Chromium Code Reviews| Index: content/public/common/sandbox_type_mac.h |
| diff --git a/content/public/common/sandbox_type_mac.h b/content/public/common/sandbox_type_mac.h |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..600902a4e9e06fd216df6d345eb96b2f8a06f166 |
| --- /dev/null |
| +++ b/content/public/common/sandbox_type_mac.h |
| @@ -0,0 +1,41 @@ |
| +// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#ifndef CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ |
| +#define CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ |
| +#pragma once |
| + |
| +namespace content { |
| + |
| +// Defines the Mac sandbox types known within content. Embedders can add |
| +// additional sandbox types with IDs starting with |
| +// SANDBOX_TYPE_AFTER_LAST_TYPE. |
|
jeremy
2011/11/24 16:42:04
nit: does this fit on the previous line?
jochen (gone - plz use gerrit)
2011/11/24 20:08:35
Done.
|
| + |
| +enum SandboxType { |
| + SANDBOX_TYPE_FIRST_TYPE = 0, // Placeholder to ease iteration. |
| + |
| + SANDBOX_TYPE_RENDERER = SANDBOX_TYPE_FIRST_TYPE, |
| + |
| + // The worker process uses the most restrictive sandbox which has almost |
| + // *everything* locked down. Only a couple of /System/Library/ paths and |
| + // some other very basic operations (e.g., reading metadata to allow |
| + // following symlinks) are permitted. |
| + SANDBOX_TYPE_WORKER, |
| + |
| + // Utility process is as restrictive as the worker process except full |
| + // access is allowed to one configurable directory. |
| + SANDBOX_TYPE_UTILITY, |
| + |
| + // GPU process. |
| + SANDBOX_TYPE_GPU, |
| + |
| + // The PPAPI plugin process. |
| + SANDBOX_TYPE_PPAPI, |
| + |
| + SANDBOX_TYPE_AFTER_LAST_TYPE, // Placeholder to ease iteration. |
| +}; |
| + |
| +} // namespace content |
| + |
| +#endif // CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ |