- grab a copy of the environment variables from the 1PW Isomer vault
- ensure that you have your
AWS_ACCESS_KEY_ID
together withAWS_SECRET_ACCESS_KEY
. These can be generated from the IAM console, under security credentials. (see here for more details) - next, generate your ssh keys and add them to the .env file. (See here for details on generating a new SSH key and adding it to your Github account.)
- run
npm run dev
- Ensure pre-commit hooks are setup for safe commits. See below section on "Setting up Git Guardian"
- Ensure node 14 is installed. Install and use nvm to manage multiple node versions.
- Run
npm i
to install required packages - Ensure Docker is installed
- Run
npm run dev:services
to bring up the docker containers - Run
npm run dev
to start the server
- Install GitGuardian
brew install gitguardian/tap/ggshield
- Add the API Key to your
.env
file
# Service API key from GitGuardian account
export GITGUARDIAN_API_KEY=abc123
Notes:
Only if necessary,
- To skip all pre-commit hooks, use
$ git commit -m "commit message" -n
- To skip only GitGuardian’s hook, use
$ SKIP=ggshield git commit -m "commit message"
To run the E2E tests successfully, you will need to define the following environment variables:
export E2E_TEST_REPO="e2e-test-repo"
export E2E_TEST_SECRET="blahblahblah" // this should match the value of CYPRESS_COOKIE_VALUE on
// the frontend
export E2E_TEST_GH_TOKEN="" // this can be your own personal GH access token, or the token from our
// specialized E2E test user
Run the following on the release branch to tag and push changes automatically:
npm run release --isomer_update=<versionType>
where versionType corresponds to npm version types. This only works on non-Windows platforms, for Windows, modify the release script to use %npm_config_update% instead of $npm_config_update.
The following steps are needed before you can run migrations on a remote database in a private subnet of an AWS VPC.
First, ensure that you are connected to AWS VPN as only the VPN is whitelisted to use the EC2 instance1.
Next, you will require the correct environment variables and credentials.
- Go into the 1PW Isomer - Admin vault and search for the
.ssh/.env.<staging | production>
file. - Create a folder named .ssh in the root directory and place the
.env
files there. - Search for the corresponding credentials
isomercms-<staging | production>-bastion.pem
- Put these credentials into the .ssh folder also.
Next, run the following command: npm run jump:<staging | production>
. This sets up the port-forwarding service.
Finally, run the following command in a separate terminal: npm run db:migrate:<staging | production>
to run the migration.
What happens under the hood is described below: You need to set up a local port-forwarding service that forwards traffic from a specific local port, e.g. 5433, to the database via the bastion host (remember: the bastion host resides in the public subnet of the VPC and thus can be contactable from your computer).
- Open a terminal window and run the following command:
ssh -L 5433:<DB_HOST>:5432 <SSH_USER>@<SSH_HOST> -i <PATH_TO_SSH_HOST_PEM_FILE>
- The
DB_HOST
,SSH_USER
,SSH_HOST
, andPEM_FILE
values can be found in theCMS <ENVIRONMENT> Database
file in theIsomer - Admin
1Password vault. - The
PEM_FILE
(the actual file) can be found in theIsomer - Admin
1Password vault as well. Download the file and save it to your computer. and update the file value forPATH_TO_SSH_HOST_PEM_FILE
.
Finally, we want to run the migration script.
- Modify the
DB_URI
in the.env
file so that Sequelize connects to the local port-forwarding service at port 5433:postgres://<DB_USER>:<DB_PASS>@127.0.0.1:5433/<DB_NAME>
- Open another terminal window.
- Run
source .env
- Run
npx sequelize-cli db:migrate
1 To check whitelisted IPs in EC2 instance,
- Log into the AWS console and navigate to the EC2 Dashboard.
- Navigate to the Security Groups tab by looking at the Network & Security section in the left pane and clicking on the Security Groups tab.
- Look for the security group titled
cms-bastion-<ENVIRONMENT>
, where<ENVIRONMENT>
is either staging or production. Click on the security group and then the Inbound rules tab. - If you see your IP address in the Inbound rules whitelist, you are done with this step.