'executable',
198 'suid/common/sandbox.h',
199 'suid/common/suid_unsafe_environment_variables.h',
200 'suid/process_util.h',
201 'suid/process_util_linux.c',
211 # Do not use any sanitizer tools with this binary. http://crbug.com/382766
213 ['exclude', '-fsanitize'],
216 ['exclude', '-fsanitize'],
219 { 'target_name': 'sandbox_services',
220 'type': '<(component)',
222 'services/init_process_reaper.cc',
223 'services/init_process_reaper.h',
224 'services/scoped_process.cc',
225 'services/scoped_process.h',
226 'services/syscall_wrappers.cc',
227 'services/syscall_wrappers.h',
228 'services/thread_helpers.cc',
229 'services/thread_helpers.h',
232 'syscall_broker/broker_channel.cc',
233 'syscall_broker/broker_channel.h',
234 'syscall_broker/broker_client.cc',
235 'syscall_broker/broker_client.h',
236 'syscall_broker/broker_common.h',
237 'syscall_broker/broker_file_permission.cc',
238 'syscall_broker/broker_file_permission.h',
239 'syscall_broker/broker_host.cc',
240 'syscall_broker/broker_host.h',
241 'syscall_broker/broker_policy.cc',
242 'syscall_broker/broker_policy.h',
243 'syscall_broker/broker_process.cc',
244 'syscall_broker/broker_process.h',
247 '../base/base.gyp:base',
250 'SANDBOX_IMPLEMENTATION',
253 ['compile_credentials==1', {
255 'services/credentials.cc',
256 'services/credentials.h',
257 'services/proc_util.cc',
258 'services/proc_util.h',
261 # for capabilities.cc.
262 '../build/linux/system.gyp:libcap',
270 { 'target_name': 'sandbox_services_headers',
273 'services/android_arm_ucontext.h',
274 'services/android_arm64_ucontext.h',
275 'services/android_futex.h',
276 'services/android_ucontext.h',
277 'services/android_i386_ucontext.h',
278 'services/android_mips_ucontext.h',
279 'services/arm_linux_syscalls.h',
280 'services/arm64_linux_syscalls.h',
281 'services/mips_linux_syscalls.h',
282 'services/linux_syscalls.h',
283 'services/x86_32_linux_syscalls.h',
284 'services/x86_64_linux_syscalls.h',
291 # We make this its own target so that it does not interfere
293 'target_name': 'libc_urandom_override',
294 'type': 'static_library',
296 'services/libc_urandom_override.cc',
297 'services/libc_urandom_override.h',
300 '../base/base.gyp:base',
307 'target_name': 'suid_sandbox_client',
308 'type': '<(component)',
310 'suid/common/sandbox.h',
311 'suid/common/suid_unsafe_environment_variables.h',
312 'suid/client/setuid_sandbox_client.cc',
313 'suid/client/setuid_sandbox_client.h',
316 'SANDBOX_IMPLEMENTATION',
319 '../base/base.gyp:base',
331 'target_name': 'sandbox_linux_unittests_stripped',
333 'dependencies': [ 'sandbox_linux_unittests' ],
335 'action_name': 'strip sandbox_linux_unittests',
336 'inputs': [ '<(PRODUCT_DIR)/sandbox_linux_unittests' ],
337 'outputs': [ '<(PRODUCT_DIR)/sandbox_linux_unittests_stripped' ],
338 'action': [ '<(android_strip)', '<@(_inputs)', '-o', '<@(_outputs)' ],
342 'target_name': 'sandbox_linux_unittests_deps',
345 'sandbox_linux_unittests_stripped',
347 # For the component build, ensure dependent shared libraries are
348 # stripped and put alongside sandbox_linux_unittests to simplify pushing
351 'output_dir': '<(PRODUCT_DIR)/sandbox_linux_unittests_deps/',
352 'native_binary': '<(PRODUCT_DIR)/sandbox_linux_unittests_stripped',
353 'include_main_binary': 0,
356 '../../build/android/native_app_dependencies.gypi'
363 'target_name': 'sandbox_linux_jni_unittests_apk',
366 'test_suite_name': 'sandbox_linux_jni_unittests',
369 'sandbox_linux_jni_unittests',
371 'includes': [ '../../build/apk_test.gypi' ],
375 ['test_isolation_mode != "noop"', {
378 'target_name': 'sandbox_linux_unittests_run',
381 'sandbox_linux_unittests',
384 '../../build/isolate.gypi',
387 '../sandbox_linux_unittests.isolate',