| Index: sandbox/mac/bootstrap_sandbox_unittest.mm
|
| diff --git a/sandbox/mac/bootstrap_sandbox_unittest.mm b/sandbox/mac/bootstrap_sandbox_unittest.mm
|
| index e39e94966520ef6712bd4c433b339996f3dbd3bf..a6225a91c32ab07531624057ddcd96dd9dc17d2a 100644
|
| --- a/sandbox/mac/bootstrap_sandbox_unittest.mm
|
| +++ b/sandbox/mac/bootstrap_sandbox_unittest.mm
|
| @@ -138,7 +138,7 @@ TEST_F(BootstrapSandboxTest, DistributedNotifications_Unsandboxed) {
|
| // Run the test with the sandbox enabled without notifications on the policy
|
| // whitelist.
|
| TEST_F(BootstrapSandboxTest, DistributedNotifications_SandboxDeny) {
|
| - if (base::mac::IsOSSierraOrLater()) {
|
| + if (base::mac::IsAtLeastOS10_12()) {
|
| LOG(ERROR) << "BootstrapSandbox does not work on macOS Sierra or later.";
|
| return;
|
| }
|
| @@ -156,7 +156,7 @@ TEST_F(BootstrapSandboxTest, DistributedNotifications_SandboxDeny) {
|
|
|
| // Run the test with notifications permitted.
|
| TEST_F(BootstrapSandboxTest, DistributedNotifications_SandboxAllow) {
|
| - if (base::mac::IsOSSierraOrLater()) {
|
| + if (base::mac::IsAtLeastOS10_12()) {
|
| LOG(ERROR) << "BootstrapSandbox does not work on macOS Sierra or later.";
|
| return;
|
| }
|
| @@ -191,7 +191,7 @@ MULTIPROCESS_TEST_MAIN(PostNotification) {
|
| const char kTestServer[] = "org.chromium.test_bootstrap_server";
|
|
|
| TEST_F(BootstrapSandboxTest, PolicyDenyError) {
|
| - if (base::mac::IsOSSierraOrLater()) {
|
| + if (base::mac::IsAtLeastOS10_12()) {
|
| LOG(ERROR) << "BootstrapSandbox does not work on macOS Sierra or later.";
|
| return;
|
| }
|
| @@ -218,7 +218,7 @@ MULTIPROCESS_TEST_MAIN(PolicyDenyError) {
|
| }
|
|
|
| TEST_F(BootstrapSandboxTest, PolicyDenyDummyPort) {
|
| - if (base::mac::IsOSSierraOrLater()) {
|
| + if (base::mac::IsAtLeastOS10_12()) {
|
| LOG(ERROR) << "BootstrapSandbox does not work on macOS Sierra or later.";
|
| return;
|
| }
|
| @@ -250,7 +250,7 @@ struct SubstitutePortAckRecv : public SubstitutePortAckSend {
|
| const char kSubstituteAck[] = "Hello, this is doge!";
|
|
|
| TEST_F(BootstrapSandboxTest, PolicySubstitutePort) {
|
| - if (base::mac::IsOSSierraOrLater()) {
|
| + if (base::mac::IsAtLeastOS10_12()) {
|
| LOG(ERROR) << "BootstrapSandbox does not work on macOS Sierra or later.";
|
| return;
|
| }
|
| @@ -371,7 +371,7 @@ const char kDefaultRuleTestDeny[] =
|
| "org.chromium.sandbox.test.DefaultRuleAllow.Deny";
|
|
|
| TEST_F(BootstrapSandboxTest, DefaultRuleAllow) {
|
| - if (base::mac::IsOSSierraOrLater()) {
|
| + if (base::mac::IsAtLeastOS10_12()) {
|
| LOG(ERROR) << "BootstrapSandbox does not work on macOS Sierra or later.";
|
| return;
|
| }
|
| @@ -443,7 +443,7 @@ MULTIPROCESS_TEST_MAIN(DefaultRuleAllow) {
|
| }
|
|
|
| TEST_F(BootstrapSandboxTest, ChildOutliveSandbox) {
|
| - if (base::mac::IsOSSierraOrLater()) {
|
| + if (base::mac::IsAtLeastOS10_12()) {
|
| LOG(ERROR) << "BootstrapSandbox does not work on macOS Sierra or later.";
|
| return;
|
| }
|
|
|