Bug 1433577 - [Mac] Enable sandboxing for the Flash NPAPI plugin process on Nightly; r?Alex_Gaynor draft
authorHaik Aftandilian <haftandilian@mozilla.com>
Fri, 30 Mar 2018 15:40:56 -0700
changeset 776043 58281b5008e8085a7710f2be3962f1857eb11e69
parent 775971 39599f6f11b69d4d50e48922c69a6ca698e41726
push id104799
push userhaftandilian@mozilla.com
push dateMon, 02 Apr 2018 16:10:04 +0000
reviewersAlex_Gaynor
bugs1433577
milestone61.0a1
Bug 1433577 - [Mac] Enable sandboxing for the Flash NPAPI plugin process on Nightly; r?Alex_Gaynor Enable the level 1 Mac Flash sandbox by default on Nightly, controlled by pref dom.ipc.plugins.sandbox-level.flash. Enable the level 1 Mac Flash sandbox as the default for other plugins so that the sandbox is used for plugin tests. (Flash is the only non-test plugin allowed by the browser.) Controlled by pref dom.ipc.plugins.sandbox-level.default. MozReview-Commit-ID: 37gLKpHCQwp
browser/app/profile/firefox.js
--- a/browser/app/profile/firefox.js
+++ b/browser/app/profile/firefox.js
@@ -1095,21 +1095,21 @@ pref("security.sandbox.content.level", 3
 #if defined(NIGHTLY_BUILD) && defined(XP_MACOSX) && defined(MOZ_SANDBOX)
 // Controls whether and how the Mac NPAPI Flash plugin process is sandboxed.
 // On Mac these levels are:
 // 0 - "no sandbox"
 // 1 - "write access to some Flash-specific directories and global
 //      read access triggered by file dialog activity"
 // 2 - "no global read access, read and write access to some
 //      Flash-specific directories"
-pref("dom.ipc.plugins.sandbox-level.flash", 0);
+pref("dom.ipc.plugins.sandbox-level.flash", 1);
 // Controls the sandbox level used by plugins other than Flash. On Mac,
 // no other plugins are supported and this pref is only used for test
 // plugins used in automated tests.
-pref("dom.ipc.plugins.sandbox-level.default", 0);
+pref("dom.ipc.plugins.sandbox-level.default", 1);
 #endif
 
 #if defined(XP_LINUX) && defined(MOZ_SANDBOX) && defined(MOZ_CONTENT_SANDBOX)
 // This pref is introduced as part of bug 742434, the naming is inspired from
 // its Windows/Mac counterpart, but on Linux it's an integer which means:
 // 0 -> "no sandbox"
 // 1 -> "content sandbox using seccomp-bpf when available" + ipc restrictions
 // 2 -> "seccomp-bpf + write file broker"