Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(312)

Unified Diff: content/public/common/sandbox_init.h

Issue 12805004: Remove mention of the nacl process in content. (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: Created 7 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « content/public/browser/content_browser_client.h ('k') | content/public/common/sandbox_init.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/public/common/sandbox_init.h
===================================================================
--- content/public/common/sandbox_init.h (revision 189099)
+++ content/public/common/sandbox_init.h (working copy)
@@ -8,7 +8,6 @@
#include "base/process.h"
#include "build/build_config.h"
#include "content/common/content_export.h"
-#include "ipc/ipc_platform_file.h"
class CommandLine;
@@ -21,6 +20,7 @@
}
namespace content {
+class SandboxedProcessLauncherDelegate;
#if defined(OS_WIN)
@@ -53,11 +53,11 @@
// false otherwise.
CONTENT_EXPORT bool BrokerAddTargetPeer(HANDLE peer_process);
-// Starts a sandboxed process with the given directory unsandboxed
-// and returns a handle to it.
-CONTENT_EXPORT base::ProcessHandle StartProcessWithAccess(
- CommandLine* cmd_line,
- const base::FilePath& exposed_dir);
+// Launch a sandboxed process. |delegate| may be NULL. If |delegate| is non-NULL
+// then it just has to outlive this method call.
+CONTENT_EXPORT base::ProcessHandle StartSandboxedProcess(
+ SandboxedProcessLauncherDelegate* delegate,
+ CommandLine* cmd_line);
#elif defined(OS_MACOSX)
@@ -93,15 +93,6 @@
#endif
-// Platform neutral wrapper for making an exact copy of a handle for use in
-// the target process. On Windows this wraps BrokerDuplicateHandle() with the
-// DUPLICATE_SAME_ACCESS flag. On posix it behaves essentially the same as
-// IPC::GetFileHandleForProcess()
-CONTENT_EXPORT IPC::PlatformFileForTransit BrokerGetFileHandleForProcess(
- base::PlatformFile handle,
- base::ProcessId target_process_id,
- bool should_close_source);
-
} // namespace content
#endif // CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
« no previous file with comments | « content/public/browser/content_browser_client.h ('k') | content/public/common/sandbox_init.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698