run chrome with --no-sandbox flag to get around docker privilege limitations
This commit is contained in:
parent
3757703165
commit
d70be8f83c
|
@ -448,16 +448,13 @@ karma:
|
|||
<<: *except-docs
|
||||
variables:
|
||||
BABEL_ENV: "coverage"
|
||||
CHROME_LOG_FILE: "chrome_debug.log"
|
||||
script:
|
||||
- bundle exec rake karma
|
||||
coverage: '/^Statements *: (\d+\.\d+%)/'
|
||||
artifacts:
|
||||
name: coverage-javascript
|
||||
expire_in: 31d
|
||||
when: always
|
||||
paths:
|
||||
- chrome_debug.log
|
||||
- coverage-javascript/
|
||||
|
||||
coverage:
|
||||
|
|
|
@ -21,11 +21,13 @@ module.exports = function(config) {
|
|||
|
||||
var karmaConfig = {
|
||||
basePath: ROOT_PATH,
|
||||
browsers: ['ChromeDebug'],
|
||||
browsers: ['ChromeHeadlessNoSandbox'],
|
||||
customLaunchers: {
|
||||
ChromeDebug: {
|
||||
ChromeHeadlessNoSandbox: {
|
||||
base: 'ChromeHeadless',
|
||||
flags: ['--enable-logging', '--v=1'],
|
||||
// chrome cannot run in sandboxed mode inside a docker container unless it is run with
|
||||
// escalated kernel privileges: docker run --cap-add=CAP_SYS_ADMIN
|
||||
flags: ['--no-sandbox'],
|
||||
displayName: 'Chrome'
|
||||
}
|
||||
},
|
||||
|
@ -40,7 +42,6 @@ module.exports = function(config) {
|
|||
reporters: [progressReporter],
|
||||
webpack: webpackConfig,
|
||||
webpackMiddleware: { stats: 'errors-only' },
|
||||
logLevel: config.LOG_DEBUG,
|
||||
};
|
||||
|
||||
if (process.env.BABEL_ENV === 'coverage' || process.env.NODE_ENV === 'coverage') {
|
||||
|
|
Loading…
Reference in New Issue