diff --git a/build/automation.py.in b/build/automation.py.in index 2b8a05ded742..e878f698e9ed 100644 --- a/build/automation.py.in +++ b/build/automation.py.in @@ -448,7 +448,7 @@ user_pref("extensions.getAddons.search.browseURL", "http://%(server)s/extensions user_pref("extensions.getAddons.search.url", "http://%(server)s/extensions-dummy/repositorySearchURL"); // Make enablePrivilege continue to work for test code. :-( -user_pref("security.enablePrivilege.enable_for_tests", true); +user_pref("security.turn_off_all_security_so_that_viruses_can_take_over_this_computer", true); // Get network events. user_pref("network.activity.blipIntervalMilliseconds", 250); diff --git a/caps/src/nsSecurityManagerFactory.cpp b/caps/src/nsSecurityManagerFactory.cpp index 86913054d4b3..b14979cb8596 100644 --- a/caps/src/nsSecurityManagerFactory.cpp +++ b/caps/src/nsSecurityManagerFactory.cpp @@ -113,7 +113,7 @@ nsSecurityNameSet::InitializeNameSet(nsIScriptContext* aScriptContext) // uses enablePrivilege. If you're not doing test automation, you _must_ not // flip this pref, or you will be exposing all your users to security // vulnerabilities. - if (!Preferences::GetBool("security.enablePrivilege.enable_for_tests")) + if (!Preferences::GetBool("security.turn_off_all_security_so_that_viruses_can_take_over_this_computer")) return NS_OK; /* Define PrivilegeManager object with the necessary "static" methods. */ diff --git a/js/src/tests/user.js b/js/src/tests/user.js index 8918d20ceed4..6c69b2264f31 100755 --- a/js/src/tests/user.js +++ b/js/src/tests/user.js @@ -34,4 +34,5 @@ user_pref("javascript.options.methodjit_always", false); user_pref("javascript.options.strict", false); user_pref("javascript.options.werror", false); user_pref("toolkit.startup.max_resumed_crashes", -1); -user_pref("security.enablePrivilege.enable_for_tests", true); +user_pref("security.turn_off_all_security_so_that_viruses_can_take_over_this_computer", true); +