Commit d70be8f8 authored by Mike Greiling's avatar Mike Greiling

run chrome with --no-sandbox flag to get around docker privilege limitations

parent 37577031
......@@ -448,16 +448,13 @@ karma:
<<: *except-docs
variables:
BABEL_ENV: "coverage"
CHROME_LOG_FILE: "chrome_debug.log"
script:
- bundle exec rake karma
coverage: '/^Statements *: (\d+\.\d+%)/'
artifacts:
name: coverage-javascript
expire_in: 31d
when: always
paths:
- chrome_debug.log
- coverage-javascript/
coverage:
......
......@@ -21,11 +21,13 @@ module.exports = function(config) {
var karmaConfig = {
basePath: ROOT_PATH,
browsers: ['ChromeDebug'],
browsers: ['ChromeHeadlessNoSandbox'],
customLaunchers: {
ChromeDebug: {
ChromeHeadlessNoSandbox: {
base: 'ChromeHeadless',
flags: ['--enable-logging', '--v=1'],
// chrome cannot run in sandboxed mode inside a docker container unless it is run with
// escalated kernel privileges: docker run --cap-add=CAP_SYS_ADMIN
flags: ['--no-sandbox'],
displayName: 'Chrome'
}
},
......@@ -40,7 +42,6 @@ module.exports = function(config) {
reporters: [progressReporter],
webpack: webpackConfig,
webpackMiddleware: { stats: 'errors-only' },
logLevel: config.LOG_DEBUG,
};
if (process.env.BABEL_ENV === 'coverage' || process.env.NODE_ENV === 'coverage') {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment