These videos complement the docs below.
It's already possible for a user to:
- Sign up
- Sign in
- Sign out
- View a list of posts
Here's an overview of the technologies used to build this template application. You don't need to do a deep dive on each one right now. Instead, try to get a feeling for the big picture and then dive into the details when a specific task pushes you in that direction.
MongoDB is a NoSQL database program that stores data in collections of documents (in a format similar to JSON), rather than in tables. The application interacts with MongoDB using a tool called Mongoose.
Express is the Javascript equivalent of Sinatra. The structure of this application will feel quite different to what you're used to but the principles are the same.
React is a hugely popular tool that is used to build engaging front ends. The basic principle is that the front end is split up into components, each of which could include some logic, template structure (HTML) and styling (CSS).
Java script was originally designed to run exclusively in browsers, such as Chrome. Node is a tool that allows you to run Javascript outside the browser and its invention made it possible to build full stack Javascript apps.
We also used...
- Jest for unit testing on the back end
- Cypress for end-to-end testing and component testing, on the front end
- Mongoose to model objects in MongoDB.
- Handlebars for the
home
template. - ESLint for linting.
- Nodemon to reload the server automatically.
This application is comprised of two distinct pieces:
- A backend API built with Express
- A front end built with React
It's important to note that these are two completely different programs. They don't share any code. They have their own package.json
and dependencies. Imagine that they're always running on two different machines (though when you are working locally, everything is running on your computer).
The only way the frontend can communicate with the API is through HTTP requests on the network. The React front end sends HTTP requests to the backend API and receives JSON in response body, rather than a whole page of HTML.
For example, the React front end would send this request to retrieve the entire Post
collection.
GET "/posts"
And the body of the response would look like this.
{
"posts": [
{
"_id": "62f8ef0e6c1ffcf74cbbb181",
"message": "Hello, this is my first Acebook post!",
"__v": 0
},
{
"_id": "62f8ef366c1ffcf74cbbb188",
"message": "Welcome to Acebook! Have an Acetime :)",
"__v": 0
},
{
"_id": "62f8f08af1cffef85a7426ae",
"message": "Thank you :D",
"__v": 0
}
]
}
Once received by the React FE, the JSON in the response body is used to render a list of posts on the page.
This architectural pattern is quite popular because it allows teams to build multiple front ends, all of which use the same backend API. You could, for example, go on to build a mobile app without needing to create another backend API.
Up until now, if you've implemented authentication, it will likely have been done using sessions - this is a useful point of comparison but, if you haven't implemented authentication yet, that's not going to impede you right now.
Here's the authentication flow for this application
- A registered user submits their email address and password via the React front end.
- The Express backend receives the data and tries to find a user in the DB with the same email address.
- If a user is found, the password in the database is compared to the password that was submitted.
- If the passwords match, a JSON Web Token is generated and returned, as part of the response.
- The React front end receives the token and holds on to it.
- Every request to
"/posts"
must include a valid token (which is checked by the backend). - When the user logs out, the front end discards the token.
A JSON Web Token, or JWT, is a token that comprises three parts
- A header, which contains information about how the token was generated.
- A signature, which is used to verify the token.
- A payload, which you can use to store some non-sensitive data like a user id. Note that the payload is not secure and can be decoded very easily.
The signature is created using a 'secret', which must be kept private (i.e. not put on GitHub) otherwise nefarious internet users could start to issue tokens for your application.
Here, we've used an environment variable called JWT_SECRET
, which you'll see used in the commands to start the application and run the tests (in the README). You can change the value of that environment variable to anything you like, as long as it's hard to guess. It should also never be committed in your project files.