| Index: content/public/common/sandbox_init.h
|
| ===================================================================
|
| --- content/public/common/sandbox_init.h (revision 188735)
|
| +++ content/public/common/sandbox_init.h (working copy)
|
| @@ -5,6 +5,7 @@
|
| #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
|
| #define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
|
|
|
| +#include "base/callback_forward.h"
|
| #include "base/process.h"
|
| #include "build/build_config.h"
|
| #include "content/common/content_export.h"
|
| @@ -17,6 +18,7 @@
|
| }
|
|
|
| namespace sandbox {
|
| +class TargetPolicy;
|
| struct SandboxInterfaceInfo;
|
| }
|
|
|
| @@ -59,6 +61,17 @@
|
| CommandLine* cmd_line,
|
| const base::FilePath& exposed_dir);
|
|
|
| +// Allows an embeddder to modify the security policy used for the sandboxxed
|
| +// process.
|
| +// TODO(jam): this should be on ContentClient instead of a static, but it's done
|
| +// this way since chrome_nacl_win64 needs this but doesn't pull in
|
| +// ContentClient. Once we don't have the chrome_nacl_win64 target, we can move
|
| +// this to ContentClient.
|
| +typedef base::Callback<void(CommandLine*, sandbox::TargetPolicy*)>
|
| + SandboxedProcessStartingCallback;
|
| +CONTENT_EXPORT void SetSandboxedProcessStartingCallback(
|
| + const SandboxedProcessStartingCallback& callback);
|
| +
|
| #elif defined(OS_MACOSX)
|
|
|
| // Initialize the sandbox of the given |sandbox_type|, optionally specifying a
|
|
|