Chromium Code Reviews| Index: content/public/common/sandbox_init.h |
| diff --git a/content/public/common/sandbox_init.h b/content/public/common/sandbox_init.h |
| index 3415e0d4abb8e2e9ba33986add4141e7dc1f07e9..44ce914cd38cb0265c7651f8e69a497052f26713 100644 |
| --- a/content/public/common/sandbox_init.h |
| +++ b/content/public/common/sandbox_init.h |
| @@ -13,10 +13,13 @@ |
| namespace sandbox { |
| struct SandboxInterfaceInfo; |
| } |
| +#elif defined(OS_MACOSX) |
| +class FilePath; |
| #endif |
| namespace content { |
| +#if defined(OS_WIN) |
| // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in |
| // processes, depending on the command line flags. Although The browser process |
| // is not sandboxed, this also needs to be called because it will initialize |
| @@ -24,11 +27,23 @@ namespace content { |
| // Returns true if the sandbox was initialized succesfully, false if an error |
| // occurred. If process_type isn't one that needs sandboxing true is always |
| // returned. |
| -#if defined(OS_WIN) |
| CONTENT_EXPORT bool InitializeSandbox( |
| sandbox::SandboxInterfaceInfo* sandbox_info); |
| #elif defined(OS_MACOSX) |
| -CONTENT_EXPORT bool InitializeSandbox(); |
| +// Initialize the sandbox of the given |sandbox_type|, optionally specifying a |
|
jeremy
2011/11/24 12:20:19
could you add a pointer to the enum that contains
jochen (gone - plz use gerrit)
2011/11/24 16:23:22
Done.
|
| +// directory to allow access to. This needs to be supported by the sandbox |
| +// policy associated with the given |sandbox_type|. |
|
jeremy
2011/11/24 12:20:19
policy -> profile
jochen (gone - plz use gerrit)
2011/11/24 16:23:22
Done.
|
| +// |
| +// The sandbox policy to use for this |sandbox_type| is queried using |
|
jeremy
2011/11/24 12:20:19
You should note something along the lines of "If
jochen (gone - plz use gerrit)
2011/11/24 16:23:22
Done.
|
| +// ContentClient::GetSandboxPolicyForSandboxType(). The embedder can use values |
| +// for |sandbox_type| starting from |
| +// content::sandbox::SANDBOX_PROCESS_TYPE_AFTER_LAST_TYPE. |
| +// |
| +// Returns true if the sandbox was initialized succesfully, false if an error |
| +// occurred. If process_type isn't one that needs sandboxing true is always |
| +// returned. |
| +CONTENT_EXPORT bool InitializeSandbox(int sandbox_type, |
| + const FilePath& allowed_path); |
| #endif |
| } // namespace content |