summaryrefslogtreecommitdiff
path: root/user/node/openat-test.patch
diff options
context:
space:
mode:
Diffstat (limited to 'user/node/openat-test.patch')
-rw-r--r--user/node/openat-test.patch34
1 files changed, 34 insertions, 0 deletions
diff --git a/user/node/openat-test.patch b/user/node/openat-test.patch
new file mode 100644
index 000000000..e75eb7e61
--- /dev/null
+++ b/user/node/openat-test.patch
@@ -0,0 +1,34 @@
+The strace-openat-openssl test fails on musl libc because of ldso's
+attempted access of /etc/ld-musl-$ARCH.path. Additionally, at least on
+gwyn, the spawned process attempts to determine its memory limits from
+the current cgroup.
+
+*Also*, the openssl.cnf expected line fails because it happens in a
+subprocess - hence the optional [pid ....] prefix.
+
+--- node-v18.20.8/test/parallel/test-strace-openat-openssl.js.old 2025-03-26 19:56:44.000000000 -0500
++++ node-v18.20.8/test/parallel/test-strace-openat-openssl.js 2025-06-27 00:31:02.528830894 -0500
+@@ -29,7 +29,7 @@
+ // stderr is the default for strace
+ const rl = createInterface({ input: strace.stderr });
+ rl.on('line', (line) => {
+- if (!line.startsWith('open')) {
++ if (line.match(/^(\[pid.+\] )?open/) === null) {
+ return;
+ }
+
+@@ -42,6 +42,14 @@
+ if (file.match(/\/proc\/.+/) !== null) {
+ return;
+ }
++ // skip /sys/fs/cgroup/*
++ if (file.match(/\/sys\/fs\/cgroup\/.+/) !== null) {
++ return;
++ }
++ // skip /etc/ld-musl-$ARCH.path
++ if (file.match(/\/etc\/ld-musl-.+\.path/) !== null) {
++ return;
++ }
+
+ assert(allowedOpenCalls.delete(file), `${file} is not in the list of allowed openat calls`);
+ });