Security News
PyPI’s New Archival Feature Closes a Major Security Gap
PyPI now allows maintainers to archive projects, improving security and helping users make informed decisions about their dependencies.
grunt-blanket-qunit
Advanced tools
Headless Blanket.js code coverage and QUnit testing via PhantomJS
This plugin requires Grunt ~0.4.1
If you haven't used Grunt before, be sure to check out the Getting Started guide, as it explains how to create a Gruntfile as well as install and use Grunt plugins. Once you're familiar with that process, you may install this plugin with this command:
npm install grunt-blanket-qunit --save-dev
Once the plugin has been installed, it may be enabled inside your Gruntfile with this line of JavaScript:
grunt.loadNpmTasks('grunt-blanket-qunit');
This plugin is based off of grunt-contrib-qunit. For general config options and examples, please see that repo.
In your project's Gruntfile, add a section named blanket_qunit
to the data object passed into grunt.initConfig()
.
grunt.initConfig({
blanket_qunit: {
options: {
urls: ['test.html?coverage=true&gruntReport'],
threshold: 70
}
}
})
The urls
param works the same way as it does in the base grunt-contrib-qunit
plugin, with two important considerations. First, you should pass &coverage=true
as a URL parameter as shown above to trigger blanket.js. This is the same as clicking the Enable Coverage
checkbox in the QUnit report. Second, you may pass another parameter such as &gruntReport
to trigger the custom blanket reporter that talks to the grunt task. See the next section for more info.
In order for Blanket.js to communicate with the Grunt task, you must enable a custom blanket reporter. See the grunt-reporter.js
file in the reporter
directory in this repo.
You can enable this reporter in one of two ways:
<script type="text/javascript" src="blanket.js"
data-cover-reporter="reporter/grunt-reporter.js"></script>
This method is suitable if your test runner html file is only used for headless testing. Do not use this if you will be using this test runner html file in a browser, as it will spew a bunch of alerts at you (see the reporter implementation for the ugly alert
hack used to communicate with phantomjs).
<script>
if (location.href.match(/(\?|&)gruntReport($|&|=)/)) {
blanket.options("reporter", "reporter/grunt-reporter.js");
}
</script>
Place this script snippet after your blanket.js script declaration. This allows you to conditionally only enable this custom reporter if the gruntReport
URL parameter is specified. This way, you can share the same test runner html file between two use cases: running it in the browser and viewing the report inline, and running it via grunt.
Type: Number
Default value: 60
The minimum percent coverage per-file. Any files that have coverage below this threshold will fail the build. By default, only the failing files will be output in the console. To show passing files as well, use the grunt --verbose
option.
In lieu of a formal styleguide, take care to maintain the existing coding style. Add unit tests for any new or changed functionality. Lint and test your code using Grunt.
Released 23 May 2013
FAQs
Headless Blanket.js code coverage and QUnit testing via PhantomJS
The npm package grunt-blanket-qunit receives a total of 20 weekly downloads. As such, grunt-blanket-qunit popularity was classified as not popular.
We found that grunt-blanket-qunit demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PyPI now allows maintainers to archive projects, improving security and helping users make informed decisions about their dependencies.
Research
Security News
Malicious npm package postcss-optimizer delivers BeaverTail malware, targeting developer systems; similarities to past campaigns suggest a North Korean connection.
Security News
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.