Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(189)

Side by Side Diff: content/public/common/sandbox_init.h

Issue 12805004: Remove mention of the nacl process in content. (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: Created 7 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « content/public/browser/content_browser_client.h ('k') | content/public/common/sandbox_init.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
6 #define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ 6 #define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
7 7
8 #include "base/process.h" 8 #include "base/process.h"
9 #include "build/build_config.h" 9 #include "build/build_config.h"
10 #include "content/common/content_export.h" 10 #include "content/common/content_export.h"
11 #include "ipc/ipc_platform_file.h"
12 11
13 class CommandLine; 12 class CommandLine;
14 13
15 namespace base { 14 namespace base {
16 class FilePath; 15 class FilePath;
17 } 16 }
18 17
19 namespace sandbox { 18 namespace sandbox {
20 struct SandboxInterfaceInfo; 19 struct SandboxInterfaceInfo;
21 } 20 }
22 21
23 namespace content { 22 namespace content {
23 class SandboxedProcessLauncherDelegate;
24 24
25 #if defined(OS_WIN) 25 #if defined(OS_WIN)
26 26
27 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in 27 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in
28 // processes, depending on the command line flags. Although The browser process 28 // processes, depending on the command line flags. Although The browser process
29 // is not sandboxed, this also needs to be called because it will initialize 29 // is not sandboxed, this also needs to be called because it will initialize
30 // the broker code. 30 // the broker code.
31 // Returns true if the sandbox was initialized succesfully, false if an error 31 // Returns true if the sandbox was initialized succesfully, false if an error
32 // occurred. If process_type isn't one that needs sandboxing true is always 32 // occurred. If process_type isn't one that needs sandboxing true is always
33 // returned. 33 // returned.
(...skipping 12 matching lines...) Expand all
46 46
47 // Inform the current process's sandbox broker (e.g. the broker for 47 // Inform the current process's sandbox broker (e.g. the broker for
48 // 32-bit processes) about a process created under a different sandbox 48 // 32-bit processes) about a process created under a different sandbox
49 // broker (e.g. the broker for 64-bit processes). This allows 49 // broker (e.g. the broker for 64-bit processes). This allows
50 // BrokerDuplicateHandle() to send handles to a process managed by 50 // BrokerDuplicateHandle() to send handles to a process managed by
51 // another broker. For example, it allows the 32-bit renderer to send 51 // another broker. For example, it allows the 32-bit renderer to send
52 // handles to 64-bit NaCl processes. This returns true on success, 52 // handles to 64-bit NaCl processes. This returns true on success,
53 // false otherwise. 53 // false otherwise.
54 CONTENT_EXPORT bool BrokerAddTargetPeer(HANDLE peer_process); 54 CONTENT_EXPORT bool BrokerAddTargetPeer(HANDLE peer_process);
55 55
56 // Starts a sandboxed process with the given directory unsandboxed 56 // Launch a sandboxed process. |delegate| may be NULL. If |delegate| is non-NULL
57 // and returns a handle to it. 57 // then it just has to outlive this method call.
58 CONTENT_EXPORT base::ProcessHandle StartProcessWithAccess( 58 CONTENT_EXPORT base::ProcessHandle StartSandboxedProcess(
59 CommandLine* cmd_line, 59 SandboxedProcessLauncherDelegate* delegate,
60 const base::FilePath& exposed_dir); 60 CommandLine* cmd_line);
61 61
62 #elif defined(OS_MACOSX) 62 #elif defined(OS_MACOSX)
63 63
64 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a 64 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a
65 // directory to allow access to. Note specifying a directory needs to be 65 // directory to allow access to. Note specifying a directory needs to be
66 // supported by the sandbox profile associated with the given |sandbox_type|. 66 // supported by the sandbox profile associated with the given |sandbox_type|.
67 // Valid values for |sandbox_type| are defined either by the enum SandboxType, 67 // Valid values for |sandbox_type| are defined either by the enum SandboxType,
68 // or by ContentClient::GetSandboxProfileForSandboxType(). 68 // or by ContentClient::GetSandboxProfileForSandboxType().
69 // 69 //
70 // If the |sandbox_type| isn't one of the ones defined by content then the 70 // If the |sandbox_type| isn't one of the ones defined by content then the
(...skipping 15 matching lines...) Expand all
86 // switches. TODO(jln): switch to a model where the caller chooses a sandbox 86 // switches. TODO(jln): switch to a model where the caller chooses a sandbox
87 // type. 87 // type.
88 // This should be called before any additional thread has been created. 88 // This should be called before any additional thread has been created.
89 // 89 //
90 // Returns true if a sandbox has been initialized successfully, false 90 // Returns true if a sandbox has been initialized successfully, false
91 // otherwise. 91 // otherwise.
92 CONTENT_EXPORT bool InitializeSandbox(); 92 CONTENT_EXPORT bool InitializeSandbox();
93 93
94 #endif 94 #endif
95 95
96 // Platform neutral wrapper for making an exact copy of a handle for use in
97 // the target process. On Windows this wraps BrokerDuplicateHandle() with the
98 // DUPLICATE_SAME_ACCESS flag. On posix it behaves essentially the same as
99 // IPC::GetFileHandleForProcess()
100 CONTENT_EXPORT IPC::PlatformFileForTransit BrokerGetFileHandleForProcess(
101 base::PlatformFile handle,
102 base::ProcessId target_process_id,
103 bool should_close_source);
104
105 } // namespace content 96 } // namespace content
106 97
107 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ 98 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
OLDNEW
« no previous file with comments | « content/public/browser/content_browser_client.h ('k') | content/public/common/sandbox_init.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698