Index: content/public/common/sandbox_init.h |
=================================================================== |
--- content/public/common/sandbox_init.h (revision 107639) |
+++ content/public/common/sandbox_init.h (working copy) |
@@ -2,71 +2,35 @@ |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
-#ifndef CONTENT_COMMON_SANDBOX_INIT_WRAPPER_H_ |
-#define CONTENT_COMMON_SANDBOX_INIT_WRAPPER_H_ |
+#ifndef CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ |
+#define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ |
#pragma once |
-// Wraps the sandbox initialization and platform variables to consolodate |
-// the code and reduce the number of platform ifdefs elsewhere. The POSIX |
-// version of this wrapper is basically empty. |
- |
#include "build/build_config.h" |
- |
-#include <string> |
- |
-#include "base/basictypes.h" |
#include "content/common/content_export.h" |
#if defined(OS_WIN) |
-#include "sandbox/src/sandbox.h" |
+namespace sandbox { |
+struct SandboxInterfaceInfo; |
+} |
#endif |
-class CommandLine; |
+namespace content { |
+// Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in |
+// processes, depending on the command line flags. Although The browser process |
+// is not sandboxed, this also needs to be called because it will initialize |
+// the broker code. |
+// Returns true if the sandbox was initialized succesfully, false if an error |
+// occurred. If process_type isn't one that needs sandboxing true is always |
+// returned. |
#if defined(OS_WIN) |
- |
-class CONTENT_EXPORT SandboxInitWrapper { |
- public: |
- SandboxInitWrapper() : broker_services_(), target_services_() { } |
- // SetServices() needs to be called before InitializeSandbox() on Win32 with |
- // the info received from the chrome exe main. |
- void SetServices(sandbox::SandboxInterfaceInfo* sandbox_info); |
- sandbox::BrokerServices* BrokerServices() const { return broker_services_; } |
- sandbox::TargetServices* TargetServices() const { return target_services_; } |
- |
- // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and |
- // plug-in processes, depending on the command line flags. The browser |
- // process is not sandboxed. |
- // Returns true if the sandbox was initialized succesfully, false if an error |
- // occurred. If process_type isn't one that needs sandboxing true is always |
- // returned. |
- bool InitializeSandbox(const CommandLine& parsed_command_line, |
- const std::string& process_type); |
- private: |
- sandbox::BrokerServices* broker_services_; |
- sandbox::TargetServices* target_services_; |
- |
- DISALLOW_COPY_AND_ASSIGN(SandboxInitWrapper); |
-}; |
- |
-#elif defined(OS_POSIX) |
- |
-class SandboxInitWrapper { |
- public: |
- SandboxInitWrapper() { } |
- |
- // Initialize the sandbox for renderer and plug-in processes, depending on |
- // the command line flags. The browser process is not sandboxed. |
- // Returns true if the sandbox was initialized succesfully, false if an error |
- // occurred. If process_type isn't one that needs sandboxing true is always |
- // returned. |
- bool InitializeSandbox(const CommandLine& parsed_command_line, |
- const std::string& process_type); |
- |
- private: |
- DISALLOW_COPY_AND_ASSIGN(SandboxInitWrapper); |
-}; |
- |
+CONTENT_EXPORT bool InitializeSandbox( |
+ sandbox::SandboxInterfaceInfo* sandbox_info); |
+#elif defined(OS_MACOSX) |
+CONTENT_EXPORT bool InitializeSandbox(); |
#endif |
-#endif // CONTENT_COMMON_SANDBOX_INIT_WRAPPER_H_ |
+} // namespace content |
+ |
+#endif // CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ |