Index: content/public/common/sandbox_init.h |
=================================================================== |
--- content/public/common/sandbox_init.h (revision 188735) |
+++ content/public/common/sandbox_init.h (working copy) |
@@ -5,6 +5,7 @@ |
#ifndef CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ |
#define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ |
+#include "base/callback_forward.h" |
#include "base/process.h" |
#include "build/build_config.h" |
#include "content/common/content_export.h" |
@@ -17,6 +18,7 @@ |
} |
namespace sandbox { |
+class TargetPolicy; |
struct SandboxInterfaceInfo; |
} |
@@ -59,6 +61,17 @@ |
CommandLine* cmd_line, |
const base::FilePath& exposed_dir); |
+// Allows an embeddder to modify the security policy used for the sandboxxed |
+// process. |
+// TODO(jam): this should be on ContentClient instead of a static, but it's done |
+// this way since chrome_nacl_win64 needs this but doesn't pull in |
+// ContentClient. Once we don't have the chrome_nacl_win64 target, we can move |
+// this to ContentClient. |
+typedef base::Callback<void(CommandLine*, sandbox::TargetPolicy*)> |
+ SandboxedProcessStartingCallback; |
+CONTENT_EXPORT void SetSandboxedProcessStartingCallback( |
+ const SandboxedProcessStartingCallback& callback); |
+ |
#elif defined(OS_MACOSX) |
// Initialize the sandbox of the given |sandbox_type|, optionally specifying a |