Bug 1474375 - [Mac] Let Sandboxing for the Flash NPAPI plugin process ride the trains r?Alex_Gaynor draft
authorHaik Aftandilian <haftandilian@mozilla.com>
Wed, 18 Jul 2018 11:49:02 -0700
changeset 820556 10b0d5a9e58c8c0c029b5db8b6ca5f2fdb0b1376
parent 820443 0911e10caed744108c39db0afd75f777af665276
push id116860
push userhaftandilian@mozilla.com
push dateThu, 19 Jul 2018 21:10:18 +0000
reviewersAlex_Gaynor
bugs1474375
milestone63.0a1
Bug 1474375 - [Mac] Let Sandboxing for the Flash NPAPI plugin process ride the trains r?Alex_Gaynor MozReview-Commit-ID: Jlvjulbvo7S
browser/app/profile/firefox.js
--- a/browser/app/profile/firefox.js
+++ b/browser/app/profile/firefox.js
@@ -1059,18 +1059,17 @@ pref("security.sandbox.gmp.win32k-disabl
 // 3 -> "no global read/write access, read access permitted to
 //       $PROFILE/{extensions,chrome}"
 // This setting is read when the content process is started. On Mac the content
 // process is killed when all windows are closed, so a change will take effect
 // when the 1st window is opened.
 pref("security.sandbox.content.level", 3);
 #endif
 
-// Enable the Mac Flash sandbox on Nightly and Beta, not Release
-#if defined(EARLY_BETA_OR_EARLIER) && defined(XP_MACOSX) && defined(MOZ_SANDBOX)
+#if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
 // Prefs for controlling whether and how the Mac NPAPI Flash plugin process is
 // sandboxed. On Mac these levels are:
 // 0 - "no sandbox"
 // 1 - "global read access, limited write access for Flash functionality"
 // 2 - "read access triggered by file dialog activity, limited read/write"
 //     "access for Flash functionality"
 // 3 - "limited read/write access for Flash functionality"
 pref("dom.ipc.plugins.sandbox-level.flash", 2);