| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_BROWSER_UTILITY_PROCESS_HOST_H_ | 5 #ifndef CONTENT_BROWSER_UTILITY_PROCESS_HOST_H_ |
| 6 #define CONTENT_BROWSER_UTILITY_PROCESS_HOST_H_ | 6 #define CONTENT_BROWSER_UTILITY_PROCESS_HOST_H_ |
| 7 #pragma once | 7 #pragma once |
| 8 | 8 |
| 9 #include <string> | 9 #include <string> |
| 10 #include <vector> | 10 #include <vector> |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 59 // Starts utility process in batch mode. Caller must call EndBatchMode() | 59 // Starts utility process in batch mode. Caller must call EndBatchMode() |
| 60 // to finish the utility process. | 60 // to finish the utility process. |
| 61 bool StartBatchMode(); | 61 bool StartBatchMode(); |
| 62 | 62 |
| 63 // Ends the utility process. Must be called after StartBatchMode(). | 63 // Ends the utility process. Must be called after StartBatchMode(). |
| 64 void EndBatchMode(); | 64 void EndBatchMode(); |
| 65 | 65 |
| 66 void set_exposed_dir(const FilePath& dir) { exposed_dir_ = dir; } | 66 void set_exposed_dir(const FilePath& dir) { exposed_dir_ = dir; } |
| 67 void set_no_sandbox(bool flag) { no_sandbox_ = flag; } | 67 void set_no_sandbox(bool flag) { no_sandbox_ = flag; } |
| 68 void set_child_flags(int flags) { child_flags_ = flags; } | 68 void set_child_flags(int flags) { child_flags_ = flags; } |
| 69 void set_use_linux_zygote(bool flag) { use_linux_zygote_ = flag; } |
| 69 #if defined(OS_POSIX) | 70 #if defined(OS_POSIX) |
| 70 void set_env(const base::environment_vector& env) { env_ = env; } | 71 void set_env(const base::environment_vector& env) { env_ = env; } |
| 71 #endif | 72 #endif |
| 72 | 73 |
| 73 protected: | 74 protected: |
| 74 // Allow these methods to be overridden for tests. | 75 // Allow these methods to be overridden for tests. |
| 75 virtual FilePath GetUtilityProcessCmd(); | 76 virtual FilePath GetUtilityProcessCmd(); |
| 76 | 77 |
| 77 private: | 78 private: |
| 78 // Starts a process if necessary. Returns true if it succeeded or a process | 79 // Starts a process if necessary. Returns true if it succeeded or a process |
| (...skipping 16 matching lines...) Expand all Loading... |
| 95 // Allows a directory to be opened through the sandbox, in case it's needed by | 96 // Allows a directory to be opened through the sandbox, in case it's needed by |
| 96 // the operation. | 97 // the operation. |
| 97 FilePath exposed_dir_; | 98 FilePath exposed_dir_; |
| 98 | 99 |
| 99 // Whether to pass switches::kNoSandbox to the child. | 100 // Whether to pass switches::kNoSandbox to the child. |
| 100 bool no_sandbox_; | 101 bool no_sandbox_; |
| 101 | 102 |
| 102 // Flags defined in ChildProcessHost with which to start the process. | 103 // Flags defined in ChildProcessHost with which to start the process. |
| 103 int child_flags_; | 104 int child_flags_; |
| 104 | 105 |
| 106 // If the |no_sandbox_| flag is off, and we are on Linux, launch the |
| 107 // utility process from the zygote. Defaults to false. |
| 108 // Can only be used for tasks that do not require FS access. |
| 109 bool use_linux_zygote_; |
| 110 |
| 105 base::environment_vector env_; | 111 base::environment_vector env_; |
| 106 | 112 |
| 107 bool started_; | 113 bool started_; |
| 108 | 114 |
| 109 DISALLOW_COPY_AND_ASSIGN(UtilityProcessHost); | 115 DISALLOW_COPY_AND_ASSIGN(UtilityProcessHost); |
| 110 }; | 116 }; |
| 111 | 117 |
| 112 #endif // CONTENT_BROWSER_UTILITY_PROCESS_HOST_H_ | 118 #endif // CONTENT_BROWSER_UTILITY_PROCESS_HOST_H_ |
| OLD | NEW |