Skip to content

(Enquiry) Service for returning technical documents produced by CVS services. Test Certificates, Ministry Plates etc.

License

Notifications You must be signed in to change notification settings

dvsa/cvs-svc-document-retrieval

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

cvs-svc-document-retrieval

Lambda to retrieve test certificates for commercial vehicles

Dependencies

The project runs on node 18.x with typescript and serverless framework. For further details about project dependencies, please refer to the package.json file. nvm is used to managed node versions and configuration explicitely done per project using an .npmrc file.

Running the project

Once the dependencies are installed, you will be required to rename the /config/env.example file to .env.local as we use dotenv files for configuration for local local development for example. Further information about variables and environment variables with serverless.

The application runs on port :3001 by default when no stage is provided.

Environments

We use NODE_ENV environment variable to set multi-stage builds (region, stages) with the help of dotenv through npm scripts to load the relevant .env.<NODE_ENV> file from ./config folder into the serverless.yml file as we don't rely on serverless for deployment. If no NODE_ENV value is provided when running the scripts, it will default its NODE_ENV value to 'development' with the .env.development config file.

The defaulted values for 'stage' and 'region' are 'local'. Please refer to the values provided in the serverless.yml file.

The following values can be provided when running the scripts with NODE_ENV:

// ./config/.env.<NODE_ENV> files
'local'; // used for local development
'development'; // used development staging should we wish to require external services
'test'; // used during test scripts where local services, mocks can be used in conjonction
/** Running serverless offline as an example for a specific stage - 'local'.
* Stage 'local' will be injected in the serverless.yml
**/
NODE_ENV=local serverless offline

Further details about environment setup can be found in the provided documentation and env.example file.

All secrets the secrets are will stored in AWS Secrets Manager.

Scripts

The following scripts are available, for further information please refer to the project package.json file:

  • start: npm start - launch serverless offline service
  • dev: npm run dev - run in parallel the service and unit tests in --watch mode with live reload.
  • test: npm t - execute the unit test suite
  • build: npm run build - bundle the project for production

Offline

Serverless-offline with webpack is used to run the project locally. Please use npm run dev script to do so. Go to http://localhost:3001/local/version to confirm that everything has loaded correctly, you should see that the version is the same as the version in the package.json. You will also require the aws cli tool.

To test downloading a certificate:

  1. Change the default credentials to the serverless-s3-local ones (S3RVER, S3RVER) or create a s3profile in your ~/.aws/credentials if you already have existing aws profiles.
  2. Create a folder in the root of the project called buckets
  3. Download a pdf/certificate and run aws --endpoint http://localhost:4569 s3api put-object --bucket cvs-cert-develop --key <your certificate name> --body <location of your certificate including filename> --content-type application/octet-stream to put a copy of your certificate into the S3 bucket which is in the buckets folder you created.
  4. Use Postman to request the certificate using the VIN and certificate number in the name of your certificate. E.g. http://localhost:3001/local/document-retrieval?vinNumber=T12765432&testNumber=W01A00229 for a file with a key of W01A00229_T12765432.pdf
  5. Convert the base64 encoded string to a PDF using a service, e.g. https://base64.guru/converter/decode/pdf

You should be able to see the certificate on your screen.

Lambda locally

Serverless can invoke lambda functions locally which provide a close experience to the real service if you decide not use the offline mode. events and paths can be found under /local folder. For further details using lambda locally please refer to the serverless documentation.

Debugging

Existing configuration to debug the running service has been made available for vscode, please refer to .vscode/launch.json file. Serverless offline will be available on port :4000. 2 jest configurations are also provided which will allow to run a test or multiple tests.

For further information about debugging, please refer to the following documentation:

Testing

json-serverless has been added to the repository should we wish to mock external services during development and can be used in conjunction with the test environment.

Unit

Jest is used for unit testing. Please refer to the Jest documentation for further details.

Integration

To be added and customised depending on needs, supertest is used but we could be looking at other packages such as nock, ts-mockito, typemoq, wiremock, etc.. or testing (pactjs, hoverfly, mockserver, etc..)

Infrastructure

Release

Releases (tag, release notes, changelog, github release, assets) are automatically managed by semantic-release and when pushing (or merging) to master branch which is protected. semver convention is followed.

Please be familiar with conventional commit as described in the Contributing section below.

Default preset used is angular for conventional commits, please see the angular conventions.

The <type> 'breaking' in the commit message will trigger a major version bump as well as any of the following text contained in the commit body: "BREAKING CHANGE", "BREAKING CHANGES", "BREAKING_CHANGES", "BREAKING", "BREAKING_CHANGE". Please refer to the .releaserc.json file for the full configuration.

The script npm run release will automatically trigger the release in CI. To manually test the release the following flags ---dry-run --no-ci - can be passed to the release script.

Publishing and artifacts are managed separately by the pipeline.

Contributing

To facilitate the standardisation of the code, a few helpers and tools have been adopted for this repository.

External dependencies

The projects has multiple hooks configured using husky which will execute the following scripts: audit, lint, build, test and format your code with eslint and prettier.

You will be required to install git-secrets (brew approach is recommended) and DVSA repo-security-scanner that runs against your git log history to find accidentally committed passwords, private keys.

We follow the conventional commit format when we commit code to the repository and follow the angular convention.

The type is mandatory and must be all lowercase. The scope of your commit remain is also mandatory, it must include your ticket number and be all lowercase. The format for the ticket number can be set in the commitlint.config.js file.

// Please see /commitlint.config.js for customised format

type(scope?): subject

// examples
'chore(cvsb-1234): my commit msg' // pass
'CHORE(cvsb-1234): my commit msg' // will fail

Code standards

Code structure

Domain Drive Design diagram with Interfaces, Application, Domain layers and Infrastructure across the layers.

Domain Drive Design diagram with Interfaces, Application, Domain layers and Infrastructure across the layers

Please refer to the the docs for the API specification and samples of postman requests.

Toolings

The code uses eslint, typescript clean code standards as well as sonarqube for static analysis. SonarQube is available locally, please follow the instructions below if you wish to run the service locally (brew is the preferred approach):

  • Brew:

    • Install sonarqube using brew
    • Change sonar.host.url to point to localhost, by default, sonar runs on http://localhost:9000
    • run the sonar server sonar start, then perform your analysis npm run sonar-scanner
  • Manual:

    • Add sonar-scanner in environment variables in your _profile file add the line: export PATH=<PATH_TO_SONAR_SCANNER>/sonar-scanner-3.3.0.1492-macosx/bin:$PATH
    • Start the SonarQube server: cd <PATH_TO_SONARQUBE_SERVER>/bin/macosx-universal-64 ./sonar.sh start
    • In the microservice folder run the command: npm run sonar-scanner

About

(Enquiry) Service for returning technical documents produced by CVS services. Test Certificates, Ministry Plates etc.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published