diff options
author | Hiroki Tagato <tagattie@FreeBSD.org> | 2021-11-24 17:28:24 +0900 |
---|---|---|
committer | Hiroki Tagato <tagattie@FreeBSD.org> | 2021-11-24 17:30:52 +0900 |
commit | 4da4f5edbf9de5c4269cf66d70044f4cb3abdc41 (patch) | |
tree | 21363ca7518a943c48bde3a669c78444685f832e /devel/electron13/files/patch-electron_spec_node-spec.js | |
parent | ports-mgmt/octopkg: update description and WWW (diff) |
devel/electron13: update to 13.6.2 (and rename from devel/electron12)
Changelog: https://www.electronjs.org/blog/electron-13-0
Diffstat (limited to 'devel/electron13/files/patch-electron_spec_node-spec.js')
-rw-r--r-- | devel/electron13/files/patch-electron_spec_node-spec.js | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/devel/electron13/files/patch-electron_spec_node-spec.js b/devel/electron13/files/patch-electron_spec_node-spec.js new file mode 100644 index 000000000000..60ffbd2d63a9 --- /dev/null +++ b/devel/electron13/files/patch-electron_spec_node-spec.js @@ -0,0 +1,11 @@ +--- electron/spec/node-spec.js.orig 2021-01-22 23:55:24 UTC ++++ electron/spec/node-spec.js +@@ -130,7 +130,7 @@ describe('node feature', () => { + }); + + describe('child_process.exec', () => { +- (process.platform === 'linux' ? it : it.skip)('allows executing a setuid binary from non-sandboxed renderer', () => { ++ (process.platform === 'linux' || process.platform === 'freebsd' ? it : it.skip)('allows executing a setuid binary from non-sandboxed renderer', () => { + // Chrome uses prctl(2) to set the NO_NEW_PRIVILEGES flag on Linux (see + // https://github.com/torvalds/linux/blob/40fde647cc/Documentation/userspace-api/no_new_privs.rst). + // We disable this for unsandboxed processes, which the renderer tests |