Index: content/public/common/sandbox_process_type_mac.h |
diff --git a/content/public/common/sandbox_process_type_mac.h b/content/public/common/sandbox_process_type_mac.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..c91d154ed586bc353db4c4730d7418070ca383bc |
--- /dev/null |
+++ b/content/public/common/sandbox_process_type_mac.h |
@@ -0,0 +1,41 @@ |
+// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef CONTENT_PUBLIC_COMMON_SANDBOX_PROCESS_TYPE_MAC_H_ |
+#define CONTENT_PUBLIC_COMMON_SANDBOX_PROCESS_TYPE_MAC_H_ |
+#pragma once |
+ |
+namespace content { |
+ |
+// Defines the Mac sandbox types known within content. Embedders can add |
+// additional sandbox types with IDs starting with |
+// SANDBOX_PROCESS_TYPE_AFTER_LAST_TYPE. |
+ |
+enum SandboxProcessType { |
+ SANDBOX_PROCESS_TYPE_FIRST_TYPE = 0, // Placeholder to ease iteration. |
jeremy
2011/11/24 12:20:19
I'd remove the word PROCESS from all these defines
jochen (gone - plz use gerrit)
2011/11/24 16:23:22
Done.
|
+ |
+ SANDBOX_PROCESS_TYPE_RENDERER = SANDBOX_PROCESS_TYPE_FIRST_TYPE, |
+ |
+ // The worker process uses the most restrictive sandbox which has almost |
+ // *everything* locked down. Only a couple of /System/Library/ paths and |
+ // some other very basic operations (e.g., reading metadata to allow |
+ // following symlinks) are permitted. |
+ SANDBOX_PROCESS_TYPE_WORKER, |
+ |
+ // Utility process is as restrictive as the worker process except full |
+ // access is allowed to one configurable directory. |
+ SANDBOX_PROCESS_TYPE_UTILITY, |
+ |
+ // GPU process. |
+ SANDBOX_PROCESS_TYPE_GPU, |
+ |
+ // The PPAPI plugin process. |
+ SANDBOX_PROCESS_TYPE_PPAPI, |
+ |
+ SANDBOX_PROCESS_TYPE_AFTER_LAST_TYPE, // Placeholder to ease iteration. |
+}; |
+ |
+} // namespace content |
+ |
+#endif // CONTENT_PUBLIC_COMMON_SANDBOX_PROCESS_TYPE_MAC_H_ |