Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(229)

Side by Side Diff: content/public/common/sandboxed_process_launcher_delegate.h

Issue 303293002: Initialize the bootstrap sandbox in the browser process. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rename constant Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
7 7
8 #include "base/environment.h" 8 #include "base/environment.h"
9 #include "base/process/process.h" 9 #include "base/process/process.h"
10 10
11 #include "content/common/content_export.h" 11 #include "content/common/content_export.h"
12 12
13 #if defined(OS_MACOSX)
14 #include "content/public/common/sandbox_type_mac.h"
15 #endif
16
13 namespace base { 17 namespace base {
14 class FilePath; 18 class FilePath;
15 } 19 }
16 20
17 namespace sandbox { 21 namespace sandbox {
18 class TargetPolicy; 22 class TargetPolicy;
19 } 23 }
20 24
21 namespace content { 25 namespace content {
22 26
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
55 #elif defined(OS_POSIX) 59 #elif defined(OS_POSIX)
56 // Override this to return true to use the setuid sandbox. 60 // Override this to return true to use the setuid sandbox.
57 virtual bool ShouldUseZygote(); 61 virtual bool ShouldUseZygote();
58 62
59 // Override this if the process needs a non-empty environment map. 63 // Override this if the process needs a non-empty environment map.
60 virtual base::EnvironmentMap GetEnvironment(); 64 virtual base::EnvironmentMap GetEnvironment();
61 65
62 // Return the file descriptor for the IPC channel. 66 // Return the file descriptor for the IPC channel.
63 virtual int GetIpcFd() = 0; 67 virtual int GetIpcFd() = 0;
64 68
69 #if defined(OS_MACOSX)
70 // Gets the Mac SandboxType to enforce on the process. Return
71 // SANDBOX_TYPE_INVALID for no sandbox policy.
72 virtual SandboxType GetSandboxType();
73 #endif
74
65 #endif 75 #endif
66 }; 76 };
67 77
68 } // namespace content 78 } // namespace content
69 79
70 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 80 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
OLDNEW
« no previous file with comments | « content/public/common/sandbox_type_mac.h ('k') | content/public/common/sandboxed_process_launcher_delegate.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698