Christian Blichmann 24c3e34344 Implement a GetDataDependencyFilepath() for CMake (non-Bazel really).
This code assumes, like Bazel's runfiles that the data dependency to access
exists in the same sub-tree as the binary:

WORKSPACE
+- sandboxed_api/sandbox2/examples/crc4
                                   +- crc4bin
                                   +- crc4sandbox

The code requires the directory structure to exist, so that in the example
above, crc4sandbox can use
  GetDataDependencyFilepath("sandboxed_api/sandbox2/examples/crc4/crc4bin")

regardless of how it was called.

PiperOrigin-RevId: 251834480
Change-Id: I6470b62ce9b403297116481a0c17c070992f2e81
2019-06-06 05:44:32 -07:00
..
2019-04-23 10:42:14 -07:00
2019-05-15 08:04:58 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-06-05 00:26:14 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-06-05 00:26:14 -07:00
2019-04-23 10:42:14 -07:00
2019-03-18 19:00:48 +01:00
2019-05-17 07:21:31 -07:00
2019-04-23 10:30:45 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-19 03:41:32 -07:00
2019-03-19 03:41:32 -07:00
2019-03-19 03:41:32 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-04-26 06:18:59 -07:00
2019-06-05 00:26:14 -07:00
2019-05-17 02:02:03 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-06-05 00:26:14 -07:00
2019-03-20 05:19:55 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-20 05:19:55 -07:00
2019-05-15 07:46:49 -07:00
2019-05-15 07:46:49 -07:00
2019-05-15 07:46:49 -07:00
2019-06-05 00:26:14 -07:00
2019-06-05 00:26:14 -07:00
2019-06-05 00:26:14 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-05-17 01:55:35 -07:00
2019-05-17 01:55:35 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Who is it for?

Sandbox2 is aimed to sandbox C/C++ code or whole binaries in production.

See the sandboxing options overview page to make sure this is the type of sandboxing you are looking for.

How does it work?

Read our How it works page to learn everything about this technology.