summaryrefslogtreecommitdiffstats
path: root/sandbox/src
diff options
context:
space:
mode:
authorsgk@google.com <sgk@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2009-04-01 22:05:12 +0000
committersgk@google.com <sgk@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2009-04-01 22:05:12 +0000
commit0fad1f1a74408b939d1b09dcc2f9391544e7e692 (patch)
treec62164260c26f143c9ae43c32694142a725bc7eb /sandbox/src
parenta9b826af8ef183810c176b9ede4a2934f4678d50 (diff)
downloadchromium_src-0fad1f1a74408b939d1b09dcc2f9391544e7e692.zip
chromium_src-0fad1f1a74408b939d1b09dcc2f9391544e7e692.tar.gz
chromium_src-0fad1f1a74408b939d1b09dcc2f9391544e7e692.tar.bz2
Remove the checked-in scons configuration files.
Review URL: http://codereview.chromium.org/53121 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@12982 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/src')
-rw-r--r--sandbox/src/sandbox_lib.scons84
1 files changed, 0 insertions, 84 deletions
diff --git a/sandbox/src/sandbox_lib.scons b/sandbox/src/sandbox_lib.scons
deleted file mode 100644
index 8667968..0000000
--- a/sandbox/src/sandbox_lib.scons
+++ /dev/null
@@ -1,84 +0,0 @@
-# Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
-# Use of this source code is governed by a BSD-style license that can be
-# found in the LICENSE file.
-
-Import('env')
-
-env = env.Clone()
-
-env.ApplySConscript([
- '$GTEST_DIR/../using_gtest.scons',
-])
-
-if env.Bit('windows'):
- env.Append(
- CCFLAGS = [
- '/WX', # treat warnings as errors
- ],
- )
-
-input_files = [
- 'Wow64.cc',
- 'acl.cc',
- 'broker_services.cc',
- 'crosscall_server.cc',
- 'dep.cc',
- 'eat_resolver.cc',
- 'filesystem_dispatcher.cc',
- 'filesystem_interception.cc',
- 'filesystem_policy.cc',
- 'interception.cc',
- 'interception_agent.cc',
- 'job.cc',
- 'named_pipe_dispatcher.cc',
- 'named_pipe_interception.cc',
- 'named_pipe_policy.cc',
- 'pe_image.cc',
- 'policy_broker.cc',
- 'policy_engine_opcodes.cc',
- 'policy_engine_processor.cc',
- 'policy_low_level.cc',
- 'policy_target.cc',
- 'process_thread_dispatcher.cc',
- 'process_thread_interception.cc',
- 'process_thread_policy.cc',
- 'registry_dispatcher.cc',
- 'registry_interception.cc',
- 'registry_policy.cc',
- 'resolver.cc',
- 'restricted_token.cc',
- 'restricted_token_utils.cc',
- 'sandbox.cc',
- 'sandbox_nt_util.cc',
- 'sandbox_policy_base.cc',
- 'sandbox_utils.cc',
- 'service_resolver.cc',
- 'shared_handles.cc',
- 'sharedmem_ipc_client.cc',
- 'sharedmem_ipc_server.cc',
- 'sid.cc',
- 'sidestep/ia32_modrm_map.cpp',
- 'sidestep/ia32_opcode_map.cpp',
- 'sidestep/mini_disassembler.cpp',
- 'sidestep/preamble_patcher_with_stub.cpp',
- 'sidestep_resolver.cc',
- 'sync_dispatcher.cc',
- 'sync_interception.cc',
- 'sync_policy.cc',
- 'target_interceptions.cc',
- 'target_process.cc',
- 'target_services.cc',
- 'win2k_threadpool.cc',
- 'win_utils.cc',
-]
-
-# TODO(bradnelson): This step generates sandbox.pch.ib_tag
-# SCons doesn't know.
-env_p = env.Clone()
-env_p.Append(CCFLAGS='/Ylsandbox')
-pch, obj = env_p.PCH(['sandbox.pch', 'stdafx.obj'], 'stdafx.cc')
-env['PCH'] = pch
-env['PCHSTOP'] = 'stdafx.h'
-env.Append(CCPCHFLAGS = ['/FIstdafx.h'])
-
-env.ChromeLibrary('sandbox', input_files + [obj])