585ff9062c
Consider an electron application that uses `execFile` to run a script that lives within the application code base: ```coffee child_process = require 'child_process' child_process.execFile __dirname + '/script.sh', (error) -> throw error if error? ``` An application like this will fail when being packaged in an `asar` with an following error: ``` Error: spawn EACCES ``` Electron overrides certain `fs` functions to make them work within an `asar` package. In the case of `execFile`, the file to be executed is extracted from the `asar` package into a temporary file and ran from there. The problem is that during the extraction, the original permissions of the file are lost. We workaround this by: 1. Extending `asar.stat` to return whether a file is executable or not, which is information that's already saved in the `asar` header. 2. Setting execution permissions on the extracted file if the above property holds true. Fixes: https://github.com/atom/electron/issues/3512 |
||
---|---|---|
.. | ||
lib | ||
api_messages.h | ||
atom_api_asar.cc | ||
atom_api_clipboard.cc | ||
atom_api_crash_reporter.cc | ||
atom_api_id_weak_map.cc | ||
atom_api_id_weak_map.h | ||
atom_api_native_image.cc | ||
atom_api_native_image.h | ||
atom_api_native_image_mac.mm | ||
atom_api_shell.cc | ||
atom_api_v8_util.cc | ||
atom_bindings.cc | ||
atom_bindings.h | ||
event_emitter_caller.cc | ||
event_emitter_caller.h | ||
locker.cc | ||
locker.h | ||
object_life_monitor.cc | ||
object_life_monitor.h |