| Index: chrome/common/sandbox_init_wrapper.h
|
| diff --git a/chrome/common/sandbox_init_wrapper.h b/chrome/common/sandbox_init_wrapper.h
|
| index a1c2de9b17780cd4512e757fac635f9676f3de60..d1652d2172f31cc385442df41bc6f5e77258704f 100644
|
| --- a/chrome/common/sandbox_init_wrapper.h
|
| +++ b/chrome/common/sandbox_init_wrapper.h
|
| @@ -33,7 +33,10 @@ class SandboxInitWrapper {
|
|
|
| // Initialize the sandbox for renderer and plug-in processes, depending on
|
| // the command line flags. The browser process is not sandboxed.
|
| - void InitializeSandbox(const CommandLine& parsed_command_line,
|
| + // Returns true if the sandbox was initialized succesfully, false if an error
|
| + // occurred. If process_type isn't one that needs sandboxing true is always
|
| + // returned.
|
| + bool InitializeSandbox(const CommandLine& parsed_command_line,
|
| const std::string& process_type);
|
| private:
|
| sandbox::BrokerServices* broker_services_;
|
| @@ -50,17 +53,12 @@ class SandboxInitWrapper {
|
|
|
| // Initialize the sandbox for renderer and plug-in processes, depending on
|
| // the command line flags. The browser process is not sandboxed.
|
| - void InitializeSandbox(const CommandLine& parsed_command_line,
|
| + // Returns true if the sandbox was initialized succesfully, false if an error
|
| + // occurred. If process_type isn't one that needs sandboxing true is always
|
| + // returned.
|
| + bool InitializeSandbox(const CommandLine& parsed_command_line,
|
| const std::string& process_type);
|
|
|
| -#if defined(OS_MACOSX)
|
| - // We keep the process type so we can configure the sandbox as needed.
|
| - public:
|
| - std::string ProcessType() const { return process_type_; }
|
| - private:
|
| - std::string process_type_;
|
| -#endif
|
| -
|
| private:
|
| DISALLOW_COPY_AND_ASSIGN(SandboxInitWrapper);
|
| };
|
|
|