The Procurement Concierge is a web application that enables Buyers to work with Program Staff to publish Requests for Information, and for Vendors to respond to them. In addition, Vendors can use this tool to publish their own ideas, enabling Program Staff to facilitate connections between Buyers and Vendors.
This document describes the project's developer environment, technical architecture and deployment infrastructure.
The Concierge is a full-stack TypeScript web application that uses MongoDB for persistence. It is written in a functional and declarative style with the goal of maximising compile-time guarantees through type-safety.
The source code is split into four parts:
src/front-end
)A TypeScript single-page application using React, Immutable.js, Bootstrap and SASS. The front-end's build system is executed by Grunt.
The front-end's state management framework (src/front-end/lib/framework.tsx
) provides type-safe state management, and is heavily influenced by the Elm Architecture. If you've used Redux before, you will find this to be very similar since Redux is also based on the Elm Architecture. The main difference is that this project's framework derives greater inspiration from the Elm Architecture and it aims to be far more type-safe than Redux.
src/back-end
)A TypeScript server that vends the front-end's build assets (src/back-end/lib/routers/front-end.ts
) as well as a JSON CRUD API (src/back-end/lib/resources/**.ts
) that performs business logic and persists data to a MongoDB database.
The server framework (src/back-end/lib/server/index.ts
) provides type-safe abstractions for API development, and is executed by Express (src/back-end/lib/server/adapters.ts
).
CRUD resources are created in a standardised, type-safe way in this project. CRUD abstractions are located in src/back-end/lib/crud.ts
, and it is recommended to review this module prior to extending the API.
src/shared
)The src/shared
folder contains modules that expose types and functions that are used across the entire stack: front-end and back-end.
migrations
)All database migration logic is stored in the migrations
folder. Migrations are managed by the migrate
NPM module, and use the native MongoDB driver to execute them. The MongoDB-related environment variables described below are required to define the database to connect to.
You can create a migration using the following command:
npm run migrations:create -- <MIGRATION_NAME>
This command creates a migration file from a template and stores it at migrations/migrations/{TIMESTAMP}_{MIGRATION_NAME}.ts
.
DO NOT delete or change committed migration files. Creating and executing migrations is a stateful process, and, unless you know what you are doing, running a database migration should be viewed as an irreversible process.
Features should be implemented in feature branches. Create a pull request against the develop
branch to have your work reviewed for subsequent deployment.
The develop
branch contains all approved code.
The master
branch contains work that has passed the Quality Assurance process and is ready to be deployed to production.
Hotfixes can be merged directly to master
via a pull request, but should be merged back into the develop
branch as well.
If you are using NixOS or the Nix package manager, running nix-shell
will install all necessary dependencies,
and drop you in a shell with them accessible in your $PATH
.
If you are not using Nix, please ensure the following packages have been installed:
Once complete, cd
into this repository's root directory and proceed to install NPM dependencies:
npm install
Once you have installed all necessary dependencies, create a .env
file and replace the placeholder values with your credentials. Refer to the "Environment Variables" section below for further information.
cp sample.env .env
# Open .env in your text editor.
Finally, open three terminals and run the following commands:
docker-compose up -d db # Terminal 1, starts a local MongoDB server.
npm run back-end:watch # Terminal 2, starts the back-end server.
npm run front-end:watch # Terminal 3, builds the front-end source code.
Then, visit the URL logged to your terminal to view the now locally-running web application.
You can stop the local MongoDB server by running docker-compose down
.
You can wipe the local MongoDB server by removing the .db
directory.
You can also run the application in a docker container locally, by using docker-compose up -d
(do not specify the db
service). This will build the front-end, and run the back-end as a service in the background.
It is recommended that developers use the following scripts defined in package.json
to operate this web application:
# Usage
npm run <SCRIPT_NAME>
Script Name | Description |
---|---|
start |
Runs the back-end server. |
front-end:lint |
Lints the front-end source code using tslint. |
front-end:typecheck |
Typechecks the front-end source code using tsc. |
front-end:test |
Runs unit tests for the front-end source code. |
front-end:build |
Builds the front-end using grunt. |
front-end:watch |
Builds the front-end using grunt, and rebuilds it whenever a front-end or shared source file changes. |
front-end:typedoc |
Builds TypeDoc API documentation for the front-end source code. |
back-end:lint |
Lints the back-end source code using tslint. |
back-end:typecheck |
Typechecks the back-end source code using tsc. |
back-end:test |
Runs unit tests for the back-end source code. |
back-end:start |
Starts the back-end server. |
back-end:watch |
Starts the back-end server inside a nodemon process, and restarts it whenever a back-end or shared source file changes. |
back-end:typedoc |
Builds TypeDoc API documentation for the back-end source code. |
shared:typedoc |
Builds TypeDoc API documentation for the shared source code. |
migrations:create |
Creates a migration file from a template in migrations/migrations . |
migrations:up |
Runs migrations using their exported up functions. |
migrations:down |
Runs migrations using their exported down functions. |
typedoc:build |
Builds all TypeDoc API documentation. |
typedoc:start |
Serves TypeDoc documentation on a local server. |
docs:readme-toc |
Generate and insert a table of contents for README.md. |
docs:licenses |
Generate the list of licenses from this project's NPM dependencies in OPEN_SOURCE_LICENSES.txt. |
Developers can configure the following environment variables to alter how the web application is built and/or run.
All environment variables affect the back-end server's functionality, and are sanitised in src/back-end/config.ts
.
NODE_ENV
is the only environment variable that affects how the front-end source code is built.
In development, developers can create a .env
file in the repository's root directory to configure environment variables.
As a convenience, developers can refer to sample.env
as a guide.
Name | Description |
---|---|
NODE_ENV |
The back-end run-time's environment, or the front-end's build target. Possible values include either "development" or "production". |
SERVER_HOST |
The IPv4 address for the back-end to bind to. |
SERVER_PORT |
The TCP port for the back-end to bind to. |
BASIC_AUTH_USERNAME |
An HTTP basic auth username to limit access to the web application. |
BASIC_AUTH_PASSWORD_HASH |
A password hash to authenticate HTTP basic auth passwords to limit access to the web application. |
MONGO_URL |
The MongoDB database to connect to. |
DATABASE_SERVICE_NAME |
Auto-generated by OpenShift. |
${DATABASE_SERVICE_NAME}_SERVICE_HOST |
The MongoDB host to connect to in OpenShift. |
${DATABASE_SERVICE_NAME}_SERVICE_PORT |
The MongoDB port to connect to in OpenShift. |
MONGODB_USER |
The MongoDB user to connect with in OpenShift. |
MONGODB_PASSWORD |
The MongoDB password to connect with in OpenShift. |
MONGODB_DATABASE_NAME |
The MongoDB database to connect to in OpenShift. |
TOKEN_SECRET |
The secret used to hash ForgotPasswordTokens. |
COOKIE_SECRET |
The secret used to hash cookies. |
FILE_STORAGE_DIR |
The location to store uploaded files. |
SENDGRID_USER |
A SendGrid SMTP username to test transactional emails in development. |
SENDGRID_PASS |
A SendGrid SMTP password to test transactional emails in development. |
MAILER_NOREPLY |
The no-reply email address to use for email notifications. If using SendGrid in development, this must match a registered sender in Sendgrid. |
MAILER_HOST |
SMTP server host for transactional emails in production. |
MAILER_PORT |
SMTP server port for transactional emails in production. |
MAILER_FROM |
The sender for transactional emails. |
MAILER_ROOT_URL |
The domain used for links in transactional email bodies. |
CONTACT_EMAIL |
The Procurement Transformation team's contact email address. |
SCHEDULED_MAINTENANCE |
A boolean flag (0 for false , 1 for true ) to turn off CRUD endpoints and vend a downtime HTML page to all users when set to a non-zero number. |
HIDE_VENDOR_IDEAS |
Feature flag for hiding the Vendor Ideas / Unsolicited Proposals features. Defaults to false . Set to true to hide features. |
FORCE_SHOW_VENDOR_IDEAS |
A semi-colon separated list of user emails that will allow certains users to access the Vendor Ideas / Unsolicited Proposal features, despite them being hidden. Has no effect if HIDE_VENDOR_IDEAS is set to false . |
This project is deployed to the Government of British Columbia's own OpenShift infrastructure. NOTE The instructions below apply to deployment to the OpenShift 4 (OCP4) environment, and no longer apply to deployment to OCP3 environments.
We have three application environments:
OpenShift Project | Name | URL |
---|---|---|
1b91ec-dev | Development | https://app-concierge-dev.apps.silver.devops.gov.bc.ca |
1b91ec-test | Test | https://app-concierge-test.apps.silver.devops.gov.bc.ca |
1b91ec-prod | Production | https://app-concierge-prod.apps.silver.devops.gov.bc.ca |
The Development, Test and Staging environments are secured behind HTTP Basic Auth. Please contact a team member to access these credentials.
The "1b91ec-tools" OpenShift project is used to trigger the deployment process for all environments.
To deploy to the Development environment, start a build for "app-concierge-dev", and OpenShift will build and deploy HEAD from the development
branch into the Dev environment listed above.
To deploy to the Test environment, start a build for "app-concierge-test", and OpenShift will build and deploy HEAD from the master
branch into the Test environment listed above.
To deploy to the Production environment, start a build for "app-concierge-prod", and OpenShift will build HEAD from the master
branch. You will need to manually deploy the build to the Production environment listed above once it completes by deploying the "app-concierge-prod" deployment in the "1b91ec-prod" project.
For instructions on building images for each of the environments and setting up build and deployment configurations in OpenShift 4, please refer to the instructions in openshift/README.md.
Using an environment's deployment shell, run npm run migrations:up
or npm run migrations:down
in the root of this repository's directory.
Automated backups of the MongoDB database are performed with the BC Government Backup Container. Full documentation for this tool can be found here: https://github.com/BCDevOps/backup-container. The schedule for automated backups is as follows:
A manual backup can be immediately performed by connecting to the backup container pod in OpenShift and running backup.sh -1
.
Backup archives are stored in the same OpenShift project as the Procurement Concierge application, on a separate provisioned volume.
You can find instructions for building and deploying the Backup Container images to OpenShift 4 here.
In the unfortunate event that you need to restore your data from a backup archive, the backup.sh
script can be used to restore from the last backup file. Refer to https://github.com/BCDevOps/backup-container#restore for details on how to use this script.
If you are deploying the Concierge application to OpenShift, we recommend running the MongoDB database as a replica set, or Stateful Set in OpenShift. Replica sets use redundant pods on separate nodes to minimize downtime and mitigate data loss. We have provided the necessary configuration and instructions for setting up the replica set in openshift/README.md.
If you are deploying the Concierge application to OpenShift, we recommend running the MongoDB database as a replica set, or Stateful Set in OpenShift. Replica sets use redundant pods on separate nodes to minimize downtime and mitigate data loss. We have provided the necessary configuration and instructions for setting up the replica set and configuring the application below.
IMPORTANT: Create a backup of your existing database before migrating to a replica set. This is in case anything goes wrong, and for transferring over data to the replica set.
Create the replicaset
openshift/mongodb-replicaset
and change the appropriate parameters values before performing the steps belowoc new-app openshift/mongodb-replicaset.yaml
to create the replicaset from the openshift command line toolsMigrate existing data to the replicaset
mongodump -u admin -p <admin-password> --authenticationDatabase=admin
mongorestore -u admin -p <admin-password> --authenticationDatabase=admin
Configure the Concierge application to use the replicaset
rs0
)Set the backup pod to point to the replicaset
Cleanup
The Procurement Concierge is currently operated by the BC Developers' Exchange within the Government of British Columbia.
This project was originally built by the digital product development team at Real Folk.
This project would not have been possible by the incredible work done by open source project maintainers. The licenses for open source projects used by the Procurement Concierge Program's web app are documented in OPEN_SOURCE_LICENSES.tx.
In addition, the hero image on the web app's landing page is provided by Cytonn Photography on Unsplash.