summaryrefslogtreecommitdiff
path: root/devel/electron36/files/patch-electron_spec_node-spec.ts
blob: b943ea8f0ba948a6003cf4f24710d310cf61ac94 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
--- electron/spec/node-spec.ts.orig	2024-10-09 13:53:06 UTC
+++ electron/spec/node-spec.ts
@@ -148,7 +148,7 @@ describe('node feature', () => {
     });
 
     describe('child_process.exec', () => {
-      ifit(process.platform === 'linux')('allows executing a setuid binary from non-sandboxed renderer', async () => {
+      ifit(process.platform === 'linux' || process.platform === 'freebsd')('allows executing a setuid binary from non-sandboxed renderer', async () => {
         // Chrome uses prctl(2) to set the NO_NEW_PRIVILEGES flag on Linux (see
         // https://github.com/torvalds/linux/blob/40fde647cc/Documentation/userspace-api/no_new_privs.rst).
         // We disable this for unsandboxed processes, which the renderer tests