Skip to main content

Backend service for ZMP manual management

Project description

ZMP Manual Backend

Platform Badge Component Badge CI Badge License Badge

A high-performance backend service for managing manual content from Notion to Docusaurus. Supports real-time progress tracking, multiple language translations, and automated publishing workflows.

Features

  • Exports Notion pages to Markdown/MDX format
  • Preserves document structure and formatting
  • Supports multiple target languages simultaneously
  • Real-time progress tracking with Server-Sent Events
  • Automated translation integration
  • User-specific notification system for export status
  • Docusaurus-compatible output structure
  • Job management and monitoring
  • Secure authentication with JWT tokens

API Endpoints

Authentication

POST /auth/login
- Authenticate user and get access token
- Request body: {"username": "string", "password": "string"}
- Response: {"access_token": "string", "token_type": "bearer"}

All other API endpoints require authentication via the JWT token in the Authorization header:

Authorization: Bearer <access_token>

Sidebar

GET /sidebar
- Get information about all available solutions
- Response: {"solutions": [{"name": "string", "solution_type": "string", "root_page_id": "string"}]}

Manual Service

GET /manuals
- Get hierarchical list of manuals and folders
- Optional query param: ?selected_solution=zcp

POST /publish
- Publish a manual by exporting from Notion and translating
- Request body: {
    "notion_page_id": "string",
    "selected_solution": "string",
    "target_languages": ["string"]
  }
- Response: {"job_id": "string"}

GET /watch/{job_id}
- Watch publication progress using Server-Sent Events
- Returns real-time status updates

GET /jobs/{job_id}
- Get current status of a publication job

GET /jobs
- List recent publication jobs
- Query params:
  - status: Filter by job status
  - limit: Number of jobs to return (1-100)

Notifications

GET /notifications
- Get recent notifications for the authenticated user
- User ID is automatically extracted from the authentication token
- Query params:
  - limit: Number of notifications (1-100)
  - include_read: Include read notifications
- Response includes notification data with document_title when available

GET /notifications/latest
- Get only the most recent notification for the authenticated user
- User ID is automatically extracted from the authentication token
- Query params:
  - include_read: Include read notifications
- Response includes notification data with document_title when available

GET /notifications/stream
- Stream notifications in real-time using Server-Sent Events (SSE)
- Establishes a persistent connection for receiving notifications as they happen
- User ID is automatically extracted from the authentication token
- Query params:
  - include_read: Include read notifications
- Returns: SSE stream with notification JSON data including document_title
- Includes periodic ping events to keep connection alive

POST /notifications/{notification_id}/read
- Mark a notification as read

POST /notifications/clear
- Clear all notifications

Real-Time Notifications with Server-Sent Events (SSE)

The system provides real-time notifications using Server-Sent Events (SSE), allowing clients to receive notifications as they happen without polling the server.

SSE Notification Endpoint

GET /notifications/stream

This endpoint establishes a persistent connection with the client using SSE. The server will push notifications to the client as they are created.

Query Parameters:

  • include_read (boolean, default: false): Whether to include notifications that have been marked as read.

Authentication:

  • Requires a valid JWT token in the Authorization header.

Response:

  • A stream of SSE events, each containing a JSON-serialized notification.
  • Each notification event follows the format: data: {...JSON notification data...}
  • Ping events are sent periodically with format: data: ping to keep the connection alive.
  • Notification data includes document_title when available.

SSE Watch Endpoint

GET /watch/{job_id}

This endpoint establishes a persistent connection using SSE to watch the progress of a specific job.

Path Parameters:

  • job_id: The ID of the job to watch.

Authentication:

  • Requires a valid JWT token in the Authorization header.

Response:

  • A stream of SSE events with real-time job status updates.
  • Initial event contains the current status of the job.
  • Periodic ping events with format: data: ping to keep the connection alive.
  • Status update events whenever the job status changes.
  • Connection closes automatically when job reaches a terminal state (COMPLETED or FAILED).

Client Implementation Examples

JavaScript Example

// Create and configure EventSource for SSE
const token = "YOUR_JWT_TOKEN";
const eventSource = new EventSource("/notifications/stream", {
  headers: {
    "Authorization": `Bearer ${token}`
  }
});

// Handle incoming notifications
eventSource.onmessage = function(event) {
  const notification = JSON.parse(event.data);
  console.log("Received notification:", notification);
  // Handle notification (display in UI, etc.)
};

// Handle connection open
eventSource.onopen = function() {
  console.log("SSE connection established");
};

// Handle errors
eventSource.onerror = function(error) {
  console.error("SSE connection error:", error);
  // Optionally reconnect or report error to user
};

// Close connection when done
function closeConnection() {
  eventSource.close();
}

Python Example

import asyncio
import aiohttp
import json

async def listen_for_notifications(token):
    headers = {"Authorization": f"Bearer {token}"}
    url = "http://localhost:8000/notifications/stream"

    async with aiohttp.ClientSession() as session:
        async with session.get(url, headers=headers) as response:
            if response.status != 200:
                print(f"Failed to connect: {response.status}")
                return

            async for line in response.content:
                line = line.decode('utf-8').strip()

                # Parse SSE format: "data: {json}"
                if line.startswith('data: '):
                    data = line[6:]  # Remove "data: " prefix
                    notification = json.loads(data)
                    # Handle notification
                    print(f"New notification: {notification['title']}")

Best Practices for SSE Usage

  1. Always close the connection when a client no longer needs notifications to free up server resources.
  2. Implement error handling and reconnection logic in client applications to maintain stable connections.
  3. Use the query parameters to filter notifications appropriately and reduce unnecessary network traffic.
  4. Consider implementing a maximum connection time for long-lived connections to prevent resource exhaustion.

Deployment Guide

Recent Updates and Fixes

The application has been updated with several improvements:

  1. Storage configuration improvements:

    • Added separate persistent storage for manuals cache using EFS (efs-zcp-retain storage class)
    • Repository data uses EBS (ebs-gp3 storage class) for better performance
    • Improved volume configuration in Helm charts for better persistence
  2. GitHub branch configuration:

    • Added GITHUB_BRANCH parameter to specify which branch to use (defaults to "develop")
    • Updated code to properly handle the branch parameter throughout the application
    • Fixed references to the branch in logging and error messages
    • Modified Git credential handling for better security
  3. Environment configuration:

    • Added CACHE_BASE_PATH to separate cache files from repository data
    • Updated the application to store manuals cache in a dedicated directory
    • Improved environment variable handling for cleaner initialization
  4. Updated KeyCloak configuration: The application now properly connects to the AGS cluster KeyCloak:

    • Updated KEYCLOAK_SERVER_URL to use https://keycloak.ags.cloudzcp.net/auth
    • Updated KEYCLOAK_REALM to ags
    • Updated KEYCLOAK_CLIENT_ID to zmp-client
    • Updated KEYCLOAK_REDIRECT_URI to use http://localhost:8001/api/manual/v1/auth/callback
    • Added explicit endpoint URLs:
      • KEYCLOAK_AUTH_ENDPOINT: https://keycloak.ags.cloudzcp.net/auth/realms/ags/protocol/openid-connect/auth
      • KEYCLOAK_TOKEN_ENDPOINT: https://keycloak.ags.cloudzcp.net/auth/realms/ags/protocol/openid-connect/token
      • KEYCLOAK_USER_ENDPOINT: https://keycloak.ags.cloudzcp.net/auth/realms/ags/protocol/openid-connect/userinfo
    • KeyCloak is now enabled by default for the AGS cluster
  5. Docker image: The latest docker image tag is now test17

Building and Deploying

For detailed deployment instructions, please refer to:

k8s/DEPLOYMENT_GUIDE.md

The application can be built and deployed using the provided scripts:

# Build and push the Docker image
./k8s/build-and-push.sh

# Deploy to the EKS cluster
./k8s/deploy-app.sh

Environment Configuration

Make sure to configure your environment variables in k8s/secrets.yaml before deployment. This file should contain:

  • OPENAI_API_KEY
  • NOTION_TOKEN
  • JWT_SECRET_KEY
  • KEYCLOAK_CLIENT_SECRET (if using KeyCloak)

Installation

# Using Poetry (recommended)
poetry install

# Or using pip
pip install -r requirements.txt

Configuration

Create a .env file in your project root:

# Notion Configuration
NOTION_TOKEN=your-notion-token-here
ZCP_ROOT_PAGE_ID=your-root-page-id
APIM_ROOT_PAGE_ID=your-apim-root-page-id
AMDP_ROOT_PAGE_ID=your-amdp-root-page-id

# Repository Configuration
REPO_BASE_PATH=./repo
CACHE_BASE_PATH=./cache
SOURCE_DIR=docs
TARGET_DIR=i18n
GITHUB_REPO_URL=your-github-repo-url
GITHUB_BRANCH=develop  # The branch to use in the GitHub repository (default: develop)

# Translation Configuration
TARGET_LANGUAGES=ko,ja,zh

# Authentication Configuration
JWT_SECRET_KEY=your-secret-key-keep-it-secure
ACCESS_TOKEN_EXPIRE_MINUTES=30
ENABLE_KEYCLOAK=True

Development

# Install dependencies
poetry install

# Run tests
poetry run pytest

# Quick start using run.sh (recommended)
chmod +x run.sh  # Make script executable (first time only)
./run.sh        # Starts server on port 8001 with auto-reload and debug logging

# Manual server start options
poetry run uvicorn zmp_manual_backend.main:app --reload
poetry run uvicorn zmp_manual_backend.main:app --reload --host 0.0.0.0 --port 8001

The run.sh script automatically:

  • Checks if port 8001 is in use and frees it if needed
  • Starts the FastAPI server with:
    • Host: 0.0.0.0 (accessible from other machines)
    • Port: 8001
    • Auto-reload enabled
    • Debug logging enabled

Authentication

The application uses JWT (JSON Web Tokens) for authentication. All API endpoints (except /auth/login) require a valid JWT token in the Authorization header.

The token contains information about the user, including:

  • Username
  • Roles
  • Email
  • Full name

This user information is used to filter certain resources, such as notifications, to ensure users only see content that is relevant to them.

User-Specific Notifications

Notifications can be:

  1. System-wide: Visible to all users (no user_id specified)
  2. User-specific: Visible only to a specific user

When retrieving notifications through the /notifications or /notifications/latest endpoints, the system automatically filters the results based on the user's identity from the authentication token.

Directory Structure

The service creates a Docusaurus-compatible directory structure:

repo/                  # Repository data (using EBS storage in Kubernetes)
├── docs/
│   └── [solution]/
│       └── content.mdx
└── i18n/
    ├── ko/
    │   └── docusaurus-plugin-content-docs/
    │       └── current/
    │           └── [solution]/
    │               └── content.mdx
    ├── ja/
    │   └── ...
    └── zh/
        └── ...

cache/                # Cache data (using EFS storage in Kubernetes)
└── manuals/
    ├── zcp_manuals.json
    ├── apim_manuals.json
    └── amdp_manuals.json

Job States

Publication jobs follow a specific workflow with the following states:

State Description
STARTED Job has been initiated
CHECKING_REPO Verifying repository access and status
CLONING Cloning the repository if not exists
PULLING Pulling latest changes from repository
EXPORTING Exporting content from Notion
EXPORT_COMMIT Committing exported content
TRANSLATING Translating content to target languages
TRANSLATION_COMMIT Committing translated content
PUSHING Pushing changes to repository
COMPLETED Successfully finished
FAILED Failed to complete

Failure Reasons

When a job fails, it can have one of these specific failure reasons:

Reason Description
REPO_ACCESS Failed to access or authenticate with the repository
EXPORT_FAILED Failed to export content from Notion
TRANSLATION_FAILED Failed during content translation
GIT_OPERATION_FAILED Failed during a git operation

Notification Types

The service provides three types of notifications:

Type Description
SUCCESS Successful operation notifications
ERROR Error and failure notifications
INFO General information notifications
PROCESSING In-progress operation notifications

Each notification includes:

  • Unique ID
  • Type (success/error/info/processing)
  • Title
  • Message
  • Associated solution (optional)
  • User ID (optional, for user-specific notifications)
  • Creation timestamp
  • Read status

Solution Types

The service supports the following solution types:

Type Description
ZCP Cloud Z CP Documentation
APIM API Management Documentation
AMDP Application Modernization Documentation

Supported Languages

The following language codes are supported:

Code Language
ko Korean
fr French
ja Japanese
es Spanish
de German
zh Chinese
ru Russian
it Italian
pt Portuguese
ar Arabic

License

This project is distributed under the MIT License. See the LICENSE file for more information.

Docker Deployment

For detailed instructions on building a Docker image and deploying to a Kubernetes cluster, see the Kubernetes Deployment Guide.

Quick start:

  1. Build and push the Docker image:

    ./k8s/build-and-push.sh
    
  2. Deploy the application:

    ./k8s/deploy-app.sh
    

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

zmp_manual_backend-0.1.8.tar.gz (62.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

zmp_manual_backend-0.1.8-py3-none-any.whl (63.1 kB view details)

Uploaded Python 3

File details

Details for the file zmp_manual_backend-0.1.8.tar.gz.

File metadata

  • Download URL: zmp_manual_backend-0.1.8.tar.gz
  • Upload date:
  • Size: 62.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.5 CPython/3.11.10 Darwin/24.3.0

File hashes

Hashes for zmp_manual_backend-0.1.8.tar.gz
Algorithm Hash digest
SHA256 d2febf83dbe8749fedd817a9fc2e346355da88884bc04f4dc5696665e083d387
MD5 f545700ab1afb11b1223689715b16f75
BLAKE2b-256 970b7bc7796dc8ead33b4773f6c49a9b3fa58475a887492cf23602e953024e25

See more details on using hashes here.

File details

Details for the file zmp_manual_backend-0.1.8-py3-none-any.whl.

File metadata

  • Download URL: zmp_manual_backend-0.1.8-py3-none-any.whl
  • Upload date:
  • Size: 63.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.5 CPython/3.11.10 Darwin/24.3.0

File hashes

Hashes for zmp_manual_backend-0.1.8-py3-none-any.whl
Algorithm Hash digest
SHA256 5f44a48d6fe8dcf3154ec0fa5a5a0e8607ec88c679cf8fb529b2a8b0ac2136a8
MD5 2e7e7274f56567e85155c33a0f4bfb5e
BLAKE2b-256 aa1fe628c081493b4fa2c3b7fe0324cf79e6d2de05a4067b7b2248f56b83d126

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page