mirror of
https://github.com/google/sandboxed-api.git
synced 2024-03-22 13:11:30 +08:00
83 lines
2.5 KiB
CMake
83 lines
2.5 KiB
CMake
|
# Copyright 2020 Google LLC
|
||
|
#
|
||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
# you may not use this file except in compliance with the License.
|
||
|
# You may obtain a copy of the License at
|
||
|
#
|
||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||
|
#
|
||
|
# Unless required by applicable law or agreed to in writing, software
|
||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
# See the License for the specific language governing permissions and
|
||
|
# limitations under the License.
|
||
|
|
||
|
# Example that demonstrates how to embed Sandboxed API into a project using
|
||
|
# CMake.
|
||
|
|
||
|
cmake_minimum_required(VERSION 3.12)
|
||
|
|
||
|
project(hello_sapi_project CXX)
|
||
|
|
||
|
# Path to the Sandboxed API source tree. Unlike Bazel, CMake does not download
|
||
|
# downstream dependencies by default. So the option below needs to be adjusted
|
||
|
# to point to a local checkout or a Git submodule.
|
||
|
# The default value is chosen so that this example can be easily tried out for
|
||
|
# a regular checkout of Sandboxed API.
|
||
|
set(SAPI_ROOT "${PROJECT_SOURCE_DIR}/../../.."
|
||
|
CACHE PATH "Path to the Sandboxed API source tree")
|
||
|
|
||
|
# Configure options and include Sandboxed API as a sub-directory.
|
||
|
set(SAPI_ENABLE_EXAMPLES OFF CACHE BOOL "")
|
||
|
set(SAPI_ENABLE_TESTS OFF CACHE BOOL "")
|
||
|
add_subdirectory("${SAPI_ROOT}"
|
||
|
"${CMAKE_BINARY_DIR}/sandboxed-api-build" EXCLUDE_FROM_ALL)
|
||
|
|
||
|
# Interface library with common settings for this projects
|
||
|
add_library(hello_base INTERFACE)
|
||
|
add_library(hello::base ALIAS hello_base)
|
||
|
target_compile_features(hello_base INTERFACE cxx_std_17)
|
||
|
target_include_directories(hello_base INTERFACE
|
||
|
"${PROJECT_BINARY_DIR}" # To find the generated SAPI header
|
||
|
)
|
||
|
|
||
|
# Library with code that should be sandboxed
|
||
|
add_library(hello_lib STATIC
|
||
|
hello_lib.cc
|
||
|
)
|
||
|
target_link_libraries(hello_lib PRIVATE
|
||
|
hello::base
|
||
|
)
|
||
|
|
||
|
# Sandboxed API for the library above
|
||
|
add_sapi_library(hello_sapi
|
||
|
FUNCTIONS AddTwoIntegers
|
||
|
INPUTS hello_lib.cc
|
||
|
LIBRARY hello_lib
|
||
|
LIBRARY_NAME Hello
|
||
|
NAMESPACE ""
|
||
|
)
|
||
|
add_library(hello::sapi ALIAS hello_sapi)
|
||
|
|
||
|
# Main executable demonstrating how the sandboxed library is used
|
||
|
add_executable(hello
|
||
|
hello_main.cc
|
||
|
)
|
||
|
target_link_libraries(hello PRIVATE
|
||
|
hello::base
|
||
|
hello::sapi
|
||
|
sapi::sapi
|
||
|
)
|
||
|
|
||
|
# Another example using the same library, but using the Transaction API that
|
||
|
# automatically retries sandbox operations. Also demonstates error handling
|
||
|
# and a custom security policy.
|
||
|
add_executable(hello_transacted
|
||
|
hello_transacted.cc
|
||
|
)
|
||
|
target_link_libraries(hello_transacted PRIVATE
|
||
|
hello::base
|
||
|
hello::sapi
|
||
|
sapi::sapi
|
||
|
)
|