summaryrefslogtreecommitdiffstats
path: root/chrome/browser/sandbox_policy.cc
diff options
context:
space:
mode:
authorjam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-03-13 00:18:06 +0000
committerjam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-03-13 00:18:06 +0000
commit88a1fb47ae5abed1c518cdb63836199431ac5af7 (patch)
tree6bd2be5124623c48546122c80b94a3b203352fe1 /chrome/browser/sandbox_policy.cc
parent226183d33f7e52d01d38cad1cfb2e70b938ae74e (diff)
downloadchromium_src-88a1fb47ae5abed1c518cdb63836199431ac5af7.zip
chromium_src-88a1fb47ae5abed1c518cdb63836199431ac5af7.tar.gz
chromium_src-88a1fb47ae5abed1c518cdb63836199431ac5af7.tar.bz2
Get rid of the gears in renderer process code. This allows me to do some cleanup in how resource dispatching happens in a future cl.
Review URL: http://codereview.chromium.org/42158 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@11601 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/sandbox_policy.cc')
-rw-r--r--chrome/browser/sandbox_policy.cc31
1 files changed, 0 insertions, 31 deletions
diff --git a/chrome/browser/sandbox_policy.cc b/chrome/browser/sandbox_policy.cc
index 8d39650..d491aff 100644
--- a/chrome/browser/sandbox_policy.cc
+++ b/chrome/browser/sandbox_policy.cc
@@ -161,37 +161,6 @@ bool AddDllEvictionPolicy(sandbox::TargetPolicy* policy) {
return true;
}
-bool AddPolicyForGearsInRenderer(sandbox::TargetPolicy* policy) {
- sandbox::ResultCode result;
-
- // TODO(mpcomplete): need to restrict access to database files only. This
- // is just temporary for debugging purposes.
- std::wstring plugin_data;
- if (!PathService::Get(chrome::DIR_USER_DATA, &plugin_data))
- return false;
- if (!win_util::ConvertToLongPath(plugin_data, &plugin_data))
- return false;
-
- file_util::AppendToPath(&plugin_data, L"*");
- result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES,
- sandbox::TargetPolicy::FILES_ALLOW_ANY,
- plugin_data.c_str());
- if (result != sandbox::SBOX_ALL_OK)
- return false;
-
- std::wstring temppath;
- if (!file_util::GetTempDir(&temppath))
- return false;
- file_util::AppendToPath(&temppath, L"*");
- result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES,
- sandbox::TargetPolicy::FILES_ALLOW_ANY,
- temppath.c_str());
- if (result != sandbox::SBOX_ALL_OK)
- return false;
-
- return true;
-}
-
bool AddGenericPolicy(sandbox::TargetPolicy* policy) {
sandbox::ResultCode result;