| // Copyright (c) 2009 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/common/sandbox_init_wrapper.h" |
| |
| #include "base/command_line.h" |
| #include "chrome/common/chrome_switches.h" |
| #include "chrome/common/sandbox_mac.h" |
| |
| bool SandboxInitWrapper::InitializeSandbox(const CommandLine& command_line, |
| const std::string& process_type) { |
| if (command_line.HasSwitch(switches::kNoSandbox)) |
| return true; |
| |
| sandbox::SandboxProcessType sandbox_process_type; |
| FilePath allowed_dir; // Empty by default. |
| |
| if (process_type.empty()) { |
| // Browser process isn't sandboxed. |
| return true; |
| } else if (process_type == switches::kRendererProcess) { |
| // Renderer process sandbox. |
| sandbox_process_type = sandbox::SANDBOX_TYPE_RENDERER; |
| } else if (process_type == switches::kExtensionProcess) { |
| // Extension processes are just renderers [they use RenderMain()] with a |
| // different set of command line flags. |
| // If we ever get here it means something has changed in regards |
| // to the extension process mechanics and we should probably reexamine |
| // how we sandbox extension processes since they are no longer identical |
| // to renderers. |
| NOTREACHED(); |
| return true; |
| } else if (process_type == switches::kUtilityProcess) { |
| // Utility process sandbox. |
| sandbox_process_type = sandbox::SANDBOX_TYPE_UTILITY; |
| allowed_dir = FilePath::FromWStringHack( |
| command_line.GetSwitchValue(switches::kUtilityProcessAllowedDir)); |
| } else if (process_type == switches::kWorkerProcess) { |
| // Worker process sandbox. |
| sandbox_process_type = sandbox::SANDBOX_TYPE_WORKER; |
| } else if ((process_type == switches::kNaClLoaderProcess) || |
| (process_type == switches::kPluginProcess) || |
| (process_type == switches::kProfileImportProcess)) { |
| return true; |
| } else { |
| // Failsafe: If you hit an unreached here, is your new process type in need |
| // of sandboxing? |
| NOTREACHED(); |
| return true; |
| } |
| |
| // Warm up APIs before turning on the sandbox. |
| sandbox::SandboxWarmup(); |
| |
| // Actually sandbox the process. |
| return sandbox::EnableSandbox(sandbox_process_type, allowed_dir); |
| } |