| Index: content/public/common/sandbox_type_mac.h
|
| diff --git a/content/public/common/sandbox_type_mac.h b/content/public/common/sandbox_type_mac.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..68a5d0fa418f97dff494076018ebe05dcb49dca2
|
| --- /dev/null
|
| +++ b/content/public/common/sandbox_type_mac.h
|
| @@ -0,0 +1,40 @@
|
| +// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_
|
| +#define CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_
|
| +#pragma once
|
| +
|
| +namespace content {
|
| +
|
| +// Defines the Mac sandbox types known within content. Embedders can add
|
| +// additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE.
|
| +
|
| +enum SandboxType {
|
| + SANDBOX_TYPE_FIRST_TYPE = 0, // Placeholder to ease iteration.
|
| +
|
| + SANDBOX_TYPE_RENDERER = SANDBOX_TYPE_FIRST_TYPE,
|
| +
|
| + // The worker process uses the most restrictive sandbox which has almost
|
| + // *everything* locked down. Only a couple of /System/Library/ paths and
|
| + // some other very basic operations (e.g., reading metadata to allow
|
| + // following symlinks) are permitted.
|
| + SANDBOX_TYPE_WORKER,
|
| +
|
| + // Utility process is as restrictive as the worker process except full
|
| + // access is allowed to one configurable directory.
|
| + SANDBOX_TYPE_UTILITY,
|
| +
|
| + // GPU process.
|
| + SANDBOX_TYPE_GPU,
|
| +
|
| + // The PPAPI plugin process.
|
| + SANDBOX_TYPE_PPAPI,
|
| +
|
| + SANDBOX_TYPE_AFTER_LAST_TYPE, // Placeholder to ease iteration.
|
| +};
|
| +
|
| +} // namespace content
|
| +
|
| +#endif // CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_
|
|
|