1# Copyright (c) 2021-2024 Huawei Device Co., Ltd. 2# Licensed under the Apache License, Version 2.0 (the "License"); 3# you may not use this file except in compliance with the License. 4# You may obtain a copy of the License at 5# 6# http://www.apache.org/licenses/LICENSE-2.0 7# 8# Unless required by applicable law or agreed to in writing, software 9# distributed under the License is distributed on an "AS IS" BASIS, 10# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 11# See the License for the specific language governing permissions and 12# limitations under the License. 13 14import("//build/ohos.gni") 15import("//foundation/communication/netmanager_base/netmanager_base_config.gni") 16 17config("net_policy_manager_config") { 18 include_dirs = [ 19 "$INNERKITS_ROOT/netpolicyclient/include/proxy", 20 "$NETCONNMANAGER_COMMON_DIR/include", 21 "include", 22 "include/stub", 23 "$NETSYSCONTROLLER_ROOT_DIR/include", 24 "$NETSYSNATIVE_SOURCE_DIR/include/netsys", 25 ] 26} 27 28ohos_shared_library("net_policy_manager") { 29 sanitize = { 30 cfi = true 31 cfi_cross_dso = true 32 debug = false 33 } 34 35 branch_protector_ret = "pac_ret" 36 37 sources = [ 38 "src/common/net_policy_event_handler.cpp", 39 "src/common/net_policy_file_event_handler.cpp", 40 "src/common/net_policy_service_common.cpp", 41 "src/common/netsys_policy_wrapper.cpp", 42 "src/core/net_policy_base.cpp", 43 "src/core/net_policy_callback.cpp", 44 "src/core/net_policy_core.cpp", 45 "src/core/net_policy_file.cpp", 46 "src/core/net_policy_firewall.cpp", 47 "src/core/net_policy_rule.cpp", 48 "src/core/net_policy_traffic.cpp", 49 "src/firewall_rule/device_idle_firewall_rule.cpp", 50 "src/firewall_rule/firewall_rule.cpp", 51 "src/firewall_rule/power_save_firewall_rule.cpp", 52 "src/net_access_policy_config.cpp", 53 "src/net_access_policy_database.cpp", 54 "src/net_policy_listener.cpp", 55 "src/net_policy_service.cpp", 56 "src/net_policy_db_clone.cpp", 57 "src/stub/net_policy_callback_proxy.cpp", 58 "src/stub/net_policy_service_stub.cpp", 59 ] 60 61 configs = [ ":net_policy_manager_config" ] 62 63 deps = [ 64 "$INNERKITS_ROOT/netpolicyclient:net_policy_parcel", 65 "$INNERKITS_ROOT/netstatsclient:net_stats_manager_if", 66 "$NETCONNMANAGER_COMMON_DIR:net_service_common", 67 "$NETMANAGER_BASE_ROOT/utils:net_manager_common", 68 "$NETSYSCONTROLLER_ROOT_DIR:netsys_controller", 69 ] 70 71 cflags = common_cflags + [ 72 "-fvisibility=hidden", 73 ] 74 75 cflags_cc = common_cflags + [ 76 "-fvisibility=hidden", 77 "-fvisibility-inlines-hidden", 78 ] 79 80 ldflags = [ 81 "-Wl,--exclude-libs=ALL", 82 "-Wl,--gc-sections", 83 ] 84 85 external_deps = [ 86 "ability_base:want", 87 "ability_runtime:app_manager", 88 "ability_runtime:wantagent_innerkits", 89 "bundle_framework:appexecfwk_base", 90 "bundle_framework:appexecfwk_core", 91 "cJSON:cjson", 92 "c_utils:utils", 93 "common_event_service:cesfwk_innerkits", 94 "eventhandler:libeventhandler", 95 "ffrt:libffrt", 96 "hitrace:hitrace_meter", 97 "ipc:ipc_core", 98 "os_account:os_account_innerkits", 99 "relational_store:native_rdb", 100 "safwk:system_ability_fwk", 101 "samgr:samgr_proxy", 102 "time_service:time_client", 103 "config_policy:configpolicy_util", 104 ] 105 106 defines = [ 107 "NETMGR_LOG_TAG = \"NetPolicyService\"", 108 "LOG_DOMAIN = 0xD0015B0", 109 ] 110 111 if (enable_netmgr_debug) { 112 defines += [ "NETMGR_DEBUG" ] 113 } 114 115 external_deps += [ "hilog:libhilog" ] 116 117 part_name = "netmanager_base" 118 subsystem_name = "communication" 119} 120 121ohos_static_library("net_policy_manager_static") { 122 testonly = true 123 sanitize = { 124 cfi = true 125 cfi_cross_dso = true 126 debug = false 127 } 128 129 branch_protector_ret = "pac_ret" 130 131 sources = [ 132 "src/common/net_policy_event_handler.cpp", 133 "src/common/net_policy_file_event_handler.cpp", 134 "src/common/net_policy_service_common.cpp", 135 "src/common/netsys_policy_wrapper.cpp", 136 "src/core/net_policy_base.cpp", 137 "src/core/net_policy_callback.cpp", 138 "src/core/net_policy_core.cpp", 139 "src/core/net_policy_file.cpp", 140 "src/core/net_policy_firewall.cpp", 141 "src/core/net_policy_rule.cpp", 142 "src/core/net_policy_traffic.cpp", 143 "src/firewall_rule/device_idle_firewall_rule.cpp", 144 "src/firewall_rule/firewall_rule.cpp", 145 "src/firewall_rule/power_save_firewall_rule.cpp", 146 "src/net_access_policy_config.cpp", 147 "src/net_access_policy_database.cpp", 148 "src/net_policy_listener.cpp", 149 "src/net_policy_service.cpp", 150 "src/net_policy_db_clone.cpp", 151 "src/stub/net_policy_callback_proxy.cpp", 152 "src/stub/net_policy_service_stub.cpp", 153 ] 154 155 configs = [ ":net_policy_manager_config" ] 156 157 deps = [ 158 "$INNERKITS_ROOT/netpolicyclient:net_policy_parcel", 159 "$INNERKITS_ROOT/netstatsclient:net_stats_manager_if", 160 "$NETCONNMANAGER_COMMON_DIR:net_service_common", 161 "$NETMANAGER_BASE_ROOT/utils:net_manager_common", 162 "$NETSYSCONTROLLER_ROOT_DIR:netsys_controller", 163 ] 164 165 external_deps = [ 166 "ability_base:want", 167 "ability_runtime:ability_connect_callback_stub", 168 "ability_runtime:app_manager", 169 "ability_runtime:wantagent_innerkits", 170 "bundle_framework:appexecfwk_base", 171 "bundle_framework:appexecfwk_core", 172 "cJSON:cjson", 173 "c_utils:utils", 174 "common_event_service:cesfwk_innerkits", 175 "eventhandler:libeventhandler", 176 "ffrt:libffrt", 177 "hitrace:hitrace_meter", 178 "ipc:ipc_core", 179 "os_account:os_account_innerkits", 180 "relational_store:native_rdb", 181 "safwk:system_ability_fwk", 182 "samgr:samgr_proxy", 183 "time_service:time_client", 184 "config_policy:configpolicy_util", 185 ] 186 187 defines = [ 188 "NETMGR_LOG_TAG = \"NetPolicyService\"", 189 "LOG_DOMAIN = 0xD0015B0", 190 "UNITTEST_FORBID_FFRT", 191 "NETMANAGER_TEST", 192 ] 193 194 if (enable_netmgr_debug) { 195 defines += [ "NETMGR_DEBUG" ] 196 } 197 198 external_deps += [ "hilog:libhilog" ] 199 200 part_name = "netmanager_base" 201 subsystem_name = "communication" 202} 203 204ohos_static_library("net_policy_manager_static_no_cfi") { 205 testonly = true 206 207 sources = [ 208 "src/common/net_policy_event_handler.cpp", 209 "src/common/net_policy_file_event_handler.cpp", 210 "src/common/net_policy_service_common.cpp", 211 "src/common/netsys_policy_wrapper.cpp", 212 "src/core/net_policy_base.cpp", 213 "src/core/net_policy_callback.cpp", 214 "src/core/net_policy_core.cpp", 215 "src/core/net_policy_file.cpp", 216 "src/core/net_policy_firewall.cpp", 217 "src/core/net_policy_rule.cpp", 218 "src/core/net_policy_traffic.cpp", 219 "src/firewall_rule/device_idle_firewall_rule.cpp", 220 "src/firewall_rule/firewall_rule.cpp", 221 "src/firewall_rule/power_save_firewall_rule.cpp", 222 "src/net_access_policy_config.cpp", 223 "src/net_access_policy_database.cpp", 224 "src/net_policy_listener.cpp", 225 "src/net_policy_service.cpp", 226 "src/net_policy_db_clone.cpp", 227 "src/stub/net_policy_callback_proxy.cpp", 228 "src/stub/net_policy_service_stub.cpp", 229 ] 230 231 configs = [ ":net_policy_manager_config" ] 232 233 deps = [ 234 "$INNERKITS_ROOT/netpolicyclient:net_policy_parcel", 235 "$INNERKITS_ROOT/netstatsclient:net_stats_manager_if", 236 "$NETCONNMANAGER_COMMON_DIR:net_service_common", 237 "$NETMANAGER_BASE_ROOT/utils:net_manager_common", 238 "$NETSYSCONTROLLER_ROOT_DIR:netsys_controller", 239 ] 240 241 external_deps = [ 242 "ability_base:want", 243 "ability_runtime:ability_connect_callback_stub", 244 "ability_runtime:app_manager", 245 "ability_runtime:wantagent_innerkits", 246 "bundle_framework:appexecfwk_base", 247 "bundle_framework:appexecfwk_core", 248 "cJSON:cjson", 249 "c_utils:utils", 250 "common_event_service:cesfwk_innerkits", 251 "eventhandler:libeventhandler", 252 "ffrt:libffrt", 253 "hitrace:hitrace_meter", 254 "ipc:ipc_core", 255 "os_account:os_account_innerkits", 256 "relational_store:native_rdb", 257 "safwk:system_ability_fwk", 258 "samgr:samgr_proxy", 259 "time_service:time_client", 260 "config_policy:configpolicy_util", 261 ] 262 263 defines = [ 264 "NETMGR_LOG_TAG = \"NetPolicyService\"", 265 "LOG_DOMAIN = 0xD0015B0", 266 "UNITTEST_FORBID_FFRT", 267 "NETMANAGER_TEST", 268 ] 269 270 if (enable_netmgr_debug) { 271 defines += [ "NETMGR_DEBUG" ] 272 } 273 274 external_deps += [ "hilog:libhilog" ] 275 276 part_name = "netmanager_base" 277 subsystem_name = "communication" 278} 279 280 281ohos_shared_library("net_access_policy_dialog") { 282 sanitize = { 283 cfi = true 284 cfi_cross_dso = true 285 debug = false 286 } 287 288 branch_protector_ret = "pac_ret" 289 290 include_dirs = [ 291 "$NETMANAGER_BASE_ROOT/utils/common_utils/include", 292 "include", 293 "include/stub", 294 ] 295 296 sources = [ "src/net_access_policy_dialog_impl.cpp" ] 297 298 defines = [ 299 "NETMGR_LOG_TAG = \"NetPolicyService\"", 300 "LOG_DOMAIN = 0xD0015B0", 301 ] 302 303 cflags = common_cflags 304 305 cflags_cc = common_cflags 306 307 if (enable_netmgr_debug) { 308 defines += [ "NETMGR_DEBUG" ] 309 } 310 311 if (is_standard_system) { 312 defines += [ "STANDARD_SYSTEM_ENABLE" ] 313 } 314 315 external_deps = [ 316 "ability_base:base", 317 "ability_base:session_info", 318 "ability_base:want", 319 "ability_runtime:ability_manager", 320 "ability_runtime:abilitykit_native", 321 "ability_runtime:wantagent_innerkits", 322 "c_utils:utils", 323 "hilog:libhilog", 324 "ipc:ipc_core", 325 "time_service:time_client", 326 ] 327 328 part_name = "netmanager_base" 329 subsystem_name = "communication" 330} 331