summaryrefslogtreecommitdiffstats
path: root/chromium/chrome/browser/resources/sandbox_internals/sandbox_internals.js
diff options
context:
space:
mode:
authorAllan Sandfeld Jensen <allan.jensen@qt.io>2019-02-13 16:23:34 +0100
committerAllan Sandfeld Jensen <allan.jensen@qt.io>2019-02-14 10:37:21 +0000
commit38a9a29f4f9436cace7f0e7abf9c586057df8a4e (patch)
treec4e8c458dc595bc0ddb435708fa2229edfd00bd4 /chromium/chrome/browser/resources/sandbox_internals/sandbox_internals.js
parente684a3455bcc29a6e3e66a004e352dea4e1141e7 (diff)
BASELINE: Update Chromium to 73.0.3683.37
Change-Id: I08c9af2948b645f671e5d933aca1f7a90ea372f2 Reviewed-by: Michael BrĂ¼ning <michael.bruning@qt.io>
Diffstat (limited to 'chromium/chrome/browser/resources/sandbox_internals/sandbox_internals.js')
-rw-r--r--chromium/chrome/browser/resources/sandbox_internals/sandbox_internals.js36
1 files changed, 18 insertions, 18 deletions
diff --git a/chromium/chrome/browser/resources/sandbox_internals/sandbox_internals.js b/chromium/chrome/browser/resources/sandbox_internals/sandbox_internals.js
index f691b62a922..ab15fb20587 100644
--- a/chromium/chrome/browser/resources/sandbox_internals/sandbox_internals.js
+++ b/chromium/chrome/browser/resources/sandbox_internals/sandbox_internals.js
@@ -22,10 +22,10 @@ const StatusClass = {
* @return {Element} The newly added TR.
*/
function addStatusRow(name, value, cssClass) {
- let row = cr.doc.createElement('tr');
+ const row = cr.doc.createElement('tr');
- let nameCol = row.appendChild(cr.doc.createElement('td'));
- let valueCol = row.appendChild(cr.doc.createElement('td'));
+ const nameCol = row.appendChild(cr.doc.createElement('td'));
+ const valueCol = row.appendChild(cr.doc.createElement('td'));
nameCol.textContent = name;
valueCol.textContent = value;
@@ -55,8 +55,8 @@ function addGoodBadRow(name, result) {
* @param {boolean}
*/
function setEvaluation(result) {
- let message = result ? 'You are adequately sandboxed.' :
- 'You are NOT adequately sandboxed.';
+ const message = result ? 'You are adequately sandboxed.' :
+ 'You are NOT adequately sandboxed.';
$('evaluation').innerText = message;
}
@@ -65,9 +65,9 @@ function setEvaluation(result) {
*/
function androidHandler() {
chrome.getAndroidSandboxStatus((status) => {
- var isIsolated = false;
- var isTsync = false;
- var isChromeSeccomp = false;
+ let isIsolated = false;
+ let isTsync = false;
+ let isChromeSeccomp = false;
addStatusRow('PID', status.pid, StatusClass.INFO);
addStatusRow('UID', status.uid, StatusClass.INFO);
@@ -76,11 +76,11 @@ function androidHandler() {
'SELinux Context', status.secontext,
isIsolated ? StatusClass.GOOD : StatusClass.BAD);
- let procStatus = status.procStatus.split('\n');
- for (let line of procStatus) {
+ const procStatus = status.procStatus.split('\n');
+ for (const line of procStatus) {
if (line.startsWith('Seccomp')) {
- var value = line.split(':')[1].trim();
- var cssClass = StatusClass.BAD;
+ let value = line.split(':')[1].trim();
+ let cssClass = StatusClass.BAD;
if (value == '2') {
value = 'Yes - TSYNC (' + line + ')';
cssClass = StatusClass.GOOD;
@@ -95,7 +95,7 @@ function androidHandler() {
}
}
- var seccompStatus = 'Unknown';
+ let seccompStatus = 'Unknown';
switch (status.seccompStatus) {
case 0:
seccompStatus = 'Not Supported';
@@ -128,8 +128,8 @@ function androidHandler() {
* Main page handler for desktop Linux.
*/
function linuxHandler() {
- let suidSandbox = loadTimeData.getBoolean('suid');
- let nsSandbox = loadTimeData.getBoolean('userNs');
+ const suidSandbox = loadTimeData.getBoolean('suid');
+ const nsSandbox = loadTimeData.getBoolean('userNs');
let layer1SandboxType = 'None';
let layer1SandboxCssClass = StatusClass.BAD;
@@ -149,15 +149,15 @@ function linuxHandler() {
'Seccomp-BPF sandbox supports TSYNC',
loadTimeData.getBoolean('seccompTsync'));
- let enforcingYamaBroker = loadTimeData.getBoolean('yamaBroker');
+ const enforcingYamaBroker = loadTimeData.getBoolean('yamaBroker');
addGoodBadRow(
'Ptrace Protection with Yama LSM (Broker)', enforcingYamaBroker);
- let enforcingYamaNonbroker = loadTimeData.getBoolean('yamaNonbroker');
+ const enforcingYamaNonbroker = loadTimeData.getBoolean('yamaNonbroker');
// If there is no ptrace protection anywhere, that is bad.
// If there is no ptrace protection for nonbroker processes because of the
// user namespace sandbox, that is fine and we display as medium.
- let yamaNonbrokerCssClass = enforcingYamaBroker ?
+ const yamaNonbrokerCssClass = enforcingYamaBroker ?
(enforcingYamaNonbroker ? StatusClass.GOOD : StatusClass.MEDIUM) :
StatusClass.BAD;
addStatusRow(