From 19969e2f19fbc851514e8d76b761b1ce717d42b6 Mon Sep 17 00:00:00 2001 From: sergeyu Date: Thu, 22 Jan 2015 16:44:38 -0800 Subject: Implement DNS blackhole check for XMPP connection in the webapp. With WCS it was possible to block CRD client by adding DNS blackhole for chromoting-client.talkgadget.google.com . This is a documented way to block CRD client. This CL duplicates this functionality for XMPP-based signaling. The new DnsBlackholeChecker ensures that the client connection doesn't start until it's verified that there is no DNS blackhole for chromoting-client.talkgadget.google.com. It's implemented as a SignalStrategy filter. BUG=443397 Review URL: https://codereview.chromium.org/860383004 Cr-Commit-Position: refs/heads/master@{#312716} --- remoting/remoting_test.gypi | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) (limited to 'remoting/remoting_test.gypi') diff --git a/remoting/remoting_test.gypi b/remoting/remoting_test.gypi index cd11122..06c1e6c 100644 --- a/remoting/remoting_test.gypi +++ b/remoting/remoting_test.gypi @@ -298,6 +298,7 @@ { 'destination': '<(PRODUCT_DIR)/remoting/browser_test_resources', 'files': [ + '<@(remoting_webapp_js_test_common_files)', '<@(remoting_webapp_js_browser_test_files)', ], }, @@ -341,8 +342,9 @@ 'destination': '<(output_dir)', 'files': [ '<@(webapp_js_files)', + '<@(remoting_webapp_js_test_common_files)', + '<@(remoting_webapp_unittest_additional_files)', '<@(remoting_webapp_unittest_js_files)', - '<@(remoting_webapp_unittest_additional_files)' ], }, ], @@ -353,6 +355,7 @@ 'webapp/build-html.py', '<(remoting_webapp_unittest_template_main)', '<@(webapp_js_files)', + '<@(remoting_webapp_js_test_common_files)', '<@(remoting_webapp_unittest_js_files)' ], 'outputs': [ @@ -368,6 +371,7 @@ # exclude list. '--exclude-js', '<@(remoting_webapp_unittest_exclude_files)', '--js', '<@(remoting_webapp_unittest_js_files)', + '<@(remoting_webapp_js_test_common_files)', '--instrument-js', '<@(webapp_js_files)', ], }, -- cgit v1.1