sandboxed-api/sandboxed_api/examples/hello_sapi/CMakeLists.txt
Christian Blichmann 839914d6dd cmake: Rename build options to follow Abseil naming
`BUILD_TESTING` is a CMake provided option and we should use similar naming,
just like how Abseil does it.

- `SAPI_ENABLE_TESTS` -> `SAPI_BUILD_TESTING`
- `SAPI_ENABLE_CONTRIB_TESTS` -> `SAPI_CONTRIB_BUILD_TESTING`
- `SAPI_ENABLE_EXAMPLES` -> `SAPI_BUILD_EXAMPLES`

Drive-by:
- Fix option name in GitHub action
PiperOrigin-RevId: 443305932
Change-Id: Ice2b42be1229a0f9ae7c2ceda9ce87187baf22c4
2022-04-21 01:17:39 -07:00

83 lines
2.5 KiB
CMake

# Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Example that demonstrates how to embed Sandboxed API into a project using
# CMake.
cmake_minimum_required(VERSION 3.12)
project(hello_sapi_project CXX)
# Path to the Sandboxed API source tree. Unlike Bazel, CMake does not download
# downstream dependencies by default. So the option below needs to be adjusted
# to point to a local checkout or a Git submodule.
# The default value is chosen so that this example can be easily tried out for
# a regular checkout of Sandboxed API.
set(SAPI_ROOT "${PROJECT_SOURCE_DIR}/../../.."
CACHE PATH "Path to the Sandboxed API source tree")
# Configure options and include Sandboxed API as a sub-directory.
set(SAPI_BUILD_EXAMPLES OFF CACHE BOOL "")
set(SAPI_BUILD_TESTING OFF CACHE BOOL "")
add_subdirectory("${SAPI_ROOT}"
"${CMAKE_BINARY_DIR}/sandboxed-api-build" EXCLUDE_FROM_ALL)
# Interface library with common settings for this projects
add_library(hello_base INTERFACE)
add_library(hello::base ALIAS hello_base)
target_compile_features(hello_base INTERFACE cxx_std_17)
target_include_directories(hello_base INTERFACE
"${PROJECT_BINARY_DIR}" # To find the generated SAPI header
)
# Library with code that should be sandboxed
add_library(hello_lib STATIC
hello_lib.cc
)
target_link_libraries(hello_lib PRIVATE
hello::base
)
# Sandboxed API for the library above
add_sapi_library(hello_sapi
FUNCTIONS AddTwoIntegers
INPUTS hello_lib.cc
LIBRARY hello_lib
LIBRARY_NAME Hello
NAMESPACE ""
)
add_library(hello::sapi ALIAS hello_sapi)
# Main executable demonstrating how the sandboxed library is used
add_executable(hello
hello_main.cc
)
target_link_libraries(hello PRIVATE
hello::base
hello::sapi
sapi::sapi
)
# Another example using the same library, but using the Transaction API that
# automatically retries sandbox operations. Also demonstates error handling
# and a custom security policy.
add_executable(hello_transacted
hello_transacted.cc
)
target_link_libraries(hello_transacted PRIVATE
hello::base
hello::sapi
sapi::sapi
)