diff options
author | jam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-03-13 00:18:06 +0000 |
---|---|---|
committer | jam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-03-13 00:18:06 +0000 |
commit | 88a1fb47ae5abed1c518cdb63836199431ac5af7 (patch) | |
tree | 6bd2be5124623c48546122c80b94a3b203352fe1 /chrome/browser/sandbox_policy.cc | |
parent | 226183d33f7e52d01d38cad1cfb2e70b938ae74e (diff) | |
download | chromium_src-88a1fb47ae5abed1c518cdb63836199431ac5af7.zip chromium_src-88a1fb47ae5abed1c518cdb63836199431ac5af7.tar.gz chromium_src-88a1fb47ae5abed1c518cdb63836199431ac5af7.tar.bz2 |
Get rid of the gears in renderer process code. This allows me to do some cleanup in how resource dispatching happens in a future cl.
Review URL: http://codereview.chromium.org/42158
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@11601 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/sandbox_policy.cc')
-rw-r--r-- | chrome/browser/sandbox_policy.cc | 31 |
1 files changed, 0 insertions, 31 deletions
diff --git a/chrome/browser/sandbox_policy.cc b/chrome/browser/sandbox_policy.cc index 8d39650..d491aff 100644 --- a/chrome/browser/sandbox_policy.cc +++ b/chrome/browser/sandbox_policy.cc @@ -161,37 +161,6 @@ bool AddDllEvictionPolicy(sandbox::TargetPolicy* policy) { return true; } -bool AddPolicyForGearsInRenderer(sandbox::TargetPolicy* policy) { - sandbox::ResultCode result; - - // TODO(mpcomplete): need to restrict access to database files only. This - // is just temporary for debugging purposes. - std::wstring plugin_data; - if (!PathService::Get(chrome::DIR_USER_DATA, &plugin_data)) - return false; - if (!win_util::ConvertToLongPath(plugin_data, &plugin_data)) - return false; - - file_util::AppendToPath(&plugin_data, L"*"); - result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, - sandbox::TargetPolicy::FILES_ALLOW_ANY, - plugin_data.c_str()); - if (result != sandbox::SBOX_ALL_OK) - return false; - - std::wstring temppath; - if (!file_util::GetTempDir(&temppath)) - return false; - file_util::AppendToPath(&temppath, L"*"); - result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, - sandbox::TargetPolicy::FILES_ALLOW_ANY, - temppath.c_str()); - if (result != sandbox::SBOX_ALL_OK) - return false; - - return true; -} - bool AddGenericPolicy(sandbox::TargetPolicy* policy) { sandbox::ResultCode result; |