| Index: content/common/sandbox_init_wrapper_mac.cc
|
| ===================================================================
|
| --- content/common/sandbox_init_wrapper_mac.cc (revision 107845)
|
| +++ content/common/sandbox_init_wrapper_mac.cc (working copy)
|
| @@ -1,67 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "content/common/sandbox_init_wrapper.h"
|
| -
|
| -#include "base/command_line.h"
|
| -#include "base/file_path.h"
|
| -#include "base/logging.h"
|
| -#include "content/common/sandbox_mac.h"
|
| -#include "content/public/common/content_switches.h"
|
| -
|
| -bool SandboxInitWrapper::InitializeSandbox(const CommandLine& command_line,
|
| - const std::string& process_type) {
|
| - using sandbox::Sandbox;
|
| -
|
| - if (command_line.HasSwitch(switches::kNoSandbox))
|
| - return true;
|
| -
|
| - Sandbox::SandboxProcessType sandbox_process_type;
|
| - FilePath allowed_dir; // Empty by default.
|
| -
|
| - if (process_type.empty()) {
|
| - // Browser process isn't sandboxed.
|
| - return true;
|
| - } else if (process_type == switches::kRendererProcess) {
|
| - if (!command_line.HasSwitch(switches::kDisable3DAPIs) &&
|
| - !command_line.HasSwitch(switches::kDisableExperimentalWebGL) &&
|
| - command_line.HasSwitch(switches::kInProcessWebGL)) {
|
| - // TODO(kbr): this check seems to be necessary only on this
|
| - // platform because the sandbox is initialized later. Remove
|
| - // this once this flag is removed.
|
| - return true;
|
| - } else {
|
| - sandbox_process_type = Sandbox::SANDBOX_TYPE_RENDERER;
|
| - }
|
| - } else if (process_type == switches::kUtilityProcess) {
|
| - // Utility process sandbox.
|
| - sandbox_process_type = Sandbox::SANDBOX_TYPE_UTILITY;
|
| - allowed_dir =
|
| - command_line.GetSwitchValuePath(switches::kUtilityProcessAllowedDir);
|
| - } else if (process_type == switches::kWorkerProcess) {
|
| - // Worker process sandbox.
|
| - sandbox_process_type = Sandbox::SANDBOX_TYPE_WORKER;
|
| - } else if (process_type == switches::kNaClLoaderProcess) {
|
| - // Native Client sel_ldr (user untrusted code) sandbox.
|
| - sandbox_process_type = Sandbox::SANDBOX_TYPE_NACL_LOADER;
|
| - } else if (process_type == switches::kGpuProcess) {
|
| - sandbox_process_type = Sandbox::SANDBOX_TYPE_GPU;
|
| - } else if ((process_type == switches::kPluginProcess) ||
|
| - (process_type == switches::kServiceProcess)) {
|
| - return true;
|
| - } else if (process_type == switches::kPpapiPluginProcess) {
|
| - sandbox_process_type = Sandbox::SANDBOX_TYPE_PPAPI;
|
| - } else {
|
| - // Failsafe: If you hit an unreached here, is your new process type in need
|
| - // of sandboxing?
|
| - NOTREACHED() << "Unknown process type " << process_type;
|
| - return true;
|
| - }
|
| -
|
| - // Warm up APIs before turning on the sandbox.
|
| - Sandbox::SandboxWarmup(sandbox_process_type);
|
| -
|
| - // Actually sandbox the process.
|
| - return Sandbox::EnableSandbox(sandbox_process_type, allowed_dir);
|
| -}
|
|
|