| Index: content/browser/utility_process_host_impl.cc
|
| diff --git a/content/browser/utility_process_host_impl.cc b/content/browser/utility_process_host_impl.cc
|
| index 7e7f3aa04c8e746ad5796a9dbf362bc0086681db..ae5efd2eff8914712c150e09bf73e880b14955de 100644
|
| --- a/content/browser/utility_process_host_impl.cc
|
| +++ b/content/browser/utility_process_host_impl.cc
|
| @@ -41,11 +41,6 @@
|
| #include "content/public/browser/zygote_handle_linux.h"
|
| #endif // defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_MACOSX)
|
|
|
| -#if defined(OS_WIN)
|
| -#include "sandbox/win/src/sandbox_policy.h"
|
| -#include "sandbox/win/src/sandbox_types.h"
|
| -#endif
|
| -
|
| namespace content {
|
|
|
| #if defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_MACOSX)
|
| @@ -81,21 +76,7 @@ class UtilitySandboxedProcessLauncherDelegate
|
| bool ShouldLaunchElevated() override { return launch_elevated_; }
|
|
|
| bool PreSpawnTarget(sandbox::TargetPolicy* policy) override {
|
| - if (exposed_dir_.empty())
|
| - return true;
|
| -
|
| - sandbox::ResultCode result;
|
| - result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES,
|
| - sandbox::TargetPolicy::FILES_ALLOW_ANY,
|
| - exposed_dir_.value().c_str());
|
| - if (result != sandbox::SBOX_ALL_OK)
|
| - return false;
|
| -
|
| - base::FilePath exposed_files = exposed_dir_.AppendASCII("*");
|
| - result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES,
|
| - sandbox::TargetPolicy::FILES_ALLOW_ANY,
|
| - exposed_files.value().c_str());
|
| - return result == sandbox::SBOX_ALL_OK;
|
| + return true;
|
| }
|
|
|
| #elif defined(OS_POSIX)
|
|
|