summaryrefslogtreecommitdiffstats
path: root/dom/security/moz.build
blob: f63fa22db65d7aa2dbfc6ac8d59e2d0441bbfdb3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*-
# vim: set filetype=python:
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.

with Files("*"):
    BUG_COMPONENT = ("Core", "DOM: Security")

TEST_DIRS += ["test"]

DIRS += ["featurepolicy", "sanitizer", "trusted-types"]

EXPORTS.mozilla.dom += [
    "CSPEvalChecker.h",
    "DOMSecurityMonitor.h",
    "FramingChecker.h",
    "nsContentSecurityManager.h",
    "nsContentSecurityUtils.h",
    "nsCSPContext.h",
    "nsCSPService.h",
    "nsCSPUtils.h",
    "nsHTTPSOnlyStreamListener.h",
    "nsHTTPSOnlyUtils.h",
    "nsMixedContentBlocker.h",
    "PolicyTokenizer.h",
    "ReferrerInfo.h",
    "SecFetch.h",
    "SRICheck.h",
    "SRILogHelper.h",
    "SRIMetadata.h",
]

EXPORTS += [
    "nsContentSecurityManager.h",
    "nsContentSecurityUtils.h",
    "nsMixedContentBlocker.h",
    "ReferrerInfo.h",
]

UNIFIED_SOURCES += [
    "CSPEvalChecker.cpp",
    "DOMSecurityMonitor.cpp",
    "FramingChecker.cpp",
    "nsContentSecurityManager.cpp",
    "nsContentSecurityUtils.cpp",
    "nsCSPContext.cpp",
    "nsCSPParser.cpp",
    "nsCSPService.cpp",
    "nsCSPUtils.cpp",
    "nsHTTPSOnlyStreamListener.cpp",
    "nsHTTPSOnlyUtils.cpp",
    "nsMixedContentBlocker.cpp",
    "PolicyTokenizer.cpp",
    "ReferrerInfo.cpp",
    "SecFetch.cpp",
    "SRICheck.cpp",
    "SRIMetadata.cpp",
]

include("/ipc/chromium/chromium-config.mozbuild")

FINAL_LIBRARY = "xul"
LOCAL_INCLUDES += [
    "/caps",
    "/docshell/base",  # for nsDocShell.h
    "/netwerk/base",
    "/netwerk/protocol/data",  # for nsDataHandler.h
    "/netwerk/protocol/http",  # for HttpBaseChannel.h
]

include("/tools/fuzzing/libfuzzer-config.mozbuild")

if CONFIG["FUZZING_INTERFACES"]:
    TEST_DIRS += ["fuzztest"]


XPIDL_SOURCES += [
    "nsIHttpsOnlyModePermission.idl",
]

XPIDL_MODULE = "dom_security"