diff options
author | tech4me <guiwanglong@gmail.com> | 2018-08-31 20:08:03 +0200 |
---|---|---|
committer | tech4me <guiwanglong@gmail.com> | 2018-09-19 20:22:14 +0200 |
commit | a8f54f96fc0b91dee8a0ea6daf9dfd55b46a9178 (patch) | |
tree | 92c57ae3f11b1f9ad5c7cdd76956c38b77984d44 /.travis/linux-mingw/scan_dll.py | |
parent | Merge pull request #1196 from FearlessTobi/ccache-consistency (diff) | |
download | yuzu-a8f54f96fc0b91dee8a0ea6daf9dfd55b46a9178.tar yuzu-a8f54f96fc0b91dee8a0ea6daf9dfd55b46a9178.tar.gz yuzu-a8f54f96fc0b91dee8a0ea6daf9dfd55b46a9178.tar.bz2 yuzu-a8f54f96fc0b91dee8a0ea6daf9dfd55b46a9178.tar.lz yuzu-a8f54f96fc0b91dee8a0ea6daf9dfd55b46a9178.tar.xz yuzu-a8f54f96fc0b91dee8a0ea6daf9dfd55b46a9178.tar.zst yuzu-a8f54f96fc0b91dee8a0ea6daf9dfd55b46a9178.zip |
Diffstat (limited to '.travis/linux-mingw/scan_dll.py')
-rw-r--r-- | .travis/linux-mingw/scan_dll.py | 106 |
1 files changed, 106 insertions, 0 deletions
diff --git a/.travis/linux-mingw/scan_dll.py b/.travis/linux-mingw/scan_dll.py new file mode 100644 index 000000000..163183f2e --- /dev/null +++ b/.travis/linux-mingw/scan_dll.py @@ -0,0 +1,106 @@ +import pefile +import sys +import re +import os +import queue +import shutil + +# constant definitions +KNOWN_SYS_DLLS = ['WINMM.DLL', 'MSVCRT.DLL', 'VERSION.DLL', 'MPR.DLL', + 'DWMAPI.DLL', 'UXTHEME.DLL', 'DNSAPI.DLL', 'IPHLPAPI.DLL'] +# below is for Ubuntu 18.04 with specified PPA enabled, if you are using +# other distro or different repositories, change the following accordingly +DLL_PATH = [ + '/usr/x86_64-w64-mingw32/bin/', + '/usr/x86_64-w64-mingw32/lib/', + '/usr/lib/gcc/x86_64-w64-mingw32/7.3-posix/' +] + +missing = [] + + +def parse_imports(file_name): + results = [] + pe = pefile.PE(file_name, fast_load=True) + pe.parse_data_directories() + + for entry in pe.DIRECTORY_ENTRY_IMPORT: + current = entry.dll.decode() + current_u = current.upper() # b/c Windows is often case insensitive + # here we filter out system dlls + # dll w/ names like *32.dll are likely to be system dlls + if current_u.upper() not in KNOWN_SYS_DLLS and not re.match(string=current_u, pattern=r'.*32\.DLL'): + results.append(current) + + return results + + +def parse_imports_recursive(file_name, path_list=[]): + q = queue.Queue() # create a FIFO queue + # file_name can be a string or a list for the convience + if isinstance(file_name, str): + q.put(file_name) + elif isinstance(file_name, list): + for i in file_name: + q.put(i) + full_list = [] + while q.qsize(): + current = q.get_nowait() + print('> %s' % current) + deps = parse_imports(current) + # if this dll does not have any import, ignore it + if not deps: + continue + for dep in deps: + # the dependency already included in the list, skip + if dep in full_list: + continue + # find the requested dll in the provided paths + full_path = find_dll(dep) + if not full_path: + missing.append(dep) + continue + full_list.append(dep) + q.put(full_path) + path_list.append(full_path) + return full_list + + +def find_dll(name): + for path in DLL_PATH: + for root, _, files in os.walk(path): + for f in files: + if name.lower() == f.lower(): + return os.path.join(root, f) + + +def deploy(name, dst, dry_run=False): + dlls_path = [] + parse_imports_recursive(name, dlls_path) + for dll_entry in dlls_path: + if not dry_run: + shutil.copy(dll_entry, dst) + else: + print('[Dry-Run] Copy %s to %s' % (dll_entry, dst)) + print('Deploy completed.') + return dlls_path + + +def main(): + if len(sys.argv) < 3: + print('Usage: %s [files to examine ...] [target deploy directory]') + return 1 + to_deploy = sys.argv[1:-1] + tgt_dir = sys.argv[-1] + if not os.path.isdir(tgt_dir): + print('%s is not a directory.' % tgt_dir) + return 1 + print('Scanning dependencies...') + deploy(to_deploy, tgt_dir) + if missing: + print('Following DLLs are not found: %s' % ('\n'.join(missing))) + return 0 + + +if __name__ == '__main__': + main() |