Index: sandbox/mac/bootstrap_sandbox_unittest.mm |
diff --git a/sandbox/mac/bootstrap_sandbox_unittest.mm b/sandbox/mac/bootstrap_sandbox_unittest.mm |
index 467189e134fa9fd74b9f8dc6756bda4ff3f34451..6478fb0377cc10a9771e8b89c8ece80a435d34c6 100644 |
--- a/sandbox/mac/bootstrap_sandbox_unittest.mm |
+++ b/sandbox/mac/bootstrap_sandbox_unittest.mm |
@@ -97,8 +97,6 @@ class BootstrapSandboxTest : public base::MultiProcessTest { |
BootstrapSandboxPolicy BaselinePolicy() { |
BootstrapSandboxPolicy policy; |
policy.rules["com.apple.cfprefsd.daemon"] = Rule(POLICY_ALLOW); |
- if (base::mac::IsOSSnowLeopard()) |
- policy.rules["com.apple.SecurityServer"] = Rule(POLICY_ALLOW); |
return policy; |
} |
@@ -354,12 +352,7 @@ TEST_F(BootstrapSandboxTest, ForwardMessageInProcess) { |
send_rights = 0; |
ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND, |
&send_rights)); |
- // On 10.6, bootstrap_lookup2 may add an extra right to place it in a per- |
- // process cache. |
- if (base::mac::IsOSSnowLeopard()) |
- EXPECT_TRUE(send_rights == 3u || send_rights == 2u) << send_rights; |
- else |
- EXPECT_EQ(2u, send_rights); |
+ EXPECT_EQ(2u, send_rights); |
} |
const char kDefaultRuleTestAllow[] = |