Index: content/browser/bootstrap_sandbox_mac.cc |
diff --git a/content/browser/bootstrap_sandbox_mac.cc b/content/browser/bootstrap_sandbox_mac.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..c0bb6f811781e67d9a4e1536dc68c3258ac51a12 |
--- /dev/null |
+++ b/content/browser/bootstrap_sandbox_mac.cc |
@@ -0,0 +1,96 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "content/browser/bootstrap_sandbox_mac.h" |
+ |
+#include "base/logging.h" |
+#include "base/mac/mac_util.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "base/memory/singleton.h" |
+#include "content/common/sandbox_init_mac.h" |
+#include "content/public/browser/browser_child_process_observer.h" |
+#include "content/public/browser/child_process_data.h" |
+#include "content/public/common/sandbox_type_mac.h" |
+#include "sandbox/mac/bootstrap_sandbox.h" |
+ |
+namespace content { |
+ |
+namespace { |
+ |
+// This class is responsible for creating the BootstrapSandbox global |
+// singleton, as well as registering all associated policies with it. |
+class BootstrapSandboxPolicy : public BrowserChildProcessObserver { |
+ public: |
+ static BootstrapSandboxPolicy* GetInstance(); |
+ |
+ sandbox::BootstrapSandbox* sandbox() const { |
+ return sandbox_.get(); |
+ } |
+ |
+ // BrowserChildProcessObserver: |
+ virtual void BrowserChildProcessHostDisconnected( |
+ const ChildProcessData& data) OVERRIDE; |
+ virtual void BrowserChildProcessCrashed( |
+ const ChildProcessData& data) OVERRIDE; |
+ |
+ private: |
+ friend struct DefaultSingletonTraits<BootstrapSandboxPolicy>; |
+ BootstrapSandboxPolicy(); |
+ virtual ~BootstrapSandboxPolicy(); |
+ |
+ void RegisterSandboxPolicies(); |
+ void RegisterNPAPIPolicy(); |
+ |
+ scoped_ptr<sandbox::BootstrapSandbox> sandbox_; |
+}; |
+ |
+BootstrapSandboxPolicy* BootstrapSandboxPolicy::GetInstance() { |
+ return Singleton<BootstrapSandboxPolicy>::get(); |
+} |
+ |
+void BootstrapSandboxPolicy::BrowserChildProcessHostDisconnected( |
+ const ChildProcessData& data) { |
+ sandbox()->ChildDied(data.handle); |
+} |
+ |
+void BootstrapSandboxPolicy::BrowserChildProcessCrashed( |
+ const ChildProcessData& data) { |
+ sandbox()->ChildDied(data.handle); |
+} |
+ |
+BootstrapSandboxPolicy::BootstrapSandboxPolicy() |
+ : sandbox_(sandbox::BootstrapSandbox::Create()) { |
+ CHECK(sandbox_.get()); |
+ BrowserChildProcessObserver::Add(this); |
+ RegisterSandboxPolicies(); |
+} |
+ |
+BootstrapSandboxPolicy::~BootstrapSandboxPolicy() { |
+ BrowserChildProcessObserver::Remove(this); |
+} |
+ |
+void BootstrapSandboxPolicy::RegisterSandboxPolicies() { |
+ RegisterNPAPIPolicy(); |
+} |
+ |
+void BootstrapSandboxPolicy::RegisterNPAPIPolicy() { |
+ sandbox::BootstrapSandboxPolicy policy; |
+ policy.default_rule = sandbox::Rule(sandbox::POLICY_ALLOW); |
+ policy.rules[kBootstrapPortNameForNPAPIPlugins] = |
+ sandbox::Rule(sandbox_->real_bootstrap_port()); |
+ sandbox_->RegisterSandboxPolicy(SANDBOX_TYPE_NPAPI, policy); |
+} |
+ |
+} // namespace |
+ |
+bool ShouldEnableBootstrapSandbox() { |
+ return base::mac::IsOSMountainLionOrEarlier() || |
+ base::mac::IsOSMavericks(); |
+} |
+ |
+sandbox::BootstrapSandbox* GetBootstrapSandbox() { |
+ return BootstrapSandboxPolicy::GetInstance()->sandbox(); |
+} |
+ |
+} // namespace content |