Index: chrome/common/sandbox_init_wrapper.h |
diff --git a/chrome/common/sandbox_init_wrapper.h b/chrome/common/sandbox_init_wrapper.h |
index a1c2de9b17780cd4512e757fac635f9676f3de60..d1652d2172f31cc385442df41bc6f5e77258704f 100644 |
--- a/chrome/common/sandbox_init_wrapper.h |
+++ b/chrome/common/sandbox_init_wrapper.h |
@@ -33,7 +33,10 @@ class SandboxInitWrapper { |
// Initialize the sandbox for renderer and plug-in processes, depending on |
// the command line flags. The browser process is not sandboxed. |
- void InitializeSandbox(const CommandLine& parsed_command_line, |
+ // Returns true if the sandbox was initialized succesfully, false if an error |
+ // occurred. If process_type isn't one that needs sandboxing true is always |
+ // returned. |
+ bool InitializeSandbox(const CommandLine& parsed_command_line, |
const std::string& process_type); |
private: |
sandbox::BrokerServices* broker_services_; |
@@ -50,17 +53,12 @@ class SandboxInitWrapper { |
// Initialize the sandbox for renderer and plug-in processes, depending on |
// the command line flags. The browser process is not sandboxed. |
- void InitializeSandbox(const CommandLine& parsed_command_line, |
+ // Returns true if the sandbox was initialized succesfully, false if an error |
+ // occurred. If process_type isn't one that needs sandboxing true is always |
+ // returned. |
+ bool InitializeSandbox(const CommandLine& parsed_command_line, |
const std::string& process_type); |
-#if defined(OS_MACOSX) |
- // We keep the process type so we can configure the sandbox as needed. |
- public: |
- std::string ProcessType() const { return process_type_; } |
- private: |
- std::string process_type_; |
-#endif |
- |
private: |
DISALLOW_COPY_AND_ASSIGN(SandboxInitWrapper); |
}; |