From 0fad1f1a74408b939d1b09dcc2f9391544e7e692 Mon Sep 17 00:00:00 2001 From: "sgk@google.com" Date: Wed, 1 Apr 2009 22:05:12 +0000 Subject: Remove the checked-in scons configuration files. Review URL: http://codereview.chromium.org/53121 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@12982 0039d316-1c4b-4281-b951-d872f2087c98 --- sandbox/src/sandbox_lib.scons | 84 ------------------------------------------- 1 file changed, 84 deletions(-) delete mode 100644 sandbox/src/sandbox_lib.scons (limited to 'sandbox/src') diff --git a/sandbox/src/sandbox_lib.scons b/sandbox/src/sandbox_lib.scons deleted file mode 100644 index 8667968..0000000 --- a/sandbox/src/sandbox_lib.scons +++ /dev/null @@ -1,84 +0,0 @@ -# Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. -# Use of this source code is governed by a BSD-style license that can be -# found in the LICENSE file. - -Import('env') - -env = env.Clone() - -env.ApplySConscript([ - '$GTEST_DIR/../using_gtest.scons', -]) - -if env.Bit('windows'): - env.Append( - CCFLAGS = [ - '/WX', # treat warnings as errors - ], - ) - -input_files = [ - 'Wow64.cc', - 'acl.cc', - 'broker_services.cc', - 'crosscall_server.cc', - 'dep.cc', - 'eat_resolver.cc', - 'filesystem_dispatcher.cc', - 'filesystem_interception.cc', - 'filesystem_policy.cc', - 'interception.cc', - 'interception_agent.cc', - 'job.cc', - 'named_pipe_dispatcher.cc', - 'named_pipe_interception.cc', - 'named_pipe_policy.cc', - 'pe_image.cc', - 'policy_broker.cc', - 'policy_engine_opcodes.cc', - 'policy_engine_processor.cc', - 'policy_low_level.cc', - 'policy_target.cc', - 'process_thread_dispatcher.cc', - 'process_thread_interception.cc', - 'process_thread_policy.cc', - 'registry_dispatcher.cc', - 'registry_interception.cc', - 'registry_policy.cc', - 'resolver.cc', - 'restricted_token.cc', - 'restricted_token_utils.cc', - 'sandbox.cc', - 'sandbox_nt_util.cc', - 'sandbox_policy_base.cc', - 'sandbox_utils.cc', - 'service_resolver.cc', - 'shared_handles.cc', - 'sharedmem_ipc_client.cc', - 'sharedmem_ipc_server.cc', - 'sid.cc', - 'sidestep/ia32_modrm_map.cpp', - 'sidestep/ia32_opcode_map.cpp', - 'sidestep/mini_disassembler.cpp', - 'sidestep/preamble_patcher_with_stub.cpp', - 'sidestep_resolver.cc', - 'sync_dispatcher.cc', - 'sync_interception.cc', - 'sync_policy.cc', - 'target_interceptions.cc', - 'target_process.cc', - 'target_services.cc', - 'win2k_threadpool.cc', - 'win_utils.cc', -] - -# TODO(bradnelson): This step generates sandbox.pch.ib_tag -# SCons doesn't know. -env_p = env.Clone() -env_p.Append(CCFLAGS='/Ylsandbox') -pch, obj = env_p.PCH(['sandbox.pch', 'stdafx.obj'], 'stdafx.cc') -env['PCH'] = pch -env['PCHSTOP'] = 'stdafx.h' -env.Append(CCPCHFLAGS = ['/FIstdafx.h']) - -env.ChromeLibrary('sandbox', input_files + [obj]) -- cgit v1.1