Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(140)

Side by Side Diff: content/common/sandbox_init_mac.h

Issue 1313533003: Fix some extern usage in .cc files. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 5 #ifndef CONTENT_COMMON_SANDBOX_INIT_MAC_H_
6 #define CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 6 #define CONTENT_COMMON_SANDBOX_INIT_MAC_H_
7 7
8 namespace content { 8 namespace content {
9 9
10 // Initialize the sandbox for renderer, gpu, utility, worker, and plugin 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plugin
11 // processes, depending on the command line flags. For the browser process which 11 // processes, depending on the command line flags. For the browser process which
12 // is not sandboxed, this call is a no-op. 12 // is not sandboxed, this call is a no-op.
13 // Returns true if the sandbox was initialized succesfully, false if an error 13 // Returns true if the sandbox was initialized succesfully, false if an error
14 // occurred. If process_type isn't one that needs sandboxing, true is always 14 // occurred. If process_type isn't one that needs sandboxing, true is always
15 // returned. 15 // returned.
16 bool InitializeSandbox(); 16 bool InitializeSandbox();
17 17
18 // The bootstrap server name of the real bootstrap port. This is never used
19 // with bootstrap_register, but is instead used with a POLICY_SUBSTITUTE_PORT
20 // in the bootstrap sandbox. In child processes, the the launchd/bootstrap
21 // sandbox will have replaced the bootstrap port with one controlled by the
22 // interception server. This server name can be used to request the original
23 // server, from the browser, in NPAPI plugins.
24 extern const char kBootstrapPortNameForNPAPIPlugins[];
25
26 } // namespace content 18 } // namespace content
27 19
28 #endif // CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 20 #endif // CONTENT_COMMON_SANDBOX_INIT_MAC_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698