diff options
author | Hiroki Tagato <tagattie@FreeBSD.org> | 2021-11-24 17:28:24 +0900 |
---|---|---|
committer | Hiroki Tagato <tagattie@FreeBSD.org> | 2021-11-24 17:30:52 +0900 |
commit | 4da4f5edbf9de5c4269cf66d70044f4cb3abdc41 (patch) | |
tree | 21363ca7518a943c48bde3a669c78444685f832e /devel/electron13/files/patch-sandbox_policy_sandbox.cc | |
parent | ports-mgmt/octopkg: update description and WWW (diff) |
devel/electron13: update to 13.6.2 (and rename from devel/electron12)
Changelog: https://www.electronjs.org/blog/electron-13-0
Diffstat (limited to 'devel/electron13/files/patch-sandbox_policy_sandbox.cc')
-rw-r--r-- | devel/electron13/files/patch-sandbox_policy_sandbox.cc | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/devel/electron13/files/patch-sandbox_policy_sandbox.cc b/devel/electron13/files/patch-sandbox_policy_sandbox.cc new file mode 100644 index 000000000000..7d1df01de6e0 --- /dev/null +++ b/devel/electron13/files/patch-sandbox_policy_sandbox.cc @@ -0,0 +1,35 @@ +--- sandbox/policy/sandbox.cc.orig 2021-07-15 19:13:43 UTC ++++ sandbox/policy/sandbox.cc +@@ -12,6 +12,10 @@ + #include "base/android/jni_android.h" + #endif // defined(OS_ANDROID) + ++#if defined(OS_FREEBSD) ++#include "sandbox/policy/freebsd/sandbox_freebsd.h" ++#endif // defined(OS_FREEBSD) ++ + #if defined(OS_LINUX) || defined(OS_CHROMEOS) + #include "sandbox/policy/linux/sandbox_linux.h" + #endif // defined(OS_LINUX) || defined(OS_CHROMEOS) +@@ -29,6 +33,12 @@ + namespace sandbox { + namespace policy { + ++#if defined(OS_FREEBSD) ++bool Sandbox::Initialize(SandboxType sandbox_type) { ++ return SandboxFreeBSD::GetInstance()->InitializeSandbox(sandbox_type); ++} ++#endif // defined(OS_FREEBSD) ++ + #if defined(OS_LINUX) || defined(OS_CHROMEOS) + bool Sandbox::Initialize(SandboxType sandbox_type, + SandboxLinux::PreSandboxHook hook, +@@ -89,6 +99,8 @@ bool Sandbox::IsProcessSandboxed() { + base::android::MethodID::Get<base::android::MethodID::TYPE_STATIC>( + env, process_class.obj(), "isIsolated", "()Z"); + return env->CallStaticBooleanMethod(process_class.obj(), is_isolated); ++#elif defined(OS_FREEBSD) ++ return SandboxFreeBSD::GetInstance()->IsSandboxed(); + #elif defined(OS_FUCHSIA) + // TODO(https://crbug.com/1071420): Figure out what to do here. Process + // launching controls the sandbox and there are no ambient capabilities, so |