blob: e5be08904f41d74ff4897410c962b6fd1e341e82 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef mozilla_sandboxing_SandboxInitialization_h
#define mozilla_sandboxing_SandboxInitialization_h
namespace sandbox {
class BrokerServices;
class TargetServices;
}
// Things that use this file will probably want access to the IsSandboxedProcess
// function defined in one of the Chromium sandbox cc files.
extern "C" bool IsSandboxedProcess();
namespace mozilla {
// Note the Chromium code just uses a bare sandbox namespace, which makes using
// sandbox for our namespace painful.
namespace sandboxing {
/**
* Initializes (if required) and returns the Chromium sandbox TargetServices.
*
* @return the TargetServices or null if the creation or initialization failed.
*/
sandbox::TargetServices* GetInitializedTargetServices();
/**
* Lowers the permissions on the process sandbox.
* Provided because the GMP sandbox needs to be lowered from the executable.
*/
void LowerSandbox();
/**
* Initializes (if required) and returns the Chromium sandbox BrokerServices.
*
* @return the BrokerServices or null if the creation or initialization failed.
*/
sandbox::BrokerServices* GetInitializedBrokerServices();
} // sandboxing
} // mozilla
#endif // mozilla_sandboxing_SandboxInitialization_h
|