[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor-browser/tor-browser-52.3.0esr-7.5-2] Bug 1344106 - Remove Linux todos() now that Linux sandboxing is riding the trains. r=haik



commit 5b224c4272f4752dea577c92f41b2f651778e975
Author: Haik Aftandilian <haftandilian@xxxxxxxxxxx>
Date:   Fri Mar 3 09:50:29 2017 +0100

    Bug 1344106 - Remove Linux todos() now that Linux sandboxing is riding the trains. r=haik
    
    MozReview-Commit-ID: 9tI2S6fEYkD
    
    --HG--
    extra : rebase_source : 0a5d00f8498861e7ea281e527b2be6b2c4e472d6
---
 .../sandbox/test/browser_content_sandbox_fs.js     | 20 --------------------
 .../test/browser_content_sandbox_syscalls.js       | 22 +---------------------
 2 files changed, 1 insertion(+), 41 deletions(-)

diff --git a/security/sandbox/test/browser_content_sandbox_fs.js b/security/sandbox/test/browser_content_sandbox_fs.js
index 946f86bb9a92..7439bd46ee53 100644
--- a/security/sandbox/test/browser_content_sandbox_fs.js
+++ b/security/sandbox/test/browser_content_sandbox_fs.js
@@ -96,25 +96,11 @@ add_task(function*() {
     prefExists = false;
   }
 
-  // Special case Linux on !isNightly
-  if (isLinux() && !isNightly()) {
-    todo(prefExists, "pref security.sandbox.content.level exists");
-    if (!prefExists) {
-      return;
-    }
-  }
-
   ok(prefExists, "pref security.sandbox.content.level exists");
   if (!prefExists) {
     return;
   }
 
-  // Special case Linux on !isNightly
-  if (isLinux() && !isNightly()) {
-    todo(level > 0, "content sandbox enabled for !nightly.");
-    return;
-  }
-
   info(`security.sandbox.content.level=${level}`);
   ok(level > 0, "content sandbox is enabled.");
   if (level == 0) {
@@ -124,12 +110,6 @@ add_task(function*() {
 
   let isFileIOSandboxed = isContentFileIOSandboxed(level);
 
-  // Special case Linux on !isNightly
-  if (isLinux() && !isNightly()) {
-    todo(isFileIOSandboxed, "content file I/O sandbox enabled for !nightly.");
-    return;
-  }
-
   // Content sandbox enabled, but level doesn't include file I/O sandboxing.
   ok(isFileIOSandboxed, "content file I/O sandboxing is enabled.");
   if (!isFileIOSandboxed) {
diff --git a/security/sandbox/test/browser_content_sandbox_syscalls.js b/security/sandbox/test/browser_content_sandbox_syscalls.js
index d56456966b8a..848b145429f2 100644
--- a/security/sandbox/test/browser_content_sandbox_syscalls.js
+++ b/security/sandbox/test/browser_content_sandbox_syscalls.js
@@ -104,7 +104,7 @@ function areContentSyscallsSandboxed(level) {
       syscallsSandboxMinLevel = 1;
       break;
     case "Linux":
-      syscallsSandboxMinLevel = 2;
+      syscallsSandboxMinLevel = 1;
       break;
     default:
       Assert.ok(false, "Unknown OS");
@@ -140,25 +140,11 @@ add_task(function*() {
     prefExists = false;
   }
 
-  // Special case Linux on !isNightly
-  if (isLinux() && !isNightly()) {
-    todo(prefExists, "pref security.sandbox.content.level exists");
-    if (!prefExists) {
-      return;
-    }
-  }
-
   ok(prefExists, "pref security.sandbox.content.level exists");
   if (!prefExists) {
     return;
   }
 
-  // Special case Linux on !isNightly
-  if (isLinux() && !isNightly()) {
-    todo(level > 0, "content sandbox enabled for !nightly.");
-    return;
-  }
-
   info(`security.sandbox.content.level=${level}`);
   ok(level > 0, "content sandbox is enabled.");
   if (level == 0) {
@@ -168,12 +154,6 @@ add_task(function*() {
 
   let areSyscallsSandboxed = areContentSyscallsSandboxed(level);
 
-  // Special case Linux on !isNightly
-  if (isLinux() && !isNightly()) {
-    todo(areSyscallsSandboxed, "content syscall sandbox enabled for !nightly.");
-    return;
-  }
-
   // Content sandbox enabled, but level doesn't include syscall sandboxing.
   ok(areSyscallsSandboxed, "content syscall sandboxing is enabled.");
   if (!areSyscallsSandboxed) {



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits