summaryrefslogtreecommitdiffstats
path: root/chrome/common/sandbox_policy.h
diff options
context:
space:
mode:
authorgregoryd@google.com <gregoryd@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2010-01-17 10:09:39 +0000
committergregoryd@google.com <gregoryd@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2010-01-17 10:09:39 +0000
commit382abc2bc90652b921c092e3342e8920f0603b17 (patch)
tree285a0524ca389f232c0f4e3e4b1b974873a59038 /chrome/common/sandbox_policy.h
parent352de89080246d48bcf30a939b7e3418513b1572 (diff)
downloadchromium_src-382abc2bc90652b921c092e3342e8920f0603b17.zip
chromium_src-382abc2bc90652b921c092e3342e8920f0603b17.tar.gz
chromium_src-382abc2bc90652b921c092e3342e8920f0603b17.tar.bz2
Moving sandbox_policy files into chrome/common .
In the next CL (http://codereview.chromium.org/542030/show) NaCl broker code will need to include sandbox_policy.h from chrome/nacl, and without this move check_deps test fails. TEST=none BUG=none Review URL: http://codereview.chromium.org/543042 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@36468 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_policy.h')
-rw-r--r--chrome/common/sandbox_policy.h25
1 files changed, 25 insertions, 0 deletions
diff --git a/chrome/common/sandbox_policy.h b/chrome/common/sandbox_policy.h
new file mode 100644
index 0000000..dcc466d
--- /dev/null
+++ b/chrome/common/sandbox_policy.h
@@ -0,0 +1,25 @@
+// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef CHROME_COMMON_SANDBOX_POLICY_H_
+#define CHROME_COMMON_SANDBOX_POLICY_H_
+
+#include "base/process.h"
+#include "base/file_path.h"
+
+class CommandLine;
+
+namespace sandbox {
+
+// Starts a sandboxed process and returns a handle to it.
+base::ProcessHandle StartProcess(CommandLine* cmd_line);
+
+// Starts a sandboxed process with the given directory unsandboxed
+// and returns a handle to it.
+base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line,
+ const FilePath& exposed_dir);
+
+} // namespace sandbox
+
+#endif // CHROME_COMMON_SANDBOX_POLICY_H_