• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (c) 2021-2024 Huawei Device Co., Ltd.
2# Licensed under the Apache License, Version 2.0 (the "License");
3# you may not use this file except in compliance with the License.
4# You may obtain a copy of the License at
5#
6#     http://www.apache.org/licenses/LICENSE-2.0
7#
8# Unless required by applicable law or agreed to in writing, software
9# distributed under the License is distributed on an "AS IS" BASIS,
10# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11# See the License for the specific language governing permissions and
12# limitations under the License.
13
14import("//build/ohos.gni")
15import("//foundation/communication/netmanager_base/netmanager_base_config.gni")
16
17config("net_policy_manager_config") {
18  include_dirs = [
19    "$INNERKITS_ROOT/netpolicyclient/include/proxy",
20    "$NETCONNMANAGER_COMMON_DIR/include",
21    "include",
22    "include/stub",
23    "$NETSYSCONTROLLER_ROOT_DIR/include",
24    "$NETSYSNATIVE_SOURCE_DIR/include/netsys",
25  ]
26}
27
28ohos_shared_library("net_policy_manager") {
29  sanitize = {
30    cfi = true
31    cfi_cross_dso = true
32    debug = false
33  }
34
35  branch_protector_ret = "pac_ret"
36
37  sources = [
38    "src/common/net_policy_event_handler.cpp",
39    "src/common/net_policy_file_event_handler.cpp",
40    "src/common/net_policy_service_common.cpp",
41    "src/common/netsys_policy_wrapper.cpp",
42    "src/core/net_policy_base.cpp",
43    "src/core/net_policy_callback.cpp",
44    "src/core/net_policy_core.cpp",
45    "src/core/net_policy_file.cpp",
46    "src/core/net_policy_firewall.cpp",
47    "src/core/net_policy_rule.cpp",
48    "src/core/net_policy_traffic.cpp",
49    "src/firewall_rule/device_idle_firewall_rule.cpp",
50    "src/firewall_rule/firewall_rule.cpp",
51    "src/firewall_rule/power_save_firewall_rule.cpp",
52    "src/net_access_policy_config.cpp",
53    "src/net_access_policy_database.cpp",
54    "src/net_policy_listener.cpp",
55    "src/net_policy_service.cpp",
56    "src/net_policy_db_clone.cpp",
57    "src/stub/net_policy_callback_proxy.cpp",
58    "src/stub/net_policy_service_stub.cpp",
59  ]
60
61  configs = [ ":net_policy_manager_config" ]
62
63  deps = [
64    "$INNERKITS_ROOT/netpolicyclient:net_policy_parcel",
65    "$INNERKITS_ROOT/netstatsclient:net_stats_manager_if",
66    "$NETCONNMANAGER_COMMON_DIR:net_service_common",
67    "$NETMANAGER_BASE_ROOT/utils:net_manager_common",
68    "$NETSYSCONTROLLER_ROOT_DIR:netsys_controller",
69  ]
70
71  cflags = common_cflags + [
72    "-fvisibility=hidden",
73  ]
74
75  cflags_cc = common_cflags + [
76    "-fvisibility=hidden",
77    "-fvisibility-inlines-hidden",
78  ]
79
80  ldflags = [
81    "-Wl,--exclude-libs=ALL",
82    "-Wl,--gc-sections",
83  ]
84
85  external_deps = [
86    "ability_base:want",
87    "ability_runtime:app_manager",
88    "ability_runtime:wantagent_innerkits",
89    "bundle_framework:appexecfwk_base",
90    "bundle_framework:appexecfwk_core",
91    "cJSON:cjson",
92    "c_utils:utils",
93    "common_event_service:cesfwk_innerkits",
94    "eventhandler:libeventhandler",
95    "ffrt:libffrt",
96    "hitrace:hitrace_meter",
97    "ipc:ipc_core",
98    "os_account:os_account_innerkits",
99    "relational_store:native_rdb",
100    "safwk:system_ability_fwk",
101    "samgr:samgr_proxy",
102    "time_service:time_client",
103    "config_policy:configpolicy_util",
104  ]
105
106  defines = [
107    "NETMGR_LOG_TAG = \"NetPolicyService\"",
108    "LOG_DOMAIN = 0xD0015B0",
109  ]
110
111  if (enable_netmgr_debug) {
112    defines += [ "NETMGR_DEBUG" ]
113  }
114
115  external_deps += [ "hilog:libhilog" ]
116
117  part_name = "netmanager_base"
118  subsystem_name = "communication"
119}
120
121ohos_static_library("net_policy_manager_static") {
122  testonly = true
123  sanitize = {
124    cfi = true
125    cfi_cross_dso = true
126    debug = false
127  }
128
129  branch_protector_ret = "pac_ret"
130
131  sources = [
132    "src/common/net_policy_event_handler.cpp",
133    "src/common/net_policy_file_event_handler.cpp",
134    "src/common/net_policy_service_common.cpp",
135    "src/common/netsys_policy_wrapper.cpp",
136    "src/core/net_policy_base.cpp",
137    "src/core/net_policy_callback.cpp",
138    "src/core/net_policy_core.cpp",
139    "src/core/net_policy_file.cpp",
140    "src/core/net_policy_firewall.cpp",
141    "src/core/net_policy_rule.cpp",
142    "src/core/net_policy_traffic.cpp",
143    "src/firewall_rule/device_idle_firewall_rule.cpp",
144    "src/firewall_rule/firewall_rule.cpp",
145    "src/firewall_rule/power_save_firewall_rule.cpp",
146    "src/net_access_policy_config.cpp",
147    "src/net_access_policy_database.cpp",
148    "src/net_policy_listener.cpp",
149    "src/net_policy_service.cpp",
150    "src/net_policy_db_clone.cpp",
151    "src/stub/net_policy_callback_proxy.cpp",
152    "src/stub/net_policy_service_stub.cpp",
153  ]
154
155  configs = [ ":net_policy_manager_config" ]
156
157  deps = [
158    "$INNERKITS_ROOT/netpolicyclient:net_policy_parcel",
159    "$INNERKITS_ROOT/netstatsclient:net_stats_manager_if",
160    "$NETCONNMANAGER_COMMON_DIR:net_service_common",
161    "$NETMANAGER_BASE_ROOT/utils:net_manager_common",
162    "$NETSYSCONTROLLER_ROOT_DIR:netsys_controller",
163  ]
164
165  external_deps = [
166    "ability_base:want",
167    "ability_runtime:ability_connect_callback_stub",
168    "ability_runtime:app_manager",
169    "ability_runtime:wantagent_innerkits",
170    "bundle_framework:appexecfwk_base",
171    "bundle_framework:appexecfwk_core",
172    "cJSON:cjson",
173    "c_utils:utils",
174    "common_event_service:cesfwk_innerkits",
175    "eventhandler:libeventhandler",
176    "ffrt:libffrt",
177    "hitrace:hitrace_meter",
178    "ipc:ipc_core",
179    "os_account:os_account_innerkits",
180    "relational_store:native_rdb",
181    "safwk:system_ability_fwk",
182    "samgr:samgr_proxy",
183    "time_service:time_client",
184    "config_policy:configpolicy_util",
185  ]
186
187  defines = [
188    "NETMGR_LOG_TAG = \"NetPolicyService\"",
189    "LOG_DOMAIN = 0xD0015B0",
190    "UNITTEST_FORBID_FFRT",
191    "NETMANAGER_TEST",
192  ]
193
194  if (enable_netmgr_debug) {
195    defines += [ "NETMGR_DEBUG" ]
196  }
197
198  external_deps += [ "hilog:libhilog" ]
199
200  part_name = "netmanager_base"
201  subsystem_name = "communication"
202}
203
204ohos_static_library("net_policy_manager_static_no_cfi") {
205  testonly = true
206
207  sources = [
208    "src/common/net_policy_event_handler.cpp",
209    "src/common/net_policy_file_event_handler.cpp",
210    "src/common/net_policy_service_common.cpp",
211    "src/common/netsys_policy_wrapper.cpp",
212    "src/core/net_policy_base.cpp",
213    "src/core/net_policy_callback.cpp",
214    "src/core/net_policy_core.cpp",
215    "src/core/net_policy_file.cpp",
216    "src/core/net_policy_firewall.cpp",
217    "src/core/net_policy_rule.cpp",
218    "src/core/net_policy_traffic.cpp",
219    "src/firewall_rule/device_idle_firewall_rule.cpp",
220    "src/firewall_rule/firewall_rule.cpp",
221    "src/firewall_rule/power_save_firewall_rule.cpp",
222    "src/net_access_policy_config.cpp",
223    "src/net_access_policy_database.cpp",
224    "src/net_policy_listener.cpp",
225    "src/net_policy_service.cpp",
226    "src/net_policy_db_clone.cpp",
227    "src/stub/net_policy_callback_proxy.cpp",
228    "src/stub/net_policy_service_stub.cpp",
229  ]
230
231  configs = [ ":net_policy_manager_config" ]
232
233  deps = [
234    "$INNERKITS_ROOT/netpolicyclient:net_policy_parcel",
235    "$INNERKITS_ROOT/netstatsclient:net_stats_manager_if",
236    "$NETCONNMANAGER_COMMON_DIR:net_service_common",
237    "$NETMANAGER_BASE_ROOT/utils:net_manager_common",
238    "$NETSYSCONTROLLER_ROOT_DIR:netsys_controller",
239  ]
240
241  external_deps = [
242    "ability_base:want",
243    "ability_runtime:ability_connect_callback_stub",
244    "ability_runtime:app_manager",
245    "ability_runtime:wantagent_innerkits",
246    "bundle_framework:appexecfwk_base",
247    "bundle_framework:appexecfwk_core",
248    "cJSON:cjson",
249    "c_utils:utils",
250    "common_event_service:cesfwk_innerkits",
251    "eventhandler:libeventhandler",
252    "ffrt:libffrt",
253    "hitrace:hitrace_meter",
254    "ipc:ipc_core",
255    "os_account:os_account_innerkits",
256    "relational_store:native_rdb",
257    "safwk:system_ability_fwk",
258    "samgr:samgr_proxy",
259    "time_service:time_client",
260    "config_policy:configpolicy_util",
261  ]
262
263  defines = [
264    "NETMGR_LOG_TAG = \"NetPolicyService\"",
265    "LOG_DOMAIN = 0xD0015B0",
266    "UNITTEST_FORBID_FFRT",
267    "NETMANAGER_TEST",
268  ]
269
270  if (enable_netmgr_debug) {
271    defines += [ "NETMGR_DEBUG" ]
272  }
273
274  external_deps += [ "hilog:libhilog" ]
275
276  part_name = "netmanager_base"
277  subsystem_name = "communication"
278}
279
280
281ohos_shared_library("net_access_policy_dialog") {
282  sanitize = {
283    cfi = true
284    cfi_cross_dso = true
285    debug = false
286  }
287
288  branch_protector_ret = "pac_ret"
289
290  include_dirs = [
291    "$NETMANAGER_BASE_ROOT/utils/common_utils/include",
292    "include",
293    "include/stub",
294  ]
295
296  sources = [ "src/net_access_policy_dialog_impl.cpp" ]
297
298  defines = [
299    "NETMGR_LOG_TAG = \"NetPolicyService\"",
300    "LOG_DOMAIN = 0xD0015B0",
301  ]
302
303  cflags = common_cflags
304
305  cflags_cc = common_cflags
306
307  if (enable_netmgr_debug) {
308    defines += [ "NETMGR_DEBUG" ]
309  }
310
311  if (is_standard_system) {
312    defines += [ "STANDARD_SYSTEM_ENABLE" ]
313  }
314
315  external_deps = [
316    "ability_base:base",
317    "ability_base:session_info",
318    "ability_base:want",
319    "ability_runtime:ability_manager",
320    "ability_runtime:abilitykit_native",
321    "ability_runtime:wantagent_innerkits",
322    "c_utils:utils",
323    "hilog:libhilog",
324    "ipc:ipc_core",
325    "time_service:time_client",
326  ]
327
328  part_name = "netmanager_base"
329  subsystem_name = "communication"
330}
331