mirror of
https://bitbucket.org/chromiumembedded/cef
synced 2025-06-05 21:39:12 +02:00
Update include/ comments to Doxygen formatting (see issue #3384)
See related guidelines in the issue.
This commit is contained in:
@ -40,27 +40,30 @@
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
// The sandbox is used to restrict sub-processes (renderer, GPU, etc) from
|
||||
// directly accessing system resources. This helps to protect the user from
|
||||
// untrusted and potentially malicious Web content. See
|
||||
// http://www.chromium.org/developers/design-documents/sandbox for complete
|
||||
// details.
|
||||
//
|
||||
// To enable the sandbox on macOS the following requirements must be met:
|
||||
// 1. Link the helper process executable with the cef_sandbox static library.
|
||||
// 2. Call the cef_sandbox_initialize() function at the beginning of the
|
||||
// helper executable main() function and before loading the CEF framework
|
||||
// library. See include/wrapper/cef_library_loader.h for example usage.
|
||||
///
|
||||
/// \file
|
||||
/// The sandbox is used to restrict sub-processes (renderer, GPU, etc) from
|
||||
/// directly accessing system resources. This helps to protect the user from
|
||||
/// untrusted and potentially malicious Web content. See
|
||||
/// http://www.chromium.org/developers/design-documents/sandbox for complete
|
||||
/// details.
|
||||
///
|
||||
/// To enable the sandbox on macOS the following requirements must be met:
|
||||
/// 1. Link the helper process executable with the cef_sandbox static library.
|
||||
/// 2. Call the cef_sandbox_initialize() function at the beginning of the
|
||||
/// helper executable main() function and before loading the CEF framework
|
||||
/// library. See include/wrapper/cef_library_loader.h for example usage.
|
||||
///
|
||||
|
||||
///
|
||||
// Initialize the sandbox for this process. Returns the sandbox context
|
||||
// handle on success or NULL on failure. The returned handle should be
|
||||
// passed to cef_sandbox_destroy() immediately before process termination.
|
||||
/// Initialize the sandbox for this process. Returns the sandbox context
|
||||
/// handle on success or NULL on failure. The returned handle should be
|
||||
/// passed to cef_sandbox_destroy() immediately before process termination.
|
||||
///
|
||||
CEF_EXPORT void* cef_sandbox_initialize(int argc, char** argv);
|
||||
|
||||
///
|
||||
// Destroy the specified sandbox context handle.
|
||||
/// Destroy the specified sandbox context handle.
|
||||
///
|
||||
CEF_EXPORT void cef_sandbox_destroy(void* sandbox_context);
|
||||
|
||||
@ -68,14 +71,16 @@ CEF_EXPORT void cef_sandbox_destroy(void* sandbox_context);
|
||||
}
|
||||
|
||||
///
|
||||
// Scoped helper for managing the life span of a sandbox context handle.
|
||||
/// Scoped helper for managing the life span of a sandbox context handle.
|
||||
///
|
||||
class CEF_EXPORT CefScopedSandboxContext {
|
||||
public:
|
||||
CefScopedSandboxContext();
|
||||
~CefScopedSandboxContext();
|
||||
|
||||
// Load the sandbox for this process. Returns true on success.
|
||||
///
|
||||
/// Load the sandbox for this process. Returns true on success.
|
||||
///
|
||||
bool Initialize(int argc, char** argv);
|
||||
|
||||
private:
|
||||
|
Reference in New Issue
Block a user