Application for management of groundwater monitoring locations.
Once the project has been cloned, the user should ensure a clean environment. This can be done with
make cleanenv
The user can then install the requirements. Both scripts will create an initial .env file that assumes that a local postgres database is available. See below for instructions on using a docker container to run a local postgres database. Installing the postgres module psycopg2 can be challenging on some environments so two options are provided. The first
make devenv
installs psycopg2-binary. This should never be done in for deployment or in the docker container. Instead use
make prodenv
This installs psycopg2 module which has some environment prerequisites. See https://www.psycopg.org/docs/install.html for details
The tests require a postgres database. The docker ci database can be used to run these tests. Start the docker ci database and ensure the application's DATABASE_HOST is set to localhost before running the tests. See Using Docker ci database. To run tests locally:
make test
You can also easily run pylint against all python modules using:
make runlint
The Django environment requires a database. On an empty database, you will need to run the migrations. Care should be taken to ensure that you are running migrations against the local database. It is not harmful to run the migrations again as previously run migrations will be skipped.
make runmigrations
There is also a sample batch script to configure a local postgres instance on Windows.
migration_test.bat
If running by hand please note that the order of migrations should be maintained.
Notice that the first scripts are run while connecting for the only time with the postgres user. Subsequent migrations run while connected to the application database. The 0000 migration must be run on its own because it sets the search_path to use the application schema. Subsequent connections default to placing new objects (DDL) in the application schema properly.
The Django local development can be run as follows:
make watch
Another means to run local is the manage.py from within the wellregistry path:
% python -m manage runserver
Use localhost
instead of 127.0.0.1
for local development, otherwise a KeyCloak bug
regarding an invalid redirect_uri
will be encountered when authenticating.
To build the container:
% docker build ./ -t well_registry_app
To run the container:
docker run --env-file wellregistry/.env -p 8000:8000 well_registry_app
If you are running the docker ci database locally, your .env file DATABASE_HOST will need to change in order for the application within a docker container can talk to another container. On Macs, you can set DATABASE_HOST to host.docker.internal
The docker ci database can be started with the start_ci_db.bash script. Keep in mind that any existing instance will be removed first. To manually start, run the following command:
docker pull usgswma/well-registry-db:ci
docker run --name registry_postgres -d -p 5432:5432 usgswma/well-registry-db:ci
You can stop the container using:
% docker stop registry_postgres
You can start the container again:
% docker start registry_postgres
Environment variables are used to configure this application. In order to facilitate local development the developer can create a .env file with the necessary environment variables. There is a sample file at ./wellregistry/.env.sample which will be copied to ./env if the make devenv or make prodenv command is executed and no .env file already exists. Below is the description of the variables. All variables are described in https://docs.djangoproject.com/en/3.0/ref/settings unless noted.
DEBUG: boolean - true for debug level logging
These environment variables are required for the tier deployment. They are not used for local development.
SECRET_KEY: Django cryptographic signing key
ALLOWED_HOSTS: list of host domain names for this application to respond
CIDR_RANGES: list of IP ranges allowed used in django-allow-cidr. Is used to
set ALLOWED_CIDR_NETS which is defined in allow_cidr.middleware.AllowCIDRMiddleware
The DATABASE values are defined to connect to cloud RDS or local DB installation.These values are used by the initial Django migrations only to configure the application.
DATABASE_NAME: posgres database name
DATABASE_HOST: posgres host url
- use 'localhost' for local development database
- use the actual tier database host URL for cloud deployment
DATABASE_PORT: optional posgres port - if not specified then default is '5432'
DATABASE_USERNAME: postgres root user name
DATABASE_PASSWORD: postgres root password
The following should be set to initial values for a new database configuration.When setting up the database to run the initial migration scripts the values are flexible. They are arbitrarily configurable for local database development. However, once the database has been configured they are not arbitrary and must be the values used to configure that database. For example, if the application database is new the it could be called 'well_registry' or 'ngwmn_registry' but once the scripts have run to create that database, the values must remain unchanged. Continuing the example, if 'well_registry' is used for the database name then it must remain 'well_registry' in order for the application to use it. The point is that these values are used for configuration and runtime after configuration. Some addition example values are given below.
The application database ensures that application data is not stored in the postgres system database. It also enables multiple application to share a database instance.
APP_DATABASE_NAME: name for the applicaiton database within postgres
APP_DB_OWNER_USERNAME: user name for the database owner
APP_DB_OWNER_PASSWORD: database owner password
The application schema ensure that application data is not stored in the default public schema. The configuration assigns this schema as the primary search_path.
APP_SCHEMA_NAME: name for the application schema
APP_SCHEMA_OWNER_USERNAME: owner user name for the application schema
APP_SCHEMA_OWNER_PASSWORD: schema owner password
This connection will allow maintenance of all registry entries in support of user issues. It has less restricted table CRUD roles than the application user.
APP_ADMIN_USERNAME: user name for the connection used by the registry administration
APP_ADMIN_PASSWORD: administration login password
This connection is the standard or default application user connection. It has limited table CRUD roles.
APP_CLIENT_USERNAME: user name for the connection used by the registry users
APP_CLIENT_PASSWORD: user level login password