3bf44848c3
This prepares for pulling chromium's build as dependency for gn. After this, the files in build and gypfiles need to stay in sync until chromium is updated. BUG=chromium:474921 LOG=n Review-Url: https://codereview.chromium.org/1848553003 Cr-Commit-Position: refs/heads/master@{#35898}
187 lines
3.9 KiB
Python
187 lines
3.9 KiB
Python
# Copyright 2016 the V8 project authors. All rights reserved.
|
|
# Use of this source code is governed by a BSD-style license that can be
|
|
# found in the LICENSE file.
|
|
|
|
{
|
|
'variables': {
|
|
'v8_code': 1,
|
|
},
|
|
'includes': ['../../gypfiles/toolchain.gypi', '../../gypfiles/features.gypi'],
|
|
'targets': [
|
|
{
|
|
'target_name': 'json_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'json_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'json_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'json.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'parser_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'parser_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'parser_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'parser.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'regexp_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'regexp_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'regexp_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'regexp.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'wasm_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'wasm_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'wasm_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'wasm.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'wasm_asmjs_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'wasm_asmjs_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'wasm_asmjs_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'wasm-asmjs.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'fuzzer_support',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'../../src/v8.gyp:v8_libplatform',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'fuzzer-support.cc',
|
|
'fuzzer-support.h',
|
|
],
|
|
'conditions': [
|
|
['component=="shared_library"', {
|
|
# fuzzers can't be built against a shared library, so we need to
|
|
# depend on the underlying static target in that case.
|
|
'dependencies': ['../../src/v8.gyp:v8_maybe_snapshot'],
|
|
}, {
|
|
'dependencies': ['../../src/v8.gyp:v8'],
|
|
}],
|
|
],
|
|
},
|
|
],
|
|
'conditions': [
|
|
['test_isolation_mode != "noop"', {
|
|
'targets': [
|
|
{
|
|
'target_name': 'fuzzer_run',
|
|
'type': 'none',
|
|
'dependencies': [
|
|
'json_fuzzer',
|
|
'parser_fuzzer',
|
|
'regexp_fuzzer',
|
|
],
|
|
'includes': [
|
|
'../../gypfiles/isolate.gypi',
|
|
],
|
|
'sources': [
|
|
'fuzzer.isolate',
|
|
],
|
|
},
|
|
],
|
|
}],
|
|
],
|
|
}
|