summaryrefslogtreecommitdiffstats
path: root/chrome/common/sandbox_init_wrapper_mac.cc
diff options
context:
space:
mode:
authorjeremy@chromium.org <jeremy@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-11-05 13:15:24 +0000
committerjeremy@chromium.org <jeremy@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-11-05 13:15:24 +0000
commit1c5fdc4aa3b54cbc3a103e26af918188afbe8b66 (patch)
tree1523fd698a41ac8a4e357850f050338341d33cfe /chrome/common/sandbox_init_wrapper_mac.cc
parent824083c52c5689198290e24938793ce4ccc6e683 (diff)
downloadchromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.zip
chromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.tar.gz
chromium_src-1c5fdc4aa3b54cbc3a103e26af918188afbe8b66.tar.bz2
TBR:mark
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@31090 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_init_wrapper_mac.cc')
-rw-r--r--chrome/common/sandbox_init_wrapper_mac.cc49
1 files changed, 0 insertions, 49 deletions
diff --git a/chrome/common/sandbox_init_wrapper_mac.cc b/chrome/common/sandbox_init_wrapper_mac.cc
deleted file mode 100644
index 6ce09d3..0000000
--- a/chrome/common/sandbox_init_wrapper_mac.cc
+++ /dev/null
@@ -1,49 +0,0 @@
-// Copyright (c) 2009 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "chrome/common/sandbox_init_wrapper.h"
-
-#include "base/command_line.h"
-#include "chrome/common/chrome_switches.h"
-#include "chrome/common/sandbox_mac.h"
-
-bool SandboxInitWrapper::InitializeSandbox(const CommandLine& command_line,
- const std::string& process_type) {
- if (command_line.HasSwitch(switches::kNoSandbox))
- return true;
-
- sandbox::SandboxProcessType sandbox_process_type;
- FilePath allowed_dir; // Empty by default.
-
- if (process_type.empty()) {
- // Browser process isn't sandboxed.
- return true;
- } else if (process_type == switches::kRendererProcess) {
- // Renderer process sandbox.
- sandbox_process_type = sandbox::SANDBOX_TYPE_RENDERER;
- } else if (process_type == switches::kUtilityProcess) {
- // Utility process sandbox.
- sandbox_process_type = sandbox::SANDBOX_TYPE_UTILITY;
- allowed_dir = FilePath::FromWStringHack(
- command_line.GetSwitchValue(switches::kUtilityProcessAllowedDir));
- } else if (process_type == switches::kWorkerProcess) {
- // Worker process sandbox.
- sandbox_process_type = sandbox::SANDBOX_TYPE_WORKER;
- } else if ((process_type == switches::kNaClProcess) ||
- (process_type == switches::kPluginProcess) ||
- (process_type == switches::kProfileImportProcess)) {
- return true;
- } else {
- // Failsafe: If you hit an unreached here, is your new process type in need
- // of sandboxing?
- NOTREACHED();
- return true;
- }
-
- // Warm up APIs before turning on the sandbox.
- sandbox::SandboxWarmup();
-
- // Actually sandbox the process.
- return sandbox::EnableSandbox(sandbox_process_type, allowed_dir);
-}