Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(28)

Side by Side Diff: content/public/common/sandboxed_process_launcher_delegate.h

Issue 303293002: Initialize the bootstrap sandbox in the browser process. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Merge bootstrap-child-proc branch Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 6 #define CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
7 7
8 #include "base/environment.h" 8 #include "base/environment.h"
9 #include "base/process/process.h" 9 #include "base/process/process.h"
10 10
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after
55 #elif defined(OS_POSIX) 55 #elif defined(OS_POSIX)
56 // Override this to return true to use the setuid sandbox. 56 // Override this to return true to use the setuid sandbox.
57 virtual bool ShouldUseZygote(); 57 virtual bool ShouldUseZygote();
58 58
59 // Override this if the process needs a non-empty environment map. 59 // Override this if the process needs a non-empty environment map.
60 virtual base::EnvironmentMap GetEnvironment(); 60 virtual base::EnvironmentMap GetEnvironment();
61 61
62 // Return the file descriptor for the IPC channel. 62 // Return the file descriptor for the IPC channel.
63 virtual int GetIpcFd() = 0; 63 virtual int GetIpcFd() = 0;
64 64
65 #if defined(OS_MACOSX)
66 // Gets the Mac SandboxType to enforce on the process. Return -1 for no
Mark Mentovai 2014/05/30 21:01:13 What’s a SandboxType? It’s just a registered polic
Robert Sesek 2014/05/30 21:05:11 Yes, it is: https://code.google.com/p/chromium/co
jam 2014/05/30 21:11:55 can this be SandboxType instead of "int" then?
Robert Sesek 2014/05/30 21:17:35 Yeah, if I add an INVALID enum value. Done.
67 // sandbox policy.
68 virtual int GetSandboxType();
69 #endif
70
65 #endif 71 #endif
66 }; 72 };
67 73
68 } // namespace content 74 } // namespace content
69 75
70 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_ 76 #endif // CONTENT_PUBLIC_COMMON_SANDBOXED_PROCESS_LAUNCHER_DELEGATE_H_
OLDNEW
« no previous file with comments | « content/content_browser.gypi ('k') | content/public/common/sandboxed_process_launcher_delegate.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698