Index: content/public/common/sandbox_type_mac.h |
diff --git a/content/public/common/sandbox_type_mac.h b/content/public/common/sandbox_type_mac.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..68a5d0fa418f97dff494076018ebe05dcb49dca2 |
--- /dev/null |
+++ b/content/public/common/sandbox_type_mac.h |
@@ -0,0 +1,40 @@ |
+// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ |
+#define CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ |
+#pragma once |
+ |
+namespace content { |
+ |
+// Defines the Mac sandbox types known within content. Embedders can add |
+// additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE. |
+ |
+enum SandboxType { |
+ SANDBOX_TYPE_FIRST_TYPE = 0, // Placeholder to ease iteration. |
+ |
+ SANDBOX_TYPE_RENDERER = SANDBOX_TYPE_FIRST_TYPE, |
+ |
+ // The worker process uses the most restrictive sandbox which has almost |
+ // *everything* locked down. Only a couple of /System/Library/ paths and |
+ // some other very basic operations (e.g., reading metadata to allow |
+ // following symlinks) are permitted. |
+ SANDBOX_TYPE_WORKER, |
+ |
+ // Utility process is as restrictive as the worker process except full |
+ // access is allowed to one configurable directory. |
+ SANDBOX_TYPE_UTILITY, |
+ |
+ // GPU process. |
+ SANDBOX_TYPE_GPU, |
+ |
+ // The PPAPI plugin process. |
+ SANDBOX_TYPE_PPAPI, |
+ |
+ SANDBOX_TYPE_AFTER_LAST_TYPE, // Placeholder to ease iteration. |
+}; |
+ |
+} // namespace content |
+ |
+#endif // CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ |