xref: /aosp_15_r20/external/sandboxed-api/contrib/libtiff/README.md (revision ec63e07ab9515d95e79c211197c445ef84cefa6a)
1*ec63e07aSXin Li# sapi-libtiff
2*ec63e07aSXin Li
3*ec63e07aSXin LiThis library was sandboxed as part of Google's summer 2020 internship program
4*ec63e07aSXin Li([blog post](https://security.googleblog.com/2020/12/improving-open-source-security-during.html)).
5*ec63e07aSXin Li
6*ec63e07aSXin LiCopyright 2020 Google LLC.
7*ec63e07aSXin Li
8*ec63e07aSXin Li## Usage
9*ec63e07aSXin Li
10*ec63e07aSXin Li#### build:
11*ec63e07aSXin Li
12*ec63e07aSXin Li```bash
13*ec63e07aSXin Limkdir -p build && cd build && cmake .. \
14*ec63e07aSXin Li  -DSAPI_ROOT=$HOME/sapi_root \
15*ec63e07aSXin Li  -DBUILD_SHARED_LIBS=OFF
16*ec63e07aSXin Limake -j 8
17*ec63e07aSXin Li```
18*ec63e07aSXin Li
19*ec63e07aSXin Li#### to run the sandboxed example:
20*ec63e07aSXin Li
21*ec63e07aSXin Li`./example/sandboxed absolute/path/to/project/dir`
22*ec63e07aSXin Li
23*ec63e07aSXin Li#### to run tests:
24*ec63e07aSXin Li
25*ec63e07aSXin Li`./test/tests`
26*ec63e07aSXin Li
27*ec63e07aSXin Liyou also can use sandbox flags `sandbox2_danger_danger_permit_all` and
28*ec63e07aSXin Li`sandbox2_danger_danger_permit_all_and_log` for debugging.
29