gecko-dev/security/sandbox/common/moz.build
Srujana Peddinti 51255aa5b8 Bug 1570009 - Part 1: Create a top-level actor in child processes capable of testing the sandbox. r=bobowen,dmajor
This patch includes a new browser chrome mochitest that uses a new XPCOM service (moxISandboxTest) to create a new top-level actor (PSandboxTesting) between the chrome process and any supported child processes (in later parts of this patch set). The framework is makes it easy to add new C/C++ instructions to be tested for permission under real sandbox conditions. Test results can be conditioned on the type of OS, process, sandbox level, etc.

Differential Revision: https://phabricator.services.mozilla.com/D37706

--HG--
extra : moz-landing-system : lando
2019-10-15 07:19:54 +00:00

51 lines
1.1 KiB
Python

# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*-
# vim: set filetype=python:
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
with Files('**'):
BUG_COMPONENT = ('Core', 'Security: Process Sandboxing')
UNIFIED_SOURCES += [
'SandboxSettings.cpp',
]
XPCOM_MANIFESTS += [
'components.conf',
]
XPIDL_SOURCES += [
'mozISandboxSettings.idl',
]
XPIDL_MODULE = 'sandbox'
if CONFIG['MOZ_SANDBOX'] and CONFIG['MOZ_DEBUG'] and CONFIG['ENABLE_TESTS']:
UNIFIED_SOURCES += [
'test/SandboxTest.cpp',
'test/SandboxTestingChild.cpp',
'test/SandboxTestingParent.cpp',
]
EXPORTS.mozilla += [
'test/SandboxTestingChild.h',
'test/SandboxTestingParent.h',
]
IPDL_SOURCES += [
"test/PSandboxTesting.ipdl",
]
XPIDL_SOURCES += [
'test/mozISandboxTest.idl',
]
include('/ipc/chromium/chromium-config.mozbuild')
FINAL_LIBRARY = 'xul'
EXPORTS.mozilla += [
'SandboxSettings.h',
]