diff options
author | jeremy@chromium.org <jeremy@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-11-05 13:15:24 +0000 |
---|---|---|
committer | jeremy@chromium.org <jeremy@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-11-05 13:15:24 +0000 |
commit | 1c5fdc4aa3b54cbc3a103e26af918188afbe8b66 (patch) | |
tree | 1523fd698a41ac8a4e357850f050338341d33cfe /chrome/common/sandbox_init_wrapper_mac.cc | |
parent | 824083c52c5689198290e24938793ce4ccc6e683 (diff) | |
download | chromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.zip chromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.tar.gz chromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.tar.bz2 |
TBR:mark
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@31090 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_init_wrapper_mac.cc')
-rw-r--r-- | chrome/common/sandbox_init_wrapper_mac.cc | 49 |
1 files changed, 0 insertions, 49 deletions
diff --git a/chrome/common/sandbox_init_wrapper_mac.cc b/chrome/common/sandbox_init_wrapper_mac.cc deleted file mode 100644 index 6ce09d3..0000000 --- a/chrome/common/sandbox_init_wrapper_mac.cc +++ /dev/null @@ -1,49 +0,0 @@ -// Copyright (c) 2009 The Chromium Authors. All rights reserved. -// Use of this source code is governed by a BSD-style license that can be -// found in the LICENSE file. - -#include "chrome/common/sandbox_init_wrapper.h" - -#include "base/command_line.h" -#include "chrome/common/chrome_switches.h" -#include "chrome/common/sandbox_mac.h" - -bool SandboxInitWrapper::InitializeSandbox(const CommandLine& command_line, - const std::string& process_type) { - if (command_line.HasSwitch(switches::kNoSandbox)) - return true; - - sandbox::SandboxProcessType sandbox_process_type; - FilePath allowed_dir; // Empty by default. - - if (process_type.empty()) { - // Browser process isn't sandboxed. - return true; - } else if (process_type == switches::kRendererProcess) { - // Renderer process sandbox. - sandbox_process_type = sandbox::SANDBOX_TYPE_RENDERER; - } else if (process_type == switches::kUtilityProcess) { - // Utility process sandbox. - sandbox_process_type = sandbox::SANDBOX_TYPE_UTILITY; - allowed_dir = FilePath::FromWStringHack( - command_line.GetSwitchValue(switches::kUtilityProcessAllowedDir)); - } else if (process_type == switches::kWorkerProcess) { - // Worker process sandbox. - sandbox_process_type = sandbox::SANDBOX_TYPE_WORKER; - } else if ((process_type == switches::kNaClProcess) || - (process_type == switches::kPluginProcess) || - (process_type == switches::kProfileImportProcess)) { - return true; - } else { - // Failsafe: If you hit an unreached here, is your new process type in need - // of sandboxing? - NOTREACHED(); - return true; - } - - // Warm up APIs before turning on the sandbox. - sandbox::SandboxWarmup(); - - // Actually sandbox the process. - return sandbox::EnableSandbox(sandbox_process_type, allowed_dir); -} |