Skip to content

isomerpages/isomercms-backend

Repository files navigation

Running dev environment

  1. grab a copy of the environment variables from the 1PW Isomer vault
  2. ensure that you have your AWS_ACCESS_KEY_ID together with AWS_SECRET_ACCESS_KEY. These can be generated from the IAM console, under security credentials. (see here for more details)
  3. next, generate your ssh keys and add them to the .env file. (See here for details on generating a new SSH key and adding it to your Github account.)
  4. run npm run dev

Setup

  1. Ensure pre-commit hooks are setup for safe commits. See below section on "Setting up Git Guardian"
  2. Ensure node 14 is installed. Install and use nvm to manage multiple node versions.
  3. Run npm i to install required packages
  4. Ensure Docker is installed
  5. Run npm run dev:services to bring up the docker containers
  6. Run npm run dev to start the server

Setting Up Git Guardian

  1. Install GitGuardian
brew install gitguardian/tap/ggshield
  1. Add the API Key to your .env file
# Service API key from GitGuardian account
export GITGUARDIAN_API_KEY=abc123

Notes:

Only if necessary,

  • To skip all pre-commit hooks, use $ git commit -m "commit message" -n
  • To skip only GitGuardian’s hook, use $ SKIP=ggshield git commit -m "commit message"

E2E Tests

To run the E2E tests successfully, you will need to define the following environment variables:

export E2E_TEST_REPO="e2e-test-repo"
export E2E_TEST_SECRET="blahblahblah" // this should match the value of CYPRESS_COOKIE_VALUE on
// the frontend
export E2E_TEST_GH_TOKEN="" // this can be your own personal GH access token, or  the token from our
// specialized E2E test user

Release

Run the following on the release branch to tag and push changes automatically:

npm run release --isomer_update=<versionType>

where versionType corresponds to npm version types. This only works on non-Windows platforms, for Windows, modify the release script to use %npm_config_update% instead of $npm_config_update.

Running migrations on a remote database in a private subnet of a VPC

The following steps are needed before you can run migrations on a remote database in a private subnet of an AWS VPC.

First, ensure that you are connected to AWS VPN as only the VPN is whitelisted to use the EC2 instance1.

Next, you will require the correct environment variables and credentials.

  • Go into the 1PW Isomer - Admin vault and search for the .ssh/.env.<staging | production> file.
  • Create a folder named .ssh in the root directory and place the .env files there.
  • Search for the corresponding credentials isomercms-<staging | production>-bastion.pem
  • Put these credentials into the .ssh folder also.

Next, run the following command: npm run jump:<staging | production>. This sets up the port-forwarding service. Finally, run the following command in a separate terminal: npm run db:migrate:<staging | production> to run the migration.

What happens under the hood is described below: You need to set up a local port-forwarding service that forwards traffic from a specific local port, e.g. 5433, to the database via the bastion host (remember: the bastion host resides in the public subnet of the VPC and thus can be contactable from your computer).

  • Open a terminal window and run the following command: ssh -L 5433:<DB_HOST>:5432 <SSH_USER>@<SSH_HOST> -i <PATH_TO_SSH_HOST_PEM_FILE>
  • The DB_HOST, SSH_USER, SSH_HOST, and PEM_FILE values can be found in the CMS <ENVIRONMENT> Database file in the Isomer - Admin 1Password vault.
  • The PEM_FILE (the actual file) can be found in the Isomer - Admin 1Password vault as well. Download the file and save it to your computer. and update the file value for PATH_TO_SSH_HOST_PEM_FILE.

Finally, we want to run the migration script.

  • Modify the DB_URI in the .env file so that Sequelize connects to the local port-forwarding service at port 5433: postgres://<DB_USER>:<DB_PASS>@127.0.0.1:5433/<DB_NAME>
  • Open another terminal window.
  • Run source .env
  • Run npx sequelize-cli db:migrate

1 To check whitelisted IPs in EC2 instance,

  • Log into the AWS console and navigate to the EC2 Dashboard.
  • Navigate to the Security Groups tab by looking at the Network & Security section in the left pane and clicking on the Security Groups tab.
  • Look for the security group titled cms-bastion-<ENVIRONMENT>, where <ENVIRONMENT> is either staging or production. Click on the security group and then the Inbound rules tab.
  • If you see your IP address in the Inbound rules whitelist, you are done with this step.