Index: mojo/shell/runner/host/linux_sandbox.h |
diff --git a/mojo/shell/runner/host/linux_sandbox.h b/mojo/shell/runner/host/linux_sandbox.h |
deleted file mode 100644 |
index df81cf4d7ef59016db1319ab07ec0670c2b7c21d..0000000000000000000000000000000000000000 |
--- a/mojo/shell/runner/host/linux_sandbox.h |
+++ /dev/null |
@@ -1,53 +0,0 @@ |
-// Copyright 2015 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef MOJO_SHELL_RUNNER_HOST_LINUX_SANDBOX_H_ |
-#define MOJO_SHELL_RUNNER_HOST_LINUX_SANDBOX_H_ |
- |
-#include <memory> |
- |
-#include "base/files/scoped_file.h" |
-#include "base/macros.h" |
-#include "sandbox/linux/bpf_dsl/bpf_dsl.h" |
-#include "sandbox/linux/bpf_dsl/policy.h" |
-#include "sandbox/linux/syscall_broker/broker_process.h" |
- |
-namespace mojo { |
-namespace shell { |
- |
-// Encapsulates all tasks related to raising the sandbox for mojo runner. |
-class LinuxSandbox { |
- public: |
- explicit LinuxSandbox( |
- const std::vector<sandbox::syscall_broker::BrokerFilePermission>& |
- permissions); |
- ~LinuxSandbox(); |
- |
- // Grabs a file descriptor to /proc. |
- void Warmup(); |
- |
- // Puts the user in a new PID namespace. |
- void EngageNamespaceSandbox(); |
- |
- // Starts a broker process and sets up seccomp-bpf to delegate decisions to |
- // it. |
- void EngageSeccompSandbox(); |
- |
- // Performs the dropping of access to the outside world (drops the reference |
- // to /proc acquired in Warmup(). |
- void Seal(); |
- |
- private: |
- bool warmed_up_; |
- base::ScopedFD proc_fd_; |
- std::unique_ptr<sandbox::syscall_broker::BrokerProcess> broker_; |
- std::unique_ptr<sandbox::bpf_dsl::Policy> policy_; |
- |
- DISALLOW_COPY_AND_ASSIGN(LinuxSandbox); |
-}; |
- |
-} // namespace shell |
-} // namespace mojo |
- |
-#endif // MOJO_SHELL_RUNNER_HOST_LINUX_SANDBOX_H_ |