blob: 525600f7a9e08273f9ea8351a4b596977fadbf73 [file] [log] [blame]
# Copyright 2018 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=7
CROS_WORKON_COMMIT="5bbbe52a139486abcbd802b9bd3f6763dac479b3"
CROS_WORKON_TREE=("ef118ceb3e8ebcc8b8a4ae6577a71d7ad210a722" "3a8b816b9fdaca04ec76e8a8d97b206e139a9dfc" "c49e61abb0d60510e8ca41e657656cdd950c50e9" "e7dba8c91c1f3257c34d4a7ffff0ea2537aeb6bb")
CROS_WORKON_INCREMENTAL_BUILD=1
CROS_WORKON_LOCALNAME="platform2"
CROS_WORKON_PROJECT="chromiumos/platform2"
CROS_WORKON_OUTOFTREE_BUILD=1
CROS_WORKON_SUBTREE="common-mk chromeos-config runtime_probe .gn"
PLATFORM_SUBDIR="runtime_probe"
inherit cros-workon cros-unibuild platform user udev
DESCRIPTION="Runtime probing on device componenets."
HOMEPAGE="https://chromium.googlesource.com/chromiumos/platform2/+/master/runtime_probe/"
LICENSE="BSD-Google"
KEYWORDS="*"
IUSE="asan fuzzer"
COMMON_DEPEND="
chromeos-base/chromeos-config-tools:=
"
RDEPEND="
${COMMON_DEPEND}
chromeos-base/ec-utils
"
# Add vboot_reference as build time dependency to read cros_debug status
DEPEND="${COMMON_DEPEND}
chromeos-base/debugd-client:=
chromeos-base/shill-client:=
chromeos-base/system_api:=[fuzzer?]
chromeos-base/vboot_reference:=
"
pkg_preinst() {
# Create user and group for runtime_probe
enewuser "runtime_probe"
enewgroup "cros_ec-access"
enewgroup "runtime_probe"
}
src_install() {
dobin "${OUT}/runtime_probe"
# Install upstart configs and scripts.
insinto /etc/init
doins init/*.conf
# Install D-Bus configuration file.
insinto /etc/dbus-1/system.d
doins dbus/org.chromium.RuntimeProbe.conf
# Install D-Bus service activation configuration.
insinto /usr/share/dbus-1/system-services
doins dbus/org.chromium.RuntimeProbe.service
# Install sandbox information.
insinto /etc/runtime_probe/sandbox
doins sandbox/"${ARCH}"/args.json
doins sandbox/"${ARCH}"/*-seccomp.policy
# Install seccomp policy file.
insinto /usr/share/policy
newins "seccomp/runtime_probe-seccomp-${ARCH}.policy" \
runtime_probe-seccomp.policy
# Install udev rules.
udev_dorules udev/*.rules
local fuzzer
for fuzzer in "${OUT}"/*_fuzzer; do
local fuzzer_component_id="606088"
platform_fuzzer_install "${S}"/OWNERS "${fuzzer}" \
--comp "${fuzzer_component_id}"
done
}
platform_pkg_test() {
platform_test "run" "${OUT}/unittest_runner"
}