logofilesdir = $(HTML_DIR)/logos
logofiles_DATA = $(logofiles)
-kbase_html_in = \
- $(patsubst $(srcdir)/%,%,$(wildcard $(srcdir)/kbase/*.html.in))
-kbase_rst = \
- $(patsubst $(srcdir)/%,%,$(wildcard $(srcdir)/kbase/*.rst))
-kbase_rst_html_in = \
- $(kbase_rst:%.rst=%.html.in)
-kbase_html = \
- $(kbase_html_in:%.html.in=%.html) \
- $(kbase_rst_html_in:%.html.in=%.html)
-
-kbasedir = $(HTML_DIR)/kbase
-kbase_DATA = $(kbase_html)
-
# Sync with src/util/
KEYCODES = linux osx atset1 atset2 atset3 xtkbd usb win32 qnum
KEYNAMES = linux osx win32
--- /dev/null
+docs_kbase_files = [
+ 'backing_chains',
+ 'domainstatecapture',
+ 'incrementalbackupinternals',
+ 'kvm-realtime',
+ 'launch_security_sev',
+ 'locking-lockd',
+ 'locking',
+ 'locking-sanlock',
+ 'migrationinternals',
+ 'qemu-passthrough-security',
+ 'rpm-deployment',
+ 's390_protected_virt',
+ 'secureusage',
+ 'virtiofs',
+]
+
+foreach name : docs_kbase_files
+ rst_file = '@0@.rst'.format(name)
+ html_file = '@0@.html'.format(name)
+
+ html_in = docs_rst2html_gen.process(rst_file)
+
+ custom_target(
+ html_file,
+ input: html_in,
+ output: html_file,
+ command: [
+ meson_python_prog,
+ python3_prog.path(),
+ meson_html_gen_prog.path(),
+ xsltproc_prog.path(),
+ xmllint_prog.path(),
+ meson.build_root(),
+ docs_timestamp,
+ subsite_xsl,
+ '@INPUT@',
+ '@OUTPUT@',
+ 'kbase' / rst_file,
+ ],
+ depends: [ aclperms_gen ],
+ depend_files: [ page_xsl ],
+ install: true,
+ install_dir: docs_html_dir / 'kbase',
+ )
+endforeach
subdir('html')
subdir('internals')
subdir('js')
+subdir('kbase')
# This hack enables us to view the web pages