Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ | 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ |
| 6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ | 6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ |
| 7 | 7 |
| 8 #include "base/environment.h" | |
| 8 #include "base/process/process.h" | 9 #include "base/process/process.h" |
| 9 | 10 |
| 11 #include "content/common/content_export.h" | |
| 12 | |
| 10 namespace base { | 13 namespace base { |
| 11 class FilePath; | 14 class FilePath; |
| 12 } | 15 } |
| 13 | 16 |
| 14 namespace sandbox { | 17 namespace sandbox { |
| 15 class TargetPolicy; | 18 class TargetPolicy; |
| 16 } | 19 } |
| 17 | 20 |
| 18 namespace content { | 21 namespace content { |
| 19 | 22 |
| 20 // Allows a caller of StartSandboxedProcess or | 23 // Allows a caller of StartSandboxedProcess or |
| 21 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, | 24 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, |
| 22 // i.e. to loosen it if needed. | 25 // i.e. to loosen it if needed. |
| 23 // The methods below will be called on the PROCESS_LAUNCHER thread. | 26 // The methods below will be called on the PROCESS_LAUNCHER thread. |
| 24 class SandboxedProcessLauncherDelegate { | 27 class CONTENT_EXPORT SandboxedProcessLauncherDelegate { |
| 25 public: | 28 public: |
| 26 virtual ~SandboxedProcessLauncherDelegate() {} | 29 virtual ~SandboxedProcessLauncherDelegate() { |
| 30 } | |
|
jam
2014/02/26 19:47:52
nit: keep on one line as before, that's the conven
aberent
2014/02/28 08:51:07
Done.
| |
| 31 | |
| 32 #if defined(OS_WIN) | |
| 33 // Override to return true if the process should be launched as an elevated | |
| 34 // process (which implies no sandbox). | |
| 35 virtual bool LaunchElevated(); | |
|
jam
2014/02/26 19:47:52
nit: LaunchElevated could be confused in that cont
aberent
2014/02/28 08:51:07
Done.
| |
| 27 | 36 |
| 28 // By default, the process is launched sandboxed. Override this method and set | 37 // By default, the process is launched sandboxed. Override this method and set |
| 29 // |in_sandbox| to false if this process should be launched without a sandbox | 38 // |in_sandbox| to false if this process should be launched without a sandbox |
| 30 // (i.e. through base::LaunchProcess directly). | 39 // (i.e. through base::LaunchProcess directly). |
| 31 virtual void ShouldSandbox(bool* in_sandbox) {} | 40 virtual void ShouldSandbox(bool* in_sandbox) {} |
|
jam
2014/02/26 22:45:14
oh i forgot to mention, I had added this method th
aberent
2014/02/28 08:51:07
Done.
| |
| 32 | 41 |
| 33 // Called before the default sandbox is applied. If the default policy is too | 42 // Called before the default sandbox is applied. If the default policy is too |
| 34 // restrictive, the caller should set |disable_default_policy| to true and | 43 // restrictive, the caller should set |disable_default_policy| to true and |
| 35 // apply their policy in PreSpawnTarget. |exposed_dir| is used to allow a | 44 // apply their policy in PreSpawnTarget. |exposed_dir| is used to allow a |
| 36 //directory through the sandbox. | 45 //directory through the sandbox. |
| 37 virtual void PreSandbox(bool* disable_default_policy, | 46 virtual void PreSandbox(bool* disable_default_policy, |
| 38 base::FilePath* exposed_dir) {} | 47 base::FilePath* exposed_dir) {} |
| 39 | 48 |
| 40 // Called right before spawning the process. | 49 // Called right before spawning the process. |
| 41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, | 50 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, |
| 42 bool* success) {} | 51 bool* success) {} |
| 43 | 52 |
| 44 // Called right after the process is launched, but before its thread is run. | 53 // Called right after the process is launched, but before its thread is run. |
| 45 virtual void PostSpawnTarget(base::ProcessHandle process) {} | 54 virtual void PostSpawnTarget(base::ProcessHandle process) {} |
| 55 | |
| 56 #elif defined(OS_POSIX) | |
| 57 // Override this to return true to use the setuid sandbox. | |
| 58 virtual bool UseZygote(); | |
|
jam
2014/02/26 19:47:52
nit: ditto re naming, this should be ShouldUseZygo
aberent
2014/02/28 08:51:07
Done.
| |
| 59 | |
| 60 // Override this if the process needs a non-empty environment map. | |
| 61 virtual base::EnvironmentMap GetEnvironment(); | |
| 62 | |
| 63 // Return the File descriptor for the IPC channel. | |
| 64 virtual int IpcFd() = 0; | |
|
jam
2014/02/26 19:47:52
nit: GetIPCFD
aberent
2014/02/28 08:51:07
Done.
| |
| 65 | |
| 66 #endif | |
| 46 }; | 67 }; |
| 47 | 68 |
| 48 } // namespace content | 69 } // namespace content |
| 49 | 70 |
| 50 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ | 71 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ |
| OLD | NEW |