| Index: sandbox/mac/bootstrap_sandbox_unittest.mm
|
| diff --git a/sandbox/mac/bootstrap_sandbox_unittest.mm b/sandbox/mac/bootstrap_sandbox_unittest.mm
|
| index 467189e134fa9fd74b9f8dc6756bda4ff3f34451..6478fb0377cc10a9771e8b89c8ece80a435d34c6 100644
|
| --- a/sandbox/mac/bootstrap_sandbox_unittest.mm
|
| +++ b/sandbox/mac/bootstrap_sandbox_unittest.mm
|
| @@ -97,8 +97,6 @@ class BootstrapSandboxTest : public base::MultiProcessTest {
|
| BootstrapSandboxPolicy BaselinePolicy() {
|
| BootstrapSandboxPolicy policy;
|
| policy.rules["com.apple.cfprefsd.daemon"] = Rule(POLICY_ALLOW);
|
| - if (base::mac::IsOSSnowLeopard())
|
| - policy.rules["com.apple.SecurityServer"] = Rule(POLICY_ALLOW);
|
| return policy;
|
| }
|
|
|
| @@ -354,12 +352,7 @@ TEST_F(BootstrapSandboxTest, ForwardMessageInProcess) {
|
| send_rights = 0;
|
| ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND,
|
| &send_rights));
|
| - // On 10.6, bootstrap_lookup2 may add an extra right to place it in a per-
|
| - // process cache.
|
| - if (base::mac::IsOSSnowLeopard())
|
| - EXPECT_TRUE(send_rights == 3u || send_rights == 2u) << send_rights;
|
| - else
|
| - EXPECT_EQ(2u, send_rights);
|
| + EXPECT_EQ(2u, send_rights);
|
| }
|
|
|
| const char kDefaultRuleTestAllow[] =
|
|
|