diff options
author | bors-servo <lbergstrom+bors@mozilla.com> | 2016-04-11 23:54:27 +0530 |
---|---|---|
committer | bors-servo <lbergstrom+bors@mozilla.com> | 2016-04-11 23:54:27 +0530 |
commit | a162cfe45cceab123504289a7afc7bf06a4eeec8 (patch) | |
tree | dbc5bf3e0159232871aaebf1247426ef0bebd8e8 /python/tidy/tidy.py | |
parent | 608533cb4ad31358269cfa8039077767f325f3be (diff) | |
parent | b631202e66784e7d3cbcc2a3e8d4f243e784fd38 (diff) | |
download | servo-a162cfe45cceab123504289a7afc7bf06a4eeec8.tar.gz servo-a162cfe45cceab123504289a7afc7bf06a4eeec8.zip |
Auto merge of #10496 - kaksmet:fix-sandbox, r=pcwalton
Fix sandboxing on OS X
The main issue was resources_dir_path. Every time it was called it would start from the executable's path and walk up the hierarchy to find a directory named "resources". The sandbox was granted permission to read from the found resources dir, but after the sandbox had been activated resources_dir_path would again start from the executable's path and try to find the resources dir. It would then fail with "Operation not permitted" when trying to canonicalize the path because it didn't have permissions to read metadata under ./target.
To fix this the resources dir path is now cached between resources_dir_path calls.
<!-- Reviewable:start -->
---
This change is [<img src="https://reviewable.io/review_button.svg" height="35" align="absmiddle" alt="Reviewable"/>](https://reviewable.io/reviews/servo/servo/10496)
<!-- Reviewable:end -->
Diffstat (limited to 'python/tidy/tidy.py')
0 files changed, 0 insertions, 0 deletions