diff options
author | rsesek@chromium.org <rsesek@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-05-12 19:59:16 +0000 |
---|---|---|
committer | rsesek@chromium.org <rsesek@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-05-12 19:59:16 +0000 |
commit | 31acf3ef2427841346b3e84546e31e909062d511 (patch) | |
tree | 4f4bb5d65b6305a29ca9076a6cde0b968c966f7a /sandbox | |
parent | ad9e06b6dd783729032746cfc3c914b2fcff551b (diff) | |
download | chromium_src-31acf3ef2427841346b3e84546e31e909062d511.zip chromium_src-31acf3ef2427841346b3e84546e31e909062d511.tar.gz chromium_src-31acf3ef2427841346b3e84546e31e909062d511.tar.bz2 |
Move sanbox_export.h to //sandbox from //sandbox/linux and split root OWNERS file.
BUG=none
R=jln@chromium.org, jschuh@chromium.org
Review URL: https://codereview.chromium.org/273423007
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@269852 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox')
20 files changed, 34 insertions, 22 deletions
diff --git a/sandbox/linux/DEPS b/sandbox/linux/DEPS index 5c5f476..3912859 100644 --- a/sandbox/linux/DEPS +++ b/sandbox/linux/DEPS @@ -19,7 +19,7 @@ include_rules = [ "+base", "+build", "+testing", - "+sandbox/linux/sandbox_export.h", + "+sandbox/sandbox_export.h", # Everyone can use tests/ "+sandbox/linux/tests", ] diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h index fe7c5dc..edf4c77 100644 --- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h +++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h @@ -5,9 +5,9 @@ #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_BASELINE_POLICY_H_ #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_BASELINE_POLICY_H_ -#include "sandbox/linux/sandbox_export.h" #include "sandbox/linux/seccomp-bpf/errorcode.h" #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h b/sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h index fdfbb66..dde27ec 100644 --- a/sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h +++ b/sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h @@ -7,7 +7,7 @@ #include "base/basictypes.h" #include "build/build_config.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" // The handlers are suitable for use in Trap() error codes. They are // guaranteed to be async-signal safe. diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h index 5283b49..f348bb5 100644 --- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h +++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h @@ -8,7 +8,7 @@ #include <unistd.h> #include "build/build_config.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" // These are helpers to build seccomp-bpf policies, i.e. policies for a // sandbox that reduces the Linux kernel's attack surface. They return an diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h b/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h index dc92681..173d4db 100644 --- a/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h +++ b/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h @@ -7,7 +7,7 @@ #include "base/basictypes.h" #include "build/build_config.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" // These are helpers to build seccomp-bpf policies, i.e. policies for a // sandbox that reduces the Linux kernel's attack surface. Given their diff --git a/sandbox/linux/seccomp-bpf/codegen.h b/sandbox/linux/seccomp-bpf/codegen.h index ad28978..1c4cd46 100644 --- a/sandbox/linux/seccomp-bpf/codegen.h +++ b/sandbox/linux/seccomp-bpf/codegen.h @@ -9,10 +9,10 @@ #include <set> #include <vector> -#include "sandbox/linux/sandbox_export.h" #include "sandbox/linux/seccomp-bpf/basicblock.h" #include "sandbox/linux/seccomp-bpf/instruction.h" #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/seccomp-bpf/die.h b/sandbox/linux/seccomp-bpf/die.h index 2708a12..3ac31cc 100644 --- a/sandbox/linux/seccomp-bpf/die.h +++ b/sandbox/linux/seccomp-bpf/die.h @@ -6,7 +6,7 @@ #define SANDBOX_LINUX_SECCOMP_BPF_DIE_H__ #include "base/basictypes.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/seccomp-bpf/errorcode.h b/sandbox/linux/seccomp-bpf/errorcode.h index 7a21f3f..04f22ae 100644 --- a/sandbox/linux/seccomp-bpf/errorcode.h +++ b/sandbox/linux/seccomp-bpf/errorcode.h @@ -5,9 +5,9 @@ #ifndef SANDBOX_LINUX_SECCOMP_BPF_ERRORCODE_H__ #define SANDBOX_LINUX_SECCOMP_BPF_ERRORCODE_H__ -#include "sandbox/linux/sandbox_export.h" #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" #include "sandbox/linux/seccomp-bpf/trap.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.h b/sandbox/linux/seccomp-bpf/sandbox_bpf.h index 2391c5d..923a9f3 100644 --- a/sandbox/linux/seccomp-bpf/sandbox_bpf.h +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.h @@ -18,10 +18,10 @@ #include "base/compiler_specific.h" #include "base/memory/scoped_ptr.h" -#include "sandbox/linux/sandbox_export.h" #include "sandbox/linux/seccomp-bpf/die.h" #include "sandbox/linux/seccomp-bpf/errorcode.h" #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/seccomp-bpf/syscall.h b/sandbox/linux/seccomp-bpf/syscall.h index 95647ed..f444d3a 100644 --- a/sandbox/linux/seccomp-bpf/syscall.h +++ b/sandbox/linux/seccomp-bpf/syscall.h @@ -7,7 +7,7 @@ #include <stdint.h> -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/seccomp-bpf/syscall_iterator.h b/sandbox/linux/seccomp-bpf/syscall_iterator.h index ea4273f..7842b2a 100644 --- a/sandbox/linux/seccomp-bpf/syscall_iterator.h +++ b/sandbox/linux/seccomp-bpf/syscall_iterator.h @@ -8,7 +8,7 @@ #include <stdint.h> #include "base/basictypes.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/seccomp-bpf/trap.h b/sandbox/linux/seccomp-bpf/trap.h index 4438d67..f6a09c0 100644 --- a/sandbox/linux/seccomp-bpf/trap.h +++ b/sandbox/linux/seccomp-bpf/trap.h @@ -12,7 +12,7 @@ #include <vector> #include "base/basictypes.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/services/broker_process.h b/sandbox/linux/services/broker_process.h index 6645deb..ddde42e 100644 --- a/sandbox/linux/services/broker_process.h +++ b/sandbox/linux/services/broker_process.h @@ -12,7 +12,7 @@ #include "base/callback_forward.h" #include "base/pickle.h" #include "base/process/process.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/services/credentials.h b/sandbox/linux/services/credentials.h index 75eb5c4..56ff115 100644 --- a/sandbox/linux/services/credentials.h +++ b/sandbox/linux/services/credentials.h @@ -15,7 +15,7 @@ #include "base/basictypes.h" #include "base/memory/scoped_ptr.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/services/init_process_reaper.h b/sandbox/linux/services/init_process_reaper.h index 7c9eab4..840f6fc 100644 --- a/sandbox/linux/services/init_process_reaper.h +++ b/sandbox/linux/services/init_process_reaper.h @@ -6,7 +6,7 @@ #define SANDBOX_LINUX_SERVICES_INIT_PROCESS_REAPER_H_ #include "base/callback_forward.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/services/scoped_process.h b/sandbox/linux/services/scoped_process.h index 61da80a..a28131e 100644 --- a/sandbox/linux/services/scoped_process.h +++ b/sandbox/linux/services/scoped_process.h @@ -8,7 +8,7 @@ #include "base/basictypes.h" #include "base/callback_forward.h" #include "base/process/process_handle.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/services/thread_helpers.h b/sandbox/linux/services/thread_helpers.h index d3ae038..377742a 100644 --- a/sandbox/linux/services/thread_helpers.h +++ b/sandbox/linux/services/thread_helpers.h @@ -6,7 +6,7 @@ #define SANDBOX_LINUX_SERVICES_THREAD_HELPERS_H_ #include "base/basictypes.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace base { class Thread; } diff --git a/sandbox/linux/services/yama.h b/sandbox/linux/services/yama.h index 8677c2f..20c28ba 100644 --- a/sandbox/linux/services/yama.h +++ b/sandbox/linux/services/yama.h @@ -7,7 +7,7 @@ #include "base/basictypes.h" #include "base/process/process_handle.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.h b/sandbox/linux/suid/client/setuid_sandbox_client.h index 2bbad7a..c69a5c3 100644 --- a/sandbox/linux/suid/client/setuid_sandbox_client.h +++ b/sandbox/linux/suid/client/setuid_sandbox_client.h @@ -10,7 +10,7 @@ #include "base/files/file_path.h" #include "base/files/scoped_file.h" #include "base/process/launch.h" -#include "sandbox/linux/sandbox_export.h" +#include "sandbox/sandbox_export.h" namespace sandbox { diff --git a/sandbox/linux/sandbox_export.h b/sandbox/sandbox_export.h index 546de90..0b77303 100644 --- a/sandbox/linux/sandbox_export.h +++ b/sandbox/sandbox_export.h @@ -2,10 +2,19 @@ // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. -#ifndef SANDBOX_LINUX_SANDBOX_EXPORT_H_ -#define SANDBOX_LINUX_SANDBOX_EXPORT_H_ +#ifndef SANDBOX_SANDBOX_EXPORT_H_ +#define SANDBOX_SANDBOX_EXPORT_H_ #if defined(COMPONENT_BUILD) +#if defined(WIN32) + +#if defined(SANDBOX_IMPLEMENTATION) +#define SANDBOX_EXPORT __declspec(dllexport) +#else +#define SANDBOX_EXPORT __declspec(dllimport) +#endif // defined(GFX_IMPLEMENTATION) + +#else // defined(WIN32) #if defined(SANDBOX_IMPLEMENTATION) #define SANDBOX_EXPORT __attribute__((visibility("default"))) @@ -15,9 +24,12 @@ #define SANDBOX_EXPORT_PRIVATE #endif // defined(SANDBOX_IMPLEMENTATION) +#endif // defined(WIN32) #else // defined(COMPONENT_BUILD) + #define SANDBOX_EXPORT #define SANDBOX_EXPORT_PRIVATE + #endif // defined(COMPONENT_BUILD) -#endif // SANDBOX_LINUX_SANDBOX_EXPORT_H_ +#endif // SANDBOX_SANDBOX_EXPORT_H_ |