From 0538417ba031d87d67f5b33d8f1761800a749685 Mon Sep 17 00:00:00 2001 From: Gijs Kruitbosch Date: Thu, 18 Jun 2020 15:46:41 +0000 Subject: [PATCH] Bug 1621231 - make sandbox prefs not trip browser_preferences_usage.js so much, r=florian A longer-term fix is being worked on in bug 1644917, but this will make life easier for sheriffs and on try. Differential Revision: https://phabricator.services.mozilla.com/D79662 --- .../performance/browser_preferences_usage.js | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/browser/base/content/test/performance/browser_preferences_usage.js b/browser/base/content/test/performance/browser_preferences_usage.js index f33fd7d736ee..130846274cc0 100644 --- a/browser/base/content/test/performance/browser_preferences_usage.js +++ b/browser/base/content/test/performance/browser_preferences_usage.js @@ -216,16 +216,16 @@ add_task(async function navigate_around() { // The following 3 sandbox prefs are covered by // https://bugzilla.mozilla.org/show_bug.cgi?id=1600189 whitelist["security.sandbox.content.write_path_whitelist"] = { - min: 50, - max: 51, + min: 49, + max: 55, }; whitelist["security.sandbox.content.read_path_whitelist"] = { - min: 50, - max: 51, + min: 49, + max: 55, }; whitelist["security.sandbox.content.force-namespace"] = { - min: 50, - max: 51, + min: 49, + max: 55, }; } else if (AppConstants.platform == "win") { // The following 2 graphics prefs are covered by @@ -241,12 +241,12 @@ add_task(async function navigate_around() { // The following 2 sandbox prefs are covered by // https://bugzilla.mozilla.org/show_bug.cgi?id=1639494 whitelist["security.sandbox.content.read_path_whitelist"] = { - min: 50, - max: 51, + min: 49, + max: 55, }; whitelist["security.sandbox.logging.enabled"] = { - min: 50, - max: 51, + min: 49, + max: 55, }; } }