Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(675)

Side by Side Diff: content/public/common/sandboxed_process_launcher_delegate.h

Issue 177863002: Refactor configuration of sandboxes - first steps (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix remaining nits and rebase Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
7 7
8 #include "base/environment.h"
8 #include "base/process/process.h" 9 #include "base/process/process.h"
9 10
11 #include "content/common/content_export.h"
12
10 namespace base { 13 namespace base {
11 class FilePath; 14 class FilePath;
12 } 15 }
13 16
14 namespace sandbox { 17 namespace sandbox {
15 class TargetPolicy; 18 class TargetPolicy;
16 } 19 }
17 20
18 namespace content { 21 namespace content {
19 22
20 // Allows a caller of StartSandboxedProcess or 23 // Allows a caller of StartSandboxedProcess or
21 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, 24 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy,
22 // i.e. to loosen it if needed. 25 // i.e. to loosen it if needed.
23 // The methods below will be called on the PROCESS_LAUNCHER thread. 26 // The methods below will be called on the PROCESS_LAUNCHER thread.
24 class SandboxedProcessLauncherDelegate { 27 class CONTENT_EXPORT SandboxedProcessLauncherDelegate {
25 public: 28 public:
26 virtual ~SandboxedProcessLauncherDelegate() {} 29 virtual ~SandboxedProcessLauncherDelegate() {}
27 30
28 // By default, the process is launched sandboxed. Override this method and set 31 #if defined(OS_WIN)
29 // |in_sandbox| to false if this process should be launched without a sandbox 32 // Override to return true if the process should be launched as an elevated
33 // process (which implies no sandbox).
34 virtual bool ShouldLaunchElevated();
35
36 // By default, the process is launched sandboxed. Override this method to
37 // return false if the process should be launched without a sandbox
30 // (i.e. through base::LaunchProcess directly). 38 // (i.e. through base::LaunchProcess directly).
31 virtual void ShouldSandbox(bool* in_sandbox) {} 39 virtual bool ShouldSandbox();
32 40
33 // Called before the default sandbox is applied. If the default policy is too 41 // Called before the default sandbox is applied. If the default policy is too
34 // restrictive, the caller should set |disable_default_policy| to true and 42 // restrictive, the caller should set |disable_default_policy| to true and
35 // apply their policy in PreSpawnTarget. |exposed_dir| is used to allow a 43 // apply their policy in PreSpawnTarget. |exposed_dir| is used to allow a
36 //directory through the sandbox. 44 //directory through the sandbox.
37 virtual void PreSandbox(bool* disable_default_policy, 45 virtual void PreSandbox(bool* disable_default_policy,
38 base::FilePath* exposed_dir) {} 46 base::FilePath* exposed_dir) {}
39 47
40 // Called right before spawning the process. 48 // Called right before spawning the process.
41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, 49 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
42 bool* success) {} 50 bool* success) {}
43 51
44 // Called right after the process is launched, but before its thread is run. 52 // Called right after the process is launched, but before its thread is run.
45 virtual void PostSpawnTarget(base::ProcessHandle process) {} 53 virtual void PostSpawnTarget(base::ProcessHandle process) {}
54
55 #elif defined(OS_POSIX)
56 // Override this to return true to use the setuid sandbox.
57 virtual bool ShouldUseZygote();
58
59 // Override this if the process needs a non-empty environment map.
60 virtual base::EnvironmentMap GetEnvironment();
61
62 // Return the file descriptor for the IPC channel.
63 virtual int GetIpcFd() = 0;
64
65 #endif
46 }; 66 };
47 67
48 } // namespace content 68 } // namespace content
49 69
50 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 70 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
OLDNEW
« no previous file with comments | « content/public/browser/browser_child_process_host.h ('k') | content/public/common/sandboxed_process_launcher_delegate.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698