From 93723b5339a6f238745c7445665276aa1e1f8bda Mon Sep 17 00:00:00 2001 From: "sgk@google.com" Date: Mon, 27 Oct 2008 16:11:15 +0000 Subject: Fix SCons build of the sandbox module, splitting out the individual targets into the new *.scons file naming scheme. Review URL: http://codereview.chromium.org/8616 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@4000 0039d316-1c4b-4281-b951-d872f2087c98 --- sandbox/tests/unit_tests/sbox_unittests.scons | 79 +++++++++++++++++++++++++++ 1 file changed, 79 insertions(+) create mode 100644 sandbox/tests/unit_tests/sbox_unittests.scons (limited to 'sandbox/tests/unit_tests') diff --git a/sandbox/tests/unit_tests/sbox_unittests.scons b/sandbox/tests/unit_tests/sbox_unittests.scons new file mode 100644 index 0000000..2ce1759 --- /dev/null +++ b/sandbox/tests/unit_tests/sbox_unittests.scons @@ -0,0 +1,79 @@ +# Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +# Use of this source code is governed by a BSD-style license that can be +# found in the LICENSE file. + +Import('env') + +env = env.Clone() + +env.SConscript([ + '$BASE_DIR/using_base.scons', + '$GTEST_DIR/../using_gtest.scons', + '$SANDBOX_DIR/using_sandbox.scons', +], {'env':env}) + +env.Prepend( + CPPPATH = [ + '$CHROME_SRC_DIR', + ], + CPPDEFINES = [ + 'CHROMIUM_BUILD', + ], +) + +if env['PLATFORM'] == 'win32': + env.Append( + CPPDEFINES = [ + '_SECURE_ATL', + '_WINDOWS', + ], + CCFLAGS = [ + '/TP', + '/WX', # treat warnings as errors + ], + ) + +env.Prepend( + LINKFLAGS = [ + '/DELAYLOAD:dwmapi.dll', + '/DELAYLOAD:uxtheme.dll', + '/MACHINE:X86', + '/FIXED:No', + '/safeseh', + '/dynamicbase', + '/ignore:4199', + '/nxcompat', + ], +) + + +# TODO(bradnelson): This step generates unittests_tests.pch.ib_tag +# SCons doesn't know. +env_p = env.Clone() +pch, obj = env_p.PCH(['unit_tests.pch', 'unit_tests.obj'], + 'unit_tests.cc') +env['PCH'] = pch +env['PCHSTOP'] = 'stdafx.h' +env.Append(CCPCHFLAGS = ['/FIstdafx.h']) + +input_files = [ + obj, + + '$SANDBOX_DIR/src/interception_unittest.cc', + '$SANDBOX_DIR/src/ipc_unittest.cc', + '$SANDBOX_DIR/src/job_unittest.cc', + '$SANDBOX_DIR/src/pe_image_unittest.cc', + '$SANDBOX_DIR/src/policy_engine_unittest.cc', + '$SANDBOX_DIR/src/policy_low_level_unittest.cc', + '$SANDBOX_DIR/src/policy_opcodes_unittest.cc', + '$SANDBOX_DIR/src/restricted_token_unittest.cc', + '$SANDBOX_DIR/src/service_resolver_unittest.cc', + '$SANDBOX_DIR/src/sid_unittest.cc', + '$SANDBOX_DIR/src/threadpool_unittest.cc', + + '../common/controller$OBJSUFFIX', +] + +sbox_unittests = env.ChromeTestProgram('sbox_unittests', input_files) +i = env.Install('$TARGET_ROOT', sbox_unittests) +env.Alias('sandbox', i) -- cgit v1.1