| Index: sandbox/linux/suid/client/setuid_sandbox_client.h
|
| diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.h b/sandbox/linux/suid/client/setuid_sandbox_client.h
|
| index afbde0a5e39c4663b4a1f41d4201978d843f11d2..da77ce006d3e727c7c8cc2358e71fd6185d9ba51 100644
|
| --- a/sandbox/linux/suid/client/setuid_sandbox_client.h
|
| +++ b/sandbox/linux/suid/client/setuid_sandbox_client.h
|
| @@ -6,7 +6,8 @@
|
| #define SANDBOX_LINUX_SUID_SETUID_SANDBOX_CLIENT_H_
|
|
|
| #include "base/basictypes.h"
|
| -#include "base/environment.h"
|
| +
|
| +namespace base { class Environment; }
|
|
|
| namespace sandbox {
|
|
|
| @@ -38,6 +39,8 @@ class SetuidSandboxClient {
|
| bool IsInNewPIDNamespace() const;
|
| // Did the setuid helper create a new network namespace ?
|
| bool IsInNewNETNamespace() const;
|
| + // Are we done and fully sandboxed ?
|
| + bool IsSandboxed() const;
|
|
|
| // Set-up the environment. This should be done prior to launching the setuid
|
| // helper.
|
| @@ -46,6 +49,7 @@ class SetuidSandboxClient {
|
| private:
|
| // Holds the environment. Will never be NULL.
|
| base::Environment* env_;
|
| + bool sandboxed_;
|
| DISALLOW_IMPLICIT_CONSTRUCTORS(SetuidSandboxClient);
|
| };
|
|
|
|
|