This document summarizes guidelines and helpful options when hacking on the airmapd codebase.
Occasionally, during local development, being able to selectively redirect requests to specific AirMap APIs is helpful. For that, the following environment variables can be set:
AIRMAP_PROTOCOL_AIRCRAFTS,AIRMAP_HOST_AIRCRAFTS,AIRMAP_PORT_AIRCRAFTSandAIRMAP_ROUTE_AIRCRAFTSfor APIaircraftsAIRMAP_PROTOCOL_AIRSPACES,AIRMAP_HOST_AIRSPACES,AIRMAP_PORT_AIRSPACESandAIRMAP_ROUTE_AIRSPACESfor APIairspacesAIRMAP_PROTOCOL_AUTHENTICATOR,AIRMAP_HOST_AUTHENTICATOR,AIRMAP_PORT_AUTHENTICATORandAIRMAP_ROUTE_AUTHENTICATORfor authentication purposesAIRMAP_PROTOCOL_FLIGHTS,AIRMAP_HOST_FLIGHTS,AIRMAP_PORT_FLIGHTSandAIRMAP_ROUTE_FLIGHTSfor APIflightsAIRMAP_PROTOCOL_PILOTS,AIRMAP_HOST_PILOTS,AIRMAP_PORT_PILOTSandAIRMAP_ROUTE_PILOTSfor APIpilotsAIRMAP_PROTOCOL_STATUS,AIRMAP_HOST_STATUS,AIRMAP_PORT_STATUSandAIRMAP_ROUTE_STATUSfor APIstatusAIRMAP_PROTOCOL_SSO,AIRMAP_HOST_SSOandAIRMAP_PORT_SSOfor the SSO endpoint
An example invocation of airmap redirecting API flights to localhost:3000, routing via /bla/blubb, accessing without SSL would look like:
AIRMAP_PROTOCOL_FLIGHTS=http AIRMAP_HOST_FLIGHTS=localhost AIRMAP_PORT_FLIGHTS=3000 AIRMAP_ROUTE_FLIGHTS=/bla/blubb airmap test --test-suite=laanc.phoenix.zoo