Makefile: Developer setup for privileged daemon

Tests:

- When a new container image is provisioned, developer configuration is set on
  privileged daemon as seen with 'systemctl show freedombox-privileged.service'.
  freedombox-privileged.socket is enabled and running (socket is being listened
  on).

Signed-off-by: Sunil Mohan Adapa <sunil@medhas.org>
Reviewed-by: Joseph Nuthalapati <njoseph@riseup.net>
This commit is contained in:
Sunil Mohan Adapa 2025-07-07 11:25:45 -07:00 committed by Joseph Nuthalapati
parent 71a50e6d19
commit 847de4d570
No known key found for this signature in database
GPG Key ID: 5398F00A2FA43C35

View File

@ -151,6 +151,13 @@ clean:
rm -rf Plinth.egg-info
find plinth/locale -name *.mo -delete
define DEVELOP_SERVICE_CONF
[Service]
Environment=FREEDOMBOX_DEVELOP=1
Environment=PYTHONPATH=/freedombox/
endef
export DEVELOP_SERVICE_CONF
# Run basic setup for a developer environment (VM or container)
provision-dev:
# Install newer build dependencies if any
@ -160,9 +167,19 @@ provision-dev:
# Install latest code over .deb
$(MAKE) build install
# Configure privileged daemon for development setup
mkdir -p /etc/systemd/system/freedombox-privileged.service.d/
echo "$$DEVELOP_SERVICE_CONF" > /etc/systemd/system/freedombox-privileged.service.d/develop.conf
# Reload newer systemd units, ignore failure
-systemctl daemon-reload
# Enable privileged daemon
-systemctl stop freedombox-privileged.service
-test -d /run/systemd/system && \
systemctl enable --now freedombox-privileged.socket
# Stop any ongoing upgrade, ignore failure
-killall -9 unattended-upgr