blob: 2a506cd475440c6b16271eef55ec889a86f7415a [file] [log] [blame]
# Copyright 2018 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=7
CROS_WORKON_COMMIT="d24ade58dab8ad0320dc4c61ffa759e11ec287c8"
CROS_WORKON_TREE=("a625767bb59509159091f2ab0b71f8b9b4b2e353" "bea140d13f7cf1092e4c89a45011c04c28327972" "b2a628a7e6e84c75bbb6593f7e7d6c7baa8ccba0" "1aed0c3c60315dba4d781aa861490bd01a1d53f6" "e7dba8c91c1f3257c34d4a7ffff0ea2537aeb6bb")
CROS_WORKON_INCREMENTAL_BUILD=1
CROS_WORKON_LOCALNAME="platform2"
CROS_WORKON_PROJECT="chromiumos/platform2"
CROS_WORKON_OUTOFTREE_BUILD=1
CROS_WORKON_SUBTREE="common-mk chromeos-config libec runtime_probe .gn"
PLATFORM_SUBDIR="runtime_probe"
inherit cros-workon cros-unibuild platform user udev
DESCRIPTION="Runtime probing on device componenets."
HOMEPAGE="https://chromium.googlesource.com/chromiumos/platform2/+/master/runtime_probe/"
LICENSE="BSD-Google"
KEYWORDS="*"
IUSE="asan fuzzer"
COMMON_DEPEND="
chromeos-base/chromeos-config-tools:=
"
RDEPEND="
${COMMON_DEPEND}
chromeos-base/ec-utils
"
# Add vboot_reference as build time dependency to read cros_debug status
DEPEND="${COMMON_DEPEND}
chromeos-base/debugd-client:=
chromeos-base/libec:=
chromeos-base/shill-client:=
chromeos-base/system_api:=[fuzzer?]
chromeos-base/vboot_reference:=
"
pkg_preinst() {
# Create user and group for runtime_probe
enewuser "runtime_probe"
enewgroup "cros_ec-access"
enewgroup "runtime_probe"
}
src_install() {
dobin "${OUT}/runtime_probe"
# Install upstart configs and scripts.
insinto /etc/init
doins init/*.conf
# Install D-Bus configuration file.
insinto /etc/dbus-1/system.d
doins dbus/org.chromium.RuntimeProbe.conf
# Install D-Bus service activation configuration.
insinto /usr/share/dbus-1/system-services
doins dbus/org.chromium.RuntimeProbe.service
# Install sandbox information.
insinto /etc/runtime_probe/sandbox
doins sandbox/"${ARCH}"/args.json
doins sandbox/"${ARCH}"/*-seccomp.policy
# Install seccomp policy file.
insinto /usr/share/policy
newins "seccomp/runtime_probe-seccomp-${ARCH}.policy" \
runtime_probe-seccomp.policy
# Install udev rules.
udev_dorules udev/*.rules
local fuzzer
for fuzzer in "${OUT}"/*_fuzzer; do
local fuzzer_component_id="606088"
platform_fuzzer_install "${S}"/OWNERS "${fuzzer}" \
--comp "${fuzzer_component_id}"
done
}
platform_pkg_test() {
platform_test "run" "${OUT}/unittest_runner"
}