Closed Bruno-Tavares-Bose closed 4 years ago
There are other situations (e.g. storybook-dark-mode that changes the iframe body class from the outside of the iframe) that requires adding other flags to puppeteer (--disable-web-security
, --disable-site-isolation-trials
).
Hi everyone! Seems like there hasn't been much going on in this issue lately. If there are still questions, comments, or bugs, please feel free to continue the discussion. Unfortunately, we don't have time to get to every issue. We are always open to contributions so please send us a pull request if you would like to help. Inactive issues will be closed after 30 days. Thanks!
Any news on this one?
Hi everyone! Seems like there hasn't been much going on in this issue lately. If there are still questions, comments, or bugs, please feel free to continue the discussion. Unfortunately, we don't have time to get to every issue. We are always open to contributions so please send us a pull request if you would like to help. Inactive issues will be closed after 30 days. Thanks!
Hey there, it's me again! I am going close this issue to help our maintainers focus on the current development roadmap instead. If the issue mentioned is still a concern, please open a new ticket and mention this old one. Cheers and thanks for using Storybook!
Is there any update on this issue or accepted workaround for this?
Describe the bug Trying to run
Storyshots
(image snapshots) with afile://...
in a project with SVG (for example) is not possible.To Reproduce Steps to reproduce the behavior:
href
(in icons for instance)jest
andstoryshots
/storyshots-puppeteer
to run visual regression testsstorybookUrl
point to your static storybook (file:///${path.resolve(__dirname, 'path/to/storybook-static')
)Expected behavior Those images should have our SVGs.
Code snippets
System:
Additional context Changing this line to have
--allow-file-access-from-files
flag, fix the issue. Therefore, we may want to have thisargs
to be set up (like we haveexecutablePath
already) or having a specific flag to add this flag (I would not recommend adding it by default since it is a dangerous one...)