2018-10-30 05:13:35 -05:00
|
|
|
ETAGS=ctags -e
|
|
|
|
|
2019-02-13 06:22:25 -06:00
|
|
|
if ENABLE_MOBILEAPP
|
2018-08-31 05:24:17 -05:00
|
|
|
|
2018-10-16 18:03:39 -05:00
|
|
|
if ENABLE_GTKAPP
|
2021-11-03 08:22:00 -05:00
|
|
|
SUBDIRS = gtk browser
|
2019-02-13 06:22:25 -06:00
|
|
|
else
|
2022-11-11 07:26:34 -06:00
|
|
|
if ENABLE_WASM
|
2022-12-15 02:37:13 -06:00
|
|
|
SUBDIRS = wasm browser
|
2022-11-11 07:26:34 -06:00
|
|
|
else !ENABLE_WASM
|
2021-11-03 08:22:00 -05:00
|
|
|
SUBDIRS = browser
|
2022-11-11 07:26:34 -06:00
|
|
|
endif !ENABLE_WASM
|
2019-02-13 06:22:25 -06:00
|
|
|
endif
|
2018-10-16 18:03:39 -05:00
|
|
|
|
|
|
|
else
|
|
|
|
|
2021-11-03 08:22:00 -05:00
|
|
|
SUBDIRS = . browser test cypress_test
|
2015-10-21 05:01:47 -05:00
|
|
|
|
2016-04-15 08:23:44 -05:00
|
|
|
export ENABLE_DEBUG
|
|
|
|
|
2018-04-17 08:01:49 -05:00
|
|
|
bin_PROGRAMS = \
|
2021-11-16 03:59:05 -06:00
|
|
|
coolforkit \
|
2021-11-17 11:08:27 -06:00
|
|
|
coolmount \
|
2022-08-31 14:39:09 -05:00
|
|
|
coolstress \
|
2021-11-17 11:44:09 -06:00
|
|
|
coolconvert coolconfig
|
2015-03-09 04:11:15 -05:00
|
|
|
|
Add an initial libfuzzer based fuzzer
- target ClientSession::_handleInput(), since crashing there would bring
down the whole loolwsd (not just a kit process), and it deals with
input from untrusted users (browsers)
- add a --enable-fuzzers configure switch to build with
-fsanitize=fuzzer (compared to normal sanitizers build, this is the only
special flag needed)
- configuring other sanitizers is not done automatically, either use
--with-sanitizer=... or the environment variables from LODE's sanitizer
config
- run the actual fuzzer like this:
./clientsession_fuzzer -max_len=16384 fuzzer/data/
- note that at least openSUSE Leap 15.1 sadly ships with a clang with
libfuzzer static libs removed from the package, so you need a
self-built clang to run the fuzzer (either manual build or one from
LODE)
- <https://chromium.googlesource.com/chromium/src/testing/libfuzzer/+/refs/heads/master/efficient_fuzzing.md#execution-speed>
suggests that "You should aim for at least 1,000 exec/s from your fuzz
target locally" (i.e. one run should not take more than 1 ms), so try
this minimal approach first. The alternative would be to start from the
existing loolwsd_fuzzer binary, then step by step cut it down to not
fork(), not do any network traffic, etc -- till it's fast enough that
the fuzzer can find interesting input
- the various configurations start to be really complex (the matrix is
just very large), so try to use Util::isFuzzing() for fuzzer-specific
changes (this is what core.git does as well), and only resort to ifdefs
for the Util::isFuzzing() itself
Change-Id: I72dc1193b34c93eacb5d8e39cef42387d42bd72f
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/89226
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Michael Meeks <michael.meeks@collabora.com>
2020-02-21 08:52:20 -06:00
|
|
|
if ENABLE_LIBFUZZER
|
|
|
|
else
|
2021-11-17 04:16:49 -06:00
|
|
|
bin_PROGRAMS += coolwsd
|
2023-11-29 10:11:18 -06:00
|
|
|
if ENABLE_DEBUG
|
|
|
|
bin_PROGRAMS += coolwsd-inproc
|
|
|
|
endif
|
Add an initial libfuzzer based fuzzer
- target ClientSession::_handleInput(), since crashing there would bring
down the whole loolwsd (not just a kit process), and it deals with
input from untrusted users (browsers)
- add a --enable-fuzzers configure switch to build with
-fsanitize=fuzzer (compared to normal sanitizers build, this is the only
special flag needed)
- configuring other sanitizers is not done automatically, either use
--with-sanitizer=... or the environment variables from LODE's sanitizer
config
- run the actual fuzzer like this:
./clientsession_fuzzer -max_len=16384 fuzzer/data/
- note that at least openSUSE Leap 15.1 sadly ships with a clang with
libfuzzer static libs removed from the package, so you need a
self-built clang to run the fuzzer (either manual build or one from
LODE)
- <https://chromium.googlesource.com/chromium/src/testing/libfuzzer/+/refs/heads/master/efficient_fuzzing.md#execution-speed>
suggests that "You should aim for at least 1,000 exec/s from your fuzz
target locally" (i.e. one run should not take more than 1 ms), so try
this minimal approach first. The alternative would be to start from the
existing loolwsd_fuzzer binary, then step by step cut it down to not
fork(), not do any network traffic, etc -- till it's fast enough that
the fuzzer can find interesting input
- the various configurations start to be really complex (the matrix is
just very large), so try to use Util::isFuzzing() for fuzzer-specific
changes (this is what core.git does as well), and only resort to ifdefs
for the Util::isFuzzing() itself
Change-Id: I72dc1193b34c93eacb5d8e39cef42387d42bd72f
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/89226
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Michael Meeks <michael.meeks@collabora.com>
2020-02-21 08:52:20 -06:00
|
|
|
endif
|
|
|
|
|
2023-07-06 14:51:58 -05:00
|
|
|
dist_bin_SCRIPTS = coolwsd-systemplate-setup
|
2016-04-14 07:43:13 -05:00
|
|
|
|
2021-11-17 15:02:46 -06:00
|
|
|
man_MANS = man/coolwsd.1 \
|
2021-11-16 03:59:05 -06:00
|
|
|
man/coolforkit.1 \
|
2021-11-17 11:44:09 -06:00
|
|
|
man/coolconvert.1 \
|
2021-11-15 07:47:53 -06:00
|
|
|
man/coolconfig.1 \
|
2022-08-31 14:39:09 -05:00
|
|
|
man/coolstress.1 \
|
2021-11-17 15:09:50 -06:00
|
|
|
man/coolwsd-systemplate-setup.1 \
|
2021-11-17 11:08:27 -06:00
|
|
|
man/coolmount.1
|
2021-09-26 17:52:53 -05:00
|
|
|
|
2018-05-14 03:49:46 -05:00
|
|
|
|
2017-05-03 07:13:37 -05:00
|
|
|
dist_doc_DATA = wsd/README \
|
|
|
|
wsd/README.vars \
|
|
|
|
wsd/protocol.txt \
|
2019-11-12 03:50:33 -06:00
|
|
|
wsd/reference.md \
|
2024-02-26 13:28:14 -06:00
|
|
|
wsd/metrics.txt \
|
|
|
|
THIRDPARTYLICENSES
|
2017-05-03 07:13:37 -05:00
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
coolwsddatadir = @COOLWSD_DATADIR@
|
2016-04-14 07:43:13 -05:00
|
|
|
|
2021-11-17 04:16:49 -06:00
|
|
|
coolwsddata_DATA = discovery.xml \
|
2018-02-15 08:17:32 -06:00
|
|
|
favicon.ico
|
2015-05-19 05:20:16 -05:00
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
coolwsdconfigdir = @COOLWSD_CONFIGDIR@
|
2016-04-14 08:06:49 -05:00
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
coolwsdconfig_DATA = coolwsd.xml \
|
|
|
|
coolkitconfig.xcu
|
2016-04-14 11:47:35 -05:00
|
|
|
|
2018-10-27 07:46:59 -05:00
|
|
|
apache2configdir = ${sysconfdir}/apache2/conf-available
|
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
apache2config_DATA = etc/apache2/coolwsd.conf
|
2018-10-27 07:46:59 -05:00
|
|
|
|
|
|
|
nginxconfigdir = ${sysconfdir}/nginx/snippets
|
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
nginxconfig_DATA = etc/nginx/coolwsd.conf
|
2018-10-27 07:46:59 -05:00
|
|
|
|
2016-04-12 02:39:53 -05:00
|
|
|
ACLOCAL_AMFLAGS = -I m4
|
|
|
|
|
2016-11-24 08:56:06 -06:00
|
|
|
# quick and easy for now.
|
2022-11-11 12:03:09 -06:00
|
|
|
include_paths = -I${top_srcdir}/common -I${top_srcdir}/net -I${top_srcdir}/wsd -I${top_srcdir}/kit ${ZLIB_CFLAGS} ${ZSTD_CFLAGS} ${PNG_CFLAGS}
|
2023-02-26 11:50:58 -06:00
|
|
|
if ENABLE_SSL
|
|
|
|
include_paths += ${OPENSSL_CFLAGS}
|
|
|
|
endif
|
2016-11-24 08:56:06 -06:00
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
AM_CPPFLAGS = -pthread -DCOOLWSD_DATADIR='"@COOLWSD_DATADIR@"' \
|
|
|
|
-DCOOLWSD_CONFIGDIR='"@COOLWSD_CONFIGDIR@"' \
|
2017-03-11 13:43:26 -06:00
|
|
|
-DDEBUG_ABSSRCDIR='"@abs_srcdir@"' \
|
|
|
|
${include_paths}
|
2017-03-31 04:12:10 -05:00
|
|
|
|
2017-04-05 04:57:28 -05:00
|
|
|
if !ENABLE_DEBUG
|
|
|
|
AM_CPPFLAGS += -DNDEBUG
|
|
|
|
endif
|
|
|
|
|
2023-05-07 17:19:24 -05:00
|
|
|
AM_LDFLAGS = -Wl,-E -lpam $(ZLIB_LIBS) $(ZSTD_LIBS) ${PNG_LIBS}
|
|
|
|
|
|
|
|
# Clang's linker doesn't like -pthread.
|
|
|
|
if !HAVE_CLANG
|
|
|
|
AM_LDFLAGS += -pthread
|
|
|
|
endif
|
2017-02-26 23:01:17 -06:00
|
|
|
|
|
|
|
if ENABLE_SSL
|
2022-11-11 12:03:09 -06:00
|
|
|
AM_LDFLAGS += ${OPENSSL_LIBS}
|
2017-06-18 13:19:10 -05:00
|
|
|
else
|
2022-11-11 12:03:09 -06:00
|
|
|
coolwsd_LDADD = ${OPENSSL_LIBS}
|
|
|
|
coolconfig_LDADD = ${OPENSSL_LIBS}
|
2017-02-26 23:01:17 -06:00
|
|
|
endif
|
2015-12-17 11:49:34 -06:00
|
|
|
|
2021-11-03 08:22:00 -05:00
|
|
|
AM_ETAGSFLAGS = --c++-kinds=+p --fields=+iaS --extra=+q -R --totals=yes --exclude=browser *
|
2016-03-22 13:26:57 -05:00
|
|
|
AM_CTAGSFLAGS = $(AM_ETAGSFLAGS)
|
|
|
|
|
2016-11-24 08:56:06 -06:00
|
|
|
shared_sources = common/FileUtil.cpp \
|
wsd: faster jail setup via bind-mount
loolmount now works and supports mounting and
unmounting, plus numerous improvements,
refactoring, logging, etc.. When enabled,
binding improves the jail setup time by anywhere
from 2x to orders of magnitude (in docker, f.e.).
A new config entry mount_jail_tree controls
whether mounting is used or the old method of
linking/copying of jail contents. It is set to
true by default and falls back to linking/copying.
A test mount is done when the setting is enabled,
and if mounting fails, it's disabled to avoid noise.
Temporarily disabled for unit-tests until we can
cleanup lingering mounts after Jenkins aborts our
build job. In a future patch we will have mount/jail
cleanup as part of make.
The network/system files in /etc that need frequent
refreshing are now updated in systemplate to make
their most recent version available in the jails.
These files can change during the course of loolwsd
lifetime, and are unlikely to be updated in
systemplate after installation at all. We link to
them in the systemplate/etc directory, and if that
fails, we copy them before forking each kit
instance to have the latest.
This reworks the approach used to bind-mount the
jails and the templates such that the total is
now down to only three mounts: systemplate, lo, tmp.
As now systemplate and lotemplate are shared, they
must be mounted as readonly, this means that user/
must now be moved into tmp/user/ which is writable.
The mount-points must be recursive, because we mount
lo/ within the mount-point of systemplate (which is
the root of the jail). But because we (re)bind
recursively, and because both systemplate and
lotemplate are mounted for each jails, we need to
make them unbindable, so they wouldn't multiply the
mount-points for each jails (an explosive growth!)
Contrarywise, we don't want the mount-points to
be shared, because we don't expect to add/remove
mounts after a jail is created.
The random temp directory is now created and set
correctly, plus many logging and other improvements.
Change-Id: Iae3fda5e876cf47d2cae6669a87b5b826a8748df
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/92829
Tested-by: Jenkins
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Ashod Nakashian <ashnakash@gmail.com>
2020-04-09 08:02:58 -05:00
|
|
|
common/JailUtil.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Log.cpp \
|
|
|
|
common/Protocol.cpp \
|
2020-02-28 03:50:58 -06:00
|
|
|
common/StringVector.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Session.cpp \
|
2017-04-28 05:02:06 -05:00
|
|
|
common/Seccomp.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/MessageQueue.cpp \
|
2020-04-24 02:46:54 -05:00
|
|
|
common/MobileApp.cpp \
|
2021-06-01 05:21:09 -05:00
|
|
|
common/TraceEvent.cpp \
|
2016-11-14 07:58:04 -06:00
|
|
|
common/SigUtil.cpp \
|
2016-11-27 09:38:35 -06:00
|
|
|
common/SpookyV2.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Unit.cpp \
|
2017-02-20 12:28:16 -06:00
|
|
|
common/Util.cpp \
|
2021-03-27 16:39:45 -05:00
|
|
|
common/ConfigUtil.cpp \
|
2018-11-22 05:03:42 -06:00
|
|
|
common/Authorization.cpp \
|
2021-09-13 14:24:50 -05:00
|
|
|
common/CommandControl.cpp \
|
2023-09-25 08:58:30 -05:00
|
|
|
common/Simd.cpp \
|
2017-03-23 12:14:51 -05:00
|
|
|
net/DelaySocket.cpp \
|
2021-01-10 08:35:42 -06:00
|
|
|
net/HttpRequest.cpp \
|
2020-10-26 07:45:23 -05:00
|
|
|
net/HttpHelper.cpp \
|
2021-01-12 21:48:26 -06:00
|
|
|
net/NetUtil.cpp \
|
2022-02-02 13:07:19 -06:00
|
|
|
net/Socket.cpp \
|
|
|
|
wsd/Exceptions.cpp
|
2017-02-26 23:01:17 -06:00
|
|
|
if ENABLE_SSL
|
|
|
|
shared_sources += net/Ssl.cpp
|
|
|
|
endif
|
2016-11-24 08:56:06 -06:00
|
|
|
|
2021-11-17 04:16:49 -06:00
|
|
|
coolwsd_sources = common/Crypto.cpp \
|
2017-10-03 14:48:28 -05:00
|
|
|
wsd/Admin.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
wsd/AdminModel.cpp \
|
|
|
|
wsd/Auth.cpp \
|
|
|
|
wsd/DocumentBroker.cpp \
|
2020-03-04 07:54:04 -06:00
|
|
|
wsd/ProxyProtocol.cpp \
|
2021-11-18 06:08:14 -06:00
|
|
|
wsd/COOLWSD.cpp \
|
2024-02-11 10:42:22 -06:00
|
|
|
wsd/ClientRequestDispatcher.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
wsd/ClientSession.cpp \
|
|
|
|
wsd/FileServer.cpp \
|
2022-06-22 08:44:29 -05:00
|
|
|
wsd/ProxyRequestHandler.cpp \
|
2020-06-03 11:46:42 -05:00
|
|
|
wsd/FileServerUtil.cpp \
|
2020-05-12 10:19:41 -05:00
|
|
|
wsd/RequestDetails.cpp \
|
2023-03-04 12:24:01 -06:00
|
|
|
wsd/RequestVettingStation.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
wsd/Storage.cpp \
|
2023-02-28 05:30:00 -06:00
|
|
|
wsd/StorageConnectionManager.cpp \
|
2022-03-24 05:23:34 -05:00
|
|
|
wsd/HostUtil.cpp \
|
2019-11-07 09:24:37 -06:00
|
|
|
wsd/TileCache.cpp \
|
2021-10-21 14:29:15 -05:00
|
|
|
wsd/ProofKey.cpp \
|
2023-11-06 05:04:27 -06:00
|
|
|
wsd/QuarantineUtil.cpp \
|
|
|
|
wsd/WopiProxy.cpp
|
2017-02-06 08:59:14 -06:00
|
|
|
|
2021-11-17 04:16:49 -06:00
|
|
|
coolwsd_SOURCES = $(coolwsd_sources) \
|
2023-11-29 07:59:01 -06:00
|
|
|
$(shared_sources) \
|
|
|
|
wsd/coolwsd-fork.cpp
|
2016-03-31 02:01:05 -05:00
|
|
|
|
2021-11-17 04:16:49 -06:00
|
|
|
EXTRA_coolwsd_DEPENDENCIES = browser/node_modules
|
2021-05-22 09:29:59 -05:00
|
|
|
|
2017-02-14 16:57:03 -06:00
|
|
|
noinst_PROGRAMS = clientnb \
|
|
|
|
connect \
|
2016-04-16 14:44:53 -05:00
|
|
|
lokitclient \
|
2021-11-17 11:19:53 -06:00
|
|
|
coolmap \
|
2021-11-18 06:08:14 -06:00
|
|
|
coolsocketdump
|
2016-03-31 02:01:05 -05:00
|
|
|
|
Add an initial libfuzzer based fuzzer
- target ClientSession::_handleInput(), since crashing there would bring
down the whole loolwsd (not just a kit process), and it deals with
input from untrusted users (browsers)
- add a --enable-fuzzers configure switch to build with
-fsanitize=fuzzer (compared to normal sanitizers build, this is the only
special flag needed)
- configuring other sanitizers is not done automatically, either use
--with-sanitizer=... or the environment variables from LODE's sanitizer
config
- run the actual fuzzer like this:
./clientsession_fuzzer -max_len=16384 fuzzer/data/
- note that at least openSUSE Leap 15.1 sadly ships with a clang with
libfuzzer static libs removed from the package, so you need a
self-built clang to run the fuzzer (either manual build or one from
LODE)
- <https://chromium.googlesource.com/chromium/src/testing/libfuzzer/+/refs/heads/master/efficient_fuzzing.md#execution-speed>
suggests that "You should aim for at least 1,000 exec/s from your fuzz
target locally" (i.e. one run should not take more than 1 ms), so try
this minimal approach first. The alternative would be to start from the
existing loolwsd_fuzzer binary, then step by step cut it down to not
fork(), not do any network traffic, etc -- till it's fast enough that
the fuzzer can find interesting input
- the various configurations start to be really complex (the matrix is
just very large), so try to use Util::isFuzzing() for fuzzer-specific
changes (this is what core.git does as well), and only resort to ifdefs
for the Util::isFuzzing() itself
Change-Id: I72dc1193b34c93eacb5d8e39cef42387d42bd72f
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/89226
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Michael Meeks <michael.meeks@collabora.com>
2020-02-21 08:52:20 -06:00
|
|
|
if ENABLE_LIBFUZZER
|
2020-04-01 10:22:23 -05:00
|
|
|
noinst_PROGRAMS += \
|
|
|
|
admin_fuzzer \
|
2021-04-22 02:43:03 -05:00
|
|
|
clientsession_fuzzer \
|
2021-05-26 21:04:02 -05:00
|
|
|
httpresponse_fuzzer \
|
|
|
|
httpecho_fuzzer
|
Add an initial libfuzzer based fuzzer
- target ClientSession::_handleInput(), since crashing there would bring
down the whole loolwsd (not just a kit process), and it deals with
input from untrusted users (browsers)
- add a --enable-fuzzers configure switch to build with
-fsanitize=fuzzer (compared to normal sanitizers build, this is the only
special flag needed)
- configuring other sanitizers is not done automatically, either use
--with-sanitizer=... or the environment variables from LODE's sanitizer
config
- run the actual fuzzer like this:
./clientsession_fuzzer -max_len=16384 fuzzer/data/
- note that at least openSUSE Leap 15.1 sadly ships with a clang with
libfuzzer static libs removed from the package, so you need a
self-built clang to run the fuzzer (either manual build or one from
LODE)
- <https://chromium.googlesource.com/chromium/src/testing/libfuzzer/+/refs/heads/master/efficient_fuzzing.md#execution-speed>
suggests that "You should aim for at least 1,000 exec/s from your fuzz
target locally" (i.e. one run should not take more than 1 ms), so try
this minimal approach first. The alternative would be to start from the
existing loolwsd_fuzzer binary, then step by step cut it down to not
fork(), not do any network traffic, etc -- till it's fast enough that
the fuzzer can find interesting input
- the various configurations start to be really complex (the matrix is
just very large), so try to use Util::isFuzzing() for fuzzer-specific
changes (this is what core.git does as well), and only resort to ifdefs
for the Util::isFuzzing() itself
Change-Id: I72dc1193b34c93eacb5d8e39cef42387d42bd72f
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/89226
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Michael Meeks <michael.meeks@collabora.com>
2020-02-21 08:52:20 -06:00
|
|
|
endif
|
|
|
|
|
2016-11-24 08:56:06 -06:00
|
|
|
connect_SOURCES = tools/Connect.cpp \
|
2021-06-17 05:31:27 -05:00
|
|
|
common/DummyTraceEventEmitter.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Log.cpp \
|
|
|
|
common/Protocol.cpp \
|
2020-02-28 03:50:58 -06:00
|
|
|
common/StringVector.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Util.cpp
|
2016-03-31 02:01:05 -05:00
|
|
|
|
2020-04-10 06:45:14 -05:00
|
|
|
lokitclient_SOURCES = common/Log.cpp \
|
2021-06-17 05:31:27 -05:00
|
|
|
common/DummyTraceEventEmitter.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
tools/KitClient.cpp \
|
|
|
|
common/Protocol.cpp \
|
2020-02-28 03:50:58 -06:00
|
|
|
common/StringVector.cpp \
|
2021-06-22 07:40:48 -05:00
|
|
|
common/TraceEvent.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Util.cpp
|
2016-03-31 02:01:05 -05:00
|
|
|
|
2023-08-28 15:14:46 -05:00
|
|
|
noinst_LIBRARIES = libsimd.a
|
|
|
|
libsimd_a_SOURCES = kit/DeltaSimd.c
|
|
|
|
libsimd_a_CFLAGS = @SIMD_CFLAGS@
|
|
|
|
|
2021-11-16 03:59:05 -06:00
|
|
|
coolforkit_sources = kit/ChildSession.cpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
kit/ForKit.cpp \
|
2017-02-06 08:59:14 -06:00
|
|
|
kit/Kit.cpp
|
|
|
|
|
2021-11-16 03:59:05 -06:00
|
|
|
coolforkit_SOURCES = $(coolforkit_sources) \
|
2023-11-29 07:59:01 -06:00
|
|
|
$(shared_sources) \
|
|
|
|
kit/forkit-main.cpp
|
2015-12-19 16:20:04 -06:00
|
|
|
|
2023-08-28 15:14:46 -05:00
|
|
|
coolforkit_LDADD = libsimd.a
|
|
|
|
|
2023-11-29 10:11:18 -06:00
|
|
|
if ENABLE_DEBUG
|
|
|
|
coolwsd_inproc_SOURCES = $(coolwsd_sources) \
|
|
|
|
$(shared_sources) \
|
|
|
|
$(coolforkit_sources) \
|
|
|
|
wsd/coolwsd-inproc.cpp
|
|
|
|
|
|
|
|
coolwsd_inproc_LDADD = ${coolwsd_LDADD} \
|
|
|
|
${coolforkit_LDADD}
|
|
|
|
endif
|
|
|
|
|
2022-04-10 10:28:15 -05:00
|
|
|
if ENABLE_LIBFUZZER
|
2022-08-05 21:20:16 -05:00
|
|
|
coolforkit_SOURCES += \
|
|
|
|
common/DummyTraceEventEmitter.cpp
|
|
|
|
|
2022-08-05 21:19:59 -05:00
|
|
|
common_fuzzer_sources = \
|
2022-08-05 21:20:16 -05:00
|
|
|
common/DummyTraceEventEmitter.cpp \
|
2022-08-05 21:19:59 -05:00
|
|
|
$(coolwsd_sources) \
|
2023-11-29 07:59:01 -06:00
|
|
|
wsd/coolwsd-inproc.cpp \
|
2022-08-05 21:19:59 -05:00
|
|
|
$(coolforkit_sources) \
|
|
|
|
$(shared_sources)
|
2022-04-10 10:28:15 -05:00
|
|
|
|
2020-04-01 10:22:23 -05:00
|
|
|
admin_fuzzer_CPPFLAGS = \
|
|
|
|
$(AM_CPPFLAGS)
|
|
|
|
admin_fuzzer_SOURCES = \
|
2022-08-05 21:19:59 -05:00
|
|
|
$(common_fuzzer_sources) \
|
2020-04-01 10:22:23 -05:00
|
|
|
fuzzer/Admin.cpp
|
|
|
|
admin_fuzzer_LDFLAGS = -fsanitize=fuzzer $(AM_LDFLAGS)
|
2023-10-02 08:37:28 -05:00
|
|
|
admin_fuzzer_LDADD = libsimd.a
|
2020-04-01 10:22:23 -05:00
|
|
|
|
Add an initial libfuzzer based fuzzer
- target ClientSession::_handleInput(), since crashing there would bring
down the whole loolwsd (not just a kit process), and it deals with
input from untrusted users (browsers)
- add a --enable-fuzzers configure switch to build with
-fsanitize=fuzzer (compared to normal sanitizers build, this is the only
special flag needed)
- configuring other sanitizers is not done automatically, either use
--with-sanitizer=... or the environment variables from LODE's sanitizer
config
- run the actual fuzzer like this:
./clientsession_fuzzer -max_len=16384 fuzzer/data/
- note that at least openSUSE Leap 15.1 sadly ships with a clang with
libfuzzer static libs removed from the package, so you need a
self-built clang to run the fuzzer (either manual build or one from
LODE)
- <https://chromium.googlesource.com/chromium/src/testing/libfuzzer/+/refs/heads/master/efficient_fuzzing.md#execution-speed>
suggests that "You should aim for at least 1,000 exec/s from your fuzz
target locally" (i.e. one run should not take more than 1 ms), so try
this minimal approach first. The alternative would be to start from the
existing loolwsd_fuzzer binary, then step by step cut it down to not
fork(), not do any network traffic, etc -- till it's fast enough that
the fuzzer can find interesting input
- the various configurations start to be really complex (the matrix is
just very large), so try to use Util::isFuzzing() for fuzzer-specific
changes (this is what core.git does as well), and only resort to ifdefs
for the Util::isFuzzing() itself
Change-Id: I72dc1193b34c93eacb5d8e39cef42387d42bd72f
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/89226
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Michael Meeks <michael.meeks@collabora.com>
2020-02-21 08:52:20 -06:00
|
|
|
clientsession_fuzzer_CPPFLAGS = \
|
|
|
|
$(AM_CPPFLAGS)
|
|
|
|
clientsession_fuzzer_SOURCES = \
|
2022-08-05 21:20:16 -05:00
|
|
|
$(common_fuzzer_sources) \
|
Add an initial libfuzzer based fuzzer
- target ClientSession::_handleInput(), since crashing there would bring
down the whole loolwsd (not just a kit process), and it deals with
input from untrusted users (browsers)
- add a --enable-fuzzers configure switch to build with
-fsanitize=fuzzer (compared to normal sanitizers build, this is the only
special flag needed)
- configuring other sanitizers is not done automatically, either use
--with-sanitizer=... or the environment variables from LODE's sanitizer
config
- run the actual fuzzer like this:
./clientsession_fuzzer -max_len=16384 fuzzer/data/
- note that at least openSUSE Leap 15.1 sadly ships with a clang with
libfuzzer static libs removed from the package, so you need a
self-built clang to run the fuzzer (either manual build or one from
LODE)
- <https://chromium.googlesource.com/chromium/src/testing/libfuzzer/+/refs/heads/master/efficient_fuzzing.md#execution-speed>
suggests that "You should aim for at least 1,000 exec/s from your fuzz
target locally" (i.e. one run should not take more than 1 ms), so try
this minimal approach first. The alternative would be to start from the
existing loolwsd_fuzzer binary, then step by step cut it down to not
fork(), not do any network traffic, etc -- till it's fast enough that
the fuzzer can find interesting input
- the various configurations start to be really complex (the matrix is
just very large), so try to use Util::isFuzzing() for fuzzer-specific
changes (this is what core.git does as well), and only resort to ifdefs
for the Util::isFuzzing() itself
Change-Id: I72dc1193b34c93eacb5d8e39cef42387d42bd72f
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/89226
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Michael Meeks <michael.meeks@collabora.com>
2020-02-21 08:52:20 -06:00
|
|
|
fuzzer/ClientSession.cpp
|
|
|
|
clientsession_fuzzer_LDFLAGS = -fsanitize=fuzzer $(AM_LDFLAGS)
|
2023-10-02 08:37:28 -05:00
|
|
|
clientsession_fuzzer_LDADD = libsimd.a
|
Add an initial libfuzzer based fuzzer
- target ClientSession::_handleInput(), since crashing there would bring
down the whole loolwsd (not just a kit process), and it deals with
input from untrusted users (browsers)
- add a --enable-fuzzers configure switch to build with
-fsanitize=fuzzer (compared to normal sanitizers build, this is the only
special flag needed)
- configuring other sanitizers is not done automatically, either use
--with-sanitizer=... or the environment variables from LODE's sanitizer
config
- run the actual fuzzer like this:
./clientsession_fuzzer -max_len=16384 fuzzer/data/
- note that at least openSUSE Leap 15.1 sadly ships with a clang with
libfuzzer static libs removed from the package, so you need a
self-built clang to run the fuzzer (either manual build or one from
LODE)
- <https://chromium.googlesource.com/chromium/src/testing/libfuzzer/+/refs/heads/master/efficient_fuzzing.md#execution-speed>
suggests that "You should aim for at least 1,000 exec/s from your fuzz
target locally" (i.e. one run should not take more than 1 ms), so try
this minimal approach first. The alternative would be to start from the
existing loolwsd_fuzzer binary, then step by step cut it down to not
fork(), not do any network traffic, etc -- till it's fast enough that
the fuzzer can find interesting input
- the various configurations start to be really complex (the matrix is
just very large), so try to use Util::isFuzzing() for fuzzer-specific
changes (this is what core.git does as well), and only resort to ifdefs
for the Util::isFuzzing() itself
Change-Id: I72dc1193b34c93eacb5d8e39cef42387d42bd72f
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/89226
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Michael Meeks <michael.meeks@collabora.com>
2020-02-21 08:52:20 -06:00
|
|
|
|
2021-04-23 07:05:23 -05:00
|
|
|
httpresponse_fuzzer_CPPFLAGS = \
|
2021-04-22 02:43:03 -05:00
|
|
|
$(AM_CPPFLAGS)
|
2021-04-23 07:05:23 -05:00
|
|
|
httpresponse_fuzzer_SOURCES = \
|
2022-08-05 21:20:16 -05:00
|
|
|
$(common_fuzzer_sources) \
|
2021-04-23 07:05:23 -05:00
|
|
|
fuzzer/HttpResponse.cpp
|
|
|
|
httpresponse_fuzzer_LDFLAGS = -fsanitize=fuzzer $(AM_LDFLAGS)
|
2023-10-02 08:37:28 -05:00
|
|
|
httpresponse_fuzzer_LDADD = libsimd.a
|
2021-04-22 02:43:03 -05:00
|
|
|
|
2021-05-26 21:04:02 -05:00
|
|
|
httpecho_fuzzer_CPPFLAGS = \
|
|
|
|
$(AM_CPPFLAGS) \
|
|
|
|
-I${top_srcdir}/test
|
|
|
|
httpecho_fuzzer_SOURCES = \
|
2022-08-05 21:20:16 -05:00
|
|
|
$(common_fuzzer_sources) \
|
2021-05-26 21:04:02 -05:00
|
|
|
fuzzer/HttpEcho.cpp
|
|
|
|
httpecho_fuzzer_LDFLAGS = -fsanitize=fuzzer $(AM_LDFLAGS)
|
2023-10-02 08:37:28 -05:00
|
|
|
httpecho_fuzzer_LDADD = libsimd.a
|
2021-05-26 21:04:02 -05:00
|
|
|
|
2022-04-10 10:28:15 -05:00
|
|
|
endif # ENABLE_LIBFUZZER
|
|
|
|
|
2017-02-19 11:06:45 -06:00
|
|
|
clientnb_SOURCES = net/clientnb.cpp \
|
2021-06-17 05:31:27 -05:00
|
|
|
common/DummyTraceEventEmitter.cpp \
|
2017-02-19 11:06:45 -06:00
|
|
|
common/Log.cpp \
|
2021-03-27 16:39:45 -05:00
|
|
|
common/StringVector.cpp \
|
2017-02-19 11:06:45 -06:00
|
|
|
common/Util.cpp
|
2017-02-14 16:57:03 -06:00
|
|
|
|
2021-11-17 11:08:27 -06:00
|
|
|
coolmount_SOURCES = tools/mount.cpp
|
2016-11-24 08:56:06 -06:00
|
|
|
|
2021-11-17 11:19:53 -06:00
|
|
|
coolmap_SOURCES = tools/map.cpp
|
2016-11-24 08:56:06 -06:00
|
|
|
|
2021-11-17 11:44:09 -06:00
|
|
|
coolconvert_SOURCES = tools/Tool.cpp
|
2016-11-24 08:56:06 -06:00
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
coolstress_CPPFLAGS = -DTDOC=\"$(abs_top_srcdir)/test/data\" ${include_paths}
|
|
|
|
coolstress_SOURCES = tools/Stress.cpp \
|
2021-06-17 05:31:27 -05:00
|
|
|
common/DummyTraceEventEmitter.cpp \
|
2021-08-10 16:11:13 -05:00
|
|
|
$(shared_sources)
|
2016-11-24 08:56:06 -06:00
|
|
|
|
2021-11-15 07:47:53 -06:00
|
|
|
coolconfig_SOURCES = tools/Config.cpp \
|
2022-01-08 10:38:21 -06:00
|
|
|
tools/ConfigMigrationAssistant.cpp \
|
2021-06-17 05:31:27 -05:00
|
|
|
common/DummyTraceEventEmitter.cpp \
|
2017-07-21 09:33:19 -05:00
|
|
|
common/Crypto.cpp \
|
|
|
|
common/Log.cpp \
|
2020-02-28 03:50:58 -06:00
|
|
|
common/StringVector.cpp \
|
2017-07-21 09:33:19 -05:00
|
|
|
common/Util.cpp
|
2017-05-24 03:52:24 -05:00
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
coolsocketdump_SOURCES = tools/WebSocketDump.cpp \
|
2021-06-17 05:31:27 -05:00
|
|
|
common/DummyTraceEventEmitter.cpp \
|
2018-04-17 08:01:49 -05:00
|
|
|
$(shared_sources)
|
|
|
|
|
2016-11-24 08:56:06 -06:00
|
|
|
wsd_headers = wsd/Admin.hpp \
|
|
|
|
wsd/AdminModel.hpp \
|
|
|
|
wsd/Auth.hpp \
|
|
|
|
wsd/ClientSession.hpp \
|
2023-06-08 04:38:03 -05:00
|
|
|
wsd/ContentSecurityPolicy.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
wsd/DocumentBroker.hpp \
|
2020-03-04 07:54:04 -06:00
|
|
|
wsd/ProxyProtocol.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
wsd/Exceptions.hpp \
|
|
|
|
wsd/FileServer.hpp \
|
2022-06-22 08:44:29 -05:00
|
|
|
wsd/ProxyRequestHandler.hpp \
|
2021-11-18 06:08:14 -06:00
|
|
|
wsd/COOLWSD.hpp \
|
2024-02-11 10:42:22 -06:00
|
|
|
wsd/ClientRequestDispatcher.hpp \
|
2019-11-21 14:39:01 -06:00
|
|
|
wsd/ProofKey.hpp \
|
2020-05-12 10:19:41 -05:00
|
|
|
wsd/RequestDetails.hpp \
|
2023-03-04 12:24:01 -06:00
|
|
|
wsd/RequestVettingStation.hpp \
|
2016-12-11 11:03:38 -06:00
|
|
|
wsd/SenderQueue.hpp \
|
2020-05-06 11:02:51 -05:00
|
|
|
wsd/ServerURL.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
wsd/Storage.hpp \
|
2023-02-28 05:30:00 -06:00
|
|
|
wsd/StorageConnectionManager.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
wsd/TileCache.hpp \
|
|
|
|
wsd/TileDesc.hpp \
|
|
|
|
wsd/TraceFile.hpp \
|
2021-10-21 14:29:15 -05:00
|
|
|
wsd/UserMessages.hpp \
|
2022-03-24 05:23:34 -05:00
|
|
|
wsd/QuarantineUtil.hpp \
|
2023-11-06 05:04:27 -06:00
|
|
|
wsd/HostUtil.hpp \
|
|
|
|
wsd/WopiProxy.hpp
|
2016-11-24 08:56:06 -06:00
|
|
|
|
|
|
|
shared_headers = common/Common.hpp \
|
2019-06-22 11:45:36 -05:00
|
|
|
common/Clipboard.hpp \
|
2017-10-03 14:48:28 -05:00
|
|
|
common/Crypto.hpp \
|
2018-03-07 05:18:57 -06:00
|
|
|
common/JsonUtil.hpp \
|
2016-11-25 05:58:13 -06:00
|
|
|
common/FileUtil.hpp \
|
wsd: faster jail setup via bind-mount
loolmount now works and supports mounting and
unmounting, plus numerous improvements,
refactoring, logging, etc.. When enabled,
binding improves the jail setup time by anywhere
from 2x to orders of magnitude (in docker, f.e.).
A new config entry mount_jail_tree controls
whether mounting is used or the old method of
linking/copying of jail contents. It is set to
true by default and falls back to linking/copying.
A test mount is done when the setting is enabled,
and if mounting fails, it's disabled to avoid noise.
Temporarily disabled for unit-tests until we can
cleanup lingering mounts after Jenkins aborts our
build job. In a future patch we will have mount/jail
cleanup as part of make.
The network/system files in /etc that need frequent
refreshing are now updated in systemplate to make
their most recent version available in the jails.
These files can change during the course of loolwsd
lifetime, and are unlikely to be updated in
systemplate after installation at all. We link to
them in the systemplate/etc directory, and if that
fails, we copy them before forking each kit
instance to have the latest.
This reworks the approach used to bind-mount the
jails and the templates such that the total is
now down to only three mounts: systemplate, lo, tmp.
As now systemplate and lotemplate are shared, they
must be mounted as readonly, this means that user/
must now be moved into tmp/user/ which is writable.
The mount-points must be recursive, because we mount
lo/ within the mount-point of systemplate (which is
the root of the jail). But because we (re)bind
recursively, and because both systemplate and
lotemplate are mounted for each jails, we need to
make them unbindable, so they wouldn't multiply the
mount-points for each jails (an explosive growth!)
Contrarywise, we don't want the mount-points to
be shared, because we don't expect to add/remove
mounts after a jail is created.
The random temp directory is now created and set
correctly, plus many logging and other improvements.
Change-Id: Iae3fda5e876cf47d2cae6669a87b5b826a8748df
Reviewed-on: https://gerrit.libreoffice.org/c/online/+/92829
Tested-by: Jenkins
Tested-by: Jenkins CollaboraOffice <jenkinscollaboraoffice@gmail.com>
Reviewed-by: Ashod Nakashian <ashnakash@gmail.com>
2020-04-09 08:02:58 -05:00
|
|
|
common/JailUtil.hpp \
|
2023-03-14 17:22:30 -05:00
|
|
|
common/LangUtil.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Log.hpp \
|
|
|
|
common/Protocol.hpp \
|
2022-04-01 20:04:41 -05:00
|
|
|
common/StateEnum.hpp \
|
2020-02-28 03:50:58 -06:00
|
|
|
common/StringVector.hpp \
|
2017-04-28 05:02:06 -05:00
|
|
|
common/Seccomp.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Session.hpp \
|
|
|
|
common/Unit.hpp \
|
|
|
|
common/Util.hpp \
|
2021-03-27 16:39:45 -05:00
|
|
|
common/ConfigUtil.hpp \
|
2018-11-22 05:03:42 -06:00
|
|
|
common/Authorization.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/MessageQueue.hpp \
|
2017-02-20 12:28:16 -06:00
|
|
|
common/Message.hpp \
|
2020-04-24 02:46:54 -05:00
|
|
|
common/MobileApp.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Png.hpp \
|
2021-06-01 05:21:09 -05:00
|
|
|
common/TraceEvent.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
common/Rectangle.hpp \
|
2020-07-10 06:59:59 -05:00
|
|
|
common/RenderTiles.hpp \
|
2016-11-25 05:55:52 -06:00
|
|
|
common/SigUtil.hpp \
|
2016-12-06 07:47:48 -06:00
|
|
|
common/security.h \
|
2017-02-26 23:01:17 -06:00
|
|
|
common/SpookyV2.h \
|
2021-09-13 14:24:50 -05:00
|
|
|
common/CommandControl.hpp \
|
2023-09-25 08:58:30 -05:00
|
|
|
common/Simd.hpp \
|
2020-11-19 10:29:53 -06:00
|
|
|
net/Buffer.hpp \
|
2017-03-23 12:14:51 -05:00
|
|
|
net/DelaySocket.hpp \
|
2018-11-21 13:41:13 -06:00
|
|
|
net/FakeSocket.hpp \
|
2021-01-10 08:35:42 -06:00
|
|
|
net/HttpRequest.hpp \
|
2020-10-26 07:45:23 -05:00
|
|
|
net/HttpHelper.hpp \
|
2021-01-12 21:48:26 -06:00
|
|
|
net/NetUtil.hpp \
|
2017-03-14 09:40:16 -05:00
|
|
|
net/ServerSocket.hpp \
|
2017-02-26 23:01:17 -06:00
|
|
|
net/Socket.hpp \
|
2017-03-10 03:44:06 -06:00
|
|
|
net/WebSocketHandler.hpp \
|
2021-04-29 05:01:47 -05:00
|
|
|
net/WebSocketSession.hpp \
|
2017-03-10 03:44:06 -06:00
|
|
|
tools/Replay.hpp
|
2017-02-26 23:01:17 -06:00
|
|
|
if ENABLE_SSL
|
|
|
|
shared_headers += net/Ssl.hpp \
|
|
|
|
net/SslSocket.hpp
|
|
|
|
endif
|
2016-11-24 08:56:06 -06:00
|
|
|
|
|
|
|
kit_headers = kit/ChildSession.hpp \
|
2017-11-27 18:33:46 -06:00
|
|
|
kit/Delta.hpp \
|
2023-08-28 15:14:46 -05:00
|
|
|
kit/DeltaSimd.h \
|
2017-02-08 04:24:19 -06:00
|
|
|
kit/DummyLibreOfficeKit.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
kit/Kit.hpp \
|
2019-10-18 14:15:54 -05:00
|
|
|
kit/KitHelper.hpp \
|
2020-07-02 08:57:22 -05:00
|
|
|
kit/SetupKitEnvironment.hpp \
|
2019-10-18 14:15:54 -05:00
|
|
|
kit/Watermark.hpp
|
2016-11-24 08:56:06 -06:00
|
|
|
|
|
|
|
noinst_HEADERS = $(wsd_headers) $(shared_headers) $(kit_headers) \
|
2021-11-18 06:08:14 -06:00
|
|
|
tools/COOLWebSocket.hpp \
|
2021-10-08 15:51:41 -05:00
|
|
|
test/UnitHTTP.hpp \
|
2021-04-29 07:41:04 -05:00
|
|
|
test/HttpTestServer.hpp \
|
2017-09-27 08:55:44 -05:00
|
|
|
test/WopiTestServer.hpp \
|
2021-11-18 06:08:14 -06:00
|
|
|
test/countcoolkits.hpp \
|
2020-03-16 06:37:43 -05:00
|
|
|
test/lokassert.hpp \
|
2017-06-06 05:14:43 -05:00
|
|
|
test/test.hpp \
|
2020-12-20 17:35:31 -06:00
|
|
|
test/testlog.hpp \
|
2021-04-28 07:56:03 -05:00
|
|
|
test/HttpTestServer.hpp \
|
2022-02-05 17:14:38 -06:00
|
|
|
test/WOPIUploadConflictCommon.hpp \
|
2022-11-07 19:27:12 -06:00
|
|
|
test/UnitWSDClient.hpp \
|
2016-11-24 08:56:06 -06:00
|
|
|
test/helpers.hpp
|
2016-03-31 02:01:05 -05:00
|
|
|
|
2022-03-13 17:28:31 -05:00
|
|
|
GIT_BRANCH := $(shell git symbolic-ref --short HEAD)
|
|
|
|
GIT_HASH := $(shell git log -1 --format=%h)
|
|
|
|
|
2017-04-28 04:54:18 -05:00
|
|
|
dist-hook:
|
|
|
|
git log -1 --format=%h > $(distdir)/dist_git_hash 2> /dev/null || rm $(distdir)/dist_git_hash
|
2019-12-03 08:14:57 -06:00
|
|
|
mkdir -p $(distdir)/bundled/include/LibreOfficeKit/
|
|
|
|
cp @LOKIT_PATH@/LibreOfficeKit/LibreOfficeKit.h \
|
|
|
|
@LOKIT_PATH@/LibreOfficeKit/LibreOfficeKit.hxx \
|
|
|
|
@LOKIT_PATH@/LibreOfficeKit/LibreOfficeKitEnums.h \
|
|
|
|
@LOKIT_PATH@/LibreOfficeKit/LibreOfficeKitInit.h \
|
|
|
|
@LOKIT_PATH@/LibreOfficeKit/LibreOfficeKitTypes.h \
|
|
|
|
$(distdir)/bundled/include/LibreOfficeKit/
|
2017-04-28 04:54:18 -05:00
|
|
|
|
2016-03-31 02:01:05 -05:00
|
|
|
EXTRA_DIST = discovery.xml \
|
2016-08-26 05:57:33 -05:00
|
|
|
favicon.ico \
|
2021-11-18 06:08:14 -06:00
|
|
|
coolkitconfig.xcu \
|
|
|
|
coolwsd.spec \
|
|
|
|
coolwsd.xml.in \
|
|
|
|
coolwsd.service \
|
2017-03-20 17:22:26 -05:00
|
|
|
debian/compat \
|
|
|
|
debian/copyright \
|
2021-11-18 06:08:14 -06:00
|
|
|
debian/coolwsd.preinst \
|
|
|
|
debian/coolwsd.service \
|
2017-03-20 17:22:26 -05:00
|
|
|
debian/rules \
|
|
|
|
debian/source/format \
|
|
|
|
debian/changelog \
|
|
|
|
debian/control \
|
2021-11-18 06:08:14 -06:00
|
|
|
debian/coolwsd.postinst \
|
|
|
|
debian/coolwsd.postrm \
|
2016-04-14 07:50:48 -05:00
|
|
|
etc/key.pem \
|
|
|
|
etc/cert.pem \
|
2017-12-19 01:35:32 -06:00
|
|
|
etc/ca-chain.cert.pem \
|
2021-11-18 06:08:14 -06:00
|
|
|
etc/apache2/coolwsd.conf \
|
|
|
|
etc/nginx/coolwsd.conf \
|
2018-05-14 03:49:46 -05:00
|
|
|
scripts/unocommands.py \
|
2020-10-07 04:59:20 -05:00
|
|
|
scripts/refresh-git-hooks \
|
2021-03-31 10:24:33 -05:00
|
|
|
README.md \
|
2024-02-26 13:28:14 -06:00
|
|
|
THIRDPARTYLICENSES \
|
2018-05-14 03:49:46 -05:00
|
|
|
$(man_MANS)
|
2015-06-09 14:33:46 -05:00
|
|
|
|
2020-07-16 03:43:57 -05:00
|
|
|
if ENABLE_LIBFUZZER
|
|
|
|
CLEANUP_COMMAND=true
|
|
|
|
else
|
2021-11-18 06:08:14 -06:00
|
|
|
# Use coolwsd to cleanup jails, if any. If it fails, we may have a broken/old coolwsd binary, remove it to rebuild.
|
2021-11-17 04:16:49 -06:00
|
|
|
# A CI box may switch branches without cleaning up the binaries, if coolwsd from a broken branch is used here
|
|
|
|
# it will fail all subsequent builds, until it's rebuilt from the new branch. So removing coolwsd after failing is needed.
|
|
|
|
CLEANUP_COMMAND=if test -s ./coolwsd; then echo "Cleaning up..." && ./coolwsd --disable-cool-user-checking --cleanup --o:logging.level=trace || rm ./coolwsd; fi
|
2020-07-16 03:43:57 -05:00
|
|
|
endif
|
2020-06-28 10:30:22 -05:00
|
|
|
|
2023-07-12 06:12:15 -05:00
|
|
|
CLEANUP_COVERAGE=rm -rf ${abs_top_srcdir}/gcov; find . -iname "*.gc??" -delete
|
|
|
|
|
2016-04-11 12:21:16 -05:00
|
|
|
if HAVE_LO_PATH
|
|
|
|
|
2016-04-12 01:29:57 -05:00
|
|
|
SYSTEM_STAMP = @SYSTEMPLATE_PATH@/system_stamp
|
2020-03-04 07:09:47 -06:00
|
|
|
CAPABILITIES = $(if @ENABLE_SETCAP@,true,false)
|
2020-03-05 08:44:25 -06:00
|
|
|
RUN_GDB = $(if $(GDB_FRONTEND),$(GDB_FRONTEND),gdb --tui --args)
|
2016-04-12 01:29:57 -05:00
|
|
|
|
2020-07-01 12:06:46 -05:00
|
|
|
if ENABLE_SETCAP
|
2021-11-17 11:08:27 -06:00
|
|
|
SET_CAPS_COMMAND=sudo @SETCAP@ cap_fowner,cap_chown,cap_mknod,cap_sys_chroot=ep coolforkit && sudo @SETCAP@ cap_sys_admin=ep coolmount
|
2020-07-01 12:06:46 -05:00
|
|
|
else
|
2020-10-07 09:34:59 -05:00
|
|
|
SET_CAPS_COMMAND=echo "Skipping capability setting"
|
2020-07-01 12:06:46 -05:00
|
|
|
endif
|
|
|
|
|
2020-07-16 03:43:57 -05:00
|
|
|
if ENABLE_LIBFUZZER
|
|
|
|
CLEANUP_DEPS=
|
|
|
|
else
|
2021-11-17 11:08:27 -06:00
|
|
|
CLEANUP_DEPS=coolwsd coolmount coolforkit
|
2020-07-16 03:43:57 -05:00
|
|
|
endif
|
|
|
|
|
2021-11-18 06:08:14 -06:00
|
|
|
# Build coolwsd and coolmount first, so we can cleanup before updating
|
2020-07-01 12:06:46 -05:00
|
|
|
# the systemplate directory, which we can't rm if it's mounted.
|
2021-11-17 15:09:50 -06:00
|
|
|
$(SYSTEM_STAMP): ${top_srcdir}/coolwsd-systemplate-setup $(CLEANUP_DEPS)
|
2020-08-23 11:11:23 -05:00
|
|
|
$(SET_CAPS_COMMAND)
|
2020-07-01 12:06:46 -05:00
|
|
|
$(CLEANUP_COMMAND)
|
2022-02-15 16:44:19 -06:00
|
|
|
if test "z@SYSTEMPLATE_PATH@" != "z"; then chmod u+w -R --silent "@SYSTEMPLATE_PATH@" ; rm -rf "@SYSTEMPLATE_PATH@" && \
|
2021-11-17 15:09:50 -06:00
|
|
|
${top_srcdir}/coolwsd-systemplate-setup "@SYSTEMPLATE_PATH@" "@LO_PATH@" && touch $@; fi
|
2016-04-11 12:21:16 -05:00
|
|
|
|
2020-07-01 12:06:46 -05:00
|
|
|
@JAILS_PATH@:
|
2022-02-10 17:12:43 -06:00
|
|
|
@$(CLEANUP_COMMAND)
|
2020-07-01 12:06:46 -05:00
|
|
|
mkdir -p $@
|
2016-04-11 12:21:16 -05:00
|
|
|
|
2020-07-02 13:17:37 -05:00
|
|
|
cleanup:
|
|
|
|
$(CLEANUP_COMMAND)
|
|
|
|
|
|
|
|
# Always cleanup before removing the binaries.
|
|
|
|
# Note: this can break with -j option!
|
|
|
|
clean-am: cleanup clean-binPROGRAMS clean-generic clean-libtool clean-local clean-noinstPROGRAMS mostlyclean-am
|
|
|
|
|
2016-04-11 12:21:16 -05:00
|
|
|
clean-local:
|
2020-06-28 10:30:22 -05:00
|
|
|
$(CLEANUP_COMMAND)
|
2023-05-26 18:33:43 -05:00
|
|
|
if test "z@SYSTEMPLATE_PATH@" != "z"; then rm -rf "@SYSTEMPLATE_PATH@" || echo "WARNING: failed to remove the systemplate"; fi
|
|
|
|
if test "z@JAILS_PATH@" != "z"; then rm -rf "@JAILS_PATH@" || echo "WARNING: failed to remove all jails cleanly"; fi
|
2021-11-09 08:27:29 -06:00
|
|
|
rm -rf "${top_srcdir}/loleaflet"
|
2022-03-03 13:55:12 -06:00
|
|
|
rm -rf loolconfig loolconvert loolforkit loolmap loolmount # kill old binaries
|
2022-04-14 18:05:26 -05:00
|
|
|
rm -rf loolwsd loolwsd_fuzzer coolwsd_fuzzer loolstress loolsocketdump
|
2023-07-12 06:12:15 -05:00
|
|
|
$(CLEANUP_COVERAGE)
|
2016-04-11 12:21:16 -05:00
|
|
|
|
2021-05-14 03:33:18 -05:00
|
|
|
if ENABLE_DEBUG
|
2021-11-18 06:08:14 -06:00
|
|
|
# can write to /tmp/coolwsd.log
|
2021-05-14 03:33:18 -05:00
|
|
|
OUTPUT_TO_FILE=true
|
|
|
|
else
|
2021-11-18 06:08:14 -06:00
|
|
|
# can't write to /var/log/coolwsd.log
|
2021-05-14 03:33:18 -05:00
|
|
|
OUTPUT_TO_FILE=false
|
|
|
|
endif
|
|
|
|
|
2021-09-10 10:59:11 -05:00
|
|
|
setup-wsd: all @JAILS_PATH@
|
2021-11-18 06:08:14 -06:00
|
|
|
@echo "Launching coolwsd"
|
2017-04-05 08:38:33 -05:00
|
|
|
@fc-cache "@LO_PATH@"/share/fonts/truetype
|
2016-04-14 04:36:18 -05:00
|
|
|
@cp $(abs_top_srcdir)/test/data/hello.odt $(abs_top_srcdir)/test/data/hello-world.odt
|
2018-11-01 05:29:23 -05:00
|
|
|
@cp $(abs_top_srcdir)/test/data/hello.ods $(abs_top_srcdir)/test/data/hello-world.ods
|
|
|
|
@cp $(abs_top_srcdir)/test/data/hello.odp $(abs_top_srcdir)/test/data/hello-world.odp
|
2016-04-13 11:31:10 -05:00
|
|
|
@echo
|
2021-09-10 10:59:11 -05:00
|
|
|
|
2023-05-31 02:01:47 -05:00
|
|
|
COMMON_PARAMS = \
|
|
|
|
--o:sys_template_path="@SYSTEMPLATE_PATH@" \
|
|
|
|
--o:child_root_path="@JAILS_PATH@" --o:storage.filesystem[@allow]=true \
|
|
|
|
--o:ssl.cert_file_path="$(abs_top_srcdir)/etc/cert.pem" \
|
|
|
|
--o:ssl.key_file_path="$(abs_top_srcdir)/etc/key.pem" \
|
|
|
|
--o:ssl.ca_file_path="$(abs_top_srcdir)/etc/ca-chain.cert.pem" \
|
|
|
|
--o:admin_console.username=admin --o:admin_console.password=admin
|
|
|
|
|
2021-09-10 10:59:11 -05:00
|
|
|
run: setup-wsd
|
2023-05-31 02:01:47 -05:00
|
|
|
./coolwsd $(COMMON_PARAMS) \
|
2023-06-10 13:04:59 -05:00
|
|
|
--o:security.capabilities="$(CAPABILITIES)" \
|
|
|
|
--o:logging.file[@enable]=${OUTPUT_TO_FILE} --o:logging.level=trace \
|
|
|
|
--o:trace_event[@enable]=true
|
2016-05-12 06:24:38 -05:00
|
|
|
|
2020-03-04 13:38:17 -06:00
|
|
|
if ENABLE_DEBUG
|
2021-09-10 10:59:11 -05:00
|
|
|
run-one: setup-wsd
|
2023-05-31 02:01:47 -05:00
|
|
|
./coolwsd $(COMMON_PARAMS) \
|
2023-06-10 13:04:59 -05:00
|
|
|
--o:security.capabilities="$(CAPABILITIES)" \
|
|
|
|
--o:logging.file[@enable]=true --o:logging.level=trace \
|
|
|
|
--singlekit
|
2023-11-29 10:11:18 -06:00
|
|
|
|
|
|
|
run-inproc: setup-wsd
|
|
|
|
@echo "Launching coolwsd-inproc"
|
|
|
|
./coolwsd-inproc $(COMMON_PARAMS) \
|
|
|
|
--o:logging.file[@enable]=true --o:logging.level=trace
|
|
|
|
|
|
|
|
run-massif-inproc: setup-wsd
|
|
|
|
@echo "Launching coolwsd under valgrind for single process"
|
|
|
|
valgrind --tool=massif --num-callers=64 --trace-children=no -v \
|
|
|
|
./coolwsd-inproc $(COMMON_PARAMS) \
|
|
|
|
--o:logging.file[@enable]=false --o:logging.level=trace
|
2020-03-04 13:38:17 -06:00
|
|
|
endif
|
|
|
|
|
2019-02-12 04:47:24 -06:00
|
|
|
sync-writer:
|
2021-11-03 08:22:00 -05:00
|
|
|
browser-sync start --config browsersync-config.js --startPath "browser/96c23f663/cool.html?file_path=file://$(abs_top_srcdir)/test/data/hello-world.odt"
|
2019-02-12 04:47:24 -06:00
|
|
|
|
|
|
|
sync-calc:
|
2021-11-03 08:22:00 -05:00
|
|
|
browser-sync start --config browsersync-config.js --startPath "browser/96c23f663/cool.html?file_path=file://$(abs_top_srcdir)/test/data/hello-world.ods"
|
2019-02-12 04:47:24 -06:00
|
|
|
|
|
|
|
sync-impress:
|
2021-11-03 08:22:00 -05:00
|
|
|
browser-sync start --config browsersync-config.js --startPath "browser/96c23f663/cool.html?file_path=file://$(abs_top_srcdir)/test/data/hello-world.odp"
|
2019-02-12 04:47:24 -06:00
|
|
|
|
2021-09-10 10:59:11 -05:00
|
|
|
run-trace: setup-wsd
|
2023-06-10 13:04:59 -05:00
|
|
|
./coolwsd $(COMMON_PARAMS) \
|
|
|
|
--o:logging.file[@enable]=false --o:logging.level=trace \
|
|
|
|
--o:trace[@enable]=true --o:trace.path=${builddir}/trace.txt.gz \
|
|
|
|
--o:trace.outgoing.record=false
|
2021-09-10 10:59:11 -05:00
|
|
|
|
|
|
|
run-valgrind: setup-wsd
|
2021-11-18 06:08:14 -06:00
|
|
|
@echo "Launching coolwsd under valgrind (but not forkit/coolkit, yet)"
|
2016-05-12 06:24:38 -05:00
|
|
|
valgrind --tool=memcheck --trace-children=no -v --read-var-info=yes \
|
2023-06-10 13:04:59 -05:00
|
|
|
./coolwsd $(COMMON_PARAMS) \
|
|
|
|
--o:logging.file[@enable]=false --o:logging.level=trace
|
2016-09-30 16:53:48 -05:00
|
|
|
|
2021-09-10 10:59:11 -05:00
|
|
|
run-gdb: setup-wsd
|
2021-11-17 04:16:49 -06:00
|
|
|
@echo "Launching coolwsd under gdb"
|
2020-03-05 08:44:25 -06:00
|
|
|
$(RUN_GDB) \
|
2023-06-10 13:04:59 -05:00
|
|
|
./coolwsd $(COMMON_PARAMS) \
|
|
|
|
--o:security.capabilities="false" \
|
|
|
|
--o:logging.file[@enable]=false --o:logging.level=error
|
2018-04-25 06:46:48 -05:00
|
|
|
|
2021-09-10 10:59:11 -05:00
|
|
|
run-callgrind: setup-wsd
|
2021-11-17 04:16:49 -06:00
|
|
|
@echo "Launching coolwsd under valgrind's callgrind"
|
2017-04-05 13:20:47 -05:00
|
|
|
valgrind --tool=callgrind --simulate-cache=yes --dump-instr=yes --num-callers=50 --error-limit=no --trace-children=yes \
|
2023-06-10 13:04:59 -05:00
|
|
|
./coolwsd $(COMMON_PARAMS) \
|
|
|
|
--o:security.capabilities="false" \
|
|
|
|
--o:logging.file[@enable]=false --o:logging.level=error
|
2018-01-26 13:27:51 -06:00
|
|
|
|
2021-09-10 10:59:11 -05:00
|
|
|
run-strace: setup-wsd
|
2021-11-17 04:16:49 -06:00
|
|
|
@echo "Launching coolwsd under strace"
|
2018-01-26 13:27:51 -06:00
|
|
|
strace -o strace.log -f -tt -s 256 \
|
2023-06-10 13:04:59 -05:00
|
|
|
./coolwsd $(COMMON_PARAMS) \
|
|
|
|
--o:security.capabilities="false" \
|
|
|
|
--o:logging.file[@enable]=false --o:logging.level=error
|
2018-01-26 13:27:51 -06:00
|
|
|
|
2016-04-12 01:29:57 -05:00
|
|
|
else
|
|
|
|
|
|
|
|
SYSTEM_STAMP =
|
|
|
|
|
2016-04-11 12:21:16 -05:00
|
|
|
endif
|
|
|
|
|
2021-09-10 10:59:11 -05:00
|
|
|
.PHONY: cleanup setup-wsd
|
2016-03-07 05:08:02 -06:00
|
|
|
|
2020-07-16 03:43:57 -05:00
|
|
|
if ENABLE_LIBFUZZER
|
|
|
|
ALL_LOCAL_DEPS=
|
|
|
|
else
|
2021-11-17 04:16:49 -06:00
|
|
|
ALL_LOCAL_DEPS=coolwsd
|
2020-07-16 03:43:57 -05:00
|
|
|
endif
|
|
|
|
|
2021-11-16 03:59:05 -06:00
|
|
|
# After building coolforkit, set its capabilities as required. Do it
|
2020-08-23 11:11:23 -05:00
|
|
|
# already after a plain 'make' to allow for testing without
|
|
|
|
# installing. When building for packaging, no need for this, as the
|
|
|
|
# capabilities won't survive packaging anyway. Instead, handle it when
|
|
|
|
# installing the RPM or Debian package.
|
|
|
|
all-local: $(ALL_LOCAL_DEPS) @JAILS_PATH@ $(SYSTEM_STAMP)
|
|
|
|
$(SET_CAPS_COMMAND)
|
2020-10-07 04:59:20 -05:00
|
|
|
@$(abs_top_srcdir)/scripts/refresh-git-hooks
|
2020-06-28 10:30:22 -05:00
|
|
|
|
2016-09-30 03:43:04 -05:00
|
|
|
# just run the build without any tests
|
|
|
|
build-nocheck: all-am
|
2018-08-31 05:24:17 -05:00
|
|
|
|
|
|
|
endif
|
2020-04-04 15:19:07 -05:00
|
|
|
|
|
|
|
define file_target
|
|
|
|
$(1): $(2)
|
|
|
|
|
|
|
|
endef
|
|
|
|
|
|
|
|
define file_targets
|
|
|
|
$(foreach file,$(1),$(call file_target,$(file),$(patsubst %.cmd,%.cpp,$(file))))
|
|
|
|
endef
|
|
|
|
|
|
|
|
CLANGXX_COMPILE_FLAGS=clang++ $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) \
|
|
|
|
$(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CXXFLAGS) $(CXXFLAGS)
|
|
|
|
|
|
|
|
JSON_COMPILE_FLAGS=$(subst ",\",$(subst \,\\,$(CLANGXX_COMPILE_FLAGS)))
|
|
|
|
|
2023-04-20 10:36:14 -05:00
|
|
|
JSON_COMPILE_SRC = $(patsubst %.cpp,%.cmd,$(wildcard **/*.cpp))
|
2020-04-04 15:19:07 -05:00
|
|
|
|
|
|
|
$(eval $(call file_targets,$(JSON_COMPILE_SRC)))
|
|
|
|
|
|
|
|
.cpp.cmd:
|
|
|
|
@echo -n "{\"directory\":\"$(abs_builddir)\",\"command\":\"" > $@
|
|
|
|
@echo -n $(JSON_COMPILE_FLAGS) >> $@
|
|
|
|
@echo -n "\",\"file\":\"$<\"}" >> $@
|
|
|
|
|
|
|
|
$(abs_srcdir)/compile_commands.json: $(JSON_COMPILE_SRC)
|
|
|
|
@echo -n "[" > $@
|
|
|
|
@for file in $(JSON_COMPILE_SRC) ; \
|
|
|
|
do \
|
|
|
|
cat $$file; \
|
|
|
|
echo ","; \
|
|
|
|
rm -f $$file; \
|
|
|
|
done >> $@
|
|
|
|
@echo -n "]" >> $@
|
|
|
|
|
|
|
|
compile_commands: $(abs_srcdir)/compile_commands.json
|
2021-05-22 09:29:59 -05:00
|
|
|
|
2021-11-03 08:22:00 -05:00
|
|
|
browser/node_modules: browser/package.json browser/archived-packages
|
|
|
|
@cd browser && npm install
|
2021-11-15 13:14:55 -06:00
|
|
|
|
2023-12-18 10:25:40 -06:00
|
|
|
eslint: browser/node_modules
|
|
|
|
browser/node_modules/.bin/eslint browser/src browser/js browser/admin/src \
|
|
|
|
--max-warnings 0 \
|
|
|
|
--resolve-plugins-relative-to browser \
|
|
|
|
--ignore-path browser/.eslintignore \
|
|
|
|
--no-eslintrc \
|
|
|
|
--config browser/.eslintrc
|
|
|
|
|
2021-11-15 13:14:55 -06:00
|
|
|
install-exec-hook:
|
|
|
|
cd $(DESTDIR)$(bindir) && \
|
2021-11-17 15:02:46 -06:00
|
|
|
$(LN_S) coolconfig loolconfig && \
|
2021-11-17 15:09:50 -06:00
|
|
|
$(LN_S) coolwsd loolwsd && \
|
|
|
|
$(LN_S) coolwsd-systemplate-setup loolwsd-systemplate-setup
|
2022-03-03 13:55:12 -06:00
|
|
|
|
|
|
|
stress_file=$(abs_top_srcdir)/test/data/hello-world.odt
|
|
|
|
trace_dir=$(abs_top_srcdir)/test/traces
|
|
|
|
stress:
|
|
|
|
@cp $(abs_top_srcdir)/test/data/hello.odt $(stress_file)
|
|
|
|
@echo "Watch at: https://localhost:9980/browser/12345/cool.html?file_path=$(stress_file)"
|
|
|
|
./coolstress wss://localhost:9980 \
|
|
|
|
$(stress_file) $(trace_dir)/writer-quick.txt \
|
|
|
|
$(stress_file) $(trace_dir)/writer-add-bullet.txt \
|
|
|
|
$(stress_file) $(trace_dir)/writer-mash-text-table.txt \
|
|
|
|
$(stress_file) $(trace_dir)/writer-document-edit.txt \
|
|
|
|
$(stress_file) $(trace_dir)/writer-mash-text-table.txt \
|
|
|
|
$(stress_file) $(trace_dir)/writer-hello-shape.txt \
|
|
|
|
$(stress_file) $(trace_dir)/writer-quick.txt
|
|
|
|
|
2022-03-13 17:28:31 -05:00
|
|
|
if ENABLE_CODE_COVERAGE
|
|
|
|
GEN_COVERAGE_COMMAND=mkdir -p ${abs_top_srcdir}/gcov && \
|
|
|
|
lcov --no-external --capture --rc 'lcov_excl_line=' --rc 'lcov_excl_br_line=LOG_|TST_|LOK_|WSD_|TRANSITION|assert' \
|
|
|
|
--compat libtool=on --directory ${abs_top_srcdir}/. --output-file ${abs_top_srcdir}/gcov/cool.coverage.test.info && \
|
|
|
|
genhtml --prefix ${abs_top_srcdir}/. --ignore-errors source ${abs_top_srcdir}/gcov/cool.coverage.test.info \
|
|
|
|
--legend --title "${GIT_BRANCH} @ ${GIT_HASH}" --output-directory=${abs_top_srcdir}/gcov/html && \
|
|
|
|
echo "Code-Coverage report generated in ${abs_top_srcdir}/gcov/html"
|
|
|
|
else
|
|
|
|
GEN_COVERAGE_COMMAND=true
|
|
|
|
endif
|
|
|
|
|
2023-07-03 09:09:47 -05:00
|
|
|
# typically the system nss won't work in a jail and fail to init which is fatal for
|
|
|
|
# exporting to pdf, which is something that gets tested
|
|
|
|
check-for-system-nss:
|
|
|
|
@if test -e "@LO_PATH@/../config_host.mk"; then \
|
|
|
|
if grep -q SYSTEM_NSS=TRUE "@LO_PATH@/../config_host.mk"; then \
|
|
|
|
echo make check will fail unless core is configured using --without-system-nss; \
|
|
|
|
exit 1; \
|
|
|
|
fi \
|
|
|
|
fi
|
|
|
|
|
2024-02-07 05:17:07 -06:00
|
|
|
check-recursive: eslint
|
|
|
|
|
|
|
|
check: check-for-system-nss eslint check-recursive
|
2022-03-13 17:28:31 -05:00
|
|
|
$(GEN_COVERAGE_COMMAND)
|
|
|
|
|
|
|
|
coverage-report:
|
|
|
|
$(GEN_COVERAGE_COMMAND)
|
|
|
|
|
2023-07-12 06:12:15 -05:00
|
|
|
coverage-clean:
|
|
|
|
$(CLEANUP_COVERAGE)
|
|
|
|
|
2022-05-09 14:30:28 -05:00
|
|
|
czech: check
|
|
|
|
@echo "This should do something much cooler"
|