blob: c60b4be9f1f7f2bdace4dac38668e98e31d9316e [file] [log] [blame]
[email protected]882f1d562009-11-05 14:04:481;;
[email protected]8a72f64c2011-04-07 18:04:572;; Copyright (c) 2011 The Chromium Authors. All rights reserved.
[email protected]882f1d562009-11-05 14:04:483;; Use of this source code is governed by a BSD-style license that can be
4;; found in the LICENSE file.
5;;
6; This is the Sandbox configuration file used for safeguarding the utility
7; process which is used for performing sandboxed operations that need to touch
8; the filesystem like decoding theme images and unpacking extensions.
9;
10; This configuration locks everything down, except access to one configurable
11; directory. This is different from other sandbox configuration files where
12; file system access is entireley restricted.
[email protected]882f1d562009-11-05 14:04:4813
[email protected]8a72f64c2011-04-07 18:04:5714; *** The contents of content/common/common.sb are implicitly included here. ***
[email protected]882f1d562009-11-05 14:04:4815
[email protected]120be5d2009-12-03 15:36:0816; Enable full access to given directory if needed.
kerrnele46995f2015-07-16 15:41:3017(if (param-defined? permitted-dir)
18 (begin
19 (allow file-read-metadata )
20 (allow file-read* file-write* (regex (param permitted-dir)))))