Index: chrome/common/sandbox_init_wrapper_mac.cc |
diff --git a/chrome/common/sandbox_init_wrapper_mac.cc b/chrome/common/sandbox_init_wrapper_mac.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..1461080a00819606b06877162805f24785acb7a1 |
--- /dev/null |
+++ b/chrome/common/sandbox_init_wrapper_mac.cc |
@@ -0,0 +1,49 @@ |
+// Copyright (c) 2009 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/common/sandbox_init_wrapper.h" |
+ |
+#include "base/command_line.h" |
+#include "chrome/common/chrome_switches.h" |
+#include "chrome/common/sandbox_mac.h" |
+ |
+bool SandboxInitWrapper::InitializeSandbox(const CommandLine& command_line, |
+ const std::string& process_type) { |
+ if (command_line.HasSwitch(switches::kNoSandbox)) |
+ return true; |
+ |
+ sandbox::SandboxProcessType sandbox_process_type; |
+ FilePath allowed_dir; // Empty by default. |
+ |
+ // Browser process isn't sandboxed. |
+ if (process_type.empty()) { |
+ return true; |
+ } else if (process_type == switches::kRendererProcess) { |
+ // Renderer process sandbox. |
+ sandbox_process_type = sandbox::SANDBOX_TYPE_RENDERER; |
+ } else if (process_type == switches::kUtilityProcess) { |
+ // Utility process sandbox. |
+ sandbox_process_type = sandbox::SANDBOX_TYPE_UTILITY; |
+ allowed_dir = FilePath::FromWStringHack( |
+ command_line.GetSwitchValue(switches::kUtilityProcessAllowedDir)); |
+ } else if (process_type == switches::kWorkerProcess) { |
+ // Worker process sandbox. |
+ sandbox_process_type = sandbox::SANDBOX_TYPE_WORKER; |
+ } else if ((process_type == switches::kNaClProcess) || |
+ (process_type == switches::kPluginProcess) || |
+ (process_type == switches::kProfileImportProcess)) { |
+ return true; |
+ } else { |
+ // Failsafe: If you hit an unreached here, is your new process type in need |
+ // of sandboxing? |
+ NOTREACHED(); |
+ return true; |
+ } |
+ |
+ // Warm up APIs before turning on the sandbox. |
+ sandbox::SandboxWarmup(); |
+ |
+ // Actually sandbox the process. |
+ return sandbox::EnableSandbox(sandbox_process_type, allowed_dir); |
+} |