diff options
author | gregoryd@google.com <gregoryd@google.com@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-01-17 10:09:39 +0000 |
---|---|---|
committer | gregoryd@google.com <gregoryd@google.com@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-01-17 10:09:39 +0000 |
commit | 382abc2bc90652b921c092e3342e8920f0603b17 (patch) | |
tree | 285a0524ca389f232c0f4e3e4b1b974873a59038 /chrome/common/sandbox_policy.h | |
parent | 352de89080246d48bcf30a939b7e3418513b1572 (diff) | |
download | chromium_src-382abc2bc90652b921c092e3342e8920f0603b17.zip chromium_src-382abc2bc90652b921c092e3342e8920f0603b17.tar.gz chromium_src-382abc2bc90652b921c092e3342e8920f0603b17.tar.bz2 |
Moving sandbox_policy files into chrome/common .
In the next CL (http://codereview.chromium.org/542030/show) NaCl broker code will need to include sandbox_policy.h from chrome/nacl, and without this move check_deps test fails.
TEST=none
BUG=none
Review URL: http://codereview.chromium.org/543042
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@36468 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_policy.h')
-rw-r--r-- | chrome/common/sandbox_policy.h | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/chrome/common/sandbox_policy.h b/chrome/common/sandbox_policy.h new file mode 100644 index 0000000..dcc466d --- /dev/null +++ b/chrome/common/sandbox_policy.h @@ -0,0 +1,25 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef CHROME_COMMON_SANDBOX_POLICY_H_ +#define CHROME_COMMON_SANDBOX_POLICY_H_ + +#include "base/process.h" +#include "base/file_path.h" + +class CommandLine; + +namespace sandbox { + +// Starts a sandboxed process and returns a handle to it. +base::ProcessHandle StartProcess(CommandLine* cmd_line); + +// Starts a sandboxed process with the given directory unsandboxed +// and returns a handle to it. +base::ProcessHandle StartProcessWithAccess(CommandLine* cmd_line, + const FilePath& exposed_dir); + +} // namespace sandbox + +#endif // CHROME_COMMON_SANDBOX_POLICY_H_ |