ports/devel/electron13/files/patch-electron_spec_node-spec.js

11 lines
753 B
JavaScript

--- electron/spec/node-spec.js.orig 2021-01-22 23:55:24 UTC
+++ electron/spec/node-spec.js
@@ -130,7 +130,7 @@ describe('node feature', () => {
});
describe('child_process.exec', () => {
- (process.platform === 'linux' ? it : it.skip)('allows executing a setuid binary from non-sandboxed renderer', () => {
+ (process.platform === 'linux' || process.platform === 'freebsd' ? it : it.skip)('allows executing a setuid binary from non-sandboxed renderer', () => {
// Chrome uses prctl(2) to set the NO_NEW_PRIVILEGES flag on Linux (see
// https://github.com/torvalds/linux/blob/40fde647cc/Documentation/userspace-api/no_new_privs.rst).
// We disable this for unsandboxed processes, which the renderer tests