Bug 1388046 - Disable sandbox read restrictions (level 3) on beta/release. r?jld draft
authorGian-Carlo Pascutto <gcp@mozilla.com>
Wed, 09 Aug 2017 18:51:51 +0200
changeset 643360 7deb1f1572f961432b9836333298a2cde431c226
parent 643359 b72ee82614a903048578b1e4d4535ad1820aa896
child 725277 1f08bf3a957b5c5d5d4992e3455028e86a674645
push id73068
push usergpascutto@mozilla.com
push dateWed, 09 Aug 2017 16:52:24 +0000
reviewersjld
bugs1388046
milestone57.0a1
Bug 1388046 - Disable sandbox read restrictions (level 3) on beta/release. r?jld MozReview-Commit-ID: 3VQM545aqpL
browser/app/profile/firefox.js
--- a/browser/app/profile/firefox.js
+++ b/browser/app/profile/firefox.js
@@ -1091,17 +1091,21 @@ pref("security.sandbox.content.level", 3
 // to whitelist more system calls.
 //
 // So the purpose of this setting is to allow nightly users to disable the
 // sandbox while we fix their problems. This way, they won't have to wait for
 // another nightly release which disables seccomp-bpf again.
 //
 // This setting may not be required anymore once we decide to permanently
 // enable the content sandbox.
+#ifdef NIGHTLY_BUILD
 pref("security.sandbox.content.level", 3);
+#else
+pref("security.sandbox.content.level", 2);
+#endif
 pref("security.sandbox.content.write_path_whitelist", "");
 pref("security.sandbox.content.read_path_whitelist", "");
 pref("security.sandbox.content.syscall_whitelist", "");
 #endif
 
 #if defined(XP_MACOSX) || defined(XP_WIN)
 #if defined(MOZ_SANDBOX) && defined(MOZ_CONTENT_SANDBOX)
 // ID (a UUID when set by gecko) that is used to form the name of a