Skip sandboxing PrintBackendService for known exceptions

For some printer drivers it can be known ahead of time that sandboxing
of the Print Backend Service should be avoided.

Making use of this knowledge rather than relying upon getting an
access-denied error can be important in some cases.  For example, when
trying to start printing of a document on Windows, if it will require
the display of a system dialog to select the file to save to (e.g.,
print to port FILE:) then the call will hang instead of returning an
error.

Introduce a call to determine if a driver for a client type should
automatically avoid being sandboxed.  This is a workaround for the
hanging issue.  This approach might be improved upon if a Windows low
privilege AppContainer (LPAC) can be made to enable the UI to be
displayed, but that is still a work in progress.

TESTED=On Windows print to a driver that saves to file, such as the
`Microsoft Print to PDF`.  This enables the `File Print Output As`
dialog to be displayed instead of the Print Backend Service process
hanging.

Bug: 809738, 1243873
Change-Id: I102a38c311f012c743cd94c3c81a319d14161ed9
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/3313488
Reviewed-by: Lei Zhang <thestig@chromium.org>
Commit-Queue: Alan Screen <awscreen@chromium.org>
Cr-Commit-Position: refs/heads/main@{#977529}
4 files changed
tree: a2c56bceeb053d4eaf373062dd964742d5ba0484
  1. android_webview/
  2. apps/
  3. ash/
  4. base/
  5. build/
  6. build_overrides/
  7. buildtools/
  8. cc/
  9. chrome/
  10. chromecast/
  11. chromeos/
  12. cloud_print/
  13. codelabs/
  14. components/
  15. content/
  16. courgette/
  17. crypto/
  18. dbus/
  19. device/
  20. docs/
  21. extensions/
  22. fuchsia/
  23. gin/
  24. google_apis/
  25. google_update/
  26. gpu/
  27. headless/
  28. infra/
  29. ios/
  30. ipc/
  31. media/
  32. mojo/
  33. native_client_sdk/
  34. net/
  35. pdf/
  36. ppapi/
  37. printing/
  38. remoting/
  39. rlz/
  40. sandbox/
  41. services/
  42. skia/
  43. sql/
  44. storage/
  45. styleguide/
  46. testing/
  47. third_party/
  48. tools/
  49. ui/
  50. url/
  51. weblayer/
  52. .clang-format
  53. .clang-tidy
  54. .eslintrc.js
  55. .git-blame-ignore-revs
  56. .gitattributes
  57. .gitignore
  58. .gn
  59. .mailmap
  60. .rustfmt.toml
  61. .vpython
  62. .vpython3
  63. .yapfignore
  64. AUTHORS
  65. BUILD.gn
  66. CODE_OF_CONDUCT.md
  67. codereview.settings
  68. DEPS
  69. DIR_METADATA
  70. ENG_REVIEW_OWNERS
  71. LICENSE
  72. LICENSE.chromium_os
  73. OWNERS
  74. PRESUBMIT.py
  75. PRESUBMIT_test.py
  76. PRESUBMIT_test_mocks.py
  77. README.md
  78. WATCHLISTS
README.md

Logo Chromium

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web.

The project's web site is https://www.chromium.org.

To check out the source code locally, don't use git clone! Instead, follow the instructions on how to get the code.

Documentation in the source is rooted in docs/README.md.

Learn how to Get Around the Chromium Source Code Directory Structure .

For historical reasons, there are some small top level directories. Now the guidance is that new top level directories are for product (e.g. Chrome, Android WebView, Ash). Even if these products have multiple executables, the code should be in subdirectories of the product.

If you found a bug, please file it at https://crbug.com/new.