You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
hydra/README.md

893 lines
25 KiB

3 years ago
<!-- <img src='https://img.icons8.com/external-flaticons-lineal-color-flat-icons/344/external-hydra-ancient-greek-mythology-monsters-and-creatures-flaticons-lineal-color-flat-icons.png' width='256px'/> -->
3 years ago
![Hydra - Zero Config API Boilerplate with Laravel Sanctum](https://res.cloudinary.com/roxlox/image/upload/v1653133921/hydra/hydra-trnsparent_jcsl4l.png)
3 years ago
# Hydra - Zero Config API Boilerplate with Laravel Sanctum
3 years ago
[![CircleCI](https://circleci.com/gh/hasinhayder/hydra/tree/master.svg?style=svg)](https://circleci.com/gh/hasinhayder/hydra/tree/master) ![GitHub](https://img.shields.io/github/license/hasinhayder/hydra?label=License&style=flat-square)
3 years ago
Hydra is a zero-config API boilerplate with Laravel Sanctum and comes with excellent user and role management API out of the box. Start your next big API project with Hydra, focus on building business logic, and save countless hours of writing boring user and role management API again and again.
- [Hydra - Zero Config API Boilerplate with Laravel Sanctum](#hydra---zero-config-api-boilerplate-with-laravel-sanctum)
- [Getting Started](#getting-started)
3 years ago
- [Screencast](#screencast)
- [Database Migration and Seeding](#database-migration-and-seeding)
- [List of Default Routes](#list-of-default-routes)
- [Default Roles](#default-roles)
- [Routes Documentation](#routes-documentation)
- [User Registration](#user-registration)
- [User Authentication/Login (Admin)](#user-authenticationlogin-admin)
- [User Authentication/Login (Other Roles)](#user-authenticationlogin-other-roles)
3 years ago
- [List Users (Admin Ability Required)](#list-users-admin-ability-required)
3 years ago
- [Update a User (User/Admin Ability Required)](#update-a-user-useradmin-ability-required)
3 years ago
- [Delete a User (Admin Ability Required)](#delete-a-user-admin-ability-required)
- [List Roles (Admin Ability Required)](#list-roles-admin-ability-required)
- [Add a New Role (Admin Ability Required)](#add-a-new-role-admin-ability-required)
- [Update a Role (Admin Ability Required)](#update-a-role-admin-ability-required)
3 years ago
- [Delete a Role (Admin Ability Required)](#delete-a-role-admin-ability-required)
3 years ago
- [List Available Roles of a User (Admin Ability Required)](#list-available-roles-of-a-user-admin-ability-required)
- [Assign a Role to a User (Admin Ability Required)](#assign-a-role-to-a-user-admin-ability-required)
3 years ago
- [Delete a Role from a User (Admin Ability Required)](#delete-a-role-from-a-user-admin-ability-required)
3 years ago
- [Notes](#notes)
- [Default Role for New Users](#default-role-for-new-users)
- [Single Session or Multiple Session](#single-session-or-multiple-session)
- [Add `Accept: application/json` Header In Your API Calls](#add-accept-applicationjson-header-in-your-api-calls)
- [Tutorial](#tutorial)
- [Create a New API Controller](#create-a-new-api-controller)
- [Add a Function](#add-a-function)
- [Create Protected Routes](#create-protected-routes)
- [Test Protected Routes](#test-protected-routes)
- [Protect a Route with Laravel Sanctum's Ability and Abilities Middleware](#protect-a-route-with-laravel-sanctums-ability-and-abilities-middleware)
3 years ago
## Getting Started
3 years ago
3 years ago
It's super easy to get Hydra up and running.
3 years ago
3 years ago
1. clone the project
3 years ago
```shell
git clone https://github.com/hasinhayder/hydra.git
```
3 years ago
2. install the dependencies
```shell
cd hydra
composer install
```
3. Copy `.env.example` to `.env`
3 years ago
```shell
cp .env.example .env
```
4. Generate application key
```shell
php artisan key:generate
```
5. Start the webserver
3 years ago
```shell
php artisan serve
```
3 years ago
That's mostly it! You have a fully running laravel installation with Sanctum, all configured.
### Screencast
[![asciicast](https://asciinema.org/a/497775.svg)](https://asciinema.org/a/497775)
3 years ago
## Database Migration and Seeding
3 years ago
Open your `.env` file and change the DATABASE options. You can start with SQLite by following these steps
3 years ago
1. Create a new SQLite database
3 years ago
```shell
touch database/hydra.sqlite
```
3 years ago
Or simply create a new file as **hydra.sqlite** inside your **database** folder.
3 years ago
2. you can run both migrations and seeders together by simply running the following command
3 years ago
3 years ago
```shell
php artisan migrate:fresh --seed
```
**OR**
you can run them separately using the following commands
2. Run Migrations
3 years ago
```shell
3 years ago
php artisan migrate:fresh
3 years ago
```
3 years ago
Now your database has essential tables for user and roles management.
3 years ago
3. Run Database Seeders
3 years ago
Run `db:seed`, and you have your first admin user, some essential roles in the roles table, and the relationship correctly setup.
3 years ago
```shell
php artisan db:seed
```
3 years ago
Please note that the default admin user is **admin@hydra.project** and the default password is **hydra**. You should create a new admin user before deploying to production and delete this default admin user. You can do that using the available Hydra user management API or any DB management tool.
3 years ago
## List of Default Routes
Here is a list of default routes. Run the following artisan command to see this list in your terminal.
3 years ago
```shell
3 years ago
php artisan route:list
```
3 years ago
![Hydra - List of Default Routes](https://res.cloudinary.com/roxlox/image/upload/v1653131647/hydra/default-routes-hydra_fgn9oh.webp)
## Default Roles
3 years ago
Hydra comes with these `super-admin`,`admin`,`editor`,`customer` & `user` roles out of the box. For details, open the roles table after database seeding, or open the laravel tinker and experiment with the `Role` model.
3 years ago
```shell
php artisan tinker
```
run the following command
3 years ago
3 years ago
```php
3 years ago
>>> Role::select(['id','slug','name'])->get()
//or
>>> Role::all(['id','name','slug'])
//or
>>> Role::all()
3 years ago
```
3 years ago
## Routes Documentation
Let's have a look at what Hydra has to offer. Before experimenting with the following API endpoints, run your Hydra project using `php artisan serve` command. For the next part of this documentation, we assumed that Hydra is listening at http://localhost:8000
### User Registration
3 years ago
You can make an `HTTP POST` call to create/register a new user to the following endpoint. Newly created users will have the `user` role by default.
```shell
http://localhost:8000/api/users
```
**API Payload & Response**
3 years ago
You can send a Form Multipart payload or a JSON payload like this.
```json
{
"name":"Hydra User",
"email":"user@hydra.project",
"passsword":"Surprisingly A Good Password"
}
```
3 years ago
Voila! Your user has been created and is now ready to log in!
3 years ago
If this user already exists, then you will receive a 409 Response like this
```json
{
"error": 1,
"message": "user already exists"
}
```
3 years ago
### User Authentication/Login (Admin)
3 years ago
Remember Hydra comes with the default admin user? You can log in as an admin by making an HTTP POST call to the following route.
```shell
http://localhost:8000/api/login
```
**API Payload & Response**
3 years ago
You can send a Form Multipart or a JSON payload like this.
```json
{
"email":"admin@hydra.project",
"passsword":"hydra"
}
```
You will get a JSON response with user token. You need this admin token for making any call to other routes protected by admin ability.
```json
{
"error": 0,
"token": "1|se9wkPKTxevv9jpVgXN8wS5tYKx53wuRLqvRuqCR"
}
```
3 years ago
For any unsuccessful attempt, you will receive a 401 error response.
3 years ago
```json
{
"error": 1,
"message": "invalid credentials"
}
```
3 years ago
### User Authentication/Login (Other Roles)
3 years ago
3 years ago
You can log in as a user by making an HTTP POST call to the following route
3 years ago
```shell
http://localhost:8000/api/login
```
**API Payload & Response**
You can send a Form Multipart or a JSON payload like this
```json
{
"email":"user@hydra.project",
"passsword":"Surprisingly A Good Password"
}
```
3 years ago
You will get a JSON response with user token. You need this user token for making any calls to other routes protected by user ability.
3 years ago
```json
{
"error": 0,
"token": "2|u0ZUNlNtXgdUmtQSACRU1KWBKAmcaX8Bkhd2xVIf"
}
```
3 years ago
For any unsuccessful attempt, you will receive a 401 error response.
```json
{
"error": 1,
"message": "invalid credentials"
}
```
3 years ago
### List Users (Admin Ability Required)
To list the users, make an `HTTP GET` call to the following route, with Admin Token obtained from Admin Login. Add this token as a standard `Bearer Token` to your API call.
```shell
http://localhost:8000/api/users
```
**API Payload & Response**
3 years ago
No payload is required for this call.
3 years ago
You will get a JSON response with all users available in your project.
```json
[
{
"id": 1,
"name": "Hydra Admin",
"email": "admin@hydra.project"
},
{
"id": 2,
"name": "Test User",
"email": "test@hydra.project"
},
]
```
3 years ago
For any unsuccessful attempt or wrong token, you will receive a 401 error response.
3 years ago
```json
{
"message": "Unauthenticated."
}
```
3 years ago
### Update a User (User/Admin Ability Required)
3 years ago
Make an `HTTP PUT` request to the following route to update an existing user. Replace {userid} with actual user id. You must include a Bearer token obtained from User/Admin authentication. A bearer admin token can update any user. A bearer user token can only update the authenticated user by this token.
3 years ago
```shell
http://localhost:8000/api/users/{userid}
```
3 years ago
For example, to update the user with id 2, use this endpoint `http://localhost:8000/api/users/3`
3 years ago
**API Payload & Response**
3 years ago
You can include `name` or `email`, or both in a URL Encoded Form Data or JSON payload, just like this
3 years ago
```json
{
3 years ago
"name":"Captain Cook",
"email":"captaincook@hydra.project"
3 years ago
}
```
3 years ago
You will receive the updated user if the bearer token is valid.
3 years ago
```json
{
3 years ago
"id": 3,
"name": "Captain Cook",
"email": "captaincook@hydra.project",
3 years ago
}
```
3 years ago
For any unsuccessful attempt with an invalid token, you will receive a 401 error response.
3 years ago
```json
{
"error": 1,
"message": "invalid credentials"
}
```
3 years ago
If a bearer user token attempts to update any other user but itself, a 409 error response will be delivered
3 years ago
```json
{
3 years ago
"error": 1,
"message": "Not authorized"
}
```
3 years ago
For any unsuccessful attempt with an invalid `user id`, you will receive a 404 not found error response. For example, when you are trying to delete a non-existing user with id 16, you will receive the following response.
3 years ago
```json
{
"error": 1,
"message": "No query results for model [App\\Models\\User] 16"
3 years ago
}
```
3 years ago
### Delete a User (Admin Ability Required)
3 years ago
To delete an existing user, make a `HTTP DELETE` request to the following route. Replace {userid} with actual user id
3 years ago
```shell
http://localhost:8000/api/users/{userid}
```
For example to delete the user with id 2, use this endpoint `http://localhost:8000/api/users/2`
**API Payload & Response**
No payload is required for this call.
3 years ago
If the request is successful and the bearer token is valid, you will receive a JSON response like this
3 years ago
```json
{
"error": 0,
"message": "user deleted"
}
```
3 years ago
You will receive a 401 error response for any unsuccessful attempt with an invalid token.
3 years ago
```json
{
"error": 1,
"message": "invalid credentials"
}
```
3 years ago
For any unsuccessful attempt with an invalid `user id`, you will receive a 404 not found error response. For example, you will receive the following response when you try to delete a non-existing user with id 16.
3 years ago
```json
{
"error": 1,
"message": "No query results for model [App\\Models\\User] 16"
}
```
3 years ago
### List Roles (Admin Ability Required)
To list the roles, make an `HTTP GET` call to the following route, with Admin Token obtained from Admin Login. Add this token as a standard `Bearer Token` to your API call.
```shell
http://localhost:8000/api/roles
```
**API Payload & Response**
3 years ago
No payload is required for this call.
3 years ago
You will get a JSON response with all the roles available in your project.
```json
[
{
"id": 1,
"name": "Administrator",
"slug": "admin"
},
{
"id": 2,
"name": "User",
"slug": "user"
},
{
"id": 3,
"name": "Customer",
"slug": "customer"
},
{
"id": 4,
"name": "Editor",
"slug": "editor"
},
{
"id": 5,
"name": "All",
"slug": "*"
},
{
"id": 6,
"name": "Super Admin",
"slug": "super-admin"
}
]
```
3 years ago
For any unsuccessful attempt or wrong token, you will receive a 401 error response.
3 years ago
```json
{
"message": "Unauthenticated."
}
```
### Add a New Role (Admin Ability Required)
To list the roles, make an `HTTP POST` call to the following route, with Admin Token obtained from Admin Login. Add this token as a standard `Bearer Token` to your API call.
```shell
http://localhost:8000/api/roles
```
**API Payload & Response**
You need to supply title of the role as `name`, role `slug` in your payload as Multipart Form or JSON data
```json
{
"name":"Manager",
"slug":"manager"
}
```
3 years ago
You will get a JSON response with this newly created role for successful execution.
3 years ago
```json
{
"name": "Manager",
"slug": "manager",
"id": 7
}
```
If this role `slug` already exists, you will get a 409 error message like this
```json
{
"error": 1,
"message": "role already exists"
}
```
3 years ago
For any unsuccessful attempt or wrong token, you will receive a 401 error response.
3 years ago
```json
{
"message": "Unauthenticated."
}
```
### Update a Role (Admin Ability Required)
3 years ago
To update a role, make an `HTTP PUT` or `HTTP PATCH` request to the following route, with Admin Token obtained from Admin Login. Add this token as a standard `Bearer Token` to your API call.
3 years ago
```shell
http://localhost:8000/api/roles/{roleid}
```
For example to update the Customer role, use this endpoint `http://localhost:8000/api/roles/3`
**API Payload & Response**
You need to supply title of the role as `name`, and/or role `slug` in your payload as Multipart Form or JSON data
```json
{
"name":"Product Customer",
"slug":"product-customer"
}
```
3 years ago
You will get a JSON response with this updated role for successful execution.
3 years ago
```json
{
"id": 3,
"name": "Product Customer",
"slug": "product-customer"
}
```
3 years ago
Please note that you cannot change a `super-admin` or `admin` role slug because many API routes in Hydra exclusively require this role to function correctly.
3 years ago
3 years ago
For any unsuccessful attempt or wrong token, you will receive a 401 error response.
3 years ago
```json
{
"message": "Unauthenticated."
}
```
3 years ago
### Delete a Role (Admin Ability Required)
To delete a role, make an `HTTP DELETE` request to the following route, with Admin Token obtained from Admin Login. Add this token as a standard `Bearer Token` to your API call.
```shell
http://localhost:8000/api/roles/{roleid}
```
3 years ago
For example, to delete the Customer role, use this endpoint `http://localhost:8000/api/roles/3`
3 years ago
**API Payload & Response**
3 years ago
No payload is required for this endpoint.
3 years ago
3 years ago
You will get a JSON response with this updated role for successful execution.
3 years ago
```json
{
"error": 0,
"message": "role has been deleted"
}
```
3 years ago
Please note that you cannot delete the `admin` role because many API routes in Hydra exclusively require this role to function correctly.
3 years ago
3 years ago
If you try to delete the admin role, you will receive the following 422 error response.
3 years ago
```json
{
"error": 1,
"message": "you cannot delete this role"
}
```
3 years ago
For any unsuccessful attempt or wrong token, you will receive a 401 error response.
3 years ago
```json
{
"message": "Unauthenticated."
}
```
3 years ago
### List Available Roles of a User (Admin Ability Required)
To list all available roles for a user, make an `HTTP GET` request to the following route, with Admin Token obtained from Admin Login. Add this token as a standard `Bearer Token` to your API call. Replace {userid} with an actual user id
```shell
http://localhost:8000/api/users/{userid}/roles
```
For example to get all roles assigned to the user with id 2, use this endpoint `http://localhost:8000/api/users/2/roles`
**API Payload & Response**
No payload is required for this call.
3 years ago
For successful execution, you will get a JSON response containing the user with all its assigned roles.
3 years ago
```json
{
"id": 2,
"name": "Test User",
"email": "test@hydra.project",
"roles": [
{
"id": 2,
"name": "User",
"slug": "user"
},
{
"id": 3,
"name": "Customer",
"slug": "customer"
}
]
}
```
3 years ago
For any unsuccessful attempt or wrong token, you will receive a 401 error response.
3 years ago
```json
{
"message": "Unauthenticated."
}
```
### Assign a Role to a User (Admin Ability Required)
To assign a role to a user, make an `HTTP POST` request to the following route, with Admin Token obtained from Admin Login. Add this token as a standard `Bearer Token` to your API call. Replace {userid} with an actual user id
```shell
http://localhost:8000/api/users/{userid}/roles
```
3 years ago
For example to assign a role to the user with id 2, use this endpoint `http://localhost:8000/api/users/2/roles`
3 years ago
**API Payload & Response**
You need to supply `role_id` in your payload as Multipart Form or JSON data
```json
{
"role_id":3
}
```
3 years ago
For successful execution, you will get a JSON response containing the user with all its assigned roles.
3 years ago
```json
{
"id": 2,
"name": "Test User",
"email": "test@hydra.project",
"roles": [
{
"id": 2,
"name": "User",
"slug": "user"
},
{
"id": 3,
"name": "Customer",
"slug": "customer"
}
]
}
```
3 years ago
Notice that the user has a `Roles` array, and this newly assigned role is present in this array.
3 years ago
3 years ago
Please note that it will have no effect if you assign the same `role` again to a user.
3 years ago
3 years ago
For any unsuccessful attempt or wrong token, you will receive a 401 error response.
3 years ago
```json
{
"message": "Unauthenticated."
}
```
3 years ago
### Delete a Role from a User (Admin Ability Required)
To delete a role from a user, make an `HTTP DELETE` request to the following route, with Admin Token obtained from Admin Login. Add this token as a standard `Bearer Token` to your API call. Replace `{userid}` with an actual user id, and `{role}` with an actual role id
```shell
http://localhost:8000/api/users/{userid}/roles/{role}
```
3 years ago
For example, to delete a role with id 3 from the user with id 2, use this endpoint `http://localhost:8000/api/users/2/roles/3`
3 years ago
**API Payload & Response**
No payload is required for this call
3 years ago
For successful execution, you will get a JSON response containing the user with all asigned roles to it.
3 years ago
```json
{
"id": 2,
"name": "Test User",
"email": "test@hydra.project",
"roles": [
{
"id": 2,
"name": "User",
"slug": "user"
},
]
}
```
3 years ago
Notice that the user has a `Roles` array, and the role with id 3 is not present in this array.
3 years ago
3 years ago
For any unsuccessful attempt or wrong token, you will receive a 401 error response.
3 years ago
```json
{
"message": "Unauthenticated."
}
```
3 years ago
## Notes
### Default Role for New Users
3 years ago
The `user` role is assigned to them when a new user is created. To change this behavior, open your `.env` file and set the value of `DEFAULT_ROLE_ID` to any existing role id. New users will have that role by default. For example, if you want your new users to have a `customer` role, set `DEFAULT_ROLE_ID=3` in your `.env` file.
3 years ago
### Single Session or Multiple Session
3 years ago
Hydra doesn't invalidate the previously issued access tokens when a user authenticates. So, all access tokens, including the newly created one, will remain valid. If you want to change this behavior and delete all previous tokens when a user authenticates, set `DELETE_PREVIOUS_ACCESS_TOKENS_ON_LOGIN` to `true` in your `.env` file. The value of `DELETE_PREVIOUS_ACCESS_TOKENS_ON_LOGIN` is set to `false` by default.
### Add `Accept: application/json` Header In Your API Calls
3 years ago
This is very important. To properly receive JSON responses, add the following header to your API requests.
3 years ago
```shell
Accept: application/json
```
3 years ago
For example, if you are using `curl` you can make a call like this.
```shell
curl --request GET \
--url http://localhost:8000/hydra/version \
--header 'Accept: application/json' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data =
```
## Tutorial
3 years ago
So you decided to give Hydra a try and create a new protected API endpoint; that's awesome; let's dive in.
### Create a New API Controller
3 years ago
You can create a normal or a resourceful controller. To keep it simple, I am going with a standard controller.
```shell
3 years ago
php artisan make:controller MessageController
```
This will create a new file called `app/Http/Controlers/MessageController.php`
### Add a Function
3 years ago
We will add a simple function that will greet the authenticated user. Since this will be protected using Sanctum middleware, only a request with a valid bearer token will be able to access this endpoint. You don't need to worry about anything else.
Open this file `app/Http/Controlers/MessageController.php` and add the following code
```php
<?php
namespace App\Http\Controllers;
use Illuminate\Http\Request;
3 years ago
class MessageController extends Controller
{
public function greet(Request $request){
$user = $request->user();
$response = [
"name"=>$user->name,
3 years ago
"role"=>$user->roles()->first()->name //or $user->roles()->first()->slug
];
return $response;
}
}
```
### Create Protected Routes
Let's create a protected route `http://localhost:8000/api/greet` to use this API
3 years ago
Open your `routes/api.php` file and add the following line at the end.
```php
3 years ago
Route::get('greet', [MessageController::class,'greet'])->middleware(['auth:sanctum']);
```
Nice! Now we have a route `/api/greet` that is only accessible with a valid bearer token.
### Test Protected Routes
3 years ago
If you have already created a user, you need his accessToken first. You can use the admin user or create a new user and then log in and note their bearer token. To create or authenticate a user, check the documentation in the beginning.
3 years ago
To create a new user, you can place a curl request or use tools like Postman, Insomnia or HTTPie. Here is a quick example using curl.
```shell
curl --request POST \
--url http://localhost:8000/api/users \
--header 'Accept: application/json' \
--header 'Content-Type: multipart/form-data; boundary=---011000010111000001101001' \
--form 'name=Hydra User' \
--form email=user@hydra.project \
--form 'password=Surprisingly A Good Password'
```
3 years ago
Great! Now we have our users. Let's login as this new user using curl (You can use tools like Postman, Insomnia, or HTTPie)
```shell
curl --request POST \
--url http://localhost:8000/api/login \
--header 'Accept: aplication/json' \
--header 'Content-Type: application/json' \
--data '{
"email":"user@hydra.project",
"password":"Surprisingly A Good Password"
}'
```
Now you have this user's accessToken in the response, as shown below. Note it.
```javascript
{"error":0,"id":2,"token":"5|gbiWdd7yJFYiTIgoK1jK3C7HZJtJUK1PnBIToBLN"}
```
The bearer token for this user is `5|gbiWdd7yJFYiTIgoK1jK3C7HZJtJUK1PnBIToBLN`
3 years ago
Now let's test our protected route. Add this bearer token in your PostMan/Insomnia/HTTPie or Curl call and make a `HTTP GET` request to our newly created protected route `http://localhost:8000/api/greet`. Here's an example call with curl
```shell
curl --request GET \
--url http://localhost:8000/api/greet \
--header 'Accept: application/json' \
3 years ago
--header 'Authorization: Bearer 5|gbiWdd7yJFYiTIgoK1jK3C7HZJtJUK1PnBIToBLN'
```
3 years ago
The response will be something like this.
```javascript
{
"name": "user@hydra.project",
"role": "User"
}
```
Great! you have learned how to create your protected API endpoint using Laravel Sanctum and Hydra!
### Protect a Route with Laravel Sanctum's Ability and Abilities Middleware
3 years ago
Let's make our newly created API endpoint even more robust. Say, we want our route to be accessible by only admin users. Remember you added the following line in the `routes/api.php` file just a few minutes ago? Let's change it.
```php
3 years ago
Route::get('greet', [MessageController::class,'greet'])->middleware(['auth:sanctum']);
```
Change it like this
```php
3 years ago
Route::get('greet', [MessageController::class,'greet'])->middleware(['auth:sanctum', 'ability:admin']);
```
3 years ago
Only an `HTTP GET` call with a valid admin user's access token can access this route.
If you want this route to be accessible by the users with `admin`, **OR** the `user` role, then modify it.
```php
3 years ago
Route::get('greet', [MessageController::class,'greet'])->middleware(['auth:sanctum', 'ability:admin,user']);
```
3 years ago
If you want this route to be accessible by the users with both `user`, **AND** the `customer` role, then modify it.
```php
3 years ago
Route::get('greet', [MessageController::class,'greet'])->middleware(['auth:sanctum', 'abilities:customer,user']);
```
Note that this time we have used the `abilities` keyword instead of `ability`
Great, now you know everything to start creating your next big API project with Laravel & Laravel Sanctum using our powerful boilerplate project called Hydra. Enjoy!