security/apps/moz.build
author Ciure Andrei <aciure@mozilla.com>
Fri, 22 Mar 2019 18:01:27 +0200
changeset 465706 d9708fb342243b7459321e4a773bac1e448c59ee
parent 439251 432a98e50d2bfab224328254266069aef1a474cc
child 472661 c52835481c084fecff479ddf35e06054c5e0ba32
permissions -rw-r--r--
Backed out changeset 01cdf8342a49 (bug 1521919) for test_SitePermissions.js perma failures CLOSED TREE

# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*-
# vim: set filetype=python:
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.

with Files("**"):
    BUG_COMPONENT = ("Core", "Security: PSM")

UNIFIED_SOURCES += [
    'AppSignatureVerification.cpp',
    'AppTrustDomain.cpp',
]

FINAL_LIBRARY = 'xul'

LOCAL_INCLUDES += [
    '/security/certverifier',
    '/security/manager/ssl',
    '/third_party/rust/cose-c/include',
]

DEFINES['NSS_ENABLE_ECC'] = 'True'
for var in ('DLL_PREFIX', 'DLL_SUFFIX'):
    DEFINES[var] = '"%s"' % CONFIG[var]

if CONFIG['CC_TYPE'] in ('clang', 'gcc'):
    CXXFLAGS += [
        '-Wextra',
    ]

    # Gecko headers aren't warning-free enough for us to enable these warnings.
    CXXFLAGS += [
        '-Wno-unused-parameter',
    ]

test_ssl_path = '/security/manager/ssl/tests/unit'

headers_arrays_certs = [
    ('xpcshell.inc', 'xpcshellRoot', test_ssl_path + '/test_signed_apps/xpcshellTestRoot.der'),
    ('addons-public.inc', 'addonsPublicRoot', 'addons-public.crt'),
    ('addons-stage.inc', 'addonsStageRoot', 'addons-stage.crt'),
    ('privileged-package-root.inc', 'privilegedPackageRoot', 'privileged-package-root.der'),
]

for header, array_name, cert in headers_arrays_certs:
    GENERATED_FILES += [header]
    h = GENERATED_FILES[header]
    h.script = 'gen_cert_header.py:' + array_name
    h.inputs = [cert]