Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1700)

Side by Side Diff: content/common/sandbox_mac.mm

Issue 449333002: Remove shared worker process related codes. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/common/sandbox_mac.h" 5 #include "content/common/sandbox_mac.h"
6 6
7 #import <Cocoa/Cocoa.h> 7 #import <Cocoa/Cocoa.h>
8 8
9 #include <CoreFoundation/CFTimeZone.h> 9 #include <CoreFoundation/CFTimeZone.h>
10 extern "C" { 10 extern "C" {
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
46 46
47 struct SandboxTypeToResourceIDMapping { 47 struct SandboxTypeToResourceIDMapping {
48 SandboxType sandbox_type; 48 SandboxType sandbox_type;
49 int sandbox_profile_resource_id; 49 int sandbox_profile_resource_id;
50 }; 50 };
51 51
52 // Mapping from sandbox process types to resource IDs containing the sandbox 52 // Mapping from sandbox process types to resource IDs containing the sandbox
53 // profile for all process types known to content. 53 // profile for all process types known to content.
54 SandboxTypeToResourceIDMapping kDefaultSandboxTypeToResourceIDMapping[] = { 54 SandboxTypeToResourceIDMapping kDefaultSandboxTypeToResourceIDMapping[] = {
55 { SANDBOX_TYPE_RENDERER, IDR_RENDERER_SANDBOX_PROFILE }, 55 { SANDBOX_TYPE_RENDERER, IDR_RENDERER_SANDBOX_PROFILE },
56 { SANDBOX_TYPE_WORKER, IDR_WORKER_SANDBOX_PROFILE },
57 { SANDBOX_TYPE_UTILITY, IDR_UTILITY_SANDBOX_PROFILE }, 56 { SANDBOX_TYPE_UTILITY, IDR_UTILITY_SANDBOX_PROFILE },
58 { SANDBOX_TYPE_GPU, IDR_GPU_SANDBOX_PROFILE }, 57 { SANDBOX_TYPE_GPU, IDR_GPU_SANDBOX_PROFILE },
59 { SANDBOX_TYPE_PPAPI, IDR_PPAPI_SANDBOX_PROFILE }, 58 { SANDBOX_TYPE_PPAPI, IDR_PPAPI_SANDBOX_PROFILE },
60 }; 59 };
61 60
62 COMPILE_ASSERT(arraysize(kDefaultSandboxTypeToResourceIDMapping) == \ 61 COMPILE_ASSERT(arraysize(kDefaultSandboxTypeToResourceIDMapping) == \
63 size_t(SANDBOX_TYPE_AFTER_LAST_TYPE), \ 62 size_t(SANDBOX_TYPE_AFTER_LAST_TYPE), \
64 sandbox_type_to_resource_id_mapping_incorrect); 63 sandbox_type_to_resource_id_mapping_incorrect);
65 64
66 // Try to escape |c| as a "SingleEscapeCharacter" (\n, etc). If successful, 65 // Try to escape |c| as a "SingleEscapeCharacter" (\n, etc). If successful,
(...skipping 547 matching lines...) Expand 10 before | Expand all | Expand 10 after
614 if (HANDLE_EINTR(fcntl(fd.get(), F_GETPATH, canonical_path)) != 0) { 613 if (HANDLE_EINTR(fcntl(fd.get(), F_GETPATH, canonical_path)) != 0) {
615 DPLOG(FATAL) << "GetCanonicalSandboxPath() failed for: " 614 DPLOG(FATAL) << "GetCanonicalSandboxPath() failed for: "
616 << path.value(); 615 << path.value();
617 return path; 616 return path;
618 } 617 }
619 618
620 return base::FilePath(canonical_path); 619 return base::FilePath(canonical_path);
621 } 620 }
622 621
623 } // namespace content 622 } // namespace content
OLDNEW
« no previous file with comments | « content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc ('k') | content/content_resources.grd » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698