========================
If you're new to Django, see Getting Started with Django for an introduction to the framework.
-
Install Docker https://docs.docker.com/get-docker/
-
Initialize the application:
cd src docker-compose build
-
Run the server:
docker-compose up
Press Ctrl-c when you'd like to exit or pass
-d
to run in detached mode.
Visit the running application at http://localhost:8080.
- If you are using Windows, you may need to change your line endings. If not, you may not be able to run manage.py.
- Unix based operating systems (like macOS or Linux) handle line separators differently than Windows does. This can break bash scripts in particular. In the case of manage.py, it uses #!/usr/bin/env python to access the Python executable. Since the script is still thinking in terms of unix line seperators, it may look for the executable python\r rather than python (since Windows cannot read the carriage return on its own) - thus leading to the error
usr/bin/env: 'python\r' no such file or directory
- If you'd rather not change this globally, add a
.gitattributes
file in the project root with* text eol=lf
as the text content, and refresh the repo - If you are using a Mac with a M1 chip, and see this error
The chromium binary is not available for arm64.
or an error involvingpuppeteer
, try adding this line below into your.bashrc
or.zshrc
.
export DOCKER_DEFAULT_PLATFORM=linux/amd64
When completed, don't forget to rerun docker-compose up
!
We use the branch convention of initials/branch-topic
(ex: lmm/fix-footer
). This allows for automated deployment to a developer sandbox namespaced to the initials.
History preservation and merge contexts are more important to us than a clean and linear history, so we will merge instead of rebasing. To bring your feature branch up-to-date wih main:
git checkout main
git pull
git checkout <feature-branch>
git merge orgin/main
git push
Resources:
- https://frontend.turing.edu/lessons/module-3/merge-vs-rebase.html
- https://www.atlassian.com/git/tutorials/merging-vs-rebasing
- https://www.simplilearn.com/git-rebase-vs-merge-article
Non-secret environment variables for local development are set in src/docker-compose.yml.
Secrets (for example, if you'd like to have a working Login.gov authentication) go in .env
in src/ with contents like this:
DJANGO_SECRET_LOGIN_KEY="<...>"
You'll need to create the .env
file yourself. Get started by running:
cd src
cp ./.env-example .env
Get the secrets from Cloud.gov by running cf env getgov-YOURSANDBOX
. More information is available in rotate_application_secrets.md.
The endpoint /admin can be used to view and manage site content, including but not limited to user information and the list of current applications in the database. However, access to this is limited to analysts and full-access users with regular domain requestors and domain managers not being able to see this page.
While on production (the sandbox referred to as stable
), an existing analyst or full-access user typically grants access /admin as part of onboarding (see these instructions), doing this for all development sandboxes is very time consuming. Instead, to get access to /admin on all development sandboxes and when developing code locally, refer to the following sections depending on what level of user access you desire.
To get access to /admin on every non-production sandbox and to use /admin in local development, do the following:
- Login via login.gov
- Go to the home page and make sure you can see the part where you can submit a domain request
- Go to /admin and it will tell you that your UUID is not authorized (it shows a very long string, this is your UUID). Copy that UUID for use in 4.
- (Designers) Message in #getgov-dev that you need access to admin as a
superuser
and send them this UUID along with your desired email address. Please see the "Adding an Analyst to /admin" section below to complete similiar steps if you also desire ananalyst
user account. Engineers will handle the remaining steps for designers, stop here.
(Engineers) In src/registrar/fixtures_users.py add to the ADMINS
list in that file by adding your UUID as your username along with your first and last name. See below:
ADMINS = [
{
"username": "<UUID here>",
"first_name": "",
"last_name": "",
"email": "",
},
...
]
- (Engineers) In the browser, navigate to /admin. To verify that all is working correctly, under "domain requests" you should see fake domains with various fake statuses.
- (Engineers) Add an optional email key/value pair
Analysts are a variant of the admin role with limited permissions. The process for adding an Analyst is much the same as adding an admin:
-
Login via login.gov (if you already exist as an admin, you will need to create a separate login.gov account for this: i.e. [email protected])
-
Go to the home page and make sure you can see the part where you can submit a domain request
-
Go to /admin and it will tell you that UUID is not authorized, copy that UUID for use in 4 (this will be a different UUID than the one obtained from creating an admin)
-
(Designers) Message in #getgov-dev that you need access to admin as a
superuser
and send them this UUID along with your desired email address. Engineers will handle the remaining steps for designers, stop here. -
(Engineers) In src/registrar/fixtures_users.py add to the
STAFF
list in that file by adding your UUID as your username along with your first and last name. See below:
STAFF = [
{
"username": "<UUID here>",
"first_name": "",
"last_name": "",
"email": "",
},
...
]
- (Engineers) In the browser, navigate to /admin. To verify that all is working correctly, verify that you can only see a sub-section of the modules and some are set to view-only.
- (Engineers) Add an optional email key/value pair
Do note that if you wish to have both an analyst and admin account, append -Analyst
to your first and last name, or use a completely different first/last name to avoid confusion. Example: Bob-Analyst
On all non-production environments, we use an email whitelist table (called Allowed emails
). This whitelist is not case sensitive, and it provides an inclusion for +1 emails (like [email protected]). The content after the +
can be any digit. The whitelist checks for the "base" email (example.person) so even if you only have the +1 email defined, an email will still be sent assuming that it follows those conventions.
To add yourself to this, you can go about it in three ways.
Permanent (all sandboxes):
- In src/registrar/fixtures_users.py, add the "email" field to your user in either the ADMIN or STAFF table.
- In src/registrar/fixtures_users.py, add the desired email address to the
ADDITIONAL_ALLOWED_EMAILS
list. This route is suggested for product.
Sandbox specific (wiped when the db is reset):
3. Create a new record on the Allowed emails
table with your email address. This can be done through django admin.
More detailed instructions regarding #3 can be found here.
The CODEOWNERS file sets the tagged individuals as default reviewers on any Pull Request that changes files that they are marked as owners of.
-
Go to .github\CODEOWNERS
-
Following the CODEOWNERS documentation, add yourself as owner to files that you wish to be automatically requested as reviewer for.
For example, if you wish to add yourself as a default reviewer for all pull requests, add your GitHub username to the same line as the
*
designator:- * @abroddrick + * @abroddrick @YourGitHubUser
-
Create a pull request to finalize your changes
If you run via docker-compose up
, you'll see the logs in your terminal.
If you run via docker-compose up -d
, you can get logs with docker-compose logs -f
.
You can change the logging verbosity, if needed. Do a web search for "django log level".
load.py called from docker-compose (locally) and reset-db.yml (upper) loads the fixtures from fixtures_user.py and the rest of the data-loading fixtures in that fixtures folder, giving you some test data to play with while developing.
See the database-access README for information on how to pull data to update these fixtures.
Crash course on Docker's run
vs exec
: in order to run the tests inside of a container, a container must be running. If you already have a container running, you can use exec
. If you do not, you can use run
, which will attempt to start one.
To get a container running:
cd src
docker-compose build
docker-compose up -d
Django's test suite:
docker-compose exec app ./manage.py test
OR
docker-compose exec app python -Wa ./manage.py test # view deprecation warnings
Linters:
docker-compose exec app ./manage.py lint
To test behind logged in pages with external tools, like pa11y-ci
or OWASP Zap
, add
"registrar.tests.common.MockUserLogin"
to MIDDLEWARE in settings.py. Remove it when you are finished testing.
Some tests, particularly when using Django's test client, will print errors.
These errors do not indicate test failure, but can make the output hard to read.
To silence them, we have a helper function less_console_noise
:
from .common import less_console_noise
...
with less_console_noise():
# <test code goes here>
Or alternatively, if you prefer using a decorator, just use:
from .common import less_console_noise_decorator
@less_console_noise_decorator
def some_function():
# <test code goes here>
We use the ANDI browser extension from ssa.gov for accessibility testing outside the pipeline.
ANDI will get blocked by our CSP settings, so you will need to install the Disable Content-Security-Policy extension and activate it for the page you'd like to test.
Note - refresh after enabling the extension on a page but before clicking ANDI.
The tool pa11y-ci
is used to scan pages for compliance with a set of
accessibility rules. The scan runs as part of our CI setup (see
.github/workflows/test.yaml
) but it can also be run locally. To run locally,
type
docker-compose run pa11y npm run pa11y-ci
The URLs that pa11y-ci
will scan are configured in src/.pa11yci
. When new
views and pages are added, their URLs should also be added to that file.
The tool OWASP Zap is used for scanning the codebase for compliance with
security rules. The scan runs as part of our CI setup (see
.github/workflows/test.yaml
) but it can also be run locally. To run locally,
type
docker-compose run owasp
We use the U.S. Web Design System (USWDS) for styling our applications.
Static files (images, CSS stylesheets, JavaScripts, etc) are known as "assets".
Assets are stored in registrar/assets
during development and served from registrar/public
. During deployment, assets are copied from registrar/assets
into registrar/public
. Any assets which need processing, such as USWDS Sass files, are processed before copying.
Note: Custom images are added to /registrar/assets/img/registrar
, keeping them separate from the images copied over by USWDS. However, because the /img/
directory is listed in .gitignore
, any files added to /registrar/assets/img/registrar
will need to be force added (i.e. git add --force <img-file>
) before they can be deployed.
We utilize the uswds-compile tool from USWDS to compile and package USWDS assets.
When you run docker-compose up
the node
service in the container will begin to watch for changes in the registrar/assets
folder, and will recompile once any changes are made.
Within the registrar/assets
folder, the _theme
folder contains three files initially generated by uswds-compile
:
_uswds-theme-custom-styles
contains all the custom styles created for this application_uswds-theme
contains all the custom theme settings (e.g. primary colors, fonts, banner color, etc..)styles.css
a entry point or index for the styles, forwards all of the other style files used in the project (i.e. the USWDS source code, the settings, and all custom stylesheets).
You can also compile the Sass at any time using npx gulp compile
. Similarly, you can copy over other static assets (images and javascript files), using npx gulp copyAssets
.
We use the CSS Block Element Modifier (BEM) naming convention for our custom classes. This is in line with how USWDS approaches their CSS class architecture and helps keep our code cohesive and readable.
- Version numbers can be manually controlled in
package.json
. Edit that, if desired. - Now run
docker-compose run node npm update
. - Then run
docker-compose up
to recompile and recopy the assets, or rundocker-compose updateUswds
if your docker is already up. - Make note of the dotgov changes in uswds-edited.js.
- Copy over the newly compiled code from uswds.js into uswds-edited.js.
- Put back the dotgov changes you made note of into uswds-edited.js.
- Examine the results in the running application (remember to empty your cache!) and commit
package.json
andpackage-lock.json
if all is well.
In an effort to keep our domain logic centralized, we are representing the state of objects in the application using the django-fsm library. See the ADR number 15 for more information on the topic.
If you are seeing errors related to openid complaining about issuing a token from the future like this:
ERROR [djangooidc.oidc:243] Issued in the future
it may help to resync your laptop with time.nist.gov:
sudo sntp -sS time.nist.gov
This can either be done through the CLI, or through the cloud.gov dashboard. Generally, it is better to do it through the dashboard as it handles app binding for you.
To associate a S3 instance to your sandbox, follow these steps:
- Navigate to https://dashboard.fr.cloud.gov/login
- Select your sandbox from the
Applications
tab - Click
Services
on the application nav bar - Add a new service (plus symbol)
- Click
Marketplace Service
- For Space, put in your sandbox initials
- On the
Select the service
dropdown, selects3
- Under the dropdown on
Select Plan
, selectbasic-sandbox
- Under
Service Instance
entergetgov-s3
for the name and leave the other fields empty
See this resource for information on associating an S3 instance with your sandbox through the CLI.
To test the S3 bucket associated with your sandbox, you will need to add four additional variables to your .env
file. These are as follows:
AWS_S3_ACCESS_KEY_ID = "{string value of `access_key_id` in getgov-s3}"
AWS_S3_SECRET_ACCESS_KEY = "{string value of `secret_access_key` in getgov-s3}"
AWS_S3_REGION = "{string value of `region` in getgov-s3}"
AWS_S3_BUCKET_NAME = "{string value of `bucket` in getgov-s3}"
You can view these variables by running the following command:
cf env getgov-{app name}
Then, copy the variables under the section labled s3
.
- On the app, navigate to
\admin
. - Under models, click
Waffle flags
. - Click the
disable_email_sending
record. This should exist by default, if not - create one with that name. - (Important) Set the field
everyone
toYes
. This field overrides all other settings
The .gov Domain Request & Domain Status Digram visualizes the domain request flow and resulting domain objects.