4
4
This is the relaunch of the new www.vim.org website. We have found a small team that will take on the
5
5
beautiful task of rebuilding the website with current design and new concepts.
6
6
7
- The new development should not take place behind closed doors, we want to
7
+ The new development should not take place behind closed doors, we want to
8
8
make the new development public and transparent for you.
9
9
10
10
Soon there will be a test system where you can follow the current status successively.
11
11
12
12
Of course, we will involve you, the community, in the design by collecting ideas and feedback.
13
13
14
+ # Build
15
+
16
+ Prerequisites
17
+
18
+ * docker & docker-compose
19
+ * npm
20
+
21
+ ### Getting started
22
+
23
+ Run the application locally with these make commands.
24
+
25
+ ``` sh
26
+ # start prebuilt containers
27
+ make start
28
+
29
+ # or start containers for local development
30
+ make dev
31
+ ```
32
+
33
+ This will setup default configuration (including dummy secrets),
34
+ install npm dependencies and start the application using docker on port ` 3000 ` .
35
+
36
+ ### Build locally
37
+
38
+ The following steps must be carried out:
39
+ 1 . Copy contents of ` .env.example ` files on ` root ` , ` root/cms ` and ` root/web ` into ` .env ` file
40
+ 2 . Install npm dependencies with ` npm install ` in the ` root ` , ` root/cms ` and ` root/web ` folder.
41
+ 3 . Startup: ` docker compose -f docker-compose.local.yml up `
42
+
43
+ For more information about the headless CMS used in this project, visit the official documentation: https://docs.strapi.io/
14
44
15
45
# Requirements
16
46
@@ -27,7 +57,7 @@ Add your requirements here:
27
57
## Non-Functional Requirements
28
58
29
59
* We want to continue using MySQL 8 as the database system.
30
- * We want the website to be fundamentally secure and avoid typical web application vulnerabilities (like SQL injection, XSS, ...) by design.
60
+ * We want the website to be fundamentally secure and avoid typical web application vulnerabilities (like SQL injection, XSS, ...) by design.
31
61
* The hashing of the user passwords is to be migrated to a hashing procedure that corresponds to the state of the art.
32
62
* The frontend/backend stack shall:
33
63
- should be maintainable and expandable in the future with reasonable effort
0 commit comments