Skip to content

Smurf-Engineer/Platform

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

PlatformPlatform Resource Groups

PlatformPlatform GitHub issues with enhancement label GitHub issues with roadmap label GitHub issues with bug label

Coverage Quality Gate Status Security Rating Reliability Rating Maintainability Rating

Code Smells Vulnerabilities Bugs Technical Debt

πŸ‘‹ Welcome to PlatformPlatform

Drawing on our expertise building true enterprise-grade products with millions of daily users in highly regulated sectors like healthcare, finance, government, etc., we aim to help you create secure production-ready products.

Still pre-alpha state, follow our up-to-date roadmap with core SaaS features like multi-tenancy, authentication, SSO, user management, telemetry, monitoring, alerts, multi-region, feature flags, back office for support, etc.

Building blocks of PlatformPlatform:

  • Backend - .NET adhering to the principles of Clean Architecture, DDD, CQRS, and clean code
  • Frontend - React using TypeScript, with a sleek fully localized UI and a mature accessible design system
  • CI/CD - GitHub actions for fast passwordless deployments of application (Docker) and infrastructure (Bicep)
  • Infrastructure - Cost efficient and scalable Azure PaaS services like Azure Container Apps, Azure SQL, etc.
  • Developer CLI - Extendable .NET CLI for DevEx - set up CI/CD is one command and a couple of questions

This readme contains the following sections:

  • Getting Started - Simple steps to set up local development and continuous deployments to Azure
  • Inside Our Monorepo - An overview of what's inside this repository
  • Technologies - Overview of technologies for Backend, Frontend, Azure, etc.
  • Screenshots - A few screenshots of the GitHub workflows and Azure resources

⭐⭐⭐ Show your support for our project – Give us a star on GitHub! It truly means a lot! ⭐⭐⭐

Getting Started

1. Check prerequisites

For development you need .NET, Aspire, Docker, Node, and Yarn. And GitHub and Azure CLI for setting up CI/CD.

Install prerequisites for Windows

Open a PowerShell terminal as Administrator and run the following commands:

  • wsl --install (Windows Subsystem for Linux, required for Docker)
  • Install Chocolatey, a package manager for Windows
  • choco install git dotnet-sdk git docker-desktop nodejs azure-cli gh
  • npm install --global yarn
  • dotnet workload update and dotnet workload install aspire
Install prerequisites for Mac

Open a terminal and run the following commands:

  • Install Homebrew, a package manager for Mac
  • brew install --cask dotnet-sdk
  • brew install git docker node yarn azure-cli gh
  • dotnet workload update and dotnet workload install aspire

2. Fork and clone the repository

Forking is required to configure GitHub repository with continuous deployments to Azure (step 5).

Our clean commit history serves as a great learning and troubleshooting resource. We recommend you keep it πŸ˜ƒ

3. Install the developer CLI

PlatformPlatform comes with a lightweight developer CLI pp that e.g. will help you set up CI/CD in a few minutes. It's a powerful way for sharing tools on a team - the first step to an internal developer platform.

cd developer-cli
dotnet run install # IMPORTANT: Restart the terminal and run "pp --help" to confirm installation
Read more about how the Developer CLI works

The CLI will automatically detect code changes and automatically recompile, ensuring that it is always up to date and in sync with the code base.

Upon installing, you will be offered to set up an SSL certificate and a few environment variables for easy debugging.

The CLI is published to %LocalAppData%/PlatformPlatform on Windows and ~/.platformplatform on MacOS. It designed to run side-by-side, just change the pp to another alias in the DeveloperCli.csproj file.

If you want to skip installing the CLI you can run the commands manually from the CLI folder like this:

cd developer-cli
dotnet run [command-name] # e.g. `dotnet run code-cleanup` instead of `pp code-cleanup`

To uninstall the CLI, simply run pp uninstall.

4. Run the application locally

Run the following command to spin up the .NET Minimal API, the React frontend, and an SQL Server in Docker:

pp run # The Aspire Dashboard and WebApp will automatically open in your browser when ready

To debug, just open the PlatformPlatform.sln solution in Rider or Visual Studio and run the AppHost project.

5. Set up CI/CD with passwordless deployments from GitHub to Azure

Run this command to automate Azure Subscription configuration and set up GitHub Workflows for deploying Azure Infrastructure (using Bicep) and compiling application code to Docker images deployed to Azure Container Apps:

pp configure-continuous-deployments # Tip: Add --verbose-logging to show the used CLI commands

You need to be the owner of the GitHub repository and the Azure Subscription, plus have permissions to create Service Principals and Active Directory Groups.

The command will first prompt you to login to Azure and GitHub, and collect information. You will be presented with a complete list of changes before they are applied. It will look something like this:

Configure Continuous Deployments

Except for adding a DNS record, everything is fully automated. After successful setup, the command will provide simple instructions on how to configure branch policies, Sonar Cloud static code analysis, and more.

The infrastructure is configured with auto-scaling and hosting costs in focus. It will cost less than 2 USD per day for a cluster, and it will allow scaling to millions of users πŸŽ‰

Inside Our Monorepo

PlatformPlatform is a monorepo containing all application code, infrastructure, tools, libraries, documentation, etc. A monorepo is a powerful way to organize a codebase, used by Google, Facebook, Uber, Microsoft, etc.

.
β”œβ”€β”€ .github                # GitHub workflows for CI/CD, etc.
β”œβ”€β”€ application            # Contains the application source code
β”‚   β”œβ”€β”€ AppHost            # .NET Aspire Project for starting API, WebApp, SQL Server, etc.
β”‚   β”œβ”€β”€ account-management # A self-contained system with SaaS features (DDD, CQRS, Clean Architecture)
β”‚   β”‚   β”œβ”€β”€ Api            # Presentation layer exposing the API to WebApp or other clients
β”‚   β”‚   β”œβ”€β”€ Application    # Use Case layer containing CQRS Command and Query handlers 
β”‚   β”‚   β”œβ”€β”€ Domain         # Business logic containing DDD aggregates, entities, etc.
β”‚   β”‚   β”œβ”€β”€ Infrastructure # Integrations for accessing external resources (e.g., database)
β”‚   β”‚   β”œβ”€β”€ Tests          # Tests for the API, Application, Domain, and Infrastructure
β”‚   β”‚   └── WebApp         # React SPA frontend using TypeScript and React Aria Components
β”‚   β”œβ”€β”€ shared-kernel      # Reusable components for all self-contained systems
β”‚   β”œβ”€β”€ [saas-scs]         # [Your SCS] Create your SaaS product as a self-contained system
β”‚   └── [back-office]      # [Planned] A self-contained system for operations and support
β”œβ”€β”€ cloud-infrastructure   # Contains Bash and Bicep scripts (IaC) for Azure resources
β”‚   β”œβ”€β”€ cluster            # Scale units like production-west-eu, production-east-us, etc.
β”‚   β”œβ”€β”€ environment        # Shared resources like App Insights for all Production clusters
β”‚   β”œβ”€β”€ shared             # Azure Container Registry shared between all environments
β”‚   └── modules            # Reusable Bicep modules like Container App, SQL Server, etc.
└── development-cli        # A .NET CLI tool for automating common developer tasks

** A Self-Contained System is a large microservice (or a small monolith) that contains the full stack, including frontend, background jobs, etc. These can be developed, tested, deployed, and scaled in isolation.

Technologies

.NET 8 Backend With Clean Architecture, DDD, CQRS, Minimal API, and Aspire

The backend is built using the most popular, mature, and commonly used technologies in the .NET ecosystem:

Read more about the backend architecture
  • Clean Architecture: The codebase is organized into layers that promote separation of concerns and maintainability.
  • Domain-Driven Design (DDD): DDD principles are applied to ensure a clear and expressive domain model.
  • Command Query Responsibility Segregation (CQRS): This clearly separates read (query) and write (command) operations, adhering to the single responsibility principle (each action is in a separate command).
  • Screaming architecture: The architecture is designed with namespaces (folders) per feature, making the concepts easily visible and expressive, rather than organizing the code by types like models and repositories.
  • MediatR pipelines: MediatR pipeline behaviors are used to ensure consistent handling of cross-cutting concerns like validation, unit of work, and handling of domain events.
  • Strongly Typed IDs: The codebase uses strongly typed IDs, which are a combination of the entity type and the entity ID. This is even at the outer API layer, and Swagger translates this to the underlying contract. This ensures type safety and consistency across the codebase.
  • JetBrains Code style and Cleanup: JetBrains Rider/ReSharper is used for code style and automatic cleanup (configured in .DotSettings), ensuring consistent code formatting. No need to discuss tabs vs. spaces anymore; Invalid formatting breaks the build.
  • Monolith prepared for self-contained systems: The codebase is organized into a monolith, but the architecture is prepared for splitting in to self-contained systems. A self-contained system is a large microservice (or a small monolith) that contains the full stack including frontend, background jobs, etc. These can be developed, tested, deployed, and scaled in isolation, making it a good compromise between a large monolith and many small microservices. Unlike the popular backend-for-frontend (BFF) style with one shared frontend, this allows teams to work fully independently.
  • Shared Kernel: The codebase uses a shared kernel for all the boilerplate code required to build a clean codebase. The shared kernel ensures consistency between self-contained systems, e.g., enforcing tenant isolation, auditing, tracking, implementation of tactical DDD patterns like aggregate, entities, repository base, ID generation, etc.

Although some features like authentication and multi-tenancy are not yet implemented, the current implementation serves as a solid foundation for building business logic without unnecessary boilerplate.

React Frontend With TypeScript, React Aria Components, and Node

The frontend is built with these technologies:

Azure Cloud Infrastructure With Enterprise-Grade Security and Zero Secrets

PlatformPlatform's cloud infrastructure is built using the latest Azure Platform as a Service (PaaS) technologies:

Read more about this enterprise-grade architecture
  • Platform as a Service (PaaS) technologies: Azure is the leading Cloud Service Provider (CSP) when it comes to PaaS technologies. PlatformPlatform uses PaaS technologies which are fully managed by Microsoft, as opposed to Infrastructure as a Service (IaaS) technologies where the customer is responsible for the underlying infrastructure. This means that Microsoft is responsible for the availability of the infrastructure, and you are only responsible for the application and data. This makes it possible for even a small team to run a highly scalable, stable, and secure solution.
  • Enterprise-grade security with zero secrets:
    • Managed Identities: No secrets are used when Container Apps connect to e.g. Databases, Blob Storage, and Service Bus. The infrastructure uses Managed Identities for all communication with Azure resources, eliminating the need for secrets.
    • Federated credentials: Deployment from GitHub to Azure is done using federated credentials, establishing a trust between the GitHub repository and Azure subscription based on the repository's URL, without the need for secrets.
    • No secrets expires: Since no secrets are used, there is no need to rotate secrets, and no risk of secrets expiring.
    • 100% Security Score: The current infrastructure configuration follows best practices, and the current setup code achieves a 100% Security Score in Microsoft Defender for Cloud. This minimizes the attack surface and protects against even sophisticated attacks.
  • Automatic certificate management: The infrastructure is configured to automatically request and renew SSL certificates, eliminating the need for manual certificate management.
  • Multiple environments: The setup includes different environments like Development, Staging, and Production, deployed into clearly named resource groups within a single Azure Subscription.
  • Multi-region: Spinning up a cluster in a new region is a matter of adding one extra deployment job to the GitHub workflow. This allows customers to select a region where their data is close to the user and local data protection laws like GDPR, CCPA, etc. are followed.
  • Azure Container Apps: The application is hosted using Azure Container Apps, which is a new service from Azure that provides a fully managed Kubernetes environment for running containerized applications. You don't need to be a Kubernetes expert to run your application in a scalable and secure environment.
  • Scaling from zero to millions of users: The Azure Container App Environment is configured to scale from zero to millions of users, and the infrastructure is configured to scale automatically based on load. This means the starting costs are very low, and the solution can scale to millions of users without any manual intervention. This enables having Development and Staging environments running with very low costs.
  • Azure SQL: The database is hosted using Azure SQL Database, which is a fully managed SQL Server instance. SQL Server is known for its high performance, stability, scalability, and security. The server will easily handle millions of users with single-digit millisecond response times.

Screenshots

This is how it looks when GitHub workflows has deployed Azure Infrastructure:

GitHub Environments

These are the resource groups created when deploying one staging cluster, and two production clusters:

PlatformPlatform Resource Groups

This is the security score after deploying PlatformPlatform resources to Azure. Achieving a 100% security score in Azure Defender for Cloud without exemptions is not trivial.

Azure Security Recommendations

About

No description, website, or topics provided.

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published