Digitaal Loket application on top of multiple application profiles as defined on:
- http://data.vlaanderen.be/ns/mandaat
- http://data.vlaanderen.be/doc/applicatieprofiel/mandatendatabank
- https://lblod.github.io/pages-vendors/#/docs/leidinggevenden
- [Needs ref.] eredienst mandatendatabank
- [Needs ref.] eredienst bedienaren
- https://lblod.github.io/pages-vendors/#/docs/submission-annotations
- [Needs ref.] personeelsbeheer
- [Needs ref.] berichtencentrum
- [Needs ref.] BBC-DR
This repository harvest two setups. The base of these setups resides in the standard docker-compose.yml.
- docker-compose.yml This provides you with the backend components. There is a frontend application included which you can publish using a separate proxy (we tend to put a letsencrypt proxy in front).
- docker-compose.dev.yml Provides changes for a good frontend development setup.
- publishes the backend services on port 90 directly, so you can run
ember serve --proxy http://localhost:90/
when developing the frontend apps natively. - publishes the database instance on port 8890 so you can easily see what content is stored in the base triplestore
- provides a mock-login backend service so you don't need the ACM/IDM integration.
- publishes the backend services on port 90 directly, so you can run
General information on running and maintaining an installation
You'll need a beefy machine, with at least 16 GB of ram.
First install git-lfs
(see https://github.com/git-lfs/git-lfs/wiki/Installation)
# Ensure git-lfs is enabled after installation
git lfs install
# Clone this repository
git clone https://github.com/lblod/app-digitaal-loket.git
# Move into the directory
cd app-digitaal-loket
To ease all typing for docker-compose
commands, start by creating the following files in the directory of the project.
A docker-compose.override.yml
file with following content:
version: '3.7'
And an .env
file with following content:
COMPOSE_FILE=docker-compose.yml:docker-compose.dev.yml:docker-compose.override.yml
You will need to sync the besluit:Bestuurseenheid
from app-organization-portal, else you won't be able to use the application. Here is how to proceed.
drc down;
Update docker-compose.override.yml
to:
op-public-consumer:
environment:
DCR_SYNC_BASE_URL: "https://organisaties.abb.vlaanderen.be" # or another endpoint
DCR_LANDING_ZONE_DATABASE: "virtuoso" # for the initial sync, we go directly to virtuoso
DCR_REMAPPING_DATABASE: "virtuoso" # for the initial sync, we go directly to virtuoso
DCR_DISABLE_DELTA_INGEST: "false"
DCR_DISABLE_INITIAL_SYNC: "false"
Then:
drc up -d migrations
drc up -d database op-public-consumer
# Wait until success of the previous step
drc up -d update-bestuurseenheid-mock-login
# Wait until it boots, before running the next command. You can also wait the cron-job kicks in.
drc exec update-bestuurseenheid-mock-login curl -X POST http://localhost/heal-mock-logins
# Takes about 20 min with prod data
Then, update docker-compose.override.yml
to:
op-public-consumer:
environment:
DCR_SYNC_BASE_URL: "https://organisaties.abb.vlaanderen.be" # choose the correct endpoint
DCR_LANDING_ZONE_DATABASE: "database"
DCR_REMAPPING_DATABASE: "database"
DCR_DISABLE_DELTA_INGEST: "false"
DCR_DISABLE_INITIAL_SYNC: "false"
drc up -d
This should be your go-to way of starting the stack.
docker-compose up # or 'docker-compose up -d' if you want to run it in the background
Always double check the status of the migrations docker-compose logs -f --tail=100 migrations
Wait for everything to boot to ensure clean caches.
Probably the first thing you'll want to do, is see wether the app is running correctly. The fastest way forward is creating a docker-compose.override.yml
file next to the other docker-compose.yml
files, and add
# (...)
loket:
ports:
- 4205:80
This way, you can directly connect to a built version of the frontend on port 4205
. Note, you might have conflicts because the port is already busy.
you're free to change 4205
to whatever suits you.
Once the migrations have ran, you can start developing your application by connecting the ember frontend application to this backend. See https://github.com/lblod/frontend-loket for more information on development with the ember application.
docker-compose up
The stack is built starting from mu-project.
OpenAPI documentation can be generated using cl-resources-openapi-generator.
To make sure the app can share data, producers need to be set up. There is an intial sync, that is potentially very expensive, and must be started manually
(Note: similar for other producers)
- make sure the app is up and running, the migrations have run
- in docker-compose.override.yml, make sure the following configuration is provided:
delta-producer-background-jobs-initiator-mandatarissen: # or
environment:
START_INITIAL_SYNC: 'true'
drc up -d delta-producer-background-jobs-initiator-mandatarissen
- You can follow the status of the job, through the dashboard
Due to performance issues, related to the high usage, a separate triplestore (virtuoso) has been introduced to offload the publication of the data. This architectural change is currently under evaluation. The criteria for evaluation will be: the performance win vs the practical consequences of such change.
If deemed succesful, we might consider moving the remaining publication graphs to this triplestore too (mandatarissen and leidinggevenden).
As a consequence, producers using the separate triplestore, will also publish and host the json-diff files. Mainly to simplify the transition to a separate publication triple store (else we would need a separate mu-auth and deltanotifier). In essence, it takes over https://github.com/lblod/delta-producer-json-diff-file-publisher, although both can still be combined.
If files need to be shared over deltas (attachments, form-data, cached-files) you will need to set in a docker-compose.override.yml
#(...)
delta-producer-publication-graph-maintainer-submissions:
KEY: "foo-bar
This will needs to be set in the consuming stack too. See delta-producer-publication-graph-maintainer for more informmation on the implications.
- The default virtuoso settings might be too weak if you need to ingest the production data. Hence, there is better config, you can take over in your
docker-compose.override.yml
virtuoso:
volumes:
- ./data/db:/data
- ./config/virtuoso/virtuoso-production.ini:/data/virtuoso.ini
- ./config/virtuoso/:/opt/virtuoso-scripts
Not all required parameters are provided, since deploy specific, see report-generator
Should have credentials provided, see deliver-email-service
Once installed, you may desire to upgrade your current setup to follow development of the main stack. The following example describes how to do this easily for both the demo setup, as well as for the dev setup.
For the dev setup, we assume you'll pull more often and thus will most likely clear the database separately:
# This assumes the .env file has been set. Cf. supra in the README.md
# Bring the application down
docker-compose down
# Pull in the changes
git pull origin master
# Launch the stack
docker-compose up
As with the initial setup, we wait for everything to boot to ensure clean caches. You may choose to monitor the migrations service in a separate terminal to and wait for the overview of all migrations to appear: docker-compose logs -f --tail=100 migrations
.
Once the migrations have ran, you can go on with your current setup.
At some times you may want to clean the database and make sure it's in a pristine state.
# This assumes the .env file has been set. Cf. supra in the README.md
# Bring down our current setup
docker-compose down
# Keep only required database files
rm -Rf data/db
git checkout data/db
# Bring the stack back up
docker-compose up
Notes:
- virtuoso can take a while to execute its first run, meanwhile the database is inaccessible. Make also sure to wait for the migrations to run.
- data from external sources need to be synced again.
Some vendors need access to specific data inside Loket; as such, we expose an API that allows them to query data from their own designated graphs.
There are three services involved:
In brief, the API flows as follows:
- The
vendor-login
service allows a vendor with an API key to log intoapp-digitaal-loket
and provides said vendor with an active session. - The
sparql-authorization-wrapper
service proxies SPARQL requests from the vendor toapp-digitaal-loket
by intercepting the request and adding specific authorization rules to allow/disallow this request; these rules are defined inconfig/sparql-authorization-wrapper/filter.js
.sparql-authorization-wrapper
checks whether a vendor has an active session by querying the sessions created byvendor-login
.
- The
vendor-data-distribution
service copies data insideapp-digitaal-loket
to designated graphs, which are made accessible through the SPARQL endpoint; the rules defining what gets copied are defined inconfig/vendor-data/subjectsAndPaths.js
.
To log in as a vendor, run the following command:
curl -v -X POST \
-H "Content-Type: application/json" \
-b CookieJar.tsv -c CookieJar.tsv \
-d '{
"organization": "ORG_URI",
"publisher": {
"uri": "VENDOR_URI",
"key": "VENDOR_API_KEY"
}
}' http://localhost:90/vendor/login
where:
ORG_URI
is the URI of the organization the vendor can act on behalf of.VENDOR_URI
is the URI of the relevant vendor.VENDOR_API_KEY
is the API key the vendor uses to log in.
VENDOR_URI
, VENDOR_API_KEY
and ORG_URI
can be found by querying the database as follows:
PREFIX muAccount: <http://mu.semte.ch/vocabularies/account/>
PREFIX mu: <http://mu.semte.ch/vocabularies/core/>
PREFIX foaf: <http://xmlns.com/foaf/0.1/>
PREFIX ext: <http://mu.semte.ch/vocabularies/ext/>
SELECT DISTINCT ?vendorURI ?vendorName ?vendorAPIKey ?organizationURI WHERE {
?s a foaf:Agent, ext:Vendor ;
muAccount:key ?key ;
muAccount:canActOnBehalfOf ?organizationURI ;
foaf:name ?vendorName .
}
This query will return the vendorURI, vendorName, vendorAPIKey and organizationURI; vendorName is not used in the cURL request but is useful information to have.
As mentioned in the summary above, this service acts as a proxy between the vendor and app-digitaal-loket
and is used to append extra authorization rules in addition to making sure the client is allowed to access the requested data.
After logging in as a vendor, run the following command to execute a query (note the use of the same CookieJar.tsv
from the previous section):
curl -s -X POST \
-H "Content-Type: application/x-www-form-urlencoded" \
-b CookieJar.tsv -c CookieJar.tsv \
--data-urlencode 'query=SELECT ?s ?p ?o WHERE { ?s a <http://rdf.myexperiment.org/ontologies/base/Submission> ; ?p ?o . }' \
--location "http://localhost:90/vendor/sparql" --write-out '%{json}' | jq '.results'
NOTE: The --write-out '%{json}' | jq '.results'
snippet at the end allows for a nicer output, but it can be removed. You need to install jq
first if you choose to write out the JSON output to jq
.
The following is an example output you may see after executing the request:
{
"ordered": true,
"distinct": false,
"bindings": [
{
"s": {
"value": "http://data.lblod.info/submissions/79cecc4f-ad73-453a-9a22-406e5a88d092",
"type": "uri"
},
"p": {
"value": "http://www.w3.org/1999/02/22-rdf-syntax-ns#type",
"type": "uri"
},
"o": {
"value": "http://rdf.myexperiment.org/ontologies/base/Submission",
"type": "uri"
}
}
]
}
The custom authorization rules are defined in a custom filter.js file. You can write out the specific query you want executed inside the isAuthorized()
function, and sparql-authorization-wrapper-service
will use it when proxying requests from the vendor.
More info can found in the writing rules section of the service's README page.
This service works by reacting to deltas and is responsible for moving vendor-relevant data into specific graphs, where they can then be accessed through the vendor API.
This service is configured through a custom subjectsAndPaths.js file, similar to sparql-authorization-wrapper-service
. More info can be found here.
The healing process allows the service to "manually" copy data to vendor graphs by the following the same rules defined in subjectsAndPaths.js
. Trigger a POST
request to the /healing
endpoint of the service to start the healing.