diff options
author | jeremy@chromium.org <jeremy@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-12-17 22:41:50 +0000 |
---|---|---|
committer | jeremy@chromium.org <jeremy@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-12-17 22:41:50 +0000 |
commit | fa3097a6a5ec6c6e7c092a6339c283dc34d42ca7 (patch) | |
tree | 7fc997f0a3cb9ce2aca5411e43c1987e6618b7d1 /net | |
parent | 6f666448fe72b6f98a241cb9d83a2a15aa4ff24e (diff) | |
download | chromium_src-fa3097a6a5ec6c6e7c092a6339c283dc34d42ca7.zip chromium_src-fa3097a6a5ec6c6e7c092a6339c283dc34d42ca7.tar.gz chromium_src-fa3097a6a5ec6c6e7c092a6339c283dc34d42ca7.tar.bz2 |
* On POSIX, make sure we don't leak FDs when launching child Processes.
* Add a facility to LaunchProcess() to remap a given FD into a child process.
This change is needed for 2 reasons:
1)We want to use a socketpair() for IPC, the child process needs a known FD # for it's side of the socket.
2)The OS X Sandbox doesn't close FDs.
Review URL: http://codereview.chromium.org/14497
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@7175 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r-- | net/url_request/url_request_unittest.h | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/net/url_request/url_request_unittest.h b/net/url_request/url_request_unittest.h index e2b8ca3..52fa429 100644 --- a/net/url_request/url_request_unittest.h +++ b/net/url_request/url_request_unittest.h @@ -342,8 +342,9 @@ class TestServer : public base::ProcessFilter { if (!cert_path.empty()) command_line.push_back("--https=" + WideToUTF8(cert_path)); + base::file_handle_mapping_vector no_mappings; ASSERT_TRUE( - base::LaunchApp(command_line, false, &process_handle_)) << + base::LaunchApp(command_line, no_mappings, false, &process_handle_)) << "Failed to launch " << command_line[0] << " ..."; #endif |