Skip to content
This repository has been archived by the owner on Jun 23, 2023. It is now read-only.

Latest commit

 

History

History
542 lines (406 loc) · 22.8 KB

development_handbook.md

File metadata and controls

542 lines (406 loc) · 22.8 KB

Developer handbook

Table of contents

Description

R3z is a multi-threaded web application with its own web server and its own eventually-consistent database. It builds to a binary that is runnable on any Java virtual machine version 13 or up, using a commandline like

java -jar r3z.jar

It follows some unusual conventions that new developers should be aware of.

For example, we don't have many dependencies in the system. Storytime: As we have developed, we would occasionally bring in a dependency to handle a need. Since we operated with sufficient time to reflect on things, it often occurred to us that a particular dependency was providing relatively little value. We then could easily replace it with just a little custom code. As that continued, we generally found that the only outside code worth its salt happened to already exist in the standard library. As of this writing, we have no dependencies outside the standard library (which is just incredible - thanks Java library developers / Kotlin library developers)

Instead of using a mocking framework, we just create a "Fake" version of a class (e.g. FakeTimeEntryPersistence). This is because mocking frameworks actually compile code at runtime which slows down tests tremendously. By using this practice, our unit tests often take less than even 1 millisecond.

Another example: the data structures in the database are built on a thread-safe data structure (ConcurrentHashMap), so that we don't need to synchronize a great deal of the time.

Ways in which R3z is better

for users:

  • Session remains active all day - you can leave it up and it doesn't timeout
  • Extremely fast
  • Fewer clicks for actions
  • works fine on desktop and mobile
  • easily automatable
  • simplistic and undistracting, high usability

for developers:

  • Since the database is simply a data structure in the system, it is easy to do integration testing, and easily possible to do many integration tests in parallel
  • High test coverage - fearless refactoring unlocked. Furthermore, if a change is made and the tests pass, it gives confidence that nothing was broken.
  • No magic - the system follows an entirely straightforward call tree from the Main() function down. Stack traces highly contribute to debugging, unlike many of the current frameworks. This enables fast feature dev.

For operations:

  • The system shutdown and startup is extremely fast, and it is possible to update the system safely at any time, even in the middle of a work day

for business:

  • BDD documentation of business requirements
  • System requires minimal (read: inexpensive) resources
  • happier users
  • high internal quality means easier, better, faster maintenance and improvements and better security

New Developer Setup

Here's the general series of steps for a new developer:

  1. Install Java 13 onto your machine if you don't already have it. Make sure to add the path to your JDK to your environment as JAVA_HOME, and also add the path to the Java binaries to your PATH variable.
  2. Download and install IntelliJ Community Edition (which is free of charge) if you don't already have it. This is definitely the best IDE for our purposes, since it is developed by the same company that develops the Kotlin language, and also, it's awesome. And it's the IDE all the other developers use. Find it here: https://www.jetbrains.com/idea/download/
  3. Make sure you have the Chrome browser and the Firefox browser installed
  4. Obtain this source code from Github, at https://github.com/7ep/r3z.git
  5. Run the tests on your computer, using the command line: gradlew test (you might need to add dot-slash before that, if you are using macOS or Linux)
  6. Run the application to get a feel for the user experience: gradlew run
  7. Open the software with IntelliJ. Try building and running tests with it. Note that the default test runner in IntelliJ will run the tests serially (rather than in parallel) which takes a while. To run them faster, find the gradle tool window and the test task within it, and run the tests there.
  8. Read through some of this developer documentation to get a feel for some of its unique characteristics.
  9. Examine some tests in the system to get a feel for how the system works and how test automation is done.
  10. It may be necessary to configure your browser to allow unsigned certificates. On Chrome, that is easily done: just put chrome://flags/#allow-insecure-localhost as your URL and enable it.

Optional:

  • Install "Code With Me" plugin for IntelliJ - Preferences > Plugins > Code WIth me
    • Use the new "Code With Me" icon in top bar to enable "Full Access" (turn off "start voice call")
    • Share the link with your friends

JDK

We need a minimum of Java version 13 to get the latest version of TLS, which is 1.3, and also because there was a bug in TLS 1.3 that was fixed in Java 13.

Guiding ideas

A time and expenses application, with

  • our own authentication and authorization
  • our own localization and internationalization
  • our own templating
  • our own database
  • our own mocking framework
  • our own BDD framework
  • our own HTTP server
  • our own logging framework
  • carefully documented
  • test-driven at all levels
  • agile at its core

What’s the point?

What would software look like if it were built healthy from the beginning, with a healthy team? We often quote from books like Accelerate about how much better the front-runners are doing - wouldn’t it be nice to have some of that software ourselves to show them, rather than tell them?

Simple ain’t easy

-- Thelonious Monk

Slow is smooth, smooth is fast

-- Navy Seals

It occurred to him almost instantly, with the instinctive correctness that self-preservation instills in the mind, that he mustn’t try to think about it, that if he did, the law of gravity would suddenly glance sharply in his direction and demand to know what the hell he thought he was doing up there, and all would suddenly be lost.

-- Douglas Adams, Life, The Universe and Everything

"I never knew words could be so confusing," Milo said to Tock as he bent down to scratch the dog's ear. "Only when you use a lot to say a little," answered Tock. Milo thought this was quite the wisest thing he'd heard all day.

-- Norton Juster, The Phantom Tollbooth

If you’re going to repair a motorcycle, an adequate supply of gumption is the first and most important tool. If you haven’t got that you might as well gather up all the other tools and put them away, because they won’t do you any good.

-- Robert Pirsig, Zen and the Art of Motorcycle Maintenance

If you want to build a ship, don't drum up people to collect wood and don't assign them tasks and work, but rather teach them to long for the endless immensity of the sea.

-- Antoine de Saint-Exupery

I conclude that there are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult. It demands the same skill, devotion, insight, and even inspiration as the discovery of the simple physical laws which underlie the complex phenomena of nature. It also requires a willingness to accept objectives which are limited by physical, logical, and technological constraints, and to accept a compromise when conflicting objectives cannot be met.

-- Tony Hoare, 1980 ACM Turing award lecture

Keep it simple, stupid

-- Kelly Johnson, Lockheed Skunk Works

Adding a completely new endpoint

To better understand how development takes place, it will be helpful to imagine creating an entirely-new endpoint.

As an example, let's say we want to add the concept of roles. You could be

  • an administrator
  • an auditor
  • someone's supervisor
  • someone's report

If we are following a test-driven approach to developing this, the first thing you will want to focus on is the utility - that is, the overarching business code.

If this is something that can fit inside an existing domain - like time recording - then it suits you to add that. If it does not (and that might be the case for roles), then you can make another domain at the top level, under the coverosR3z package.

Underneath that, the typical pattern for organizing the kinds of files are indicated in Directories.

Start by creating a test in the appropriate place in the tests directory, and using wishful thinking, test what you wish already existed.

The utility class accesses the database through a ___Persistence file, so after you have started testing the utility class, you may find yourself needing to mock out some of the interaction with the database. If you need a persistence file that does not yet exist, you will likely need to create a new mock as well - see any of the classes like "Fake___Persistence".

Once your utility is well-tested from both unit-test and integration approaches, you will want to provide access to it through an endpoint. An example of one of the simpler endpoints can be seen at CreateEmployeeAPI.

Some key patterns to note:

The class contains an "Elements" enum class that inherits from "Element". This allows us to replace strings in the HTML text with constant values, giving us stronger typing - if the string needs to change, it can be done more safely than a simple string replacement command.

It also contains a companion object that inherits from GetEndpoint and PostEndpoint, which requires us to implement several methods. Those interfaces correspond to their obvious purpose - they allow handling requests for a GET or a POST.

Using either of those interfaces will also require implementing the path property, which is used to indicate the URL path to this endpoint.

When implementing handleGet or handlePost, it is imperative that you use some kind of authentication mechanism. See the existing code and the authentication methods provided at AuthUtilities.

Version

Each release gets a new version, using major and minor, like 1.0 See r3z_version in the gradle.properties file for more info.

As we change the schema of the database, update the database version. The version of the database is called CURRENT_DATABASE_VERSION in Constants

Threads

Any kind of data that could be shared between threads, like caches or databases, needs to be made "thread-safe", which means that threads don't potentially corrupt the data. If no precautions are taken, it is possible for two threads to make changes to the same data in unexpected ways. If this is completely a new concept to you, take the time to review some of the ideas about parallel processing, and also look at tests in this application like testCorruptingEmployeeDataWithMultiThreading.

Types

Throughout the system, there is an attempt to keep raw values (strings, ints floats, and so on) wrapped into custom types - for example, Password.

This is for some practical reasons:

  1. they are better documented as they are used in the code.
  2. It prevents accidental cross-wiring, like for example: if a method could take a username and password string. Because they are typed - i.e. UserName("user1") and Password("password123"), the values are only allowed to fit in the proper slot.
  3. It centralizes invariants for types. For example, if a password must be non-empty, at least 12 characters and less than 255 chars, those requirements can be part of the initialization of the type and then never needs to be called again.

Behavior-Driven Development (BDD)

BDD files will often have a suffix of "BDD". See "EnteringTimeBDD" for a sample.

Note that there is a type in the system called "UserStory" and one called "BDDScenario", both of which are in the test source code.

Once all the tests are complete, you will see the BDD results written to build/bdd

Test Helpers

When writing tests, you might find some of the functions in TestHelpers.kt handy

Performance

Performance tests include the text "PERFORMANCE" in the name. We are currently running an experiment of writing the results of these tests to files in docs/performance_archive/granular_tests , to see whether trends over time help us think more clearly about system performance.

Wrapping exceptions

As we code, we encounter many places where exceptions can be thrown. Often, in the case of third-party code, the exception may be confusing, ambiguous, too-universal, or include critical information in a overly-complex stacktrace.

To avoid the difficulty this causes during maintenance and debugging, it is imperative we wrap potential exception throwers in our own handling code where we can more-precisely describe the problem.

For an example, in several of the top-level packages (the domains), there is often an "exceptions" package that contains related custom exceptions for that domain

Invariants

We hold these truths to be self-evident in our code...

The following are used in our code to positively assert truthful statements inside algorithms. Don't use "assert", since that is possible to turn off, and we want these to always run.

fun require(value: Boolean) Throws an IllegalArgumentException if the value is false. This is for asserting any kind of truth for an argument to a function.

fun check(value: Boolean) Throws an IllegalStateException if the value is false. This is for asserting any kind of truth for a section of code in an algorithm.

fun checkNotNull(value: T?): T Throws an IllegalStateException if the value is null. Otherwise returns the not null value. This is for asserting that code within an algorithm is not null.

fun requireNotNull(value: T?): T Throws an IllegalArgumentException if the value is null. Otherwise returns the not null value. This is for asserting that arguments to a function aren't null.

Also see our customized checks, such as checkParseToInt

General architecture

The general architecture pattern is to have various abilities provided in files with a suffix of "Utilities". They, in turn, have access to a file with a suffix of "Persistence" which controls their access to the database, and which eventually talks to PureMemoryDatabase, where the data is actually stored.

These constitute the business application. We then provide an interface to this code from the outside world, like for example, by providing http access, whose code is in files with a suffix of "API"

Keeping things clean and simple is crucial.

To stay organized, follow these guidelines: 1) Calls from the outside world (e.g. the web) call into any of the "-Utilities" files. They must not call directly to the "-Persistence" files or straight to the PureMemoryDatabase

Persistence files

When dealing with this layer, some general design considerations must be maintained.

  1. The code in this layer is solely dedicated to CRUD details. The only other logic to include is checking invariants - that is, making sure that certain fundamental truths are held true, for data that is readily available at this level. There is no exact right way to do this, but in general we don't want general business logic occurring here.

Database

The database is where we store all the shared state for the users. It is simple. Data is of type [ChangeTrackingSet], which is a thread-safe data structure.

The Database mainly consists of the data and some utilities for access and persistence.

Note that in typical usage (where we are persisting data to disk as it is written), the persistence takes place asynchronously. That is, you might tell the database to create a new user, and it might reply "done", but writing that to the disk may happen milliseconds later. This is because all writes to disk are put into a queue on its own thread. It means we can just pop that request in, and trust it will be done later and in the right order.

See actOn() in the DataAccess class for specifics. The queue is ActionQueue.

Authentication

When a user logs in, we set a cookie on their browser that represents the identifier to a session in the database. As long as they have that cookie, effectively it's like their browser is telling us a correct password every time they come to a page.

As far as authentication goes, there are several kinds of pages. For example, there are

  1. pages that require a valid session token to see them at all.
  2. There are pages like the public homepage, registration page, and login, that should cause a user to be redirected to an authenticated homepage if they are holding a valid session token.
  3. There are pages that require both a valid session token and special authorization to be on that page, like an administrator's page. Finally, there is
  4. a logout page that explicitly removes the session token cookie and deletes the session from the database.

There are three key pieces to the authentication puzzle: The token (i.e. the cookie), the session entry in the database, and the page you are requesting.

"valid token" means a cookie that correlates to an existing current session in the database "invalid token" means a cookie that doesn't have a correlating session

Timeouts and sessions

A question to consider: if a user doesn't explicitly log out, does anything happen to their session? Does it simply remain valid indefinitely? One possibility is to "timeout" the session - if it hasn't been accessed within some duration, it is considered "dead" and will be removed the next time it is accessed. On the other hand, is there any problem with keeping sessions active indefinitely?

API

The HTTP endpoints have the acronym API as a suffix.

For developing an API, some crucial information:

  1. Routing is set in RoutingUtilities
  2. Every API has a companion object that implements an API interface, such as GetEndpoint or PostEndpoint (for example, see HomepageAPI.kt)
  3. Choose the authentication mechanisms for the page, from coverosR3z.server.utility.AuthUtilities.Companion. Examine any of the other API's to see how these are used, in the handleGet and handlePost methods.

Parsers and clean text

Sometimes, text that users input will be run through a parser - that is, a program that analyzes the characters of the text and makes decisions based on it. For example, when you send text to a browser, it parses it - if text has angle brackets around it, like <this>, it is considered an HTML element and is treated differently.

As it happens, the most prevalent security vulnerability is indeed this. So whenever there is a possibility that user input can get parsed, we have to clean it. That means stripping the special characters that designates special formations, e.g. <this> becomes &lt;this&gt; before shipping to the client browser, using our safeHtml() or safeAttr() code.

As we deal with more parsers, we will need to include more cleaning utilities.

Web page development and testing

A thought about improving the cycle-time for the web pages: Chrome has an override feature - it will allow you to save a file that the browser will use instead of pulling from the server. See https://developers.google.com/web/updates/2018/01/devtools?utm_source=devtools#overrides

This means we can develop a web page to our heart's content very quickly and easily, and once it's about where we want, we copy the relevant portions into the real system.

Inside the element of our HTML, try to follow a pattern of setting the file location for the HTML, as we see for example in RegisterAPI at registerHTML, you will see this line:

<meta apifile="RegisterAPI" >

Logging

types of logs:

AUDIT - Business-related content. Be very strict here about what constitutes business.

DEBUG - Less-relevant business content and the large bulk of technical logging

TRACE - highly-verbose log entries that are only useful when debugging

WARN - a warning to operators - something happened that needed resolving, the application probably made the right decision but it's something to be aware of. For example, if we start and cannot find any time entries on the disk, we'll create an empty data structure for the time entries. That's probably the right path, but if something went haywire on the disk, if files got accidentally moved around, that might not be the right choice. Unfortunately, computers are stupid and there has to be a balance trying to accommodate literally every imaginable thing that could ever happen (which is impossible to program).

IMPERATIVE - these are log entries that must show, no matter what. Rare but valuable, for example it is used during startup and shutdown of the application, and also when we change the log settings dynamically during runtime

notes:

  1. In the log API, there are some that expect an input to be a lambda, like logTrace(msg: () -> String) That is a technique so anything we pass in to the function won't be actually run unless the log level is used. So for example, if we turn off the TRACE level, that means any complex logic we pass in to logTrace{ complex_stuff_here } simply won't get run, helping performance.
  2. In the Logger.kt file, there is a public variable, logSettings, which can be adjusted at anytime from anywhere in the code to dynamically adjust which log types run.

Regular expressions (regex)

Typically, you should wrap strings to be used as regular expressions in triple-quotes: """foo""" That way, you won't need to escape as much: "\d" becomes """\d"""

Directories

The source code is organized using these standards for the directories (and thus, packages).

  • utility - these provide the main logic
  • exceptions - custom exceptions
  • types - custom types
  • api - HTTP endpoints
  • persistence - access to the database