| Index: content/browser/bootstrap_sandbox_mac.cc
|
| diff --git a/content/browser/bootstrap_sandbox_mac.cc b/content/browser/bootstrap_sandbox_mac.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..c0bb6f811781e67d9a4e1536dc68c3258ac51a12
|
| --- /dev/null
|
| +++ b/content/browser/bootstrap_sandbox_mac.cc
|
| @@ -0,0 +1,96 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "content/browser/bootstrap_sandbox_mac.h"
|
| +
|
| +#include "base/logging.h"
|
| +#include "base/mac/mac_util.h"
|
| +#include "base/memory/scoped_ptr.h"
|
| +#include "base/memory/singleton.h"
|
| +#include "content/common/sandbox_init_mac.h"
|
| +#include "content/public/browser/browser_child_process_observer.h"
|
| +#include "content/public/browser/child_process_data.h"
|
| +#include "content/public/common/sandbox_type_mac.h"
|
| +#include "sandbox/mac/bootstrap_sandbox.h"
|
| +
|
| +namespace content {
|
| +
|
| +namespace {
|
| +
|
| +// This class is responsible for creating the BootstrapSandbox global
|
| +// singleton, as well as registering all associated policies with it.
|
| +class BootstrapSandboxPolicy : public BrowserChildProcessObserver {
|
| + public:
|
| + static BootstrapSandboxPolicy* GetInstance();
|
| +
|
| + sandbox::BootstrapSandbox* sandbox() const {
|
| + return sandbox_.get();
|
| + }
|
| +
|
| + // BrowserChildProcessObserver:
|
| + virtual void BrowserChildProcessHostDisconnected(
|
| + const ChildProcessData& data) OVERRIDE;
|
| + virtual void BrowserChildProcessCrashed(
|
| + const ChildProcessData& data) OVERRIDE;
|
| +
|
| + private:
|
| + friend struct DefaultSingletonTraits<BootstrapSandboxPolicy>;
|
| + BootstrapSandboxPolicy();
|
| + virtual ~BootstrapSandboxPolicy();
|
| +
|
| + void RegisterSandboxPolicies();
|
| + void RegisterNPAPIPolicy();
|
| +
|
| + scoped_ptr<sandbox::BootstrapSandbox> sandbox_;
|
| +};
|
| +
|
| +BootstrapSandboxPolicy* BootstrapSandboxPolicy::GetInstance() {
|
| + return Singleton<BootstrapSandboxPolicy>::get();
|
| +}
|
| +
|
| +void BootstrapSandboxPolicy::BrowserChildProcessHostDisconnected(
|
| + const ChildProcessData& data) {
|
| + sandbox()->ChildDied(data.handle);
|
| +}
|
| +
|
| +void BootstrapSandboxPolicy::BrowserChildProcessCrashed(
|
| + const ChildProcessData& data) {
|
| + sandbox()->ChildDied(data.handle);
|
| +}
|
| +
|
| +BootstrapSandboxPolicy::BootstrapSandboxPolicy()
|
| + : sandbox_(sandbox::BootstrapSandbox::Create()) {
|
| + CHECK(sandbox_.get());
|
| + BrowserChildProcessObserver::Add(this);
|
| + RegisterSandboxPolicies();
|
| +}
|
| +
|
| +BootstrapSandboxPolicy::~BootstrapSandboxPolicy() {
|
| + BrowserChildProcessObserver::Remove(this);
|
| +}
|
| +
|
| +void BootstrapSandboxPolicy::RegisterSandboxPolicies() {
|
| + RegisterNPAPIPolicy();
|
| +}
|
| +
|
| +void BootstrapSandboxPolicy::RegisterNPAPIPolicy() {
|
| + sandbox::BootstrapSandboxPolicy policy;
|
| + policy.default_rule = sandbox::Rule(sandbox::POLICY_ALLOW);
|
| + policy.rules[kBootstrapPortNameForNPAPIPlugins] =
|
| + sandbox::Rule(sandbox_->real_bootstrap_port());
|
| + sandbox_->RegisterSandboxPolicy(SANDBOX_TYPE_NPAPI, policy);
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +bool ShouldEnableBootstrapSandbox() {
|
| + return base::mac::IsOSMountainLionOrEarlier() ||
|
| + base::mac::IsOSMavericks();
|
| +}
|
| +
|
| +sandbox::BootstrapSandbox* GetBootstrapSandbox() {
|
| + return BootstrapSandboxPolicy::GetInstance()->sandbox();
|
| +}
|
| +
|
| +} // namespace content
|
|
|