Commit 8b866076 authored by John Budorick's avatar John Budorick Committed by Commit Bot

build: run gen_fuzzer_owners in a shallow pool.

Bug: 1008734
Change-Id: If035ff53997e314e1c7ade677d99af6088f82e18
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1838292Reviewed-by: default avatarMax Moroz <mmoroz@chromium.org>
Commit-Queue: John Budorick <jbudorick@chromium.org>
Cr-Commit-Position: refs/heads/master@{#702587}
parent d0b5933c
...@@ -53,3 +53,9 @@ config("no_clusterfuzz") { ...@@ -53,3 +53,9 @@ config("no_clusterfuzz") {
# noop to tag seed corpus rules. # noop to tag seed corpus rules.
source_set("seed_corpus") { source_set("seed_corpus") {
} }
if (use_fuzzing_engine) {
pool("fuzzer_owners_pool") {
depth = 1
}
}
...@@ -38,10 +38,14 @@ template("fuzzer_test") { ...@@ -38,10 +38,14 @@ template("fuzzer_test") {
assert(defined(invoker.sources), "Need sources in $target_name.") assert(defined(invoker.sources), "Need sources in $target_name.")
test_deps = [ "//testing/libfuzzer:libfuzzer_main" ] test_deps = [ "//testing/libfuzzer:libfuzzer_main" ]
test_data_deps = []
if (defined(invoker.deps)) { if (defined(invoker.deps)) {
test_deps += invoker.deps test_deps += invoker.deps
} }
if (defined(invoker.data_deps)) {
test_data_deps += invoker.data_deps
}
if (defined(invoker.seed_corpus) || defined(invoker.seed_corpuses)) { if (defined(invoker.seed_corpus) || defined(invoker.seed_corpuses)) {
assert(!(defined(invoker.seed_corpus) && defined(invoker.seed_corpuses)), assert(!(defined(invoker.seed_corpus) && defined(invoker.seed_corpuses)),
...@@ -157,6 +161,7 @@ template("fuzzer_test") { ...@@ -157,6 +161,7 @@ template("fuzzer_test") {
owners_file_name = target_name + ".owners" owners_file_name = target_name + ".owners"
action(owners_file_name) { action(owners_file_name) {
script = "//testing/libfuzzer/gen_fuzzer_owners.py" script = "//testing/libfuzzer/gen_fuzzer_owners.py"
pool = "//testing/libfuzzer:fuzzer_owners_pool"
args = [ args = [
"--owners", "--owners",
rebase_path("$root_build_dir/" + owners_file_name, root_build_dir), rebase_path("$root_build_dir/" + owners_file_name, root_build_dir),
...@@ -181,7 +186,7 @@ template("fuzzer_test") { ...@@ -181,7 +186,7 @@ template("fuzzer_test") {
"$root_build_dir/$owners_file_name", "$root_build_dir/$owners_file_name",
] ]
} }
test_deps += [ ":" + owners_file_name ] test_data_deps += [ ":" + owners_file_name ]
} }
test(target_name) { test(target_name) {
...@@ -196,6 +201,7 @@ template("fuzzer_test") { ...@@ -196,6 +201,7 @@ template("fuzzer_test") {
"libs", "libs",
]) ])
deps = test_deps deps = test_deps
data_deps = test_data_deps
if (defined(invoker.additional_configs)) { if (defined(invoker.additional_configs)) {
configs += invoker.additional_configs configs += invoker.additional_configs
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment