mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-20 16:55:40 +00:00
Bug 1570840 - Set com.apple.security.cs.disable-library-validation=false in Hardened Runtime entitlement files r=handyman
Set com.apple.security.cs.disable-library-validation=false in developer and production Hardened Runtime entitlements now that the definition has changed to mean allow/disallow unsigned libraries. Differential Revision: https://phabricator.services.mozilla.com/D40525 --HG-- extra : moz-landing-system : lando
This commit is contained in:
parent
44608f65ab
commit
243b7d4b1e
@ -23,12 +23,11 @@
|
||||
<!-- Code paged in from disk should match the signature at page-in time -->
|
||||
<key>com.apple.security.cs.disable-executable-page-protection</key><false/>
|
||||
|
||||
<!-- Allow loading third party libraries. Needed for Flash and CDMs -->
|
||||
<key>com.apple.security.cs.disable-library-validation</key><true/>
|
||||
<!-- Do not allow loading unsigned libraries -->
|
||||
<key>com.apple.security.cs.disable-library-validation</key><false/>
|
||||
|
||||
<!-- Allow dyld environment variables. Needed because Firefox uses
|
||||
dyld variables (such as @executable_path) to load libaries from
|
||||
within the .app bundle. -->
|
||||
dyld variables to load libaries from within the .app bundle. -->
|
||||
<key>com.apple.security.cs.allow-dyld-environment-variables</key><true/>
|
||||
|
||||
<!-- Allow debuggers to attach to running executables -->
|
||||
|
@ -20,12 +20,11 @@
|
||||
<!-- Code paged in from disk should match the signature at page in-time -->
|
||||
<key>com.apple.security.cs.disable-executable-page-protection</key><false/>
|
||||
|
||||
<!-- Allow loading third party libraries. Needed for Flash and CDMs -->
|
||||
<key>com.apple.security.cs.disable-library-validation</key><true/>
|
||||
<!-- Do not allow loading unsigned libraries -->
|
||||
<key>com.apple.security.cs.disable-library-validation</key><false/>
|
||||
|
||||
<!-- Allow dyld environment variables. Needed because Firefox uses
|
||||
dyld variables (such as @executable_path) to load libaries from
|
||||
within the .app bundle. -->
|
||||
dyld variables to load libaries from within the .app bundle. -->
|
||||
<key>com.apple.security.cs.allow-dyld-environment-variables</key><true/>
|
||||
|
||||
<!-- Don't allow debugging of the executable. Debuggers will be prevented
|
||||
|
Loading…
Reference in New Issue
Block a user