| OLD | NEW |
| 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CHROME_COMMON_SANDBOX_MAC_H_ | 5 #ifndef CHROME_COMMON_SANDBOX_MAC_H_ |
| 6 #define CHROME_COMMON_SANDBOX_MAC_H_ | 6 #define CHROME_COMMON_SANDBOX_MAC_H_ |
| 7 #pragma once | 7 #pragma once |
| 8 | 8 |
| 9 #include <string> | 9 #include <string> |
| 10 | 10 |
| (...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 68 // following symlinks) are permitted. | 68 // following symlinks) are permitted. |
| 69 SANDBOX_TYPE_WORKER, | 69 SANDBOX_TYPE_WORKER, |
| 70 | 70 |
| 71 // Utility process is as restrictive as the worker process except full | 71 // Utility process is as restrictive as the worker process except full |
| 72 // access is allowed to one configurable directory. | 72 // access is allowed to one configurable directory. |
| 73 SANDBOX_TYPE_UTILITY, | 73 SANDBOX_TYPE_UTILITY, |
| 74 | 74 |
| 75 // Native Client sandbox for the user's untrusted code. | 75 // Native Client sandbox for the user's untrusted code. |
| 76 SANDBOX_TYPE_NACL_LOADER, | 76 SANDBOX_TYPE_NACL_LOADER, |
| 77 | 77 |
| 78 // GPU process. |
| 79 SANDBOX_TYPE_GPU, |
| 80 |
| 78 SANDBOX_AFTER_TYPE_LAST_TYPE, // Placeholder to ease iteration. | 81 SANDBOX_AFTER_TYPE_LAST_TYPE, // Placeholder to ease iteration. |
| 79 }; | 82 }; |
| 80 | 83 |
| 81 // Warm up System APIs that empirically need to be accessed before the Sandbox | 84 // Warm up System APIs that empirically need to be accessed before the Sandbox |
| 82 // is turned on. | 85 // is turned on. |
| 83 static void SandboxWarmup(); | 86 static void SandboxWarmup(); |
| 84 | 87 |
| 85 // Turns on the OS X sandbox for this process. | 88 // Turns on the OS X sandbox for this process. |
| 86 // |sandbox_type| - type of Sandbox to use. | 89 // |sandbox_type| - type of Sandbox to use. |
| 87 // |allowed_dir| - directory to allow access to, currently the only sandbox | 90 // |allowed_dir| - directory to allow access to, currently the only sandbox |
| (...skipping 80 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 168 FRIEND_TEST(MacDirAccessSandboxTest, StringEscape); | 171 FRIEND_TEST(MacDirAccessSandboxTest, StringEscape); |
| 169 FRIEND_TEST(MacDirAccessSandboxTest, RegexEscape); | 172 FRIEND_TEST(MacDirAccessSandboxTest, RegexEscape); |
| 170 FRIEND_TEST(MacDirAccessSandboxTest, SandboxAccess); | 173 FRIEND_TEST(MacDirAccessSandboxTest, SandboxAccess); |
| 171 | 174 |
| 172 DISALLOW_IMPLICIT_CONSTRUCTORS(Sandbox); | 175 DISALLOW_IMPLICIT_CONSTRUCTORS(Sandbox); |
| 173 }; | 176 }; |
| 174 | 177 |
| 175 } // namespace sandbox | 178 } // namespace sandbox |
| 176 | 179 |
| 177 #endif // CHROME_COMMON_SANDBOX_MAC_H_ | 180 #endif // CHROME_COMMON_SANDBOX_MAC_H_ |
| OLD | NEW |