Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(555)

Unified Diff: content/public/common/sandbox_init.h

Issue 12805004: Remove mention of the nacl process in content. (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: fix chrome_frame_net_tests and sync Created 7 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« content/common/sandbox_policy.cc ('K') | « content/common/sandbox_policy.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/public/common/sandbox_init.h
===================================================================
--- content/public/common/sandbox_init.h (revision 188735)
+++ content/public/common/sandbox_init.h (working copy)
@@ -5,6 +5,7 @@
#ifndef CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
#define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
+#include "base/callback_forward.h"
#include "base/process.h"
#include "build/build_config.h"
#include "content/common/content_export.h"
@@ -17,6 +18,7 @@
}
namespace sandbox {
+class TargetPolicy;
struct SandboxInterfaceInfo;
}
@@ -59,6 +61,17 @@
CommandLine* cmd_line,
const base::FilePath& exposed_dir);
+// Allows an embeddder to modify the security policy used for the sandboxxed
+// process.
+// TODO(jam): this should be on ContentClient instead of a static, but it's done
+// this way since chrome_nacl_win64 needs this but doesn't pull in
+// ContentClient. Once we don't have the chrome_nacl_win64 target, we can move
+// this to ContentClient.
+typedef base::Callback<void(CommandLine*, sandbox::TargetPolicy*)>
+ SandboxedProcessStartingCallback;
+CONTENT_EXPORT void SetSandboxedProcessStartingCallback(
+ const SandboxedProcessStartingCallback& callback);
+
#elif defined(OS_MACOSX)
// Initialize the sandbox of the given |sandbox_type|, optionally specifying a
« content/common/sandbox_policy.cc ('K') | « content/common/sandbox_policy.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698