%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
'use strict'; const credentials = internalBinding('credentials'); const rawMethods = internalBinding('process_methods'); // TODO: this should be detached from ERR_WORKER_UNSUPPORTED_OPERATION const { unavailable } = require('internal/process/worker_thread_only'); process.abort = unavailable('process.abort()'); process.chdir = unavailable('process.chdir()'); process.umask = wrappedUmask; process.cwd = rawMethods.cwd; if (credentials.implementsPosixCredentials) { process.initgroups = unavailable('process.initgroups()'); process.setgroups = unavailable('process.setgroups()'); process.setegid = unavailable('process.setegid()'); process.seteuid = unavailable('process.seteuid()'); process.setgid = unavailable('process.setgid()'); process.setuid = unavailable('process.setuid()'); } // ---- keep the attachment of the wrappers above so that it's easier to ---- // ---- compare the setups side-by-side ----- const { codes: { ERR_WORKER_UNSUPPORTED_OPERATION } } = require('internal/errors'); function wrappedUmask(mask) { // process.umask() is a read-only operation in workers. if (mask !== undefined) { throw new ERR_WORKER_UNSUPPORTED_OPERATION('Setting process.umask()'); } return rawMethods.umask(mask); }