Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(23)

Side by Side Diff: content/public/common/sandbox_type_mac.h

Issue 449333002: Remove shared worker process related codes. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « content/public/common/content_switches.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_
6 #define CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ 6 #define CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_
7 7
8 namespace content { 8 namespace content {
9 9
10 // Defines the Mac sandbox types known within content. Embedders can add 10 // Defines the Mac sandbox types known within content. Embedders can add
11 // additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE. 11 // additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE.
12 12
13 enum SandboxType { 13 enum SandboxType {
14 // Not a valid sandbox type. 14 // Not a valid sandbox type.
15 SANDBOX_TYPE_INVALID = -1, 15 SANDBOX_TYPE_INVALID = -1,
16 16
17 SANDBOX_TYPE_FIRST_TYPE = 0, // Placeholder to ease iteration. 17 SANDBOX_TYPE_FIRST_TYPE = 0, // Placeholder to ease iteration.
18 18
19 SANDBOX_TYPE_RENDERER = SANDBOX_TYPE_FIRST_TYPE, 19 SANDBOX_TYPE_RENDERER = SANDBOX_TYPE_FIRST_TYPE,
20 20
21 // The worker process uses the most restrictive sandbox which has almost
22 // *everything* locked down. Only a couple of /System/Library/ paths and
23 // some other very basic operations (e.g., reading metadata to allow
24 // following symlinks) are permitted.
25 SANDBOX_TYPE_WORKER,
26
27 // Utility process is as restrictive as the worker process except full 21 // Utility process is as restrictive as the worker process except full
28 // access is allowed to one configurable directory. 22 // access is allowed to one configurable directory.
29 SANDBOX_TYPE_UTILITY, 23 SANDBOX_TYPE_UTILITY,
30 24
31 // GPU process. 25 // GPU process.
32 SANDBOX_TYPE_GPU, 26 SANDBOX_TYPE_GPU,
33 27
34 // The PPAPI plugin process. 28 // The PPAPI plugin process.
35 SANDBOX_TYPE_PPAPI, 29 SANDBOX_TYPE_PPAPI,
36 30
37 SANDBOX_TYPE_AFTER_LAST_TYPE, // Placeholder to ease iteration. 31 SANDBOX_TYPE_AFTER_LAST_TYPE, // Placeholder to ease iteration.
38 }; 32 };
39 33
40 } // namespace content 34 } // namespace content
41 35
42 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_ 36 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_TYPE_MAC_H_
OLDNEW
« no previous file with comments | « content/public/common/content_switches.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698