summaryrefslogtreecommitdiffstats
path: root/chrome/common/sandbox_init_wrapper.h
diff options
context:
space:
mode:
authorjeremy@chromium.org <jeremy@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-11-05 13:15:24 +0000
committerjeremy@chromium.org <jeremy@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-11-05 13:15:24 +0000
commit1c5fdc4aa3b54cbc3a103e26af918188afbe8b66 (patch)
tree1523fd698a41ac8a4e357850f050338341d33cfe /chrome/common/sandbox_init_wrapper.h
parent824083c52c5689198290e24938793ce4ccc6e683 (diff)
downloadchromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.zip
chromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.tar.gz
chromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.tar.bz2
TBR:mark
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@31090 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_init_wrapper.h')
-rw-r--r--chrome/common/sandbox_init_wrapper.h18
1 files changed, 10 insertions, 8 deletions
diff --git a/chrome/common/sandbox_init_wrapper.h b/chrome/common/sandbox_init_wrapper.h
index d1652d2..a1c2de9 100644
--- a/chrome/common/sandbox_init_wrapper.h
+++ b/chrome/common/sandbox_init_wrapper.h
@@ -33,10 +33,7 @@ class SandboxInitWrapper {
// Initialize the sandbox for renderer and plug-in processes, depending on
// the command line flags. The browser process is not sandboxed.
- // Returns true if the sandbox was initialized succesfully, false if an error
- // occurred. If process_type isn't one that needs sandboxing true is always
- // returned.
- bool InitializeSandbox(const CommandLine& parsed_command_line,
+ void InitializeSandbox(const CommandLine& parsed_command_line,
const std::string& process_type);
private:
sandbox::BrokerServices* broker_services_;
@@ -53,12 +50,17 @@ class SandboxInitWrapper {
// Initialize the sandbox for renderer and plug-in processes, depending on
// the command line flags. The browser process is not sandboxed.
- // Returns true if the sandbox was initialized succesfully, false if an error
- // occurred. If process_type isn't one that needs sandboxing true is always
- // returned.
- bool InitializeSandbox(const CommandLine& parsed_command_line,
+ void InitializeSandbox(const CommandLine& parsed_command_line,
const std::string& process_type);
+#if defined(OS_MACOSX)
+ // We keep the process type so we can configure the sandbox as needed.
+ public:
+ std::string ProcessType() const { return process_type_; }
+ private:
+ std::string process_type_;
+#endif
+
private:
DISALLOW_COPY_AND_ASSIGN(SandboxInitWrapper);
};