Merge pull request #42 from philips/remove-chromeos

chore(*): remove chromeos ebuilds and files
This commit is contained in:
Michael Marineau 2013-06-30 19:47:24 -07:00
commit 598ae99fdf
877 changed files with 8 additions and 28832 deletions

View File

@ -1,20 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
DESCRIPTION="Audio configuration files."
HOMEPAGE="http://src.chromium.org"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE=""
RDEPEND=""
DEPEND="${RDEPEND}"
src_install() {
insinto /etc
doins "${FILESDIR}"/asound.conf || die
}

View File

@ -1,7 +0,0 @@
#Route all audio through the CRAS plugin.
pcm.!default {
type cras
}
ctl.!default {
type cras
}

View File

@ -1,45 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
DESCRIPTION="Meta ebuild for all packages providing tests"
HOMEPAGE="http://www.chromium.org"
LICENSE="GPL-2"
SLOT=0
KEYWORDS="amd64 arm x86"
IUSE=""
RDEPEND="
chromeos-base/autotest-tests
chromeos-base/autotest-tests-ltp
chromeos-base/autotest-tests-ownershipapi
chromeos-base/autotest-chrome
chromeos-base/autotest-factory
chromeos-base/autotest-private
"
DEPEND="${RDEPEND}"
SUITE_DEPENDENCIES_FILE="dependency_info"
src_unpack() {
elog "Unpacking..."
mkdir -p "${S}"
touch "${S}/${SUITE_DEPENDENCIES_FILE}"
}
src_install() {
# So that this package properly owns the file
insinto /usr/local/autotest/test_suites
doins "${SUITE_DEPENDENCIES_FILE}"
}
# Pre-processes control files and installs DEPENDENCIES info.
pkg_postinst() {
local root_autotest_dir="${ROOT}/usr/local/autotest"
python -B "${root_autotest_dir}/site_utils/suite_preprocessor.py" \
-a "${root_autotest_dir}" \
-o "${root_autotest_dir}/test_suites/${SUITE_DEPENDENCIES_FILE}"
}

View File

@ -1,119 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit toolchain-funcs flag-o-matic cros-workon autotest
DESCRIPTION="Autotest tests that require chrome_test or pyauto deps"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
RDEPEND="
chromeos-base/autotest-tests
chromeos-base/chromeos-chrome
chromeos-base/flimflam-test
tests_audiovideo_PlaybackRecordSemiAuto? ( media-sound/alsa-utils )
"
DEPEND="${RDEPEND}"
IUSE_TESTS=(
# Inherits from enterprise_ui_test.
+tests_desktopui_EnterprisePolicy
# Uses chrome_test dependency.
+tests_audiovideo_FFMPEG
+tests_audiovideo_VDA
# Inherits from cros_ui_test.
+tests_desktopui_BrowserTest
+tests_desktopui_DocViewing
+tests_desktopui_PyAutoEnduranceTests
+tests_desktopui_PyAutoFunctionalTests
+tests_desktopui_PyAutoInstall
+tests_desktopui_PyAutoPerfTests
+tests_desktopui_SyncIntegrationTests
+tests_audiovideo_PlaybackRecordSemiAuto
+tests_desktopui_AudioFeedback
+tests_desktopui_ChromeSemiAuto
+tests_desktopui_FlashSanityCheck
+tests_desktopui_IBusTest
+tests_desktopui_ImeTest
+tests_desktopui_LoadBigFile
+tests_desktopui_MediaAudioFeedback
+tests_desktopui_NaClSanity
+tests_desktopui_ScreenLocker
+tests_desktopui_SimpleLogin
tests_desktopui_TouchScreen
+tests_desktopui_UrlFetch
+tests_desktopui_WebRTC
+tests_desktopui_VideoSanity
+tests_desktopui_YouTubeHTML5
+tests_enterprise_DevicePolicy
+tests_graphics_GLAPICheck
+tests_graphics_GpuReset
+tests_graphics_Piglit
+tests_graphics_SanAngeles
+tests_graphics_TearTest
+tests_graphics_VTSwitch
+tests_graphics_WebGLConformance
+tests_graphics_WebGLPerformance
+tests_graphics_WindowManagerGraphicsCapture
+tests_hardware_BluetoothSemiAuto
+tests_hardware_ExternalDrives
+tests_hardware_USB20
+tests_hardware_UsbPlugIn
tests_logging_AsanCrash
+tests_logging_UncleanShutdown
+tests_login_BadAuthentication
+tests_login_ChromeProfileSanitary
+tests_login_CryptohomeIncognitoMounted
+tests_login_CryptohomeIncognitoUnmounted
+tests_login_CryptohomeMounted
+tests_login_CryptohomeUnmounted
+tests_login_LoginSuccess
+tests_login_LogoutProcessCleanup
+tests_login_RemoteLogin
+tests_network_3GSuspendResume
+tests_network_NavigateToUrl
+tests_network_ONC
+tests_platform_Pkcs11InitOnLogin
+tests_platform_Pkcs11Persistence
+tests_platform_ProcessPrivileges
+tests_power_AudioDetector
+tests_power_Consumption
+tests_power_Idle
+tests_power_LoadTest
+tests_power_SuspendStress
+tests_power_UiResume
+tests_power_VideoDetector
+tests_power_VideoSuspend
+tests_realtimecomm_GTalkAudioPlayground
+tests_realtimecomm_GTalkPlayground
+tests_security_BluetoothUIXSS
+tests_security_BundledExtensions
+tests_security_NetworkListeners
+tests_security_ProfilePermissions
+tests_security_RendererSandbox
)
IUSE="${IUSE} ${IUSE_TESTS[*]}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,117 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit toolchain-funcs flag-o-matic cros-workon autotest
DESCRIPTION="Autotest tests that require chrome_test or pyauto deps"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
RDEPEND="
chromeos-base/autotest-tests
chromeos-base/chromeos-chrome
chromeos-base/flimflam-test
tests_audiovideo_PlaybackRecordSemiAuto? ( media-sound/alsa-utils )
"
DEPEND="${RDEPEND}"
IUSE_TESTS=(
# Inherits from enterprise_ui_test.
+tests_desktopui_EnterprisePolicy
# Uses chrome_test dependency.
+tests_audiovideo_FFMPEG
+tests_audiovideo_VDA
# Inherits from cros_ui_test.
+tests_desktopui_BrowserTest
+tests_desktopui_DocViewing
+tests_desktopui_PyAutoEnduranceTests
+tests_desktopui_PyAutoFunctionalTests
+tests_desktopui_PyAutoInstall
+tests_desktopui_PyAutoPerfTests
+tests_desktopui_SyncIntegrationTests
+tests_audiovideo_PlaybackRecordSemiAuto
+tests_desktopui_AudioFeedback
+tests_desktopui_ChromeSemiAuto
+tests_desktopui_FlashSanityCheck
+tests_desktopui_IBusTest
+tests_desktopui_ImeTest
+tests_desktopui_LoadBigFile
+tests_desktopui_MediaAudioFeedback
+tests_desktopui_NaClSanity
+tests_desktopui_ScreenLocker
+tests_desktopui_SimpleLogin
tests_desktopui_TouchScreen
+tests_desktopui_UrlFetch
+tests_desktopui_WebRTC
+tests_desktopui_VideoSanity
+tests_desktopui_YouTubeHTML5
+tests_enterprise_DevicePolicy
+tests_graphics_GLAPICheck
+tests_graphics_GpuReset
+tests_graphics_Piglit
+tests_graphics_SanAngeles
+tests_graphics_TearTest
+tests_graphics_VTSwitch
+tests_graphics_WebGLConformance
+tests_graphics_WebGLPerformance
+tests_graphics_WindowManagerGraphicsCapture
+tests_hardware_BluetoothSemiAuto
+tests_hardware_ExternalDrives
+tests_hardware_USB20
+tests_hardware_UsbPlugIn
tests_logging_AsanCrash
+tests_logging_UncleanShutdown
+tests_login_BadAuthentication
+tests_login_ChromeProfileSanitary
+tests_login_CryptohomeIncognitoMounted
+tests_login_CryptohomeIncognitoUnmounted
+tests_login_CryptohomeMounted
+tests_login_CryptohomeUnmounted
+tests_login_LoginSuccess
+tests_login_LogoutProcessCleanup
+tests_login_RemoteLogin
+tests_network_3GSuspendResume
+tests_network_NavigateToUrl
+tests_network_ONC
+tests_platform_Pkcs11InitOnLogin
+tests_platform_Pkcs11Persistence
+tests_platform_ProcessPrivileges
+tests_power_AudioDetector
+tests_power_Consumption
+tests_power_Idle
+tests_power_LoadTest
+tests_power_SuspendStress
+tests_power_UiResume
+tests_power_VideoDetector
+tests_power_VideoSuspend
+tests_realtimecomm_GTalkAudioPlayground
+tests_realtimecomm_GTalkPlayground
+tests_security_BluetoothUIXSS
+tests_security_BundledExtensions
+tests_security_NetworkListeners
+tests_security_ProfilePermissions
+tests_security_RendererSandbox
)
IUSE="${IUSE} ${IUSE_TESTS[*]}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,35 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest audioloop dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="amd64 arm x86"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST="audioloop"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/audioloop
RDEPEND="${RDEPEND}
media-libs/alsa-lib
media-sound/adhd"
DEPEND="${RDEPEND}"

View File

@ -1,33 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest audioloop dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST="audioloop"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/audioloop
RDEPEND="${RDEPEND}
media-libs/alsa-lib
media-sound/adhd"
DEPEND="${RDEPEND}"

View File

@ -1,35 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest chromium ffmpeg dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="amd64 arm x86"
# Autotest enabled by default.
IUSE="+autotest"
AUTOTEST_DEPS_LIST="ffmpeg"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/ffmpeg
RDEPEND="${RDEPEND}
chromeos-base/chromeos-chrome
"
DEPEND="${RDEPEND}"

View File

@ -1,33 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest chromium ffmpeg dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
# Autotest enabled by default.
IUSE="+autotest"
AUTOTEST_DEPS_LIST="ffmpeg"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/ffmpeg
RDEPEND="${RDEPEND}
chromeos-base/chromeos-chrome
"
DEPEND="${RDEPEND}"

View File

@ -1,47 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
CONFLICT_LIST="chromeos-base/autotest-deps-0.0.1-r321"
inherit cros-workon autotest-deponly conflict cros-debug
DESCRIPTION="Autotest glbench dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
# Autotest enabled by default.
IUSE="+autotest"
LIBCHROME_VERS="125070"
RDEPEND="${RDEPEND}
dev-cpp/gflags
chromeos-base/libchrome:${LIBCHROME_VERS}[cros-debug=]
virtual/opengl
opengles? ( virtual/opengles )
x11-apps/xwd
"
DEPEND="${RDEPEND}
opengles? ( x11-drivers/opengles-headers )"
AUTOTEST_DEPS_LIST="glbench"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
src_prepare() {
autotest-deponly_src_prepare
cros-debug-add-NDEBUG
export BASE_VER=${LIBCHROME_VERS}
}

View File

@ -1,45 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
CONFLICT_LIST="chromeos-base/autotest-deps-0.0.1-r321"
inherit cros-workon autotest-deponly conflict cros-debug
DESCRIPTION="Autotest glbench dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
# Autotest enabled by default.
IUSE="+autotest"
LIBCHROME_VERS="125070"
RDEPEND="${RDEPEND}
dev-cpp/gflags
chromeos-base/libchrome:${LIBCHROME_VERS}[cros-debug=]
virtual/opengl
opengles? ( virtual/opengles )
x11-apps/xwd
"
DEPEND="${RDEPEND}
opengles? ( x11-drivers/opengles-headers )"
AUTOTEST_DEPS_LIST="glbench"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
src_prepare() {
autotest-deponly_src_prepare
cros-debug-add-NDEBUG
export BASE_VER=${LIBCHROME_VERS}
}

View File

@ -1,40 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest glmark2 dependency"
HOMEPAGE="https://launchpad.net/glmark2"
SRC_URI=""
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="amd64 arm x86"
# Autotest enabled by default.
IUSE="+autotest"
AUTOTEST_DEPS_LIST="glmark2"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/glmark2
RDEPEND="
virtual/opengl
media-libs/libpng
sys-libs/zlib
x11-libs/libX11
x11-libs/libXau
x11-libs/libXdmcp
x11-libs/libXext
"
DEPEND="${RDEPEND}"

View File

@ -1,41 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="6c2d8194633ffe128f3afbc094a03ef22bd29a8a"
CROS_WORKON_TREE="3fac66aefc84fb25e5359292e9153c676ccbbf6f"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest glmark2 dependency"
HOMEPAGE="https://launchpad.net/glmark2"
SRC_URI=""
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="amd64 arm x86"
# Autotest enabled by default.
IUSE="+autotest"
AUTOTEST_DEPS_LIST="glmark2"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/glmark2
RDEPEND="
virtual/opengl
media-libs/libpng
sys-libs/zlib
x11-libs/libX11
x11-libs/libXau
x11-libs/libXdmcp
x11-libs/libXext
"
DEPEND="${RDEPEND}"

View File

@ -1,38 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest glmark2 dependency"
HOMEPAGE="https://launchpad.net/glmark2"
SRC_URI=""
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
# Autotest enabled by default.
IUSE="+autotest"
AUTOTEST_DEPS_LIST="glmark2"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/glmark2
RDEPEND="
virtual/opengl
media-libs/libpng
sys-libs/zlib
x11-libs/libX11
x11-libs/libXau
x11-libs/libXdmcp
x11-libs/libXext
"
DEPEND="${RDEPEND}"

View File

@ -1,31 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-deps-0.0.1-r321"
inherit cros-workon autotest-deponly conflict
DESCRIPTION="Autotest iotools dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST="iotools"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
DEPEND="${RDEPEND}"

View File

@ -1,29 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-deps-0.0.1-r321"
inherit cros-workon autotest-deponly conflict
DESCRIPTION="Autotest iotools dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST="iotools"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
DEPEND="${RDEPEND}"

View File

@ -1,30 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-deps-0.0.1-r321"
inherit cros-workon autotest-deponly conflict
DESCRIPTION="Autotest libaio dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST="libaio"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
DEPEND="${RDEPEND}"

View File

@ -1,28 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-deps-0.0.1-r321"
inherit cros-workon autotest-deponly conflict
DESCRIPTION="Autotest libaio dep"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST="libaio"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
DEPEND="${RDEPEND}"

View File

@ -1,50 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit cros-workon autotest-deponly
DESCRIPTION="dependencies for Piglit (collection of automated tests for OpenGl based on glean and mesa)"
HOMEPAGE="http://cgit.freedesktop.org/piglit"
SRC_URI=""
LICENSE="GPL"
SLOT="0"
KEYWORDS="amd64 arm x86"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST="piglit"
RDEPEND="
virtual/glut
virtual/opengl
dev-python/mako
dev-python/numpy
media-libs/tiff
media-libs/libpng
sys-libs/zlib
x11-libs/libICE
x11-libs/libSM
x11-libs/libX11
x11-libs/libXtst
x11-libs/libXau
x11-libs/libXdmcp
x11-libs/libXext
x11-libs/libXi
x11-libs/libXpm
"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
DEPEND="${RDEPEND}"
# export a variable so that piglit knows where to find libglut.so
export GLUT_LIBDIR=/usr/$(get_libdir)

View File

@ -1,48 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit cros-workon autotest-deponly
DESCRIPTION="dependencies for Piglit (collection of automated tests for OpenGl based on glean and mesa)"
HOMEPAGE="http://cgit.freedesktop.org/piglit"
SRC_URI=""
LICENSE="GPL"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST="piglit"
RDEPEND="
virtual/glut
virtual/opengl
dev-python/mako
dev-python/numpy
media-libs/tiff
media-libs/libpng
sys-libs/zlib
x11-libs/libICE
x11-libs/libSM
x11-libs/libX11
x11-libs/libXtst
x11-libs/libXau
x11-libs/libXdmcp
x11-libs/libXext
x11-libs/libXi
x11-libs/libXpm
"
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
DEPEND="${RDEPEND}"
# export a variable so that piglit knows where to find libglut.so
export GLUT_LIBDIR=/usr/$(get_libdir)

View File

@ -1,74 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest common deps"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
# following deps don't compile: boottool, mysql, pgpool, pgsql, systemtap, # dejagnu, libcap, libnet
# following deps are not deps: factory
# following tests are going to be moved: chrome_test
AUTOTEST_DEPS_LIST="fio gfxtest gtest hdparm ibusclient iwcap realtimecomm_playground sysstat sox test_tones fakegudev fakemodem pyxinput example_cros_dep"
AUTOTEST_CONFIG_LIST=*
AUTOTEST_PROFILERS_LIST=*
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/gtest
RDEPEND="
dev-cpp/gtest
"
RDEPEND="${RDEPEND}
chromeos-base/autotest-deps-libaio
"
# deps/chrome_test
#RDEPEND="${RDEPEND}
# chromeos-base/chromeos-chrome
#"
# deps/ibusclient
RDEPEND="${RDEPEND}
app-i18n/ibus
dev-libs/glib
sys-apps/dbus
"
# deps/iwcap
RDEPEND="${RDEPEND}
dev-libs/libnl:0
"
# deps/fakegudev
RDEPEND="${RDEPEND}
sys-fs/udev[gudev]
"
# deps/fakemodem
RDEPEND="${RDEPEND}
chromeos-base/autotest-fakemodem-conf
"
RDEPEND="${RDEPEND}
sys-devel/binutils
"
DEPEND="${RDEPEND}"

View File

@ -1,72 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit cros-workon autotest-deponly
DESCRIPTION="Autotest common deps"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
# Autotest enabled by default.
IUSE="+autotest"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
# following deps don't compile: boottool, mysql, pgpool, pgsql, systemtap, # dejagnu, libcap, libnet
# following deps are not deps: factory
# following tests are going to be moved: chrome_test
AUTOTEST_DEPS_LIST="fio gfxtest gtest hdparm ibusclient iwcap realtimecomm_playground sysstat sox test_tones fakegudev fakemodem pyxinput example_cros_dep"
AUTOTEST_CONFIG_LIST=*
AUTOTEST_PROFILERS_LIST=*
# NOTE: For deps, we need to keep *.a
AUTOTEST_FILE_MASK="*.tar.bz2 *.tbz2 *.tgz *.tar.gz"
# deps/gtest
RDEPEND="
dev-cpp/gtest
"
RDEPEND="${RDEPEND}
chromeos-base/autotest-deps-libaio
"
# deps/chrome_test
#RDEPEND="${RDEPEND}
# chromeos-base/chromeos-chrome
#"
# deps/ibusclient
RDEPEND="${RDEPEND}
app-i18n/ibus
dev-libs/glib
sys-apps/dbus
"
# deps/iwcap
RDEPEND="${RDEPEND}
dev-libs/libnl:0
"
# deps/fakegudev
RDEPEND="${RDEPEND}
sys-fs/udev[gudev]
"
# deps/fakemodem
RDEPEND="${RDEPEND}
chromeos-base/autotest-fakemodem-conf
"
RDEPEND="${RDEPEND}
sys-devel/binutils
"
DEPEND="${RDEPEND}"

View File

@ -1,99 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-tests-0.0.1-r335"
inherit toolchain-funcs flag-o-matic cros-workon autotest conflict
DESCRIPTION="Autotest Factory tests"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
IUSE="+xset hardened"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
# Factory tests require locally installed deps, which are called out in
# autotest-factory-deps.
RDEPEND="
chromeos-base/autotest-deps-iotools
chromeos-base/autotest-deps-libaio
chromeos-base/autotest-deps-audioloop
chromeos-base/autotest-deps-glbench
chromeos-base/autotest-private-board
chromeos-base/chromeos-factory
chromeos-base/flimflam-test
>=chromeos-base/vpd-0.0.1-r11
dev-python/jsonrpclib
dev-python/pygobject
dev-python/pygtk
dev-python/ws4py
xset? ( x11-apps/xset )
"
DEPEND="${RDEPEND}"
IUSE_TESTS="
+tests_dummy_Fail
+tests_dummy_Pass
+tests_factory_Antenna
+tests_factory_Audio
+tests_factory_AudioInternalLoopback
+tests_factory_AudioLoop
+tests_factory_AudioQuality
+tests_factory_BasicCellular
+tests_factory_BasicGPS
+tests_factory_BasicWifi
+tests_factory_Camera
+tests_factory_CameraPerformanceAls
+tests_factory_Cellular
+tests_factory_Connector
+tests_factory_DeveloperRecovery
+tests_factory_Display
+tests_factory_Dummy
+tests_factory_ExtDisplay
+tests_factory_ExternalStorage
+tests_factory_Fail
+tests_factory_Finalize
+tests_factory_HWID
+tests_factory_Keyboard
+tests_factory_KeyboardBacklight
+tests_factory_Leds
+tests_factory_LidSwitch
+tests_factory_LightSensor
+tests_factory_ProbeWifi
+tests_factory_Prompt
+tests_factory_RemovableStorage
+tests_factory_RunScript
+tests_factory_ScanSN
+tests_factory_ScriptWrapper
+tests_factory_Start
+tests_factory_StressTest
+tests_factory_SyncEventLogs
+tests_factory_Touchpad
+tests_factory_Touchscreen
+tests_factory_TPM
+tests_factory_USB
+tests_factory_VerifyComponents
+tests_factory_VPD
+tests_factory_Wifi
+tests_suite_Factory
"
IUSE="${IUSE} ${IUSE_TESTS}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,97 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-tests-0.0.1-r335"
inherit toolchain-funcs flag-o-matic cros-workon autotest conflict
DESCRIPTION="Autotest Factory tests"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
IUSE="+xset hardened"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
# Factory tests require locally installed deps, which are called out in
# autotest-factory-deps.
RDEPEND="
chromeos-base/autotest-deps-iotools
chromeos-base/autotest-deps-libaio
chromeos-base/autotest-deps-audioloop
chromeos-base/autotest-deps-glbench
chromeos-base/autotest-private-board
chromeos-base/chromeos-factory
chromeos-base/flimflam-test
>=chromeos-base/vpd-0.0.1-r11
dev-python/jsonrpclib
dev-python/pygobject
dev-python/pygtk
dev-python/ws4py
xset? ( x11-apps/xset )
"
DEPEND="${RDEPEND}"
IUSE_TESTS="
+tests_dummy_Fail
+tests_dummy_Pass
+tests_factory_Antenna
+tests_factory_Audio
+tests_factory_AudioInternalLoopback
+tests_factory_AudioLoop
+tests_factory_AudioQuality
+tests_factory_BasicCellular
+tests_factory_BasicGPS
+tests_factory_BasicWifi
+tests_factory_Camera
+tests_factory_CameraPerformanceAls
+tests_factory_Cellular
+tests_factory_Connector
+tests_factory_DeveloperRecovery
+tests_factory_Display
+tests_factory_Dummy
+tests_factory_ExtDisplay
+tests_factory_ExternalStorage
+tests_factory_Fail
+tests_factory_Finalize
+tests_factory_HWID
+tests_factory_Keyboard
+tests_factory_KeyboardBacklight
+tests_factory_Leds
+tests_factory_LidSwitch
+tests_factory_LightSensor
+tests_factory_ProbeWifi
+tests_factory_Prompt
+tests_factory_RemovableStorage
+tests_factory_RunScript
+tests_factory_ScanSN
+tests_factory_ScriptWrapper
+tests_factory_Start
+tests_factory_StressTest
+tests_factory_SyncEventLogs
+tests_factory_Touchpad
+tests_factory_Touchscreen
+tests_factory_TPM
+tests_factory_USB
+tests_factory_VerifyComponents
+tests_factory_VPD
+tests_factory_Wifi
+tests_suite_Factory
"
IUSE="${IUSE} ${IUSE_TESTS}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,16 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
DESCRIPTION="Runtime configuration file for fakemodem (autotest dep)"
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE=""
src_install() {
insinto /etc/dbus-1/system.d
doins "${FILESDIR}/org.chromium.FakeModem.conf" || die
}

View File

@ -1,9 +0,0 @@
<!DOCTYPE busconfig PUBLIC
"-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN"
"http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
<busconfig>
<policy context="default">
<allow send_destination="org.chromium.FakeModem" />
<allow own="org.chromium.FakeModem" />
</policy>
</busconfig>

View File

@ -1,18 +0,0 @@
# Copyright (c) 2009 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
DESCRIPTION="Board specific autotests"
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE=""
RDEPEND=""
#
# WARNING: Nothing should be added to this ebuild. This ebuild is overriden
# in most of the board specific overlays, or will be.
#

View File

@ -1,25 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
# CROS_WORKON_REPO=FILL_YOUR_REPO_URL_HERE
# inherit toolchain-funcs flag-o-matic cros-workon autotest
DESCRIPTION="Private autotest tests"
HOMEPAGE="http://src.chromium.org"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="amd64 arm x86"
DEPEND=""
RDEPEND=""
# This ebuild file is reserved for adding new private tests in your factory
# process. You can change the CROS_WORKON_REPO to your own server, and uncomment
# the following CROS_WORKON_* variables to have your own tests merged when
# building factory test run-in images.
# CROS_WORKON_PROJECT=autotest-private
# CROS_WORKON_LOCALNAME=../third_party/autotest-private
# CROS_WORKON_SUBDIR=

View File

@ -1,46 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-tests-0.0.1-r596"
inherit toolchain-funcs flag-o-matic cros-workon autotest conflict
DESCRIPTION="ltp autotest"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE="hardened"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
RDEPEND="${RDEPEND}
chromeos-base/protofiles
dev-libs/protobuf
dev-python/pygobject
!<chromeos-base/autotest-tests-0.0.1-r1723
"
DEPEND="${RDEPEND}"
IUSE_TESTS="
+tests_ltp
"
IUSE="${IUSE} ${IUSE_TESTS}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,44 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-tests-0.0.1-r596"
inherit toolchain-funcs flag-o-matic cros-workon autotest conflict
DESCRIPTION="ltp autotest"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
IUSE="hardened"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
RDEPEND="${RDEPEND}
chromeos-base/protofiles
dev-libs/protobuf
dev-python/pygobject
!<chromeos-base/autotest-tests-0.0.1-r1723
"
DEPEND="${RDEPEND}"
IUSE_TESTS="
+tests_ltp
"
IUSE="${IUSE} ${IUSE_TESTS}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,52 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-tests-0.0.1-r596"
inherit toolchain-funcs flag-o-matic cros-workon autotest conflict
DESCRIPTION="login_OwnershipApi autotest"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
IUSE="+autox +xset +tpmtools hardened"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
RDEPEND="${RDEPEND}
chromeos-base/flimflam-test
chromeos-base/chromeos-chrome
chromeos-base/protofiles
dev-libs/protobuf
dev-python/pygobject
autox? ( chromeos-base/autox )
"
DEPEND="${RDEPEND}"
IUSE_TESTS="
+tests_login_OwnershipApi
+tests_login_OwnershipNotRetaken
+tests_login_OwnershipRetaken
+tests_login_OwnershipTaken
+tests_login_RemoteOwnership
"
IUSE="${IUSE} ${IUSE_TESTS}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,50 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
CONFLICT_LIST="chromeos-base/autotest-tests-0.0.1-r596"
inherit toolchain-funcs flag-o-matic cros-workon autotest conflict
DESCRIPTION="login_OwnershipApi autotest"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
IUSE="+autox +xset +tpmtools hardened"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
RDEPEND="${RDEPEND}
chromeos-base/flimflam-test
chromeos-base/chromeos-chrome
chromeos-base/protofiles
dev-libs/protobuf
dev-python/pygobject
autox? ( chromeos-base/autox )
"
DEPEND="${RDEPEND}"
IUSE_TESTS="
+tests_login_OwnershipApi
+tests_login_OwnershipNotRetaken
+tests_login_OwnershipRetaken
+tests_login_OwnershipTaken
+tests_login_RemoteOwnership
"
IUSE="${IUSE} ${IUSE_TESTS}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,318 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit toolchain-funcs flag-o-matic cros-workon autotest
DESCRIPTION="Autotest tests"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
IUSE="+autox +xset +tpmtools hardened"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
# TODO(snanda): Remove xset dependence once power_LoadTest is switched over
# to use power manager
# TODO(semenzato): tpm-tools is included for hardware_TpmFirmware (and at this
# time only one binary is used, tpm_takeownership). Once we have a testing
# image, a better way would be to add tpm-tools to the image.
#
# pygtk is used only in the following:
# desktopui_ImeTest
# desktopui_ImeLogin
# pygobject is used only in the following:
# desktopui_ScreenLocker
# hardware_BluetoothSemiAuto
# network_3GActivate
# network_3GDormancyDance
# network_3GFailedConnect
# network_3GRecoverFromGobiDesync
# network_3GSafetyDance
# network_3GSmokeTest
# network_3GStressEnable
# network_WiFiSmokeTest
# network_WifiAuthenticationTests
RDEPEND="
chromeos-base/autotest-deps
chromeos-base/autotest-deps-glbench
chromeos-base/autotest-deps-glmark2
chromeos-base/autotest-deps-iotools
chromeos-base/autotest-deps-libaio
chromeos-base/autotest-deps-piglit
chromeos-base/flimflam-test
autox? ( chromeos-base/autox )
dev-python/numpy
dev-python/pygobject
dev-python/pygtk
xset? ( x11-apps/xset )
tpmtools? ( app-crypt/tpm-tools )
"
RDEPEND="${RDEPEND}
tests_platform_RootPartitionsNotMounted? ( sys-apps/rootdev )
tests_platform_RootPartitionsNotMounted? ( sys-fs/udev )
tests_hardware_TPMFirmware? ( chromeos-base/tpm_lite )
"
DEPEND="${RDEPEND}"
IUSE_TESTS="
+tests_compilebench
+tests_crashme
+tests_dbench
+tests_ddtest
+tests_disktest
+tests_fsx
+tests_hackbench
+tests_iperf
+tests_bonnie
+tests_iozone
+tests_netperf2
+tests_netpipe
+tests_scrashme
+tests_sound_infrastructure
+tests_sleeptest
+tests_unixbench
+tests_audiovideo_CRASFormatConversion
+tests_audiovideo_LineOutToMicInLoopback
+tests_audiovideo_LoopbackLatency
+tests_audiovideo_Microphone
+tests_audiovideo_V4L2
+tests_cellular_Smoke
+tests_cellular_ThroughputController
+tests_cellular_Throughput
+tests_build_RootFilesystemSize
+tests_desktopui_FontCache
+tests_desktopui_GTK2Config
+tests_desktopui_HangDetector
+tests_desktopui_ImeLogin
+tests_desktopui_KillRestart
+tests_desktopui_SpeechSynthesisSemiAuto
tests_example_UnitTest
+tests_example_CrosTest
+tests_graphics_GLBench
+tests_graphics_GLMark2
+tests_graphics_KernelMemory
+tests_graphics_LibDRM
+tests_graphics_SyncControlTest
+tests_firmware_RomSize
tests_firmware_VbootCrypto
+tests_hardware_Ath3k
+tests_hardware_Backlight
+tests_hardware_ch7036
+tests_hardware_Components
+tests_hardware_DeveloperRecovery
+tests_hardware_DiskSize
+tests_hardware_EC
+tests_hardware_EepromWriteProtect
+tests_hardware_GobiGPS
+tests_hardware_GPIOSwitches
+tests_hardware_GPS
+tests_hardware_I2CProbe
+tests_hardware_Interrupt
+tests_hardware_Keyboard
+tests_hardware_LightSensor
+tests_hardware_MemoryThroughput
+tests_hardware_MemoryTotalSize
+tests_hardware_MultiReader
+tests_hardware_RealtekCardReader
+tests_hardware_Resolution
+tests_hardware_SAT
+tests_hardware_SsdDetection
+tests_hardware_StorageFio
tests_hardware_TouchScreenPresent
+tests_hardware_TPMCheck
tests_hardware_TPMFirmware
+tests_hardware_Trackpad
+tests_hardware_VideoOutSemiAuto
+tests_hardware_Xrandr
+tests_hardware_bma150
+tests_kernel_Bootcache
+tests_kernel_ConfigVerify
+tests_kernel_CpufreqMinMax
+tests_kernel_fs_Inplace
+tests_kernel_fs_Punybench
+tests_kernel_Lmbench
+tests_kernel_LowMemNotify
+tests_kernel_PerfEventRename
+tests_kernel_SchedBandwith
+tests_kernel_TPMPing
+tests_kernel_HdParm
+tests_kernel_ProtocolCheck
+tests_logging_CrashSender
+tests_logging_CrashServices
+tests_logging_KernelCrash
+tests_logging_UserCrash
+tests_login_DBusCalls
+tests_login_SecondFactor
+tests_network_3GActivate
+tests_network_3GAssociation
+tests_network_3GDisableWhileConnecting
+tests_network_3GDisableGobiWhileConnecting
+tests_network_3GDormancyDance
+tests_network_3GGobiPorts
+tests_network_3GFailedConnect
+tests_network_3GModemControl
+tests_network_3GModemPresent
+tests_network_3GNoGobi
+tests_network_3GRecoverFromGobiDesync
+tests_network_3GSafetyDance
+tests_network_3GSmokeTest
+tests_network_3GStressEnable
+tests_network_SwitchCarrier
+tests_network_ConnmanCromoCrash
+tests_network_ConnmanIncludeExcludeMultiple
+tests_network_ConnmanPowerStateTracking
+tests_network_DhcpNegotiationSuccess
+tests_network_DhcpRenew
+tests_network_DisableInterface
+tests_network_EthCaps
+tests_network_EthernetStressPlug
+tests_network_GobiUncleanDisconnect
+tests_network_LockedSIM
+tests_network_ModemManagerSMS
+tests_network_ModemManagerSMSSignal
+tests_network_NegotiatedLANSpeed
+tests_network_Ping
+tests_network_Portal
+tests_network_UdevRename
+tests_network_WiFiCaps
+tests_network_WiFiSmokeTest
+tests_network_WifiAuthenticationTests
+tests_network_WlanHasIP
+tests_network_netperf2
+tests_platform_AccurateTime
+tests_platform_AesThroughput
+tests_platform_Attestation
+tests_platform_BootPerf
+tests_platform_CheckErrorsInLog
+tests_platform_CleanShutdown
+tests_platform_CompressedSwap
+tests_platform_CrosDisksArchive
+tests_platform_CrosDisksDBus
+tests_platform_CrosDisksFilesystem
+tests_platform_CrosDisksFormat
+tests_platform_CryptohomeBadPerms
+tests_platform_CryptohomeChangePassword
+tests_platform_CryptohomeFio
+tests_platform_CryptohomeMount
+tests_platform_CryptohomeMultiple
+tests_platform_CryptohomeNonDirs
+tests_platform_CryptohomeStress
+tests_platform_CryptohomeTestAuth
+tests_platform_DaemonsRespawn
+tests_platform_DebugDaemonGetModemStatus
+tests_platform_DebugDaemonGetNetworkStatus
+tests_platform_DebugDaemonGetRoutes
+tests_platform_DebugDaemonPing
+tests_platform_DebugDaemonTracePath
+tests_platform_DMVerityBitCorruption
+tests_platform_DMVerityCorruption
+tests_platform_EncryptedStateful
+tests_platform_EvdevSynDropTest
+tests_platform_ExternalUSBBootStress
+tests_platform_ExternalUSBStress
+tests_platform_FileNum
+tests_platform_FilePerms
+tests_platform_FileSize
+tests_platform_HighResTimers
+tests_platform_KernelVersion
+tests_platform_LibCBench
+tests_platform_MemCheck
+tests_platform_NetParms
+tests_platform_OSLimits
+tests_platform_PartitionCheck
+tests_platform_Pkcs11InitUnderErrors
+tests_platform_Pkcs11ChangeAuthData
+tests_platform_Pkcs11Events
+tests_platform_Pkcs11LoadPerf
+tests_platform_Rootdev
+tests_platform_RootPartitionsNotMounted
+tests_platform_SessionManagerTerm
+tests_platform_Shutdown
+tests_platform_SuspendStress
+tests_platform_TempFS
+tests_platform_TLSDate
+tests_platform_ToolchainOptions
+tests_platform_TouchpadSynDrop
+tests_platform_TPMEvict
+tests_power_ARMSettings
+tests_power_Backlight
+tests_power_BacklightControl
+tests_power_BacklightSuspend
+tests_power_BatteryCharge
+tests_power_CameraSuspend
+tests_power_CPUFreq
+tests_power_CPUIdle
+tests_power_Draw
+tests_power_HotCPUSuspend
+tests_power_KernelSuspend
+tests_power_MemorySuspend
+tests_power_NoConsoleSuspend
+tests_power_ProbeDriver
+tests_power_Resume
+tests_power_Standby
+tests_power_StatsCPUFreq
+tests_power_StatsCPUIdle
+tests_power_StatsUSB
+tests_power_Status
+tests_power_SuspendResume
+tests_power_SuspendShutdown
+tests_power_WakeupRTC
+tests_power_x86Settings
+tests_realtimecomm_GTalkAudioBench
+tests_realtimecomm_GTalkLmiCamera
+tests_realtimecomm_GTalkunittest
+tests_security_AccountsBaseline
+tests_security_ASLR
+tests_security_ChromiumOSLSM
+tests_security_DbusMap
+tests_security_DbusOwners
+tests_security_Firewall
+tests_security_HardlinkRestrictions
+tests_security_HciconfigDefaultSettings
+tests_security_HtpdateHTTP
+tests_security_Minijail_seccomp
+tests_security_Minijail0
+tests_security_ModuleLocking
+tests_security_OpenFDs
+tests_security_OpenSSLBlacklist
+tests_security_OpenSSLRegressions
+tests_security_ProtocolFamilies
+tests_security_ptraceRestrictions
+tests_security_ReservedPrivileges
+tests_security_RestartJob
+tests_security_RootCA
+tests_security_RootfsOwners
+tests_security_RootfsStatefulSymlinks
+tests_security_RuntimeExecStack
+tests_security_SandboxedServices
+tests_security_SeccompSyscallFilters
+tests_security_SMMLocked
+tests_security_StatefulPermissions
+tests_security_SuidBinaries
+tests_security_SymlinkRestrictions
+tests_security_SysVIPC
+tests_suite_HWConfig
+tests_suite_HWQual
+test_Recall
"
IUSE="${IUSE} ${IUSE_TESTS}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,316 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit toolchain-funcs flag-o-matic cros-workon autotest
DESCRIPTION="Autotest tests"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
IUSE="+autox +xset +tpmtools hardened"
# Enable autotest by default.
IUSE="${IUSE} +autotest"
# TODO(snanda): Remove xset dependence once power_LoadTest is switched over
# to use power manager
# TODO(semenzato): tpm-tools is included for hardware_TpmFirmware (and at this
# time only one binary is used, tpm_takeownership). Once we have a testing
# image, a better way would be to add tpm-tools to the image.
#
# pygtk is used only in the following:
# desktopui_ImeTest
# desktopui_ImeLogin
# pygobject is used only in the following:
# desktopui_ScreenLocker
# hardware_BluetoothSemiAuto
# network_3GActivate
# network_3GDormancyDance
# network_3GFailedConnect
# network_3GRecoverFromGobiDesync
# network_3GSafetyDance
# network_3GSmokeTest
# network_3GStressEnable
# network_WiFiSmokeTest
# network_WifiAuthenticationTests
RDEPEND="
chromeos-base/autotest-deps
chromeos-base/autotest-deps-glbench
chromeos-base/autotest-deps-glmark2
chromeos-base/autotest-deps-iotools
chromeos-base/autotest-deps-libaio
chromeos-base/autotest-deps-piglit
chromeos-base/flimflam-test
autox? ( chromeos-base/autox )
dev-python/numpy
dev-python/pygobject
dev-python/pygtk
xset? ( x11-apps/xset )
tpmtools? ( app-crypt/tpm-tools )
"
RDEPEND="${RDEPEND}
tests_platform_RootPartitionsNotMounted? ( sys-apps/rootdev )
tests_platform_RootPartitionsNotMounted? ( sys-fs/udev )
tests_hardware_TPMFirmware? ( chromeos-base/tpm_lite )
"
DEPEND="${RDEPEND}"
IUSE_TESTS="
+tests_compilebench
+tests_crashme
+tests_dbench
+tests_ddtest
+tests_disktest
+tests_fsx
+tests_hackbench
+tests_iperf
+tests_bonnie
+tests_iozone
+tests_netperf2
+tests_netpipe
+tests_scrashme
+tests_sound_infrastructure
+tests_sleeptest
+tests_unixbench
+tests_audiovideo_CRASFormatConversion
+tests_audiovideo_LineOutToMicInLoopback
+tests_audiovideo_LoopbackLatency
+tests_audiovideo_Microphone
+tests_audiovideo_V4L2
+tests_cellular_Smoke
+tests_cellular_ThroughputController
+tests_cellular_Throughput
+tests_build_RootFilesystemSize
+tests_desktopui_FontCache
+tests_desktopui_GTK2Config
+tests_desktopui_HangDetector
+tests_desktopui_ImeLogin
+tests_desktopui_KillRestart
+tests_desktopui_SpeechSynthesisSemiAuto
tests_example_UnitTest
+tests_example_CrosTest
+tests_graphics_GLBench
+tests_graphics_GLMark2
+tests_graphics_KernelMemory
+tests_graphics_LibDRM
+tests_graphics_SyncControlTest
+tests_firmware_RomSize
tests_firmware_VbootCrypto
+tests_hardware_Ath3k
+tests_hardware_Backlight
+tests_hardware_ch7036
+tests_hardware_Components
+tests_hardware_DeveloperRecovery
+tests_hardware_DiskSize
+tests_hardware_EC
+tests_hardware_EepromWriteProtect
+tests_hardware_GobiGPS
+tests_hardware_GPIOSwitches
+tests_hardware_GPS
+tests_hardware_I2CProbe
+tests_hardware_Interrupt
+tests_hardware_Keyboard
+tests_hardware_LightSensor
+tests_hardware_MemoryThroughput
+tests_hardware_MemoryTotalSize
+tests_hardware_MultiReader
+tests_hardware_RealtekCardReader
+tests_hardware_Resolution
+tests_hardware_SAT
+tests_hardware_SsdDetection
+tests_hardware_StorageFio
tests_hardware_TouchScreenPresent
+tests_hardware_TPMCheck
tests_hardware_TPMFirmware
+tests_hardware_Trackpad
+tests_hardware_VideoOutSemiAuto
+tests_hardware_Xrandr
+tests_hardware_bma150
+tests_kernel_Bootcache
+tests_kernel_ConfigVerify
+tests_kernel_CpufreqMinMax
+tests_kernel_fs_Inplace
+tests_kernel_fs_Punybench
+tests_kernel_Lmbench
+tests_kernel_LowMemNotify
+tests_kernel_PerfEventRename
+tests_kernel_SchedBandwith
+tests_kernel_TPMPing
+tests_kernel_HdParm
+tests_kernel_ProtocolCheck
+tests_logging_CrashSender
+tests_logging_CrashServices
+tests_logging_KernelCrash
+tests_logging_UserCrash
+tests_login_DBusCalls
+tests_login_SecondFactor
+tests_network_3GActivate
+tests_network_3GAssociation
+tests_network_3GDisableWhileConnecting
+tests_network_3GDisableGobiWhileConnecting
+tests_network_3GDormancyDance
+tests_network_3GGobiPorts
+tests_network_3GFailedConnect
+tests_network_3GModemControl
+tests_network_3GModemPresent
+tests_network_3GNoGobi
+tests_network_3GRecoverFromGobiDesync
+tests_network_3GSafetyDance
+tests_network_3GSmokeTest
+tests_network_3GStressEnable
+tests_network_SwitchCarrier
+tests_network_ConnmanCromoCrash
+tests_network_ConnmanIncludeExcludeMultiple
+tests_network_ConnmanPowerStateTracking
+tests_network_DhcpNegotiationSuccess
+tests_network_DhcpRenew
+tests_network_DisableInterface
+tests_network_EthCaps
+tests_network_EthernetStressPlug
+tests_network_GobiUncleanDisconnect
+tests_network_LockedSIM
+tests_network_ModemManagerSMS
+tests_network_ModemManagerSMSSignal
+tests_network_NegotiatedLANSpeed
+tests_network_Ping
+tests_network_Portal
+tests_network_UdevRename
+tests_network_WiFiCaps
+tests_network_WiFiSmokeTest
+tests_network_WifiAuthenticationTests
+tests_network_WlanHasIP
+tests_network_netperf2
+tests_platform_AccurateTime
+tests_platform_AesThroughput
+tests_platform_Attestation
+tests_platform_BootPerf
+tests_platform_CheckErrorsInLog
+tests_platform_CleanShutdown
+tests_platform_CompressedSwap
+tests_platform_CrosDisksArchive
+tests_platform_CrosDisksDBus
+tests_platform_CrosDisksFilesystem
+tests_platform_CrosDisksFormat
+tests_platform_CryptohomeBadPerms
+tests_platform_CryptohomeChangePassword
+tests_platform_CryptohomeFio
+tests_platform_CryptohomeMount
+tests_platform_CryptohomeMultiple
+tests_platform_CryptohomeNonDirs
+tests_platform_CryptohomeStress
+tests_platform_CryptohomeTestAuth
+tests_platform_DaemonsRespawn
+tests_platform_DebugDaemonGetModemStatus
+tests_platform_DebugDaemonGetNetworkStatus
+tests_platform_DebugDaemonGetRoutes
+tests_platform_DebugDaemonPing
+tests_platform_DebugDaemonTracePath
+tests_platform_DMVerityBitCorruption
+tests_platform_DMVerityCorruption
+tests_platform_EncryptedStateful
+tests_platform_EvdevSynDropTest
+tests_platform_ExternalUSBBootStress
+tests_platform_ExternalUSBStress
+tests_platform_FileNum
+tests_platform_FilePerms
+tests_platform_FileSize
+tests_platform_HighResTimers
+tests_platform_KernelVersion
+tests_platform_LibCBench
+tests_platform_MemCheck
+tests_platform_NetParms
+tests_platform_OSLimits
+tests_platform_PartitionCheck
+tests_platform_Pkcs11InitUnderErrors
+tests_platform_Pkcs11ChangeAuthData
+tests_platform_Pkcs11Events
+tests_platform_Pkcs11LoadPerf
+tests_platform_Rootdev
+tests_platform_RootPartitionsNotMounted
+tests_platform_SessionManagerTerm
+tests_platform_Shutdown
+tests_platform_SuspendStress
+tests_platform_TempFS
+tests_platform_TLSDate
+tests_platform_ToolchainOptions
+tests_platform_TouchpadSynDrop
+tests_platform_TPMEvict
+tests_power_ARMSettings
+tests_power_Backlight
+tests_power_BacklightControl
+tests_power_BacklightSuspend
+tests_power_BatteryCharge
+tests_power_CameraSuspend
+tests_power_CPUFreq
+tests_power_CPUIdle
+tests_power_Draw
+tests_power_HotCPUSuspend
+tests_power_KernelSuspend
+tests_power_MemorySuspend
+tests_power_NoConsoleSuspend
+tests_power_ProbeDriver
+tests_power_Resume
+tests_power_Standby
+tests_power_StatsCPUFreq
+tests_power_StatsCPUIdle
+tests_power_StatsUSB
+tests_power_Status
+tests_power_SuspendResume
+tests_power_SuspendShutdown
+tests_power_WakeupRTC
+tests_power_x86Settings
+tests_realtimecomm_GTalkAudioBench
+tests_realtimecomm_GTalkLmiCamera
+tests_realtimecomm_GTalkunittest
+tests_security_AccountsBaseline
+tests_security_ASLR
+tests_security_ChromiumOSLSM
+tests_security_DbusMap
+tests_security_DbusOwners
+tests_security_Firewall
+tests_security_HardlinkRestrictions
+tests_security_HciconfigDefaultSettings
+tests_security_HtpdateHTTP
+tests_security_Minijail_seccomp
+tests_security_Minijail0
+tests_security_ModuleLocking
+tests_security_OpenFDs
+tests_security_OpenSSLBlacklist
+tests_security_OpenSSLRegressions
+tests_security_ProtocolFamilies
+tests_security_ptraceRestrictions
+tests_security_ReservedPrivileges
+tests_security_RestartJob
+tests_security_RootCA
+tests_security_RootfsOwners
+tests_security_RootfsStatefulSymlinks
+tests_security_RuntimeExecStack
+tests_security_SandboxedServices
+tests_security_SeccompSyscallFilters
+tests_security_SMMLocked
+tests_security_StatefulPermissions
+tests_security_SuidBinaries
+tests_security_SymlinkRestrictions
+tests_security_SysVIPC
+tests_suite_HWConfig
+tests_suite_HWQual
+test_Recall
"
IUSE="${IUSE} ${IUSE_TESTS}"
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
AUTOTEST_DEPS_LIST=""
AUTOTEST_CONFIG_LIST=""
AUTOTEST_PROFILERS_LIST=""
AUTOTEST_FILE_MASK="*.a *.tar.bz2 *.tbz2 *.tgz *.tar.gz"

View File

@ -1,100 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
CROS_WORKON_COMMIT="c04bdd4a43f9a240961c8fb07afc1386fddb5826"
CROS_WORKON_TREE="fb8c4062f8c8ed9467124d53053e7c108d1eab34"
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit toolchain-funcs flag-o-matic cros-workon
DESCRIPTION="Autotest scripts and tools"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="x86 arm amd64"
RDEPEND="
!<chromeos-base/autotest-chrome-0.0.1-r1788
!<chromeos-base/autotest-tests-0.0.1-r3291
"
# We don't want Python on the base image, however, there're several base
# chromeos dependent ebuilds that depend on this ebuild.
DEPEND="${RDEPEND}"
# Ensure the configures run by autotest pick up the right config.site
export CONFIG_SITE=/usr/share/config.site
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
# Block AFE runtime data and test data that is not useful here.
# Note - we specifically copy over all server-side tests until crosbug.com/35194
# is resolved.
CROS_WORKON_SUBDIR_BLACKLIST=( "packages" "results" "site-packages" "frontend/client/www" client/{tests,site_tests} )
AUTOTEST_WORK="${WORKDIR}/autotest-work"
src_prepare() {
mkdir -p "${AUTOTEST_WORK}/client"
mkdir -p "${AUTOTEST_WORK}/server"
cp -fpu "${S}"/client/* "${AUTOTEST_WORK}/client" &>/dev/null
cp -fpru "${S}"/client/{bin,common_lib,tools} "${AUTOTEST_WORK}/client"
cp -fpu "${S}"/server/* "${AUTOTEST_WORK}/server" &>/dev/null
cp -fpru "${S}"/server/{bin,control_segments,hosts,site_tests,tests} \
"${AUTOTEST_WORK}/server"
cp -fpru "${S}"/{conmux,tko,utils,site_utils,test_suites,frontend} "${AUTOTEST_WORK}"
# cros directory is not from autotest upstream but cros project specific.
cp -fpru "${S}"/client/cros "${AUTOTEST_WORK}/client"
cp -fpru "${S}"/server/cros "${AUTOTEST_WORK}/server"
# Pre-create test directories.
local test_dirs="
client/tests client/site_tests
client/config client/deps client/profilers
packages"
local dir
for dir in ${test_dirs}; do
mkdir "${AUTOTEST_WORK}/${dir}"
touch "${AUTOTEST_WORK}/${dir}"/.keep
done
sed "/^enable_server_prebuild/d" "${S}/global_config.ini" > \
"${AUTOTEST_WORK}/global_config.ini"
}
src_install() {
insinto /usr/local/autotest
doins -r "${AUTOTEST_WORK}"/*
# base __init__.py
touch "${D}"/usr/local/autotest/__init__.py
# TODO: This should be more selective
chmod -R a+x "${D}"/usr/local/autotest
# setup stuff needed for read/write operation
chmod a+wx "${D}/usr/local/autotest/packages"
dodir "/usr/local/autotest/client/packages"
chmod a+wx "${D}/usr/local/autotest/client/packages"
dodir "/usr/local/autotest/server/tmp"
chmod a+wx "${D}/usr/local/autotest/server/tmp"
# Set up symlinks so that debug info works for autotests.
dodir /usr/lib/debug/usr/local/autotest/
dosym client/site_tests /usr/lib/debug/usr/local/autotest/tests
}
# Packages client.
pkg_postinst() {
local root_autotest_dir="${ROOT}/usr/local/autotest"
flock "${root_autotest_dir}/packages" \
-c "python -B ${root_autotest_dir}/utils/packager.py \
-r ${root_autotest_dir}/packages --client upload"
}

View File

@ -1,98 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
CROS_WORKON_PROJECT="chromiumos/third_party/autotest"
inherit toolchain-funcs flag-o-matic cros-workon
DESCRIPTION="Autotest scripts and tools"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~x86 ~arm ~amd64"
RDEPEND="
!<chromeos-base/autotest-chrome-0.0.1-r1788
!<chromeos-base/autotest-tests-0.0.1-r3291
"
# We don't want Python on the base image, however, there're several base
# chromeos dependent ebuilds that depend on this ebuild.
DEPEND="${RDEPEND}"
# Ensure the configures run by autotest pick up the right config.site
export CONFIG_SITE=/usr/share/config.site
CROS_WORKON_LOCALNAME=../third_party/autotest
CROS_WORKON_SUBDIR=files
# Block AFE runtime data and test data that is not useful here.
# Note - we specifically copy over all server-side tests until crosbug.com/35194
# is resolved.
CROS_WORKON_SUBDIR_BLACKLIST=( "packages" "results" "site-packages" "frontend/client/www" client/{tests,site_tests} )
AUTOTEST_WORK="${WORKDIR}/autotest-work"
src_prepare() {
mkdir -p "${AUTOTEST_WORK}/client"
mkdir -p "${AUTOTEST_WORK}/server"
cp -fpu "${S}"/client/* "${AUTOTEST_WORK}/client" &>/dev/null
cp -fpru "${S}"/client/{bin,common_lib,tools} "${AUTOTEST_WORK}/client"
cp -fpu "${S}"/server/* "${AUTOTEST_WORK}/server" &>/dev/null
cp -fpru "${S}"/server/{bin,control_segments,hosts,site_tests,tests} \
"${AUTOTEST_WORK}/server"
cp -fpru "${S}"/{conmux,tko,utils,site_utils,test_suites,frontend} "${AUTOTEST_WORK}"
# cros directory is not from autotest upstream but cros project specific.
cp -fpru "${S}"/client/cros "${AUTOTEST_WORK}/client"
cp -fpru "${S}"/server/cros "${AUTOTEST_WORK}/server"
# Pre-create test directories.
local test_dirs="
client/tests client/site_tests
client/config client/deps client/profilers
packages"
local dir
for dir in ${test_dirs}; do
mkdir "${AUTOTEST_WORK}/${dir}"
touch "${AUTOTEST_WORK}/${dir}"/.keep
done
sed "/^enable_server_prebuild/d" "${S}/global_config.ini" > \
"${AUTOTEST_WORK}/global_config.ini"
}
src_install() {
insinto /usr/local/autotest
doins -r "${AUTOTEST_WORK}"/*
# base __init__.py
touch "${D}"/usr/local/autotest/__init__.py
# TODO: This should be more selective
chmod -R a+x "${D}"/usr/local/autotest
# setup stuff needed for read/write operation
chmod a+wx "${D}/usr/local/autotest/packages"
dodir "/usr/local/autotest/client/packages"
chmod a+wx "${D}/usr/local/autotest/client/packages"
dodir "/usr/local/autotest/server/tmp"
chmod a+wx "${D}/usr/local/autotest/server/tmp"
# Set up symlinks so that debug info works for autotests.
dodir /usr/lib/debug/usr/local/autotest/
dosym client/site_tests /usr/lib/debug/usr/local/autotest/tests
}
# Packages client.
pkg_postinst() {
local root_autotest_dir="${ROOT}/usr/local/autotest"
flock "${root_autotest_dir}/packages" \
-c "python -B ${root_autotest_dir}/utils/packager.py \
-r ${root_autotest_dir}/packages --client upload"
}

View File

@ -1,26 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="0e87afb2d4f6cef2b5ecca593e21117a5e9379a0"
CROS_WORKON_TREE="611b421824a85dff20fd67f6cb25b6eab9f36730"
CROS_WORKON_PROJECT="chromiumos/platform/autox"
inherit python cros-workon
DESCRIPTION="AutoX library for interacting with X apps"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE=""
RDEPEND="dev-python/python-xlib"
DEPEND=
src_install() {
insinto "$(python_get_sitedir)"
doins autox.py || die
}

View File

@ -1,24 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/platform/autox"
inherit python cros-workon
DESCRIPTION="AutoX library for interacting with X apps"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
IUSE=""
RDEPEND="dev-python/python-xlib"
DEPEND=
src_install() {
insinto "$(python_get_sitedir)"
doins autox.py || die
}

View File

@ -1,18 +0,0 @@
# Copyright (c) 2009 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
DESCRIPTION="Generic board (meta package)"
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE=""
RDEPEND=""
#
# WARNING: Nothing should be added to this ebuild. This ebuild is overriden
# in most of the board specific overlays, or will be.
#

View File

@ -1,50 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="7cbe18c6f1b8446d486a501a94297e6b04128b6d"
CROS_WORKON_TREE="b5ef87a2635b6cbba9816bf32c256b3cdec80cef"
CROS_WORKON_PROJECT="chromiumos/platform/bootstat"
inherit cros-workon
DESCRIPTION="Chrome OS Boot Time Statistics Utilities"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 x86 arm"
IUSE=""
RDEPEND=""
DEPEND="dev-cpp/gtest"
src_compile() {
tc-export CC CXX AR PKG_CONFIG
emake || die "bootstat compile failed."
}
src_test() {
tc-export CC CXX AR PKG_CONFIG
emake tests || die "could not build tests"
if ! use x86 && ! use amd64 ; then
echo Skipping unit tests on non-x86 platform
else
for test in ./*_test; do
"${test}" ${GTEST_ARGS} || die "${test} failed"
done
fi
}
src_install() {
into /
dosbin bootstat || die
dosbin bootstat_get_last || die
dobin bootstat_summary || die
into /usr
dolib.a libbootstat.a || die
insinto /usr/include/metrics
doins bootstat.h || die
}

View File

@ -1,48 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/platform/bootstat"
inherit cros-workon
DESCRIPTION="Chrome OS Boot Time Statistics Utilities"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="~amd64 ~x86 ~arm"
IUSE=""
RDEPEND=""
DEPEND="dev-cpp/gtest"
src_compile() {
tc-export CC CXX AR PKG_CONFIG
emake || die "bootstat compile failed."
}
src_test() {
tc-export CC CXX AR PKG_CONFIG
emake tests || die "could not build tests"
if ! use x86 && ! use amd64 ; then
echo Skipping unit tests on non-x86 platform
else
for test in ./*_test; do
"${test}" ${GTEST_ARGS} || die "${test} failed"
done
fi
}
src_install() {
into /
dosbin bootstat || die
dosbin bootstat_get_last || die
dobin bootstat_summary || die
into /usr
dolib.a libbootstat.a || die
insinto /usr/include/metrics
doins bootstat.h || die
}

View File

@ -1,30 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
EAPI="2"
inherit confutils
DESCRIPTION="NVRAM image for the brcmfmac driver"
HOMEPAGE="http://src.chromium.org"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="arm"
NVRAM_USE="awnh610 awnh930"
IUSE=${NVRAM_USE}
pkg_setup() {
confutils_init
confutils_require_one ${NVRAM_USE}
}
src_install() {
insinto /lib/firmware/brcm
if use awnh610 ; then
newins "${FILESDIR}"/bcm4329-fullmac-4.txt-awnh610 bcm4329-fullmac-4.txt || die
elif use awnh930 ; then
newins "${FILESDIR}"/bcm4329-fullmac-4.txt-awnh930 bcm4329-fullmac-4.txt || die
fi
}

View File

@ -1,98 +0,0 @@
# bcm94329sdagb board
# $Copyright (C) 2008 Broadcom Corporation$
# $id$
# Azurewave Release 2010/12/13
# NH610
sromrev=3
vendid=0x14e4
devid=0x432e
boardtype=0x57e
# board revision 1.1
boardrev=0x11
# boardflags
boardflags=0x0200
boardflags2=0x00400000
xtalfreq=37400
aa2g=1
aa5g=1
ag0=0x0
ag1=0x0
# 11g paparams
#pa0b0=0x13cf
#pa0b1=0xfb34
#pa0b2=0xfe9e
pa0itssit=62
pa0maxpwr=74
ofdmpo=0x44444444
mcs2gpo0=0x2222
mcs2gpo1=0x2222
# sel = 1 : 20% evm sel = 2 : 27% evm sel = 3 : 16% evm
cckdigfilttype=4
# 11a paparams lowband ch36~ch64
#pa1lob0=0x148e
#pa1lob1=0xfaee
#pa1lob2=0xfe95
# 11a paparams midband ch100~ch140
#pa1b0=0x147a
#pa1b1=0xfaee
#pa1b2=0xfe95
# 11a paparams highband ch149~ch165
#pa1hib0=0x1478
#pa1hib1=0xfaee
#pa1hib2=0xfe95
pa1itssit=62
pa1maxpwr=60
opo=0
mcs5gpo=0x22222222
# 11g rssi params
rssismf2g=0xa
rssismc2g=0xb
rssisav2g=0x3
bxa2g=0
# 11a rssi params
rssismf5g=0xa
rssismc5g=0xa
rssisav5g=0x3
bxa5g=0
# country code
ccode=ALL
cctl=0x0
rxpo2g=2
rxpo5g=0
# Channel gain adjustments
5g_cga=0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0
boardnum=2048
#macaddr=00:11:22:33:44:55
nocrc=1
#nvram_override=1
#for mfgc
otpimagesize=182
# sdio extra configs
hwhdr=0x05ffff031030031003100000
#This generates empty F1, F2 and F3 tuple chains, and may be used if the host SDIO stack does not require the standard tuples.
RAW1=80 02 fe ff
#This includes the standard FUNCID and FUNCE tuples in the F1, F2, F3 and common CIS.
#RAW1=80 32 fe 21 02 0c 00 22 2a 01 01 00 00 c5 0 e6 00 00 00 00 00 40 00 00 ff ff 80 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 ff 20 04 D0 2 29 43 21 02 0c 00 22 04 00 20 00 5A
nvramver=4.218.203.0

View File

@ -1,92 +0,0 @@
# bcm94329sdagb board
# $Copyright (C) 2008 Broadcom Corporation$
# $id$
sromrev=3
vendid=0x14e4
devid=0x432e
boardtype=0x565
# board revision 1.1
boardrev=0x11
# boardflags
boardflags=0x10000200
boardflags2=0x00400000
# specify the xtalfreq if it is otherthan 38.4MHz
xtalfreq=37400
aa2g=3
aa5g=3
ag0=0x82
ag1=0x84
# 11g paparams
pa0b0=5107
pa0b1=64308
pa0b2=65182
pa0itssit=62
pa0maxpwr=66
opo=0
mcs2gpo0=0x2222
mcs2gpo1=0x2222
# sel = 1 : 20% evm sel = 2 : 27% evm sel = 3 : 16% evm
cckdigfilttype=1
# 11a paparams lowband
pa1lob0=6654
pa1lob1=63794
pa1lob2=65134
# paparams midband
pa1b0=5970
pa1b1=63982
pa1b2=65122
#paparams high band
pa1hib0=5910
pa1hib1=63998
pa1hib2=65130
pa1itssit=62
pa1maxpwr=60
opo=0
mcs5gpo=0x22222222
# 11g rssi params
rssismf2g=0xa
rssismc2g=0xb
rssisav2g=0x3
bxa2g=0
# 11a rssi params
rssismf5g=0x8
rssismc5g=0x6
rssisav5g=0x0
bxa2g=0
# country code
ccode=ALL
cctl=0x0
rxpo2g=2
rxpo5g=0
# Channel gain adjustments
5g_cga=0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0
boardnum=2048
macaddr=00:90:4c:c5:34:23
#######
nocrc=1
#for mfgc
otpimagesize=182
# sdio extra configs
hwhdr=0x05ffff031030031003100000
#This generates empty F1, F2 and F3 tuple chains, and may be used if the host SDIO stack does not require the standard tuples.
RAW1=80 02 fe ff
#This includes the standard FUNCID and FUNCE tuples in the F1, F2, F3 and common CIS.
#RAW1=80 32 fe 21 02 0c 00 22 2a 01 01 00 00 c5 0 e6 00 00 00 00 00 40 00 00 ff ff 80 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 ff 20 04 D0 2 29 43 21 02 0c 00 22 04 00 20 00 5A
nvramver=4.218.203.0

View File

@ -1,15 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>no-herd</herd>
<maintainer>
<email>gabeblack@gentoo.org</email>
</maintainer>
<longdescription>
brcmfmac NVRAM image file.
</longdescription>
<use>
<flag name='awnh930'>Install the NVRAM image file for the AW-NH930 module.</flag>
<flag name='awnh610'>Install the NVRAM image file for the AW-NH610 module.</flag>
</use>
</pkgmetadata>

View File

@ -1,17 +0,0 @@
# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
DESCRIPTION="CrOS specific busybox configuration file."
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
S=${WORKDIR}
src_install() {
insinto /etc/portage/savedconfig/sys-apps
doins "${FILESDIR}/busybox"
}

View File

@ -1,21 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
DESCRIPTION="Ebuild that installs the firmware needed by the ca0132 codec."
LICENSE="BSD"
SLOT="0"
KEYWORDS="x86 amd64"
DSP_FW_NAME="ctefx.bin"
EQ_NAME="ctspeq.bin"
S=${WORKDIR}
src_install() {
insinto /lib/firmware
doins "${FILESDIR}/${DSP_FW_NAME}"
doins "${FILESDIR}/${EQ_NAME}"
}

View File

@ -1,28 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
# Hand-install (with cros_package_to_live) on a device to make it an
# endpoint in the cell testbed
DESCRIPTION="Performance testing endpoint for cellular performance tests"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE=""
RDEPEND="net-misc/iperf"
DEPEND=""
S=${WORKDIR}
src_install() {
insinto /etc/init
doins "${FILESDIR}"/celltest-perf-endpoint-{network,iperf,webserver}.conf
dobin "${FILESDIR}"/celltest-perf-endpoint-webserver
}

View File

@ -1,25 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
description "Run iperf on endpoints in the cell testbed"
author "chromium-os-dev@chromium.org"
# This file is from the chromeos-base/celltest-perf-endpoint ebuild,
# which is hand-installed on the relevant testbed machines. The
# testbed is documented at
# https://docs.google.com/document/pub?id=1yG7j8Iw9PnQTH-93zP5BqB0qQRU08az11A_eN0acd70
start on stopped celltest-perf-endpoint-network
stop on stopping system-services
respawn
script
if [ -x /usr/local/bin/iperf ] ; then
IPERF=/usr/local/bin/iperf
else
IPERF=/usr/bin/iperf
fi
exec $IPERF -s
end script

View File

@ -1,30 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
description "Configure network for endpoints in the cell testbed."
author "chromium-os-dev@chromium.org"
# This file is from the chromeos-base/celltest-perf-endpoint ebuild,
# which is hand-installed on the relevant testbed machines. The
# testbed is documented at
# https://docs.google.com/document/pub?id=1yG7j8Iw9PnQTH-93zP5BqB0qQRU08az11A_eN0acd70
# Needs to run after iptables starts up so that our changes aren't
# overwritten. But, running directly after that will potentially
# interfere with openssh-server because mutliple simultaneous iptables
# invocations can fail. So run after openssh-server has started.
start on stopped iptables and stopped ip6tables and started openssh-server
script
# Bring up the air-side virtual interface
ifconfig eth0:1 192.168.2.254
# Open iperf port
iptables -A INPUT -p tcp -m tcp --dport 5001 -j ACCEPT
iptables -A INPUT -p udp -m udp --dport 5001 -j ACCEPT
# Open web server port
iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
end script

View File

@ -1,127 +0,0 @@
#!/usr/bin/python
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
"""A simple web server for cell modem tests
Used for:
Connectivity tests
Bandwidth tests
"""
import BaseHTTPServer
import socket
import struct
import urlparse
import numpy.random
_MAX_SINGLE_TRANSFER = 1 << 20
def WriteBytes(out, n):
"""Write n random bytes to out."""
remaining = n
while remaining:
if remaining > _MAX_SINGLE_TRANSFER:
# We use random bytes to defeat any compression that may be
# present. This code using the random module was on the edge of
# too slow:
# struct.pack('Q' * (n/8),
# *[random.getrandbits(64) for x in xrange(n/8)])
# so we use numpy.random.bytes instead.
out.write(numpy.random.bytes(_MAX_SINGLE_TRANSFER))
remaining -= _MAX_SINGLE_TRANSFER
else:
out.write(numpy.random.bytes(remaining))
remaining = 0
class HttpHandler(BaseHTTPServer.BaseHTTPRequestHandler):
def address_string(self):
"""Build address string without attempting a reverse DNS lookup."""
return str(self.client_address[0])
def _Dispatch(self, command):
"""Parses query and dispatches a request to the relevant method."""
parsed = urlparse.urlparse(self.path)
# the last value specified for each key
self.query = dict(
[(k, v[-1]) for k,v in urlparse.parse_qs(parsed.query).items()])
dispatch_table = {
'GET': {
'/connectivity/index.html': self.Connectivity,
'/download': self.GetBytes,
},
'POST': {
'/upload': self.SinkBytes,
},
}
if parsed.path not in dispatch_table[command]:
self.send_error(404)
return
dispatch_table[command][parsed.path]()
def do_GET(self):
return self._Dispatch('GET')
def do_POST(self):
return self._Dispatch('POST')
def GetBytes(self):
try:
n = int(self.query['size'])
except KeyError:
self.send_error(400)
return
self.send_response(200)
self.send_header('Content-Length', n)
self.end_headers()
WriteBytes(self.wfile, n)
def SinkBytes(self):
remaining = int(self.headers['Content-Length'])
while remaining:
this_read = min(remaining, _MAX_SINGLE_TRANSFER)
got = self.rfile.read(this_read)
if not got:
break
remaining -= len(got)
self.send_response(200)
self.end_headers()
def Connectivity(self):
self.send_response(200)
self.send_header('Content-Type', 'text/plain')
self.end_headers()
self.wfile.write('Chromium')
class BigBufferHTTPServer(BaseHTTPServer.HTTPServer):
"""HTTP server with large buffer sizes.
Empirically, we see poor performance with cell emulators and default
buffer sizes.
"""
def get_request(self):
"""Overrides get_request to set buffer sizes.
Returns:
(socket, address), where socket has been modified for large buffers
"""
# We can't use super() here because BaseHTTPServer.HTTPServer is an
# old-style class.
sock, addr = BaseHTTPServer.HTTPServer.get_request(self)
sock.setsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF, 1 << 24)
sock.setsockopt(socket.SOL_SOCKET, socket.SO_RCVBUF, 1 << 24)
return sock, addr
BigBufferHTTPServer(('', 80), HttpHandler).serve_forever()

View File

@ -1,18 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
description "Simple web server for cellular testbed tests"
author "chromium-os-dev@chromium.org"
# This file is from the chromeos-base/celltest-perf-endpoint ebuild,
# which is hand-installed on the relevant testbed machines. The
# testbed is documented at
# https://docs.google.com/document/pub?id=1yG7j8Iw9PnQTH-93zP5BqB0qQRU08az11A_eN0acd70
start on stopped celltest-perf-endpoint-network
stop on stopping system-services
respawn
exec celltest-perf-endpoint-webserver

View File

@ -1,78 +0,0 @@
# Copyright (C) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE.makefile file.
EAPI="4"
CROS_WORKON_COMMIT="80e2bd82e37b10c72cc5af63ee705379955a4fa1"
CROS_WORKON_TREE="21c1942d9a04e83433ab0a7af6b6ce0346f647c1"
CROS_WORKON_PROJECT="chromiumos/platform/chaps"
CROS_WORKON_OUTOFTREE_BUILD=1
inherit cros-debug cros-workon
DESCRIPTION="PKCS #11 layer over TrouSerS."
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="arm amd64 x86"
IUSE="test"
LIBCHROME_VERS="125070"
RDEPEND="
app-crypt/trousers
chromeos-base/libchrome:${LIBCHROME_VERS}[cros-debug=]
chromeos-base/libchromeos
dev-libs/dbus-c++
dev-libs/openssl
dev-cpp/gflags"
DEPEND="${RDEPEND}
dev-cpp/gmock
test? ( dev-cpp/gtest )
dev-db/leveldb"
# We only depend on this for the init script.
RDEPEND+="
chromeos-base/chromeos-init"
src_prepare() {
cros-workon_src_prepare
}
src_configure() {
cros-workon_src_configure
}
src_compile() {
cros-workon_src_compile
}
src_test() {
cros-workon_src_test
emake more_tests
}
src_install() {
dosbin "${OUT}"/chapsd
dobin "${OUT}"/chaps_client
dobin "${OUT}"/p11_replay
dolib.so "${OUT}"/libchaps.so
# Install D-Bus config file.
insinto /etc/dbus-1/system.d
doins org.chromium.Chaps.conf
# Install D-Bus service file.
insinto /usr/share/dbus-1/services
doins org.chromium.Chaps.service
# Install upstart config file.
insinto /etc/init
doins chapsd.conf
# Install headers for use by clients.
insinto /usr/include/chaps
doins login_event_client.h
insinto /usr/include/chaps/pkcs11
doins pkcs11/*.h
}

View File

@ -1,76 +0,0 @@
# Copyright (C) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE.makefile file.
EAPI="4"
CROS_WORKON_PROJECT="chromiumos/platform/chaps"
CROS_WORKON_OUTOFTREE_BUILD=1
inherit cros-debug cros-workon
DESCRIPTION="PKCS #11 layer over TrouSerS."
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="~arm ~amd64 ~x86"
IUSE="test"
LIBCHROME_VERS="125070"
RDEPEND="
app-crypt/trousers
chromeos-base/libchrome:${LIBCHROME_VERS}[cros-debug=]
chromeos-base/libchromeos
dev-libs/dbus-c++
dev-libs/openssl
dev-cpp/gflags"
DEPEND="${RDEPEND}
dev-cpp/gmock
test? ( dev-cpp/gtest )
dev-db/leveldb"
# We only depend on this for the init script.
RDEPEND+="
chromeos-base/chromeos-init"
src_prepare() {
cros-workon_src_prepare
}
src_configure() {
cros-workon_src_configure
}
src_compile() {
cros-workon_src_compile
}
src_test() {
cros-workon_src_test
emake more_tests
}
src_install() {
dosbin "${OUT}"/chapsd
dobin "${OUT}"/chaps_client
dobin "${OUT}"/p11_replay
dolib.so "${OUT}"/libchaps.so
# Install D-Bus config file.
insinto /etc/dbus-1/system.d
doins org.chromium.Chaps.conf
# Install D-Bus service file.
insinto /usr/share/dbus-1/services
doins org.chromium.Chaps.service
# Install upstart config file.
insinto /etc/init
doins chapsd.conf
# Install headers for use by clients.
insinto /usr/include/chaps
doins login_event_client.h
insinto /usr/include/chaps/pkcs11
doins pkcs11/*.h
}

View File

@ -1,37 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="bc506a513266688ccfcafdff1567b7a049d39d7c"
CROS_WORKON_TREE="97011cdf8ff5934f680c71756dea9286dc73ec11"
CROS_WORKON_PROJECT="chromiumos/platform/acpi"
inherit cros-workon
DESCRIPTION="Chrome OS ACPI Scripts"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 x86"
IUSE=""
DEPEND=""
RDEPEND="sys-power/acpid
chromeos-base/chromeos-init"
CROS_WORKON_LOCALNAME="acpi"
src_install() {
dodir /etc/acpi/events
dodir /etc/acpi
install -m 0755 -o root -g root "${S}"/event_* "${D}"/etc/acpi/events
install -m 0755 -o root -g root "${S}"/action_* "${D}"/etc/acpi
dodir /etc/init
install --owner=root --group=root --mode=0644 "${S}"/acpid.conf \
"${D}/etc/init/"
}

View File

@ -1,35 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/platform/acpi"
inherit cros-workon
DESCRIPTION="Chrome OS ACPI Scripts"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="~amd64 ~x86"
IUSE=""
DEPEND=""
RDEPEND="sys-power/acpid
chromeos-base/chromeos-init"
CROS_WORKON_LOCALNAME="acpi"
src_install() {
dodir /etc/acpi/events
dodir /etc/acpi
install -m 0755 -o root -g root "${S}"/event_* "${D}"/etc/acpi/events
install -m 0755 -o root -g root "${S}"/action_* "${D}"/etc/acpi
dodir /etc/init
install --owner=root --group=root --mode=0644 "${S}"/acpid.conf \
"${D}/etc/init/"
}

View File

@ -1,37 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="f91b983c430f2e7ce125fda8704d094616d24a0c"
CROS_WORKON_TREE="e18118e277349f02968917bc3eddb4dc39722e05"
CROS_WORKON_PROJECT="chromiumos/platform/chromiumos-assets"
inherit cros-workon toolchain-funcs
DESCRIPTION="Chromium OS-specific assets"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE=""
PDEPEND=">chromeos-base/chromeos-assets-0.0.1-r47"
DEPEND=""
RDEPEND=""
CROS_WORKON_LOCALNAME="chromiumos-assets"
src_install() {
insinto /usr/share/chromeos-assets/images
doins -r "${S}"/images/*
insinto /usr/share/chromeos-assets/images_100_percent
doins -r "${S}"/images_100_percent/*
insinto /usr/share/chromeos-assets/images_200_percent
doins -r "${S}"/images_200_percent/*
insinto /usr/share/chromeos-assets/screensavers
doins -r "${S}"/screensavers/*
}

View File

@ -1,35 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/platform/chromiumos-assets"
inherit cros-workon toolchain-funcs
DESCRIPTION="Chromium OS-specific assets"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
IUSE=""
PDEPEND=">chromeos-base/chromeos-assets-0.0.1-r47"
DEPEND=""
RDEPEND=""
CROS_WORKON_LOCALNAME="chromiumos-assets"
src_install() {
insinto /usr/share/chromeos-assets/images
doins -r "${S}"/images/*
insinto /usr/share/chromeos-assets/images_100_percent
doins -r "${S}"/images_100_percent/*
insinto /usr/share/chromeos-assets/images_200_percent
doins -r "${S}"/images_200_percent/*
insinto /usr/share/chromeos-assets/screensavers
doins -r "${S}"/screensavers/*
}

View File

@ -1,199 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_COMMIT="366c9e7ff1c99364be8eea8e1accc5bcb301773b"
CROS_WORKON_TREE="d003ce8d1ed1a8f362a169685fae11e7aedc0afe"
CROS_WORKON_PROJECT="chromiumos/platform/assets"
inherit cros-workon toolchain-funcs
DESCRIPTION="Chrome OS assets (images, sounds, etc.)"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE="alex lumpy lumpy64 mario tegra2-ldk"
DEPEND="media-fonts/croscorefonts
media-fonts/droidfonts-cros
x11-apps/xcursorgen"
RDEPEND=""
REAL_CURSOR_NAMES="
fleur
hand2
left_ptr
sb_h_double_arrow
sb_v_double_arrow
top_left_corner
top_right_corner
xterm"
# These are cursors for which there is no file, but we want to use
# one of the existing files. So we link them. The first one is an
# X holdover from some mozilla bug, and without it, we will use the
# default left_ptr_watch bitmap.
LINK_CURSORS="
08e8e1c95fe2fc01f976f1e063a24ccd:left_ptr_watch
X_cursor:left_ptr
arrow:left_ptr
based_arrow_down:sb_v_double_arrow
based_arrow_up:sb_v_double_arrow
boat:left_ptr
bogosity:left_ptr
bottom_left_corner:top_right_corner
bottom_right_corner:top_left_corner
bottom_side:sb_v_double_arrow
bottom_tee:sb_v_double_arrow
box_spiral:left_ptr
center_ptr:left_ptr
circle:left_ptr
clock:left_ptr
coffee_mug:left_ptr
diamond_cross:left_ptr
dot:left_ptr
dotbox:left_ptr
double_arrow:sb_v_double_arrow
draft_large:left_ptr
draft_small:left_ptr
draped_box:left_ptr
exchange:left_ptr
gobbler:left_ptr
gumby:left_ptr
hand1:hand2
heart:left_ptr
icon:left_ptr
iron_cross:left_ptr
left_ptr_watch:left_ptr
left_side:sb_h_double_arrow
left_tee:sb_h_double_arrow
leftbutton:left_ptr
ll_angle:top_right_corner
lr_angle:top_left_corner
man:left_ptr
middlebutton:left_ptr
mouse:left_ptr
pencil:left_ptr
pirate:left_ptr
plus:left_ptr
right_ptr:left_ptr
right_side:sb_h_double_arrow
right_tee:sb_h_double_arrow
rightbutton:left_ptr
rtl_logo:left_ptr
sailboat:left_ptr
sb_down_arrow:sb_v_double_arrow
sb_left_arrow:sb_h_double_arrow
sb_right_arrow:sb_h_double_arrow
sb_up_arrow:sb_v_double_arrow
shuttle:left_ptr
sizing:top_left_corner
spider:left_ptr
spraycan:left_ptr
star:left_ptr
target:left_ptr
tcross:left_ptr
top_left_arrow:left_ptr
top_side:sb_v_double_arrow
top_tee:sb_v_double_arrow
trek:left_ptr
ul_angle:top_left_corner
umbrella:left_ptr
ur_angle:top_right_corner
watch:left_ptr"
CROS_WORKON_LOCALNAME="assets"
src_install() {
insinto /usr/share/chromeos-assets/images
doins -r "${S}"/images/*
insinto /usr/share/chromeos-assets/images_100_percent
doins -r "${S}"/images_100_percent/*
insinto /usr/share/chromeos-assets/images_200_percent
doins -r "${S}"/images_200_percent/*
insinto /usr/share/chromeos-assets/text
doins -r "${S}"/text/boot_messages
dosbin "${S}"/text/display_boot_message
insinto /usr/share/chromeos-assets/gaia_auth
doins -r "${S}"/gaia_auth/*
insinto /usr/share/chromeos-assets/input_methods
doins "${S}"/input_methods/*
unzip "${S}"/accessibility/extensions/access_chromevox.zip
insinto /usr/share/chromeos-assets/accessibility/extensions/access_chromevox
doins -r "${S}"/chromevox_deploy/*
insinto /usr/share/chromeos-assets/crosh_builtin/
unzip -d crosh_builtin_deploy/ "${S}"/chromeapps/crosh_builtin/crosh_builtin.zip
doins -r "${S}"/crosh_builtin_deploy/*
insinto /usr/share/fonts/chrome-droid
doins "${S}"/fonts/ChromeDroid*.ttf
insinto /usr/share/color/bin
if use mario; then
newins "${S}"/color_profiles/mario.bin internal_display.bin
elif use alex; then
newins "${S}"/color_profiles/alex.bin internal_display.bin
elif use lumpy; then
newins "${S}"/color_profiles/lumpy.bin internal_display.bin
fi
# Don't install cursors when building for Tegra, since the
# current ARGB cursor implementation is performing badly,
# and the fallback to 2-bit hardware cursor works better.
# TODO: Remove this when the display driver has been fixed to
# remove the performance bottlenecks.
if ! use tegra2-ldk; then
local CURSOR_DIR="${D}"/usr/share/cursors/xorg-x11/chromeos/cursors
mkdir -p "${CURSOR_DIR}"
for i in ${REAL_CURSOR_NAMES}; do
xcursorgen -p "${S}"/cursors "${S}"/cursors/$i.cfg >"${CURSOR_DIR}/$i"
done
for i in ${LINK_CURSORS}; do
ln -s ${i#*:} "${CURSOR_DIR}/${i%:*}"
done
fi
mkdir -p "${D}"/usr/share/cursors/xorg-x11/default
echo Inherits=chromeos \
>"${D}"/usr/share/cursors/xorg-x11/default/index.theme
#
# Speech synthesis
#
insinto /usr/share/chromeos-assets/speech_synthesis/patts
# Speech synthesis component extension code
doins "${S}"/speech_synthesis/patts/manifest.json
doins "${S}"/speech_synthesis/patts/tts_main.js
doins "${S}"/speech_synthesis/patts/tts_service.nmf
# Speech synthesis voice data
doins "${S}"/speech_synthesis/patts/voice_data_hmm_en-US.js
unzip "${S}"/speech_synthesis/patts/voice_data_hmm_en-US.zip
doins -r "${S}"/voice_data_hmm_en-US
# Speech synthesis engine (platform-specific native client module)
if use arm ; then
unzip "${S}"/speech_synthesis/patts/tts_service_pexe_arm.nexe.zip
doins "${S}"/tts_service_pexe_arm.nexe
elif use x86 ; then
unzip "${S}"/speech_synthesis/patts/tts_service_x86-32.nexe.zip
doins "${S}"/tts_service_x86-32.nexe
elif use amd64 ; then
unzip "${S}"/speech_synthesis/patts/tts_service_x86-64.nexe.zip
doins "${S}"/tts_service_x86-64.nexe
fi
}

View File

@ -1,197 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
CROS_WORKON_PROJECT="chromiumos/platform/assets"
inherit cros-workon toolchain-funcs
DESCRIPTION="Chrome OS assets (images, sounds, etc.)"
HOMEPAGE="http://www.chromium.org/"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="~amd64 ~arm ~x86"
IUSE="alex lumpy lumpy64 mario tegra2-ldk"
DEPEND="media-fonts/croscorefonts
media-fonts/droidfonts-cros
x11-apps/xcursorgen"
RDEPEND=""
REAL_CURSOR_NAMES="
fleur
hand2
left_ptr
sb_h_double_arrow
sb_v_double_arrow
top_left_corner
top_right_corner
xterm"
# These are cursors for which there is no file, but we want to use
# one of the existing files. So we link them. The first one is an
# X holdover from some mozilla bug, and without it, we will use the
# default left_ptr_watch bitmap.
LINK_CURSORS="
08e8e1c95fe2fc01f976f1e063a24ccd:left_ptr_watch
X_cursor:left_ptr
arrow:left_ptr
based_arrow_down:sb_v_double_arrow
based_arrow_up:sb_v_double_arrow
boat:left_ptr
bogosity:left_ptr
bottom_left_corner:top_right_corner
bottom_right_corner:top_left_corner
bottom_side:sb_v_double_arrow
bottom_tee:sb_v_double_arrow
box_spiral:left_ptr
center_ptr:left_ptr
circle:left_ptr
clock:left_ptr
coffee_mug:left_ptr
diamond_cross:left_ptr
dot:left_ptr
dotbox:left_ptr
double_arrow:sb_v_double_arrow
draft_large:left_ptr
draft_small:left_ptr
draped_box:left_ptr
exchange:left_ptr
gobbler:left_ptr
gumby:left_ptr
hand1:hand2
heart:left_ptr
icon:left_ptr
iron_cross:left_ptr
left_ptr_watch:left_ptr
left_side:sb_h_double_arrow
left_tee:sb_h_double_arrow
leftbutton:left_ptr
ll_angle:top_right_corner
lr_angle:top_left_corner
man:left_ptr
middlebutton:left_ptr
mouse:left_ptr
pencil:left_ptr
pirate:left_ptr
plus:left_ptr
right_ptr:left_ptr
right_side:sb_h_double_arrow
right_tee:sb_h_double_arrow
rightbutton:left_ptr
rtl_logo:left_ptr
sailboat:left_ptr
sb_down_arrow:sb_v_double_arrow
sb_left_arrow:sb_h_double_arrow
sb_right_arrow:sb_h_double_arrow
sb_up_arrow:sb_v_double_arrow
shuttle:left_ptr
sizing:top_left_corner
spider:left_ptr
spraycan:left_ptr
star:left_ptr
target:left_ptr
tcross:left_ptr
top_left_arrow:left_ptr
top_side:sb_v_double_arrow
top_tee:sb_v_double_arrow
trek:left_ptr
ul_angle:top_left_corner
umbrella:left_ptr
ur_angle:top_right_corner
watch:left_ptr"
CROS_WORKON_LOCALNAME="assets"
src_install() {
insinto /usr/share/chromeos-assets/images
doins -r "${S}"/images/*
insinto /usr/share/chromeos-assets/images_100_percent
doins -r "${S}"/images_100_percent/*
insinto /usr/share/chromeos-assets/images_200_percent
doins -r "${S}"/images_200_percent/*
insinto /usr/share/chromeos-assets/text
doins -r "${S}"/text/boot_messages
dosbin "${S}"/text/display_boot_message
insinto /usr/share/chromeos-assets/gaia_auth
doins -r "${S}"/gaia_auth/*
insinto /usr/share/chromeos-assets/input_methods
doins "${S}"/input_methods/*
unzip "${S}"/accessibility/extensions/access_chromevox.zip
insinto /usr/share/chromeos-assets/accessibility/extensions/access_chromevox
doins -r "${S}"/chromevox_deploy/*
insinto /usr/share/chromeos-assets/crosh_builtin/
unzip -d crosh_builtin_deploy/ "${S}"/chromeapps/crosh_builtin/crosh_builtin.zip
doins -r "${S}"/crosh_builtin_deploy/*
insinto /usr/share/fonts/chrome-droid
doins "${S}"/fonts/ChromeDroid*.ttf
insinto /usr/share/color/bin
if use mario; then
newins "${S}"/color_profiles/mario.bin internal_display.bin
elif use alex; then
newins "${S}"/color_profiles/alex.bin internal_display.bin
elif use lumpy; then
newins "${S}"/color_profiles/lumpy.bin internal_display.bin
fi
# Don't install cursors when building for Tegra, since the
# current ARGB cursor implementation is performing badly,
# and the fallback to 2-bit hardware cursor works better.
# TODO: Remove this when the display driver has been fixed to
# remove the performance bottlenecks.
if ! use tegra2-ldk; then
local CURSOR_DIR="${D}"/usr/share/cursors/xorg-x11/chromeos/cursors
mkdir -p "${CURSOR_DIR}"
for i in ${REAL_CURSOR_NAMES}; do
xcursorgen -p "${S}"/cursors "${S}"/cursors/$i.cfg >"${CURSOR_DIR}/$i"
done
for i in ${LINK_CURSORS}; do
ln -s ${i#*:} "${CURSOR_DIR}/${i%:*}"
done
fi
mkdir -p "${D}"/usr/share/cursors/xorg-x11/default
echo Inherits=chromeos \
>"${D}"/usr/share/cursors/xorg-x11/default/index.theme
#
# Speech synthesis
#
insinto /usr/share/chromeos-assets/speech_synthesis/patts
# Speech synthesis component extension code
doins "${S}"/speech_synthesis/patts/manifest.json
doins "${S}"/speech_synthesis/patts/tts_main.js
doins "${S}"/speech_synthesis/patts/tts_service.nmf
# Speech synthesis voice data
doins "${S}"/speech_synthesis/patts/voice_data_hmm_en-US.js
unzip "${S}"/speech_synthesis/patts/voice_data_hmm_en-US.zip
doins -r "${S}"/voice_data_hmm_en-US
# Speech synthesis engine (platform-specific native client module)
if use arm ; then
unzip "${S}"/speech_synthesis/patts/tts_service_pexe_arm.nexe.zip
doins "${S}"/tts_service_pexe_arm.nexe
elif use x86 ; then
unzip "${S}"/speech_synthesis/patts/tts_service_x86-32.nexe.zip
doins "${S}"/tts_service_x86-32.nexe
elif use amd64 ; then
unzip "${S}"/speech_synthesis/patts/tts_service_x86-64.nexe.zip
doins "${S}"/tts_service_x86-64.nexe
fi
}

View File

@ -1,53 +0,0 @@
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
DESCRIPTION="ChromiumOS-specific configuration files for pambase"
HOMEPAGE="http://www.chromium.org"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="amd64 arm x86"
RDEPEND="
>=sys-auth/pambase-20090620.1-r7
chromeos-base/vboot_reference"
DEPEND="${RDEPEND}"
src_install() {
# Chrome OS: sudo and vt2 are important for system debugging both in
# developer mode and during development. These two stanzas allow sudo and
# login auth as user chronos under the following conditions:
#
# 1. password-less access:
# - system in developer mode
# - there is no passwd.devmode file
# - there is no system-wide password set above.
# 2. System-wide (/etc/shadow) password access:
# - image has a baked in password above
# 3. Developer mode password access
# - user creates a passwd.devmode file with "chronos:CRYPTED_PASSWORD"
# 4. System-wide (/etc/shadow) password access set by modifying /etc/shadow:
# - Cases #1 and #2 will apply but failure will fall through to the
# inserted password.
insinto /etc/pam.d
doins "${FILESDIR}/chromeos-auth" || die
dosbin "${FILESDIR}/is_developer_end_user" || die
}
pkg_postinst() {
# If there's a shared user password or if the build target is the host,
# reset chromeos-auth to an empty file. We don't transition from empty to
# populated because binary packages lose FILESDIR.
local crypted_password='*'
if [ "${ROOT}" = "/" ]; then
crypted_password='host'
elif [ -r "${SHARED_USER_PASSWD_FILE}" ]; then
crypted_password=$(cat "${SHARED_USER_PASSWD_FILE}")
fi
if [ "${crypted_password}" != '*' ]; then
echo -n '' > "${ROOT}/etc/pam.d/chromeos-auth" || die
fi
}

View File

@ -1,16 +0,0 @@
# If we're not in dev-mode, skip to the system password stack.
auth [success=ignore default=3] pam_exec.so \
quiet /usr/bin/crossystem cros_debug?1
# Check if a custom devmode password file exists and prefer it.
auth [success=ignore default=1] pam_exec.so \
quiet /usr/bin/test -f /mnt/stateful_partition/etc/devmode.passwd
# If we get to pwdfile, use it or bypass the password-less login.
auth [success=done default=1] pam_pwdfile.so \
pwdfile /mnt/stateful_partition/etc/devmode.passwd
# If we get here, allow password-less access
auth sufficient pam_exec.so quiet /usr/bin/crossystem cros_debug?1
# Fallback to a system password if one was stamped in after initial build.

View File

@ -1,13 +0,0 @@
#!/bin/sh
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
# Exit status is 0 if this is a "developer system", non-zero if not.
# We define "developer system" as any of
# - a release image on a system with the developer hardware switch set on,
# - a developer or test image running on hardware or a VM, or
# - a system with a shared user password set (meaning it's possible to log in
# on a VT console).
crossystem "cros_debug?1" || grep -q '^chronos:[^*]' /etc/shadow

View File

@ -1,284 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
inherit useradd pam
DESCRIPTION="ChromeOS specific system setup"
HOMEPAGE="http://src.chromium.org/"
SRC_URI=""
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE="cros_host pam"
# We need to make sure timezone-data is merged before us.
# See pkg_setup below as well as http://crosbug.com/27413
# and friends.
DEPEND=">=sys-apps/baselayout-2
!<sys-apps/baselayout-2.0.1-r227
!<sys-libs/timezone-data-2011d
!<=app-admin/sudo-1.8.2
!<sys-apps/mawk-1.3.4
!<app-shells/bash-4.1
!<app-shells/dash-0.5.5
!<net-misc/openssh-5.2_p1-r8
!cros_host? (
!app-misc/editor-wrapper
sys-libs/timezone-data
)"
RDEPEND="${DEPEND}"
# Remove entry from /etc/group
#
# $1 - Group name
remove_group() {
[ -e "${ROOT}/etc/group" ] && sed -i -e /^${1}:.\*$/d "${ROOT}/etc/group"
}
# Adds a "daemon"-type user with no login or shell.
copy_or_add_daemon_user() {
local username="$1"
local uid="$2"
if user_exists "${username}"; then
elog "Removing existing user '$1' for copy_or_add_daemon_user"
remove_user "${username}"
fi
copy_or_add_user "${username}" "*" $uid $uid "" /dev/null /bin/false
if group_exists "${username}"; then
elog "Removing existing group '$1' for copy_or_add_daemon_user"
elog "Any existing group memberships will be lost"
remove_group "${username}"
fi
copy_or_add_group "${username}" $uid
}
# Removes all users from a group in /etc/group.
# No changes if the group does not exist.
remove_all_users_from_group() {
local group="$1"
sed -i "/^${group}:/s/:[^:]*$/:/" "${ROOT}/etc/group"
}
# Removes a list of users from a group in /etc/group.
# No changes if the group does not exist or the user is not in the group.
remove_users_from_group() {
local group="$1"; shift
local username
for username in "$@"; do
sed -i -r "/^${group}:/{s/([,:])${username}(,|$)/\1/; s/,$//}" \
"${ROOT}/etc/group"
done
}
# Adds a list of users to a group in /etc/group.
# No changes if the group does not exist.
add_users_to_group() {
local group="$1"; shift
local username
remove_users_from_group "${group}" "$@"
for username in "$@"; do
sed -i "/^${group}:/{ s/$/,${username}/ ; s/:,/:/ }" "${ROOT}/etc/group"
done
}
pkg_setup() {
if ! use cros_host ; then
# The sys-libs/timezone-data package installs a default /etc/localtime
# file automatically, so scrub that if it's a regular file.
local etc_tz="${ROOT}etc/localtime"
[[ -L ${etc_tz} ]] || rm -f "${etc_tz}"
fi
}
src_install() {
insinto /etc
doins "${FILESDIR}"/sysctl.conf || die
insinto /etc/profile.d
doins "${FILESDIR}"/xauthority.sh || die
insinto /lib/udev/rules.d
doins "${FILESDIR}"/udev-rules/*.rules || die
# target-specific fun
if ! use cros_host ; then
dodir /bin /usr/bin
# Symlink /etc/localtime to something on the stateful partition, which we
# can then change around at runtime.
dosym /var/lib/timezone/localtime /etc/localtime || die
# We use mawk in the target boards, not gawk.
dosym mawk /usr/bin/awk || die
# We want dash as our main shell.
dosym dash /bin/sh
# Avoid the wrapper and just link to the only editor we have.
dodir /usr/libexec
dosym /usr/bin/vim /usr/libexec/editor || die
dosym /bin/more /usr/libexec/pager || die
# Install our custom ssh config settings.
insinto /etc/ssh
doins "${FILESDIR}"/ssh{,d}_config
fperms 600 /etc/ssh/sshd_config
# Custom login shell snippets.
insinto /etc/profile.d
doins "${FILESDIR}"/cursor.sh
fi
# Add our little bit of sudo glue.
newpamd "${FILESDIR}"/include-chromeos-auth sudo
# This one line comes from the sudo ebuild.
pamd_mimic system-auth sudo auth account session
if [[ -n ${SHARED_USER_NAME} ]] ; then
insinto /etc/sudoers.d
echo "${SHARED_USER_NAME} ALL=(ALL) ALL" > 95_cros_base
insopts -m 440
doins 95_cros_base || die
fi
}
pkg_postinst() {
local x
# We explicitly add all of the users needed in the system here. The
# build of Chromium OS uses a single build chroot environment to build
# for various targets with distinct ${ROOT}. This causes two problems:
# 1. The target rootfs needs to have the same UIDs as the build
# chroot so that chmod operations work.
# 2. The portage tools to add a new user in an ebuild don't work when
# $ROOT != /
# We solve this by having baselayout install in both the build and
# target and pre-create all needed users. In order to support existing
# build roots we copy over the user entries if they already exist.
local system_user="chronos"
local system_id="1000"
local system_home="/home/${system_user}/user"
# Add a chronos-access group to provide non-chronos users,
# mostly system daemons running as a non-chronos user, group permissions
# to access files/directories owned by chronos.
local system_access_user="chronos-access"
local system_access_id="1001"
local crypted_password='*'
[ -r "${SHARED_USER_PASSWD_FILE}" ] &&
crypted_password=$(cat "${SHARED_USER_PASSWD_FILE}")
remove_user "${system_user}"
add_user "${system_user}" "x" "${system_id}" \
"${system_id}" "system_user" "${system_home}" /bin/sh
remove_shadow "${system_user}"
add_shadow "${system_user}" "${crypted_password}"
copy_or_add_group "${system_user}" "${system_id}"
copy_or_add_daemon_user "${system_access_user}" "${system_access_id}"
copy_or_add_daemon_user "messagebus" 201 # For dbus
copy_or_add_daemon_user "syslog" 202 # For rsyslog
copy_or_add_daemon_user "ntp" 203
copy_or_add_daemon_user "sshd" 204
copy_or_add_daemon_user "polkituser" 206 # For policykit
copy_or_add_daemon_user "tss" 207 # For trousers (TSS/TPM)
copy_or_add_daemon_user "pkcs11" 208 # For pkcs11 clients
copy_or_add_daemon_user "qdlservice" 209 # for QDLService
copy_or_add_daemon_user "cromo" 210 # For cromo (modem manager)
# copy_or_add_daemon_user "cashew" 211 # Deprecated, do not reuse
copy_or_add_daemon_user "ipsec" 212 # For strongswan/ipsec VPN
copy_or_add_daemon_user "cros-disks" 213 # For cros-disks
copy_or_add_daemon_user "tor" 214 # For tor (anonymity service)
copy_or_add_daemon_user "tcpdump" 215 # For tcpdump --with-user
copy_or_add_daemon_user "debugd" 216 # For debugd
copy_or_add_daemon_user "openvpn" 217 # For openvpn
copy_or_add_daemon_user "bluetooth" 218 # For bluez
copy_or_add_daemon_user "wpa" 219 # For wpa_supplicant
copy_or_add_daemon_user "cras" 220 # For cras (audio)
# copy_or_add_daemon_user "gavd" 221 # For gavd (audio) (deprecated)
copy_or_add_daemon_user "input" 222 # For /dev/input/event access
copy_or_add_daemon_user "chaps" 223 # For chaps (pkcs11)
copy_or_add_daemon_user "dhcp" 224 # For dhcpcd (DHCP client)
copy_or_add_daemon_user "tpmd" 225 # For tpmd
copy_or_add_daemon_user "mtp" 226 # For libmtp
copy_or_add_daemon_user "proxystate" 227 # For proxy monitoring
copy_or_add_daemon_user "power" 228 # For powerd
copy_or_add_daemon_user "watchdog" 229 # For daisydog
copy_or_add_daemon_user "devbroker" 230 # For permission_broker
copy_or_add_daemon_user "xorg" 231 # For Xorg
# Reserve some UIDs/GIDs between 300 and 349 for sandboxing FUSE-based
# filesystem daemons.
copy_or_add_daemon_user "ntfs-3g" 300 # For ntfs-3g prcoess
copy_or_add_daemon_user "avfs" 301 # For avfs process
copy_or_add_daemon_user "fuse-exfat" 302 # For exfat-fuse prcoess
# Group that are allowed to create directories under /home/<hash>/root
copy_or_add_group "daemon-store" 400
# All audio interfacing will go through the audio server.
add_users_to_group audio "cras"
add_users_to_group input "cras" # For /dev/input/event* access
# The system user is part of the audio server group to play sounds. The
# power manager user needs to check whether audio is playing.
add_users_to_group cras "${system_user}" power
# The system_user needs to be part of the audio and video groups.
add_users_to_group audio "${system_user}"
add_users_to_group video "${system_user}"
# The Xorg user needs to be part of the input and video groups.
add_users_to_group input "xorg"
add_users_to_group video "xorg"
# Users which require access to PKCS #11 cryptographic services must be
# in the pkcs11 group.
remove_all_users_from_group pkcs11
add_users_to_group pkcs11 root ipsec "${system_user}" chaps wpa
# All users accessing opencryptoki database files and all users for
# sandboxing FUSE-based filesystem daemons need to be in the
# ${system_access_user} group.
remove_all_users_from_group "${system_access_user}"
add_users_to_group "${system_access_user}" root ipsec "${system_user}" \
ntfs-3g avfs fuse-exfat chaps
# Dedicated group for owning access to serial devices.
copy_or_add_group "serial" 402
add_users_to_group "serial" "${system_user}"
add_users_to_group "serial" "uucp"
# The root user must be in the wpa group for wpa_cli.
add_users_to_group wpa root
# Restrict tcsd access to root and chaps.
add_users_to_group tss root chaps
# Add mtp user to usb group for USB device access.
add_users_to_group usb mtp
# Create a group for device access via permission_broker
copy_or_add_group "devbroker-access" 403
add_users_to_group devbroker-access "${system_user}"
# Give the power manager access to I2C devices so it can adjust external
# displays' brightness via DDC.
copy_or_add_group i2c 404
add_users_to_group i2c power
# Give the power manager access to /dev/tty* so it can disable VT switching
# before suspending the system.
add_users_to_group tty power
# The power manager needs to read from /dev/input/event* to observe power
# button and lid events.
add_users_to_group input power
# Some default directories. These are created here rather than at
# install because some of them may already exist and have mounts.
for x in /dev /home /media \
/mnt/stateful_partition /proc /root /sys /var/lock; do
[ -d "${ROOT}/$x" ] && continue
install -d --mode=0755 --owner=root --group=root "${ROOT}/$x"
done
}

View File

@ -1,7 +0,0 @@
# We disable vt cursors by default on the kernel command line
# (so that it doesn't flash when doing boot splash and such).
#
# Re-enable it when launching a login shell. This should only
# happen when logging in via vt or crosh or ssh and those are
# all fine. Login shells shouldn't get launched normally.
setterm -cursor on

View File

@ -1,2 +0,0 @@
Host *
UserKnownHostsFile /home/chronos/user/.ssh/known_hosts

View File

@ -1,13 +0,0 @@
# Force protocol v2 only
Protocol 2
# /etc is read-only. Fetch keys from stateful partition
# Not using v1, so no v1 key
HostKey /mnt/stateful_partition/etc/ssh/ssh_host_rsa_key
HostKey /mnt/stateful_partition/etc/ssh/ssh_host_dsa_key
PasswordAuthentication no
UsePAM yes
PrintMotd no
PrintLastLog no
Subsystem sftp internal-sftp

View File

@ -1,96 +0,0 @@
# /etc/sysctl.conf
#
# For more information on how this file works, please see
# the manpages sysctl(8) and sysctl.conf(5).
#
# In order for this file to work properly, you must first
# enable 'Sysctl support' in the kernel.
#
# Look in /proc/sys/ for all the things you can setup.
#
#
# Original Gentoo settings:
#
# Disables packet forwarding
net.ipv4.ip_forward = 0
# Disables IP dynaddr
#net.ipv4.ip_dynaddr = 0
# Disable ECN
#net.ipv4.tcp_ecn = 0
# Enables source route verification
net.ipv4.conf.default.rp_filter = 1
# Enable reverse path
net.ipv4.conf.all.rp_filter = 1
# Enable SYN cookies (yum!)
# http://cr.yp.to/syncookies.html
#net.ipv4.tcp_syncookies = 1
# Disable source route
#net.ipv4.conf.all.accept_source_route = 0
#net.ipv4.conf.default.accept_source_route = 0
# Disable redirects
#net.ipv4.conf.all.accept_redirects = 0
#net.ipv4.conf.default.accept_redirects = 0
# Disable secure redirects
#net.ipv4.conf.all.secure_redirects = 0
#net.ipv4.conf.default.secure_redirects = 0
# Ignore ICMP broadcasts
#net.ipv4.icmp_echo_ignore_broadcasts = 1
# Perform PLPMTUD only after detecting a "blackhole" in old-style PMTUD
net.ipv4.tcp_mtu_probing = 1
# Disables the magic-sysrq key
#kernel.sysrq = 0
# When the kernel panics, automatically reboot in 3 seconds
#kernel.panic = 3
# Allow for more PIDs (cool factor!); may break some programs
#kernel.pid_max = 999999
# You should compile nfsd into the kernel or add it
# to modules.autoload for this to work properly
# TCP Port for lock manager
#fs.nfs.nlm_tcpport = 0
# UDP Port for lock manager
#fs.nfs.nlm_udpport = 0
#
# ChromeOS specific settings:
#
# Set watchdog_thresh
kernel.watchdog_thresh = 5
# When the kernel panics, automatically reboot to preserve dump in ram
kernel.panic = -1
# Reboot on oops as well
kernel.panic_on_oops = 1
# Disable shrinking the cwnd when connection is idle
net.ipv4.tcp_slow_start_after_idle = 0
# Protect working set in order to avoid thrashing.
# See http://crosbug.com/7561 for details.
vm.min_filelist_kbytes = 50000
# Allow full memory overcommit as we rather close or kill tabs than
# refuse memory to arbitrary core processes.
vm.overcommit_memory = 1
# Use laptop mode settings always
vm.dirty_background_ratio = 1
vm.dirty_expire_centisecs = 60000
vm.dirty_ratio = 60
vm.dirty_writeback_centisecs = 60000
vm.laptop_mode = 0
# Disable kernel address visibility to non-root users.
kernel.kptr_restrict = 1
# Increase shared memory segment limit for plugins rendering large areas
kernel.shmmax = 134217728

View File

@ -1,9 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
KERNEL=="tty[A-Z]*[0-9]", GROUP="serial"
# Don't allow access to serial interfaces on Gobi modems.
KERNEL=="tty[A-Z]*[0-9]", ID_USB_DRIVER=="qcserial", GROUP="root"
# Don't allow access to serial interfaces on Novatel modems.
KERNEL=="tty[A-Z]*[0-9]", ID_USB_DRIVER=="option", GROUP="root"

View File

@ -1,5 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
KERNEL=="i2c-[0-9]", GROUP="i2c"

View File

@ -1,8 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
ACTION=="add", SUBSYSTEM=="usb", ATTR{bInterfaceClass}=="07", ATTRS{idProduct}=="*", \
PROGRAM="/usr/bin/dbus-send --system --type=method_call --dest=org.chromium.LibCrosService \
/org/chromium/LibCrosService org.chromium.LibCrosServiceInterface.PrinterAdded \
string:$attr{idVendor} string:$attr{idProduct}"

View File

@ -1 +0,0 @@
export XAUTHORITY="/home/chronos/.Xauthority"

View File

@ -1,21 +0,0 @@
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=4
DESCRIPTION="Empty (null) ebuild which satisifies virtual/chromeos-bsp-dev.
This is a direct dependency of chromeos-base/chromeos-dev, but is expected to
be overridden in an overlay for each specialized board. A typical non-null
implementation will install any board-specific developer only files and
executables which are not suitable for inclusion in a generic board overlay."
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
IUSE=""
PROVIDE="virtual/chromeos-bsp-dev"
#
# WARNING: Nothing should be added to this ebuild. This ebuild is overriden
# in board specific overlays, via a base profile which specifies virtuals
#

View File

@ -1,18 +0,0 @@
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=2
DESCRIPTION="Chrome OS restricted set of certificates."
HOMEPAGE="http://src.chromium.org"
SRC_URI=""
LICENSE="BSD"
SLOT="0"
KEYWORDS="amd64 arm x86"
src_install() {
CA_CERT_DIR=/usr/share/chromeos-ca-certificates
insinto "${CA_CERT_DIR}"
doins "${FILESDIR}"/*.pem
c_rehash "${D}/${CA_CERT_DIR}"
}

View File

@ -1,25 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb
MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow
GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmlj
YXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAwMFoXDTI4MTIzMTIzNTk1OVowezEL
MAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE
BwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNVBAMM
GEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEP
ADCCAQoCggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQua
BtDFcCLNSS1UY8y2bmhGC1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe
3M/vg4aijJRPn2jymJBGhCfHdr/jzDUsi14HZGWCwEiwqJH5YZ92IFCokcdmtet4
YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszWY19zjNoFmag4qMsXeDZR
rOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjHYpy+g8cm
ez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQU
oBEKIz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF
MAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20v
QUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29t
b2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2VzLmNybDANBgkqhkiG9w0BAQUF
AAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm7l3sAg9g1o1Q
GE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz
Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2
G9w84FoVxp7Z8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsi
l2D4kF501KKaU73yqWjgom7C12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3
smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg==
-----END CERTIFICATE-----

View File

@ -1,24 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIEGDCCAwCgAwIBAgIBATANBgkqhkiG9w0BAQUFADBlMQswCQYDVQQGEwJTRTEU
MBIGA1UEChMLQWRkVHJ1c3QgQUIxHTAbBgNVBAsTFEFkZFRydXN0IFRUUCBOZXR3
b3JrMSEwHwYDVQQDExhBZGRUcnVzdCBDbGFzcyAxIENBIFJvb3QwHhcNMDAwNTMw
MTAzODMxWhcNMjAwNTMwMTAzODMxWjBlMQswCQYDVQQGEwJTRTEUMBIGA1UEChML
QWRkVHJ1c3QgQUIxHTAbBgNVBAsTFEFkZFRydXN0IFRUUCBOZXR3b3JrMSEwHwYD
VQQDExhBZGRUcnVzdCBDbGFzcyAxIENBIFJvb3QwggEiMA0GCSqGSIb3DQEBAQUA
A4IBDwAwggEKAoIBAQCWltQhSWDia+hBBwzexODcEyPNwTXH+9ZOEQpnXvUGW2ul
CDtbKRY654eyNAbFvAWlA3yCyykQruGIgb3WntP+LVbBFc7jJp0VLhD7Bo8wBN6n
tGO0/7Gcrjyvd7ZWxbWroulpOj0OM3kyP3CCkplhbY0wCI9xP6ZIVxn4JdxLZlyl
dI+Yrsj5wAYi56xz36Uu+1LcsRVlIPo1Zmne3yzxbrww2ywkEtvrNTVokMsAsJch
PXQhI2U0K7t4WaPW4XY5mqRJjox0r26kmqPZm9I4XJuiGMx1I4S+6+JNM3GOGvDC
+Mcdoq0Dlyz4zyXG9rgkMbFjXZJ/Y/AlyVMuH79NAgMBAAGjgdIwgc8wHQYDVR0O
BBYEFJWxtPCUtr3H2tERCSG+wa9J/RB7MAsGA1UdDwQEAwIBBjAPBgNVHRMBAf8E
BTADAQH/MIGPBgNVHSMEgYcwgYSAFJWxtPCUtr3H2tERCSG+wa9J/RB7oWmkZzBl
MQswCQYDVQQGEwJTRTEUMBIGA1UEChMLQWRkVHJ1c3QgQUIxHTAbBgNVBAsTFEFk
ZFRydXN0IFRUUCBOZXR3b3JrMSEwHwYDVQQDExhBZGRUcnVzdCBDbGFzcyAxIENB
IFJvb3SCAQEwDQYJKoZIhvcNAQEFBQADggEBACxtZBsfzQ3duQH6lmM0MkhHma6X
7f1yFqZzR1r0693p9db7RcwpiURdv0Y5PejuvE1Uhh4dbOMXJ0PhiVYrqW9yTkkz
43J8KiOavD7/KCrto/8cI7pDVwlnTUtiBi34/2ydYB7YHEt9tTEv2dB8Xfjea4MY
eDdXL+gzB2ffHsdrKpV2ro9Xo/D0UrSpUwjP4E/TelOL/bscVjby/rK25Xa71SJl
pz/+0WatC7xrmYbvP33zGDLKe8bjq2RGlfgmadlVg3sslgf/WSxEo8bl6ancoWOA
WiFeIc9TVPC6b4nbqKqVz4vjccweGyBECMB6tkD9xOQ14R0WHNC8K47Wcdk=
-----END CERTIFICATE-----

View File

@ -1,25 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU
MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs
IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290
MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCU0Ux
FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h
bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v
dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvt
H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9
uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX
mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX
a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN
E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0
WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD
VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0
Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU
cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx
IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN
AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH
YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5
6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC
Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX
c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a
mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ=
-----END CERTIFICATE-----

View File

@ -1,24 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,25 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,20 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UE
BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz
dCBDb21tZXJjaWFsMB4XDTEwMDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDEL
MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp
cm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
AQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6EqdbDuKP
Hx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yr
ba0F8PrVC8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPAL
MeIrJmqbTFeurCA+ukV6BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1
yHp52UKqK39c/s4mT6NmgTWvRLpUHhwwMmWd5jyTXlBOeuM61G7MGvv50jeuJCqr
VwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNVHQ4EFgQUnZPGU4teyq8/
nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ
KoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYG
XUPGhi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNj
vbz4YYCanrHOQnDiqX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivt
Z8SOyUOyXGsViQK8YvxO8rUzqrJv0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9g
N53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0khsUlHRUe072o0EclNmsxZt9YC
nlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8=
-----END CERTIFICATE-----

View File

@ -1,20 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,31 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,13 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMC
VVMxFDASBgNVBAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQ
cmVtaXVtIEVDQzAeFw0xMDAxMjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJ
BgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1UcnVzdDEgMB4GA1UEAwwXQWZmaXJt
VHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNMF4bFZ0D
0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQN8O9
ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0G
A1UdDgQWBBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4G
A1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/Vs
aobgxCd05DhT1wV/GzTjxi+zygk8N53X57hG8f2h4nECMEJZh0PUUd+60wkyWs6I
flc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKMeQ==
-----END CERTIFICATE-----

View File

@ -1,22 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,33 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,21 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,25 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,16 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,14 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,25 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIEQzCCAyugAwIBAgIBATANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJHQjEb
MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow
GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDElMCMGA1UEAwwcVHJ1c3RlZCBDZXJ0
aWZpY2F0ZSBTZXJ2aWNlczAeFw0wNDAxMDEwMDAwMDBaFw0yODEyMzEyMzU5NTla
MH8xCzAJBgNVBAYTAkdCMRswGQYDVQQIDBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAO
BgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoMEUNvbW9kbyBDQSBMaW1pdGVkMSUwIwYD
VQQDDBxUcnVzdGVkIENlcnRpZmljYXRlIFNlcnZpY2VzMIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEA33FvNlhTWvI2VFeAxHQIIO0Yfyod5jWaHiWsnOWW
fnJSoBVC21ndZHoa0Lh73TkVvFVIxO06AOoxEbrycXQaZ7jPM8yoMa+j49d/vzMt
TGo87IvDktJTdyR0nAducPy9C1t2ul/y/9c3S0pgePfw+spwtOpZqqPOSC+pw7IL
fhdyFgymBwwbOM/JYrc/oJOlh0Hyt3BAd9i+FHzjqMB6juljatEPmsbS9Is6FARW
1O24zG71++IsWL1/T2sr92AkWCTOJu80kTrV44HQsvAEAtdbtz6SrGsSivnkBbA7
kUlcsutT6vifR4buv5XAwAaf0lteERv0xwQ1KdJVXOTt6wIDAQABo4HJMIHGMB0G
A1UdDgQWBBTFe1i97doladL3WRaoszLAeydb9DAOBgNVHQ8BAf8EBAMCAQYwDwYD
VR0TAQH/BAUwAwEB/zCBgwYDVR0fBHwwejA8oDqgOIY2aHR0cDovL2NybC5jb21v
ZG9jYS5jb20vVHJ1c3RlZENlcnRpZmljYXRlU2VydmljZXMuY3JsMDqgOKA2hjRo
dHRwOi8vY3JsLmNvbW9kby5uZXQvVHJ1c3RlZENlcnRpZmljYXRlU2VydmljZXMu
Y3JsMA0GCSqGSIb3DQEBBQUAA4IBAQDIk4E7ibSvuIQSTI3S8NtwuleGFTQQuS9/
HrCoiWChisJ3DFBKmwCL2Iv0QeLQg4pKHBQGsKNoBXAxMKdTmw7pSqBYaWcOrp32
pSxBvzwGa+RZzG0Q8ZZvH9/0BAKkn0U+yNj6NkZEUD+Cl5EfKNsYEYwq5GWDVxIS
jBc/lDb+XbDABHcTuPQV1T84zJQ6VdCsmPW6AF/ghhmBeC8owH7TzEIK9a5QoNE+
xqFx7D+gIIxmOom0jtTYsU0lR+4viMi14QVFwL4Ucd56/Y57fU0IlqUSc/Atyjcn
dBInTMu2l+nZrghtWjlA3QVHdWpaIbOjGM9O9y5Xt5hwXsjEeLBi
-----END CERTIFICATE-----

View File

@ -1,22 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,22 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Some files were not shown because too many files have changed in this diff Show More