2018-08-03 13:57:43 +00:00
|
|
|
# Copyright 2018 The Dawn Authors
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import("../scripts/dawn_overrides_with_defaults.gni")
|
2018-08-13 06:31:17 +00:00
|
|
|
import("../scripts/dawn_features.gni")
|
2018-10-31 10:49:21 +00:00
|
|
|
import("//build_overrides/build.gni")
|
2018-08-13 06:31:17 +00:00
|
|
|
|
Add fuzzers for SPIRV-Cross
This CL adds in fuzzers for SPIRV-Cross for HLSL, GLSL, and MSL
outputs. These fuzzers live in Dawn because there is not appropriate
location in the Chromium source repo for them and it is unlikely they
would be land-able in the SPIRV-Cross repo, because it is not coupled
with Chromium's build system and thus Clusterfuzz so would be
effectively dead code. Dawn depends on this code, but it is also
integrated into the Chromium build system, so this was the best place
I could find for them
The code under fuzz unfortunately uses exceptions/aborting as its
error reporting mechanism. This is an acknowledge short coming and
there are efforts to remove this behaviour. To work around this and
reduce the number of false positives found by the fuzzers, a signal
trap has been implemented which will be removed once the code under
fuzz has been updated.
The trap replaces the existing signal handler and silencing signals
while running the code under test. This allows the code under test to
call abort() and not crash the fuzzing process. Theoretically, only
SIGABRT should need to be trapped, but something is causing the signal
from abort() to be converted to SIGSEGV when running under ASAN.
This signal trap has been tested with the fuzzing/sanitizers by
intentionally inserting bad calls that will occur after a few thousand
test cases. It was confirmed that the fuzzer detected the issue and
stops fuzzing.
The alternate to implementing this signal trap would be to turn on
exceptions for the fuzzer. This was attempted, but proved to be
fruitless due to what was reported as an ODR issue, but couldn't
couldn't be silenced. The likely underlying issue was a pre-built
library or other object being built without exceptions was causing
different versions of symbols or the exception version of the standard
library not being instrumented by ASAN. Given the majority of Chromium
eco-system turns off exceptions, fixing this issue would not be
helpful to the larger community and was looking like it would require
significant effort.
BUG=chromium:903380
Change-Id: I63a5595383f99b7a0e150d72bb04c89b8d722631
Reviewed-on: https://dawn-review.googlesource.com/c/2260
Commit-Queue: Corentin Wallez <cwallez@chromium.org>
Reviewed-by: Max Moroz <mmoroz@chromium.org>
Reviewed-by: Corentin Wallez <cwallez@chromium.org>
2018-11-12 12:20:21 +00:00
|
|
|
if (build_with_chromium) {
|
|
|
|
import("//testing/libfuzzer/fuzzer_test.gni")
|
|
|
|
}
|
|
|
|
|
2018-08-29 11:52:27 +00:00
|
|
|
is_msvc = is_win && !is_clang
|
|
|
|
|
2018-08-13 06:31:17 +00:00
|
|
|
###############################################################################
|
|
|
|
# Third-party dependencies needed by libdawn_native
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
# Glad
|
|
|
|
config("glad_public") {
|
|
|
|
include_dirs = [ "glad/include" ]
|
|
|
|
}
|
|
|
|
|
|
|
|
static_library("glad") {
|
|
|
|
sources = [
|
|
|
|
"glad/include/KHR/khrplatform.h",
|
|
|
|
"glad/include/glad/glad.h",
|
|
|
|
"glad/src/glad.c",
|
|
|
|
]
|
|
|
|
|
|
|
|
public_configs = [ ":glad_public" ]
|
|
|
|
}
|
|
|
|
|
|
|
|
# SPIRV-Cross
|
|
|
|
spirv_cross_dir = dawn_spirv_cross_dir
|
|
|
|
|
|
|
|
config("spirv_cross_public") {
|
2018-09-25 21:50:44 +00:00
|
|
|
include_dirs = [ "${spirv_cross_dir}/.." ]
|
2018-08-13 06:31:17 +00:00
|
|
|
defines = [ "SPIRV_CROSS_EXCEPTIONS_TO_ASSERTIONS" ]
|
|
|
|
}
|
|
|
|
|
|
|
|
static_library("spirv_cross") {
|
|
|
|
public_configs = [ ":spirv_cross_public" ]
|
|
|
|
|
2018-08-29 11:52:27 +00:00
|
|
|
if (!is_msvc) {
|
|
|
|
cflags_cc = [
|
|
|
|
"-Wno-implicit-fallthrough",
|
|
|
|
"-Wno-return-type",
|
|
|
|
"-Wno-sign-compare",
|
|
|
|
]
|
|
|
|
}
|
2018-08-13 06:31:17 +00:00
|
|
|
|
|
|
|
sources = [
|
|
|
|
"${spirv_cross_dir}/GLSL.std.450.h",
|
|
|
|
"${spirv_cross_dir}/spirv.hpp",
|
|
|
|
"${spirv_cross_dir}/spirv_cfg.cpp",
|
|
|
|
"${spirv_cross_dir}/spirv_cfg.hpp",
|
|
|
|
"${spirv_cross_dir}/spirv_common.hpp",
|
|
|
|
"${spirv_cross_dir}/spirv_cross.cpp",
|
|
|
|
"${spirv_cross_dir}/spirv_cross.hpp",
|
|
|
|
]
|
|
|
|
|
|
|
|
need_glsl_cross = dawn_enable_opengl
|
|
|
|
|
Add fuzzers for SPIRV-Cross
This CL adds in fuzzers for SPIRV-Cross for HLSL, GLSL, and MSL
outputs. These fuzzers live in Dawn because there is not appropriate
location in the Chromium source repo for them and it is unlikely they
would be land-able in the SPIRV-Cross repo, because it is not coupled
with Chromium's build system and thus Clusterfuzz so would be
effectively dead code. Dawn depends on this code, but it is also
integrated into the Chromium build system, so this was the best place
I could find for them
The code under fuzz unfortunately uses exceptions/aborting as its
error reporting mechanism. This is an acknowledge short coming and
there are efforts to remove this behaviour. To work around this and
reduce the number of false positives found by the fuzzers, a signal
trap has been implemented which will be removed once the code under
fuzz has been updated.
The trap replaces the existing signal handler and silencing signals
while running the code under test. This allows the code under test to
call abort() and not crash the fuzzing process. Theoretically, only
SIGABRT should need to be trapped, but something is causing the signal
from abort() to be converted to SIGSEGV when running under ASAN.
This signal trap has been tested with the fuzzing/sanitizers by
intentionally inserting bad calls that will occur after a few thousand
test cases. It was confirmed that the fuzzer detected the issue and
stops fuzzing.
The alternate to implementing this signal trap would be to turn on
exceptions for the fuzzer. This was attempted, but proved to be
fruitless due to what was reported as an ODR issue, but couldn't
couldn't be silenced. The likely underlying issue was a pre-built
library or other object being built without exceptions was causing
different versions of symbols or the exception version of the standard
library not being instrumented by ASAN. Given the majority of Chromium
eco-system turns off exceptions, fixing this issue would not be
helpful to the larger community and was looking like it would require
significant effort.
BUG=chromium:903380
Change-Id: I63a5595383f99b7a0e150d72bb04c89b8d722631
Reviewed-on: https://dawn-review.googlesource.com/c/2260
Commit-Queue: Corentin Wallez <cwallez@chromium.org>
Reviewed-by: Max Moroz <mmoroz@chromium.org>
Reviewed-by: Corentin Wallez <cwallez@chromium.org>
2018-11-12 12:20:21 +00:00
|
|
|
is_fuzzing = false
|
|
|
|
if (build_with_chromium) {
|
|
|
|
is_fuzzing = use_fuzzing_engine
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dawn_enable_d3d12 || is_fuzzing) {
|
2018-08-13 06:31:17 +00:00
|
|
|
sources += [
|
|
|
|
"${spirv_cross_dir}/spirv_hlsl.cpp",
|
|
|
|
"${spirv_cross_dir}/spirv_hlsl.hpp",
|
|
|
|
]
|
|
|
|
need_glsl_cross = true
|
|
|
|
}
|
|
|
|
|
Add fuzzers for SPIRV-Cross
This CL adds in fuzzers for SPIRV-Cross for HLSL, GLSL, and MSL
outputs. These fuzzers live in Dawn because there is not appropriate
location in the Chromium source repo for them and it is unlikely they
would be land-able in the SPIRV-Cross repo, because it is not coupled
with Chromium's build system and thus Clusterfuzz so would be
effectively dead code. Dawn depends on this code, but it is also
integrated into the Chromium build system, so this was the best place
I could find for them
The code under fuzz unfortunately uses exceptions/aborting as its
error reporting mechanism. This is an acknowledge short coming and
there are efforts to remove this behaviour. To work around this and
reduce the number of false positives found by the fuzzers, a signal
trap has been implemented which will be removed once the code under
fuzz has been updated.
The trap replaces the existing signal handler and silencing signals
while running the code under test. This allows the code under test to
call abort() and not crash the fuzzing process. Theoretically, only
SIGABRT should need to be trapped, but something is causing the signal
from abort() to be converted to SIGSEGV when running under ASAN.
This signal trap has been tested with the fuzzing/sanitizers by
intentionally inserting bad calls that will occur after a few thousand
test cases. It was confirmed that the fuzzer detected the issue and
stops fuzzing.
The alternate to implementing this signal trap would be to turn on
exceptions for the fuzzer. This was attempted, but proved to be
fruitless due to what was reported as an ODR issue, but couldn't
couldn't be silenced. The likely underlying issue was a pre-built
library or other object being built without exceptions was causing
different versions of symbols or the exception version of the standard
library not being instrumented by ASAN. Given the majority of Chromium
eco-system turns off exceptions, fixing this issue would not be
helpful to the larger community and was looking like it would require
significant effort.
BUG=chromium:903380
Change-Id: I63a5595383f99b7a0e150d72bb04c89b8d722631
Reviewed-on: https://dawn-review.googlesource.com/c/2260
Commit-Queue: Corentin Wallez <cwallez@chromium.org>
Reviewed-by: Max Moroz <mmoroz@chromium.org>
Reviewed-by: Corentin Wallez <cwallez@chromium.org>
2018-11-12 12:20:21 +00:00
|
|
|
if (dawn_enable_metal || is_fuzzing) {
|
2018-08-13 06:31:17 +00:00
|
|
|
sources += [
|
|
|
|
"${spirv_cross_dir}/spirv_msl.cpp",
|
|
|
|
"${spirv_cross_dir}/spirv_msl.hpp",
|
|
|
|
]
|
|
|
|
need_glsl_cross = true
|
|
|
|
}
|
|
|
|
|
Add fuzzers for SPIRV-Cross
This CL adds in fuzzers for SPIRV-Cross for HLSL, GLSL, and MSL
outputs. These fuzzers live in Dawn because there is not appropriate
location in the Chromium source repo for them and it is unlikely they
would be land-able in the SPIRV-Cross repo, because it is not coupled
with Chromium's build system and thus Clusterfuzz so would be
effectively dead code. Dawn depends on this code, but it is also
integrated into the Chromium build system, so this was the best place
I could find for them
The code under fuzz unfortunately uses exceptions/aborting as its
error reporting mechanism. This is an acknowledge short coming and
there are efforts to remove this behaviour. To work around this and
reduce the number of false positives found by the fuzzers, a signal
trap has been implemented which will be removed once the code under
fuzz has been updated.
The trap replaces the existing signal handler and silencing signals
while running the code under test. This allows the code under test to
call abort() and not crash the fuzzing process. Theoretically, only
SIGABRT should need to be trapped, but something is causing the signal
from abort() to be converted to SIGSEGV when running under ASAN.
This signal trap has been tested with the fuzzing/sanitizers by
intentionally inserting bad calls that will occur after a few thousand
test cases. It was confirmed that the fuzzer detected the issue and
stops fuzzing.
The alternate to implementing this signal trap would be to turn on
exceptions for the fuzzer. This was attempted, but proved to be
fruitless due to what was reported as an ODR issue, but couldn't
couldn't be silenced. The likely underlying issue was a pre-built
library or other object being built without exceptions was causing
different versions of symbols or the exception version of the standard
library not being instrumented by ASAN. Given the majority of Chromium
eco-system turns off exceptions, fixing this issue would not be
helpful to the larger community and was looking like it would require
significant effort.
BUG=chromium:903380
Change-Id: I63a5595383f99b7a0e150d72bb04c89b8d722631
Reviewed-on: https://dawn-review.googlesource.com/c/2260
Commit-Queue: Corentin Wallez <cwallez@chromium.org>
Reviewed-by: Max Moroz <mmoroz@chromium.org>
Reviewed-by: Corentin Wallez <cwallez@chromium.org>
2018-11-12 12:20:21 +00:00
|
|
|
if (need_glsl_cross || is_fuzzing) {
|
2018-08-13 06:31:17 +00:00
|
|
|
sources += [
|
|
|
|
"${spirv_cross_dir}/spirv_glsl.cpp",
|
|
|
|
"${spirv_cross_dir}/spirv_glsl.hpp",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
# An empty Vulkan target to add the include dirs and list the sources
|
|
|
|
# for the header inclusion check.
|
|
|
|
config("vulkan_headers_public") {
|
|
|
|
include_dirs = [ "." ]
|
|
|
|
}
|
|
|
|
|
|
|
|
source_set("vulkan_headers") {
|
|
|
|
sources = [
|
|
|
|
"vulkan/vk_platform.h",
|
|
|
|
"vulkan/vulkan.h",
|
|
|
|
]
|
|
|
|
|
|
|
|
public_configs = [ ":vulkan_headers_public" ]
|
|
|
|
}
|
2018-08-03 13:57:43 +00:00
|
|
|
|
|
|
|
###############################################################################
|
2018-10-31 10:49:21 +00:00
|
|
|
# Gtest Gmock - Handle building inside and outside of Chromium.
|
2018-08-03 13:57:43 +00:00
|
|
|
###############################################################################
|
|
|
|
|
2018-10-31 10:49:21 +00:00
|
|
|
# When building outside of Chromium we need to define our own targets for GTest
|
|
|
|
# and GMock. However when compiling inside of Chromium we need to reuse the
|
|
|
|
# existing targets, both because Chromium has a special harness for swarming
|
|
|
|
# and because otherwise the "gn check" fails.
|
2018-08-03 13:57:43 +00:00
|
|
|
|
2018-10-31 10:49:21 +00:00
|
|
|
if (!build_with_chromium) {
|
|
|
|
# When we aren't in Chromium we define out own targets based on the location
|
|
|
|
# of the googletest repo.
|
|
|
|
googletest_dir = dawn_googletest_dir
|
2018-08-03 13:57:43 +00:00
|
|
|
|
2018-10-31 10:49:21 +00:00
|
|
|
config("gtest_config") {
|
|
|
|
include_dirs = [
|
|
|
|
"${googletest_dir}/googletest",
|
|
|
|
"${googletest_dir}/googletest/include",
|
|
|
|
]
|
|
|
|
}
|
2018-08-03 13:57:43 +00:00
|
|
|
|
2018-10-31 10:49:21 +00:00
|
|
|
static_library("gtest") {
|
|
|
|
testonly = true
|
|
|
|
sources = [
|
|
|
|
"${googletest_dir}/googletest/src/gtest-all.cc",
|
|
|
|
]
|
|
|
|
public_configs = [ ":gtest_config" ]
|
|
|
|
}
|
2018-08-03 13:57:43 +00:00
|
|
|
|
2018-10-31 10:49:21 +00:00
|
|
|
config("gmock_config") {
|
|
|
|
include_dirs = [
|
|
|
|
"${googletest_dir}/googlemock",
|
|
|
|
"${googletest_dir}/googlemock/include",
|
|
|
|
"${googletest_dir}/googletest/include",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
static_library("gmock") {
|
|
|
|
testonly = true
|
|
|
|
sources = [
|
|
|
|
"${googletest_dir}/googlemock/src/gmock-all.cc",
|
|
|
|
]
|
|
|
|
public_configs = [ ":gmock_config" ]
|
|
|
|
}
|
|
|
|
|
|
|
|
group("gmock_and_gtest") {
|
|
|
|
testonly = true
|
|
|
|
public_deps = [
|
|
|
|
":gmock",
|
|
|
|
":gtest",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
# When we are in Chromium we reuse its targets, and also add some deps that
|
|
|
|
# are needed to launch the test in swarming mode.
|
|
|
|
group("gmock_and_gtest") {
|
|
|
|
testonly = true
|
|
|
|
public_deps = [
|
|
|
|
"//base",
|
|
|
|
"//base/test:test_support",
|
|
|
|
"//testing/gmock",
|
|
|
|
"//testing/gtest",
|
|
|
|
]
|
|
|
|
}
|
2018-08-03 13:57:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
###############################################################################
|
|
|
|
# GLFW - good enough build targets
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
glfw_dir = dawn_glfw_dir
|
|
|
|
|
|
|
|
config("glfw_public") {
|
|
|
|
include_dirs = [ "${glfw_dir}/include" ]
|
|
|
|
|
|
|
|
if (is_win) {
|
|
|
|
defines = [ "_GLFW_WIN32" ]
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_mac) {
|
|
|
|
defines = [ "_GLFW_COCOA" ]
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_linux) {
|
|
|
|
defines = [ "_GLFW_X11" ]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static_library("glfw") {
|
|
|
|
public_configs = [ ":glfw_public" ]
|
|
|
|
|
2018-08-29 11:52:27 +00:00
|
|
|
if (is_msvc) {
|
|
|
|
# nonstandard extension, function/data pointer conversion in expression
|
|
|
|
cflags_c = [ "/wd4152" ]
|
|
|
|
} else {
|
|
|
|
cflags_c = [ "-Wno-sign-compare" ]
|
|
|
|
}
|
2018-08-03 13:57:43 +00:00
|
|
|
|
|
|
|
sources = [
|
|
|
|
"${glfw_dir}/include/GLFW/glfw3.h",
|
|
|
|
"${glfw_dir}/include/GLFW/glfw3native.h",
|
|
|
|
"${glfw_dir}/src/context.c",
|
2018-11-19 10:21:23 +00:00
|
|
|
"${glfw_dir}/src/egl_context.c",
|
|
|
|
"${glfw_dir}/src/egl_context.h",
|
2018-08-03 13:57:43 +00:00
|
|
|
"${glfw_dir}/src/init.c",
|
|
|
|
"${glfw_dir}/src/input.c",
|
|
|
|
"${glfw_dir}/src/internal.h",
|
|
|
|
"${glfw_dir}/src/monitor.c",
|
2018-11-19 10:21:23 +00:00
|
|
|
"${glfw_dir}/src/osmesa_context.c",
|
|
|
|
"${glfw_dir}/src/osmesa_context.h",
|
2018-08-03 13:57:43 +00:00
|
|
|
"${glfw_dir}/src/vulkan.c",
|
|
|
|
"${glfw_dir}/src/window.c",
|
|
|
|
]
|
|
|
|
libs = []
|
|
|
|
|
|
|
|
if (is_win) {
|
|
|
|
sources += [
|
|
|
|
"${glfw_dir}/src/wgl_context.c",
|
|
|
|
"${glfw_dir}/src/wgl_context.h",
|
|
|
|
"${glfw_dir}/src/win32_init.c",
|
|
|
|
"${glfw_dir}/src/win32_joystick.c",
|
|
|
|
"${glfw_dir}/src/win32_joystick.h",
|
|
|
|
"${glfw_dir}/src/win32_monitor.c",
|
|
|
|
"${glfw_dir}/src/win32_platform.h",
|
|
|
|
"${glfw_dir}/src/win32_time.c",
|
2018-11-19 10:21:23 +00:00
|
|
|
"${glfw_dir}/src/win32_thread.c",
|
2018-08-03 13:57:43 +00:00
|
|
|
"${glfw_dir}/src/win32_window.c",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_linux || is_mac) {
|
|
|
|
sources += [
|
2018-11-19 10:21:23 +00:00
|
|
|
"${glfw_dir}/src/posix_thread.c",
|
|
|
|
"${glfw_dir}/src/posix_thread.h",
|
2018-08-03 13:57:43 +00:00
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_linux) {
|
|
|
|
sources += [
|
|
|
|
"${glfw_dir}/src/glx_context.c",
|
|
|
|
"${glfw_dir}/src/glx_context.h",
|
|
|
|
"${glfw_dir}/src/linux_joystick.c",
|
|
|
|
"${glfw_dir}/src/linux_joystick.h",
|
|
|
|
"${glfw_dir}/src/posix_time.c",
|
|
|
|
"${glfw_dir}/src/posix_time.h",
|
|
|
|
"${glfw_dir}/src/x11_init.c",
|
|
|
|
"${glfw_dir}/src/x11_monitor.c",
|
|
|
|
"${glfw_dir}/src/x11_platform.h",
|
|
|
|
"${glfw_dir}/src/x11_window.c",
|
|
|
|
"${glfw_dir}/src/xkb_unicode.c",
|
|
|
|
"${glfw_dir}/src/xkb_unicode.h",
|
|
|
|
]
|
|
|
|
|
|
|
|
libs += [
|
|
|
|
"rt",
|
|
|
|
"dl",
|
|
|
|
"X11",
|
|
|
|
"Xcursor",
|
|
|
|
"Xinerama",
|
|
|
|
"Xrandr",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_mac) {
|
|
|
|
sources += [
|
|
|
|
"${glfw_dir}/src/cocoa_init.m",
|
|
|
|
"${glfw_dir}/src/cocoa_joystick.h",
|
|
|
|
"${glfw_dir}/src/cocoa_joystick.m",
|
|
|
|
"${glfw_dir}/src/cocoa_monitor.m",
|
|
|
|
"${glfw_dir}/src/cocoa_platform.h",
|
|
|
|
"${glfw_dir}/src/cocoa_time.c",
|
|
|
|
"${glfw_dir}/src/cocoa_window.m",
|
|
|
|
"${glfw_dir}/src/nsgl_context.h",
|
|
|
|
"${glfw_dir}/src/nsgl_context.m",
|
|
|
|
]
|
|
|
|
libs += [
|
|
|
|
"Cocoa.framework",
|
|
|
|
"IOKit.framework",
|
|
|
|
"CoreFoundation.framework",
|
|
|
|
"CoreVideo.framework",
|
|
|
|
]
|
|
|
|
cflags_objc = [
|
|
|
|
"-Wno-sign-compare",
|
|
|
|
"-Wno-unguarded-availability",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|
2018-08-13 06:23:27 +00:00
|
|
|
|
|
|
|
###############################################################################
|
|
|
|
# Header-only dependencies for samples
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
if (dawn_standalone) {
|
|
|
|
# GLM
|
|
|
|
config("glm_public_config") {
|
|
|
|
include_dirs = [ "glm" ]
|
|
|
|
}
|
|
|
|
source_set("glm") {
|
|
|
|
public_configs = [ ":glm_public_config" ]
|
|
|
|
# GLM is header only but has too many files to list them.
|
|
|
|
}
|
|
|
|
|
|
|
|
# STB
|
|
|
|
config("stb_public_config") {
|
|
|
|
include_dirs = [ "stb" ]
|
2018-08-29 11:52:27 +00:00
|
|
|
|
|
|
|
if (!is_msvc) {
|
|
|
|
cflags_cc = [ "-Wno-implicit-fallthrough" ]
|
|
|
|
}
|
2018-08-13 06:23:27 +00:00
|
|
|
}
|
|
|
|
source_set("stb") {
|
|
|
|
public_configs = [ ":stb_public_config" ]
|
|
|
|
sources = [
|
|
|
|
"stb/stb_image.h",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
# PicoJSON
|
|
|
|
config("picojson_public_config") {
|
|
|
|
include_dirs = [ "." ]
|
|
|
|
}
|
|
|
|
source_set("picojson") {
|
|
|
|
public_configs = [ ":picojson_public_config" ]
|
|
|
|
sources = [
|
|
|
|
"picojson/picojson.h",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
# Tiny glTF Loader
|
|
|
|
config("tiny_gltf_loader_public_config") {
|
|
|
|
include_dirs = [ "." ]
|
|
|
|
}
|
|
|
|
source_set("tiny_gltf_loader") {
|
|
|
|
public_configs = [ ":tiny_gltf_loader_public_config" ]
|
|
|
|
public_deps = [
|
|
|
|
":picojson",
|
|
|
|
":stb",
|
|
|
|
]
|
|
|
|
sources = [
|
|
|
|
"tinygltfloader/tiny_gltf_loader.h",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|