# SPDX-License-Identifier: CC0-1.0 # Copyright (C) 2022 Wojtek Kosior # # Available under the terms of Creative Commons Zero v1.0 Universal. GUIX := guix # Almost all commands in this Makefilo are run through `guix time-machine` with # Guix revision fixed to the one from the commit below. This ensures that the # same working environment is always used. GUIX_COMMIT := a86979b41a49a8fcdaa887970ba594dbba701226 GUIX_TM = $(GUIX) time-machine --commit=$(GUIX_COMMIT) -- GUIX_LOAD_PATHS = $$( \ find subrepos/ -mindepth 1 -maxdepth 1 \ -exec printf ' -L %s/guix-module-dir/' {} ';' \ ) \ -L ./guix-module-dir/ GUIX_SYS_CONTAINER = $(GUIX_TM) system container $(GUIX_LOAD_PATHS) GUIX_SHELL = $(GUIX_TM) shell KOSZKO_ORG_WEBSITE_INFO = \ subrepos/koszko-org-website/src/koszko_org_website.egg-info/PKG-INFO HYDRILLA_WEBSITE_INFO = \ subrepos/hydrilla-website/src/hydrilla_website.egg-info/PKG-INFO HYDRILLA_INFO = subrepos/hydrilla/src/hydrilla.egg-info/PKG-INFO ALL_EGG_INFOS = \ $(KOSZKO_ORG_WEBSITE_INFO) \ $(HYDRILLA_WEBSITE_INFO) \ $(HYDRILLA_INFO) TEST_ROOT_DIR = "/tmp/$$(pwd | sed 's|/|!|g')"'!!test-root' all: | container-runner.touchfile log sample-malcontent $(KOSZKO_ORG_WEBSITE_INFO): $(MAKE) -C subrepos/koszko-org-website dist $(HYDRILLA_WEBSITE_INFO): $(MAKE) -C subrepos/hydrilla-website dist $(HYDRILLA_INFO): $(MAKE) -C subrepos/hydrilla dist container-runner: | container.scm $(ALL_EGG_INFOS) hydrilla-wsgi.py container-runner.touchfile: container.scm $(ALL_EGG_INFOS) hydrilla-wsgi.py container-runner container-runner.touchfile: $(MAKE) clean-runner $(GUIX_SYS_CONTAINER) container.scm -r container-runner touch container-runner.touchfile hosts: hosts-extra /etc/hosts cat $^ > $@ log: ln -sf $(TEST_ROOT_DIR)/var/log/guix-container $@ sample-malcontent: mkdir $@ printf 'hydrilla-builder -s tests/source-package-example/ -d %s' \ "$$(realpath $@)" | \ make -C subrepos/hydrilla shell-with-haketilo HYDRILLA_WEBSITE_ETC_DIR = $(TEST_ROOT_DIR)/etc/guix-container/hydrilla-website MALCONTENT_DIR = $(TEST_ROOT_DIR)/var/lib/hydrilla/malcontent_dirs prepare-test-root: sample-malcontent rm -rf $(TEST_ROOT_DIR) @# Prepare replacement `/var/www` for SITE in koszko.org hydrillarepos.koszko.org; do \ mkdir -p $(TEST_ROOT_DIR)/var/www/"$$SITE"/html; \ printf 'This is dummy file for %s :D\n' "$$SITE" \ > $(TEST_ROOT_DIR)/var/www/"$$SITE"/html/index.html; \ done @# Prepare replacement `/var/log` mkdir -p $(TEST_ROOT_DIR)/var/log @# Prepare replacement `/etc` mkdir --mode=750 -p $(HYDRILLA_WEBSITE_ETC_DIR) printf 'test non-secret\n' > $(HYDRILLA_WEBSITE_ETC_DIR)/secret.txt chgrp -R 133 $(HYDRILLA_WEBSITE_ETC_DIR) chmod 640 $(HYDRILLA_WEBSITE_ETC_DIR)/secret.txt @# Prepare replacement `/var/lib/hydrilla` mkdir -p $(MALCONTENT_DIR)/api_v2 ln -sf api_v2 $(MALCONTENT_DIR)/api_v1 cp -r $