diff options
Diffstat (limited to 'chrome/common/sandbox_init_wrapper_mac.cc')
-rw-r--r-- | chrome/common/sandbox_init_wrapper_mac.cc | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/chrome/common/sandbox_init_wrapper_mac.cc b/chrome/common/sandbox_init_wrapper_mac.cc new file mode 100644 index 0000000..6ce09d3 --- /dev/null +++ b/chrome/common/sandbox_init_wrapper_mac.cc @@ -0,0 +1,49 @@ +// Copyright (c) 2009 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/common/sandbox_init_wrapper.h" + +#include "base/command_line.h" +#include "chrome/common/chrome_switches.h" +#include "chrome/common/sandbox_mac.h" + +bool SandboxInitWrapper::InitializeSandbox(const CommandLine& command_line, + const std::string& process_type) { + if (command_line.HasSwitch(switches::kNoSandbox)) + return true; + + sandbox::SandboxProcessType sandbox_process_type; + FilePath allowed_dir; // Empty by default. + + if (process_type.empty()) { + // Browser process isn't sandboxed. + return true; + } else if (process_type == switches::kRendererProcess) { + // Renderer process sandbox. + sandbox_process_type = sandbox::SANDBOX_TYPE_RENDERER; + } else if (process_type == switches::kUtilityProcess) { + // Utility process sandbox. + sandbox_process_type = sandbox::SANDBOX_TYPE_UTILITY; + allowed_dir = FilePath::FromWStringHack( + command_line.GetSwitchValue(switches::kUtilityProcessAllowedDir)); + } else if (process_type == switches::kWorkerProcess) { + // Worker process sandbox. + sandbox_process_type = sandbox::SANDBOX_TYPE_WORKER; + } else if ((process_type == switches::kNaClProcess) || + (process_type == switches::kPluginProcess) || + (process_type == switches::kProfileImportProcess)) { + return true; + } else { + // Failsafe: If you hit an unreached here, is your new process type in need + // of sandboxing? + NOTREACHED(); + return true; + } + + // Warm up APIs before turning on the sandbox. + sandbox::SandboxWarmup(); + + // Actually sandbox the process. + return sandbox::EnableSandbox(sandbox_process_type, allowed_dir); +} |