Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(318)

Side by Side Diff: content/public/common/sandbox_init.h

Issue 196413016: Move CommandLine to base namespace. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « content/public/common/main_function_params.h ('k') | content/public/test/browser_test_base.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
6 #define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ 6 #define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
7 7
8 #include "base/memory/scoped_ptr.h" 8 #include "base/memory/scoped_ptr.h"
9 #include "base/process/process.h" 9 #include "base/process/process.h"
10 #include "build/build_config.h" 10 #include "build/build_config.h"
11 #include "content/common/content_export.h" 11 #include "content/common/content_export.h"
12 12
13 namespace base {
13 class CommandLine; 14 class CommandLine;
14
15 namespace base {
16 class FilePath; 15 class FilePath;
17 } 16 }
18 17
19 namespace sandbox { 18 namespace sandbox {
20 class SandboxBPFPolicy; 19 class SandboxBPFPolicy;
21 struct SandboxInterfaceInfo; 20 struct SandboxInterfaceInfo;
22 } 21 }
23 22
24 namespace content { 23 namespace content {
25 class SandboxedProcessLauncherDelegate; 24 class SandboxedProcessLauncherDelegate;
(...skipping 26 matching lines...) Expand all
52 // BrokerDuplicateHandle() to send handles to a process managed by 51 // BrokerDuplicateHandle() to send handles to a process managed by
53 // another broker. For example, it allows the 32-bit renderer to send 52 // another broker. For example, it allows the 32-bit renderer to send
54 // handles to 64-bit NaCl processes. This returns true on success, 53 // handles to 64-bit NaCl processes. This returns true on success,
55 // false otherwise. 54 // false otherwise.
56 CONTENT_EXPORT bool BrokerAddTargetPeer(HANDLE peer_process); 55 CONTENT_EXPORT bool BrokerAddTargetPeer(HANDLE peer_process);
57 56
58 // Launch a sandboxed process. |delegate| may be NULL. If |delegate| is non-NULL 57 // Launch a sandboxed process. |delegate| may be NULL. If |delegate| is non-NULL
59 // then it just has to outlive this method call. 58 // then it just has to outlive this method call.
60 CONTENT_EXPORT base::ProcessHandle StartSandboxedProcess( 59 CONTENT_EXPORT base::ProcessHandle StartSandboxedProcess(
61 SandboxedProcessLauncherDelegate* delegate, 60 SandboxedProcessLauncherDelegate* delegate,
62 CommandLine* cmd_line); 61 base::CommandLine* cmd_line);
63 62
64 #elif defined(OS_MACOSX) 63 #elif defined(OS_MACOSX)
65 64
66 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a 65 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a
67 // directory to allow access to. Note specifying a directory needs to be 66 // directory to allow access to. Note specifying a directory needs to be
68 // supported by the sandbox profile associated with the given |sandbox_type|. 67 // supported by the sandbox profile associated with the given |sandbox_type|.
69 // Valid values for |sandbox_type| are defined either by the enum SandboxType, 68 // Valid values for |sandbox_type| are defined either by the enum SandboxType,
70 // or by ContentClient::GetSandboxProfileForSandboxType(). 69 // or by ContentClient::GetSandboxProfileForSandboxType().
71 // 70 //
72 // If the |sandbox_type| isn't one of the ones defined by content then the 71 // If the |sandbox_type| isn't one of the ones defined by content then the
(...skipping 18 matching lines...) Expand all
91 90
92 // Return a "baseline" policy. This is used by a SandboxInitializerDelegate to 91 // Return a "baseline" policy. This is used by a SandboxInitializerDelegate to
93 // implement a policy that is derived from the baseline. 92 // implement a policy that is derived from the baseline.
94 CONTENT_EXPORT scoped_ptr<sandbox::SandboxBPFPolicy> 93 CONTENT_EXPORT scoped_ptr<sandbox::SandboxBPFPolicy>
95 GetBPFSandboxBaselinePolicy(); 94 GetBPFSandboxBaselinePolicy();
96 #endif // defined(OS_LINUX) 95 #endif // defined(OS_LINUX)
97 96
98 } // namespace content 97 } // namespace content
99 98
100 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ 99 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_
OLDNEW
« no previous file with comments | « content/public/common/main_function_params.h ('k') | content/public/test/browser_test_base.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698