Christian Blichmann 17f561f221 Use explicit conversion to std::string for look up in Protobuf maps
This is needed for some compiler versions where `absl::string_view` == `std::string_view`.

PiperOrigin-RevId: 367392064
Change-Id: Id91d23510501df4745f386475ef9049d94062e1b
2021-04-08 02:51:29 -07:00
..
2021-02-19 04:43:14 -08:00
2021-01-22 06:01:34 -08:00
2021-01-22 06:01:34 -08:00
2021-02-19 04:43:14 -08:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2021-01-22 06:01:34 -08:00
2021-01-28 02:20:37 -08:00
2021-02-02 06:55:30 -08:00
2020-10-05 05:10:16 -07:00
2020-01-31 05:39:25 -08:00
2021-01-22 06:01:34 -08:00
2021-02-19 04:43:14 -08:00
2021-01-22 06:01:34 -08:00
2021-01-27 08:05:25 -08:00
2021-01-22 06:01:34 -08:00
2021-01-22 06:01:34 -08:00
2021-02-02 02:41:13 -08:00
2021-02-24 03:06:55 -08:00
2019-10-07 02:36:35 -07:00
2021-01-22 06:01:34 -08:00
2020-09-03 07:40:33 -07:00
2020-09-03 07:40:33 -07:00
2021-01-22 06:01:34 -08:00
2021-03-18 05:56:40 -07:00
2021-02-19 04:43:14 -08:00
2020-07-20 00:24:40 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.