OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ | 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ |
6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ | 6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ |
7 | 7 |
8 #include <cstddef> | 8 #include <cstddef> |
9 | 9 |
10 #include "base/environment.h" | 10 #include "base/environment.h" |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
54 virtual void PostSpawnTarget(base::ProcessHandle process) {} | 54 virtual void PostSpawnTarget(base::ProcessHandle process) {} |
55 | 55 |
56 #elif defined(OS_POSIX) | 56 #elif defined(OS_POSIX) |
57 #if !defined(OS_MACOSX) && !defined(OS_ANDROID) | 57 #if !defined(OS_MACOSX) && !defined(OS_ANDROID) |
58 // Override this to return true to use the setuid sandbox. | 58 // Override this to return true to use the setuid sandbox. |
59 virtual ZygoteHandle* GetZygote(); | 59 virtual ZygoteHandle* GetZygote(); |
60 #endif // !defined(OS_MACOSX) && !defined(OS_ANDROID) | 60 #endif // !defined(OS_MACOSX) && !defined(OS_ANDROID) |
61 | 61 |
62 // Override this if the process needs a non-empty environment map. | 62 // Override this if the process needs a non-empty environment map. |
63 virtual base::EnvironmentMap GetEnvironment(); | 63 virtual base::EnvironmentMap GetEnvironment(); |
64 | |
65 // Return the file descriptor for the IPC channel. | |
66 virtual base::ScopedFD TakeIpcFd() = 0; | |
67 #endif | 64 #endif |
68 | 65 |
69 // Returns the SandboxType to enforce on the process, or SANDBOX_TYPE_INVALID | 66 // Returns the SandboxType to enforce on the process, or SANDBOX_TYPE_INVALID |
70 // for no sandbox policy. | 67 // for no sandbox policy. |
71 virtual SandboxType GetSandboxType(); | 68 virtual SandboxType GetSandboxType(); |
72 }; | 69 }; |
73 | 70 |
74 } // namespace content | 71 } // namespace content |
75 | 72 |
76 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ | 73 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ |
OLD | NEW |