node-service-template
provides a "battery-included" starter template for building enterprise Node.js webservices.
It comes with the following out-of-the-box:
- fastify as a basis for the general web application skeleton;
- Modular, domain-driven structure that encourages separation of concerns;
- Server/app separation, for convenient bootstrapping in e2e tests;
- Global error handler;
- JSON-based, single line standardized logging;
- Automatic population of
req.id
for incoming requests based onx-request-id
header, or generation of new UUID if none is set, for the purposes of distributed tracing.
Mechanisms:
- Type-safe config management;
- Dependency injection (using awilix);
- Scheduling (using toad-scheduler and redis-semaphore);
- Type-safe message queue handling, using message-queue-toolkit framework;
- Type-safe dependency mocking for tests;
Scaffolding:
- Periodic in-memory jobs;
- Durable enqueued Redis jobs;
- API client, using opinionated high-performance backend client, based on undici
- AWS configuration loading
Basic building block examples:
- Repository (using prisma);
- Domain service;
- Controller;
- Route;
- Schema;
- e2e test;
Plugins:
- JWT plugin (using @fastify/jwt);
Scripts:
- Generate OpenAPI specification from your route definitions;
- Validate your OpenAPI specification;
- GenerateJwt generate jwt for dev usage.
Service template also comes with a curated set of plugins installed:
- @fastify/helmet (security headers)
- @fastify/swagger (OpenAPI specification generation)
- @fastify/awilix (dependency injection)
- @fastify/schedule (scheduling background jobs)
- @fastify/auth (authentication)
- @scalar/fastify-api-reference (OpenAPI specification website)
- fastify-graceful-shutdown (handling SEGTERM gracefully)
- fastify-no-icon (avoiding warnings when sending GET calls via browser)
- @lokalise/fastify-extras -> metricsPlugin (exposing Prometheus metrics)
- @lokalise/fastify-extras -> requestContextProviderPlugin (storing requestId in AsyncLocalStorage and populating requestContext on request)
- @lokalise/fastify-extras -> newRelicTransactionManagerPlugin (creating custom NewRelic spans for background jobs)
- @lokalise/fastify-extras -> bugsnagPlugin (reporting errors to BugSnag)
- @lokalise/fastify-extras -> amplitudePlugin (tracking events in Amplitude)
- @lokalise/fastify-extras -> prismaOtelTracingPlugin (generating OpenTelemetry metrics for DB operations using prisma)
- @lokalise/fastify-extras -> publicHealthcheckPlugin (registering public healthchecks)
Note that some of the fastify-extras plugins may not be relevant for you (e. g. if you are not using Prometheus, New Relic or Bugsnag). In that case you should remove the plugins and delete everything that breaks when you attempt to build the project.
We recommend you to create your own @your-org/fastify-extras
package and create your own mix of vendor plugins that
are relevant for the technological stack of your organization, and replace @lokalise/fastify-extras
with it.
-
Make sure your node version is compatible with the requirements in package.json. We are working with
node >= 20
and recommend using a version manager, such as nvm, to manage multiple Node versions on your device if needed. -
Install all project dependencies:
npm install
-
Copy the
.env.default
file to a new.env
file. You can do this with the following npm script:node --run copy:config
-
Launch all the infrastructural dependencies locally:
docker compose up -d
-
Run migrations to synchronize your database schema with defined models:
node --run db:migration:dev
-
Generate Prisma client for type-safe DB operations:
node --run db:update-client
-
To run application:
node --run start:dev
NOTE: By default all calls to the
node-template
app will require a valid JWT token, hence authentication errors when running the application are expected if you haven't yet followed the steps in Create jwt for dev usage.
Before running your tests, make sure to run
node --run test:migrate
To initialize your test database and/or apply your latest schema changes.
You can access OpenAPI specification of your application, while it is running, by opening /documentation
You have multiple options to ease your development:
- Comment
onRequest
hook for JWT verification here - Generate a valid JWT with provided generateJwt script
-
Script requires public-private key pair encrypted with
RS256
algorithm:mkdir -p ./scripts/keys && ssh-keygen -t rsa -b 4096 -m PEM -f ./scripts/keys/jwtRS256.key # Don't add passphrase openssl rsa -in ./scripts/keys/jwtRS256.key -pubout -outform PEM -out ./scripts/keys/jwtRS256.key.pub
-
Default file names are
jwtRS256.key
for private key andjwtRS256.key.pub
for public key -
Run JWT generate script:
node --run jwt:generate
-
Your public key and token will be printed to console to make things easier. This is an example output:
Public key: -----BEGIN PUBLIC KEY-----||MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAt+2fSaw+mjbQpbPYcGv7||A0zs+P1yuCcM4LzTRpMmtXCoxCg3hwVZUM9HoxM4NxSga5A/jdHDhn1qEgQF38cX||N/wG+cRx1YfxDV2fSYxO9ouh+0J+uJaAXs0kWM0oAojrcMI4q1PcTeCFBvKDR+ei||Nu5auiRe7yrBfQTqsSmvEDRlnhUnF24CnNQPuzeN4Qe8LmcXuwimEyAi9Tf7hXBN||H31j+jnUfIq9Yy7EsbmZhW3aEmQlmR6RY/9g+IEzbpmBoYznYsxmvtODpay7n+NY||zWtOdtJC9eKDaOs3wYjDR0G9uHe00ZIBiNfZWRGfTS/3+Sl9Yx8UesVpg8WqbkxC||LwAABtA5/WiKYxp3wsx4Qu9ooZwiE6tlgsb3hZAeusNODQ+rZsoiCowxNNfZ0fvj||veaBxDz7xB4t9fST9rsBJewPna3oFMlEPxigyv4ogFo60V9Ds6e8GHuYevSUeS34||BimjE2T0uE+HYatEmUY5tHRhTgBKP+Ty9dY2I9dpPDSl/nM63PmmbqSr7DIBreh4||pr3LwEPtffpaAY/YdQ0ypAVc7xuQMreTlzEsAFzbwnfI5eTT9oxZHBb1ulrnei1e||w6yxZ93j2UmCnaXPrTWsqyr/tXH4/sfLjqkY7Upj/zl7i0FlDAxtdv3qGg5Ozpj/||8OXPuK2d9Kv7C58uaVhO5bsCAwEAAQ==||-----END PUBLIC KEY-----|| JWT: eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJjbGFpbSI6InZhbHVlIiwiaWF0IjoxNjc2OTU4MDgwfQ.ssp6cX8Juv5a56VB-w4Nhdi1XmEyTsbPc9zBre2XylHnXvGdkx38GYYXAP9UDUAw4lkU7GE0FA8wlMitB3iFPKHLDWU8d-E1W0fV6GXAAngMMRrZeRCREYGx3FchEj8ufY4_7i4jGdA2ph8WOgrTqrpjJRjYYuClFYuCgH8QsRIeCnLo_UU3AhmqJ1FnUUXYK4lpk5ssvuUR3OZR4nexNZJEsIbL_584_FHc7duui7WMQ9fvBInNG4FRu3d2ZPC9RejAlV5sRk8H0HpLORM54h4SfeUXiapNnu7Td_in_3YmhdwBVugnxDdATUBMjHbSSjxn0UWCFD2whTxFOFS6rICGWhUMViRQ9fSljwiEaAkYGwRSOKB0McYXucYmxvjyBJo2ngFEGuymJi7Ow6cjNfri6BoiCoZwQfkvAzsrTYzR4lGV7lG7o4GpX4aoUTwnndvDtvxNzHtb4ssilfFFnvRQC63v9ybIRkIBhm9GaSepoPDw9lrblImnS13-WEPWy2l5_wIeYZUSPvlPIS3SV17b9ohGoNzk-axmB5QG1PvLYpZ2_t0z7h5od2vw5ZTPNOQ-RhNSu28REd4Mp0xHySYsn0ukf4kZHPUoGbMIuIMg6WhVTsz7V4n0nd1iPIjBfJjWM5dDSZfQvg4whwO1jeaE4BXxpjeiFqxf_tOT1QM Verified payload: {"claim":"value","iat":1676958080}
-
Copy your public key to
JWT_PUBLIC_KEY
in your.env
file. Make sure to replace occurrences of||
in your key with new lines -
Restart the application to load the new public key:
node --run start:dev
-
Use your token to authenticate through bearer authentication in your requests
- If you are running a service in a monorepo setup, it is launched in the background and you want to always force closing the service before attempting to restart, you can use
node --run free-ports
, which will kill an application running on the predefined port (in an OS-independent way).
To create a new CLI command, create a new file in the scripts/cmd directory. The file should be self-executable. The process should create a CLI context using cliContextUtils.ts
and destroy it before exiting.
To use arguments in your command, ZOD schema and generic type should be provided in createCliContext()
. Arguments will be parsed and validated using the provided schema.
Create a new command in the scripts
section of package.json
:
"scripts": {
"cmd:getUserImportJobs:dev": "cross-env NODE_ENV=development tsx --env-file=.env scripts/cmd/getUserImportJobs.ts",
"cmd:getUserImportJobs:prod": "node scripts/cmd/getUserImportJobs.js",
}
!!! Be aware of extensions and node / typescript execution commands in command paths, as development environment differs from non-development.
To run a command locally, use node --run {npmScriptName} -- {arguments}
. Example:
node --run cmd:getUserImportJobs:dev -- --queue=active
To run a command in a run-command pipeline, use {npmScriptName} -- {arguments}
as a command argument. Example:
cmd:getUserImportJobs:prod -- --queue=active