| Index: sandbox/mac/pre_exec_delegate.h
|
| diff --git a/sandbox/mac/pre_exec_delegate.h b/sandbox/mac/pre_exec_delegate.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..86bf8665430d0a65935a78aa8acabb4d92190211
|
| --- /dev/null
|
| +++ b/sandbox/mac/pre_exec_delegate.h
|
| @@ -0,0 +1,34 @@
|
| +// Copyright 2015 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef SANDBOX_MAC_PRE_EXEC_DELEGATE_H_
|
| +#define SANDBOX_MAC_PRE_EXEC_DELEGATE_H_
|
| +
|
| +#include "base/process/launch.h"
|
| +
|
| +namespace sandbox {
|
| +
|
| +// This PreExecDelegate will communicate with the BootstrapSandbox running
|
| +// the Mach server registered under |sandbox_server_bootstrap_name|. It will
|
| +// check in with th BootstrapSandbox using the |sandbox_token| and will
|
| +// replace the task's bootstrap port with one provided by the sandbox.
|
| +class PreExecDelegate : public base::LaunchOptions::PreExecDelegate {
|
| + public:
|
| + PreExecDelegate(const std::string& sandbox_server_bootstrap_name,
|
| + uint64_t sandbox_token);
|
| + ~PreExecDelegate() override;
|
| +
|
| + void RunAsyncSafe() override;
|
| +
|
| + private:
|
| + const std::string sandbox_server_bootstrap_name_;
|
| + const char* const sandbox_server_bootstrap_name_ptr_;
|
| + const uint64_t sandbox_token_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(PreExecDelegate);
|
| +};
|
| +
|
| +} // namespace sandbox
|
| +
|
| +#endif // SANDBOX_MAC_PRE_EXEC_DELEGATE_H_
|
|
|