Skip to content

State Hosted Integrated Benefits Application

License

Notifications You must be signed in to change notification settings

codeforamerica/shiba

Repository files navigation

SHIBA - State Hosted Integrated Benefits Application

We appreciate your interest in contributing to our codebase, which is why we'd like to invite you to check out the volunteer projects at Open Twin Cities Brigade! At the moment, we don't have capacity to accept pull requests outside the MNbenefits team, thank you!

Development setup

Install the following system dependencies:

Note: these instructions are specific to macOS, but the same dependencies do need to be installed on Windows as well.

Java Development Kit:

brew install openjdk

Set up jenv to manage your jdk versions

First run brew install jenv.

Add the following to your ~/.bashrc or ~/.zshrc

export PATH="$HOME/.jenv/bin:$PATH"
eval "$(jenv init -)"

Reload your terminal, then finally run this from the SHIBA repo's directory

jenv add /Library/Java/JavaVirtualMachines/openjdk.jdk/Contents/Home/

Gradle

brew install gradle

Setup live reload:

Setup IntelliJ for the project:

  • Install the EnvFile plugin
  • Enable annotation processing
  • Set the Project SDK to Java 17 in File > Project Structure
  • Set the Gradle JVM version to 17 in Preferences -> Build, Execution, Deployment -> Build Tools -> Gradle
  • Create .env file in the root of the project directory
  • Paste in values from SHIBA application-secrets.yaml in LastPass with the format ENV_VAR_NAME=ENV_VAR_VALUE, translating the property notation to environment variable notation as follows:
    • shiba.username: someUsername --> SHIBA_USERNAME=someUsername
    • mail-gun.api-key: someApiKey --> MAIL-GUN_API-KEY=someApiKey
  • Generate an encryption key - see instructions in the next section.
  • Run the application using ShibaApplication run configuration
  • If Intellij is reporting error on getters/setters/builders..., check again if you enabled Lombok plugin and annotation processing correctly.
  • Open "Edit Run/Debug configuration" dialog
    • Enter comma-separated names of the profiles in "Active profiles"

Generate an encryption key:

  • Install the tinkey command line utility to generate an encryption key, following their docs
  • Run the following command to generate an encryption key and copy it to your clipboard: tinkey create-keyset --key-template AES256_GCM | awk '{printf("%s",$0)}' | pbcopy
  • Add the encryption key to the .env file as a new environment variable: ENCRYPTION_KEY=<value from clipboard>

Start the local databases:

  • Install PostgreSQL 11 via an official download
    • Or on macOS, through homebrew: brew install postgresql@11
  • Create the database using the command line:
    • $ createuser -s shiba
    • $ createdb shiba

Test:

From the project root invoke ./gradlew clean test

Setup Fake Filler (optional, Chrome only):

  • Using an automatic form filler makes manual test easier.
  • Install Fake Filler for Chrome
  • Go to fakeFillerConfig.txt, click on "Raw", then save the file to your computer.
  • Open the Fake Filler Options then click on Backup and Restore
  • Click on "Import Settings" and upload the config file that you saved above.
  • Click on Keyboard Shortcuts to chooce the shortcut you want to use to fill out the page.

Configuring TLS certs for use between a client and external server (optional)

NOTE: Certificates are already installed into the app's Java KeyStore.

Follow the instructions below to set up new certificates as needed.

For local and test environments, we rely on self-signed certificates for SSL communication.

The following steps can be followed to set these up. Self-signed server and client certificates require a root CA certificate, which is also self-signed and can be generated with:

openssl req -x509 -sha256 -days 3650 -newkey rsa:4096 -keyout rootCA.key -out rootCA.crt

Client-side self-signed certificates can be generated and installed into a new java keystore:

  • Create a certificate signing request, copying the generated certificate request into a file named client.csr. A private key will also have been generated called client.key.

openssl req -new -newkey rsa:4096 -nodes -keyout client.key

  • Sign the certificate request using the root CA certificate.

openssl x509 -req -CA rootCA.crt -CAkey rootCA.key -in client.csr -out client.crt -days 365 -CAcreateserial

  • Package the signed certificate client.crt and the private key client.key into a PKCS file.

openssl pkcs12 -export -out client.p12 -name "client" -inkey client.key -in client.crt

  • Import the signed certificate and private key into a keystore file.

keytool -importkeystore -deststorepass <password> -destkeypass <password> -deststoretype pkcs12 -srckeystore client.p12 -srcstoretype pkcs12 -srcstorepass <password> -destkeystore client-keystore.jks -alias client

The client certificate can then be shared with external servers who can register the client as trusted.

  • Client exports the certificate from their keystore.

keytool -exportcert -alias client -file client.crt -keystore client-keystore.jks -storepass <password>

  • Server imports the certificate into their truststore (java keystore used for cataloging trusted client certs).

keytool -importcert -keystore server-truststore.jks -alias client -file client.crt -storepass <password>

Special Thanks:

Assistiv Labs Logo Assistiv Labs - Accessibility Testing