mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-28 23:31:56 +00:00
02a7b4ebdf
Allow-list all Python code in tree for use with the black linter, and re-format all code in-tree accordingly. To produce this patch I did all of the following: 1. Make changes to tools/lint/black.yml to remove include: stanza and update list of source extensions. 2. Run ./mach lint --linter black --fix 3. Make some ad-hoc manual updates to python/mozbuild/mozbuild/test/configure/test_configure.py -- it has some hard-coded line numbers that the reformat breaks. 4. Make some ad-hoc manual updates to `testing/marionette/client/setup.py`, `testing/marionette/harness/setup.py`, and `testing/firefox-ui/harness/setup.py`, which have hard-coded regexes that break after the reformat. 5. Add a set of exclusions to black.yml. These will be deleted in a follow-up bug (1672023). # ignore-this-changeset Differential Revision: https://phabricator.services.mozilla.com/D94045
83 lines
1.9 KiB
Python
83 lines
1.9 KiB
Python
# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*-
|
|
# vim: set filetype=python:
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
with Files("*"):
|
|
BUG_COMPONENT = ("Core", "DOM: Security")
|
|
|
|
TEST_DIRS += ["test"]
|
|
|
|
DIRS += ["featurepolicy", "sanitizer"]
|
|
|
|
EXPORTS.mozilla.dom += [
|
|
"CSPEvalChecker.h",
|
|
"DOMSecurityMonitor.h",
|
|
"FramingChecker.h",
|
|
"nsContentSecurityManager.h",
|
|
"nsContentSecurityUtils.h",
|
|
"nsCSPContext.h",
|
|
"nsCSPService.h",
|
|
"nsCSPUtils.h",
|
|
"nsHTTPSOnlyStreamListener.h",
|
|
"nsHTTPSOnlyUtils.h",
|
|
"nsMixedContentBlocker.h",
|
|
"PolicyTokenizer.h",
|
|
"ReferrerInfo.h",
|
|
"SecFetch.h",
|
|
"SRICheck.h",
|
|
"SRILogHelper.h",
|
|
"SRIMetadata.h",
|
|
]
|
|
|
|
EXPORTS += [
|
|
"nsContentSecurityManager.h",
|
|
"nsContentSecurityUtils.h",
|
|
"nsMixedContentBlocker.h",
|
|
"ReferrerInfo.h",
|
|
]
|
|
|
|
UNIFIED_SOURCES += [
|
|
"CSPEvalChecker.cpp",
|
|
"DOMSecurityMonitor.cpp",
|
|
"FramingChecker.cpp",
|
|
"nsContentSecurityManager.cpp",
|
|
"nsContentSecurityUtils.cpp",
|
|
"nsCSPContext.cpp",
|
|
"nsCSPParser.cpp",
|
|
"nsCSPService.cpp",
|
|
"nsCSPUtils.cpp",
|
|
"nsHTTPSOnlyStreamListener.cpp",
|
|
"nsHTTPSOnlyUtils.cpp",
|
|
"nsMixedContentBlocker.cpp",
|
|
"PolicyTokenizer.cpp",
|
|
"ReferrerInfo.cpp",
|
|
"SecFetch.cpp",
|
|
"SRICheck.cpp",
|
|
"SRIMetadata.cpp",
|
|
]
|
|
|
|
include("/ipc/chromium/chromium-config.mozbuild")
|
|
|
|
FINAL_LIBRARY = "xul"
|
|
LOCAL_INCLUDES += [
|
|
"/caps",
|
|
"/docshell/base", # for nsDocShell.h
|
|
"/netwerk/base",
|
|
"/netwerk/protocol/data", # for nsDataHandler.h
|
|
"/netwerk/protocol/http", # for HttpBaseChannel.h
|
|
]
|
|
|
|
include("/tools/fuzzing/libfuzzer-config.mozbuild")
|
|
|
|
if CONFIG["FUZZING_INTERFACES"]:
|
|
TEST_DIRS += ["fuzztest"]
|
|
|
|
|
|
XPIDL_SOURCES += [
|
|
"nsIHttpsOnlyModePermission.idl",
|
|
]
|
|
|
|
XPIDL_MODULE = "dom_security"
|