reso-reference-server
RESO Reference OData Server
A metadata-driven OData 4.01 reference server for the RESO Data Dictionary. Reads the RESO JSON metadata format and dynamically generates PostgreSQL tables, OData CRUD endpoints, EDMX metadata, and OpenAPI documentation.
Quick Start (Docker)
The server supports three database backends: PostgreSQL (default), MongoDB, and SQLite. Each has its own Docker Compose profile.
PostgreSQL (default)
cd tools/reso-reference-server
docker compose up -d
This starts:
- UI at
http://localhost:5173(React SPA with nginx reverse proxy) - Server at
http://localhost:8080(OData API,DB_BACKEND=postgres) - PostgreSQL at
localhost:5432
Seed with test data:
docker compose --profile seed up seed
MongoDB
cd tools/reso-reference-server
docker compose --profile mongodb up -d mongodb server-mongo ui-mongo
This starts:
- UI at
http://localhost:5173 - Server at
http://localhost:8080(OData API,DB_BACKEND=mongodb) - MongoDB at
localhost:27017
Seed with test data:
docker compose --profile seed-mongo up seed-mongo
SQLite
cd tools/reso-reference-server
docker compose --profile sqlite up -d server-sqlite ui-sqlite
This starts:
- UI at
http://localhost:5173 - Server at
http://localhost:8080(OData API,DB_BACKEND=sqlite) - No external database — SQLite file stored in a Docker volume
Seed with test data:
docker compose --profile sqlite --profile seed-sqlite up seed-sqlite
Switching Between Backends
Stop the current backend and start the other:
# Stop everything and remove volumes
docker compose --profile mongodb --profile sqlite down -v
# Start with PostgreSQL
docker compose up -d
docker compose --profile seed up seed
# — or start with MongoDB —
docker compose --profile mongodb up -d mongodb server-mongo ui-mongo
docker compose --profile mongodb --profile seed-mongo up seed-mongo
# — or start with SQLite —
docker compose --profile sqlite up -d server-sqlite ui-sqlite
docker compose --profile sqlite --profile seed-sqlite up seed-sqlite
Verify
# Health check
curl http://localhost:8080/health
# OData metadata
curl http://localhost:8080/\$metadata
# Browse the UI
open http://localhost:5173
# Query Property records via the API
curl -H 'Accept: application/json' 'http://localhost:8080/Property?\$top=5&\$select=ListPrice,City,StateOrProvince'
# Create a Property record
curl -X POST http://localhost:8080/Property \
-H "Content-Type: application/json" \
-H "Prefer: return=representation" \
-H "Authorization: Bearer test" \
-d '{"ListPrice": 250000, "City": "Austin", "StateOrProvince": "TX", "PostalCode": "78701", "Country": "US", "BedroomsTotal": 3}'
Seeding uses the data generator with automatic dependency resolution (resolveDependencies: true). A single seed call creates all resources in topological order with valid FK linkages: Office (10), Member (25), OUID (2), Teams (5), Property (50), plus child collections (Media, OpenHouse, Showing, Rooms, etc.) — 892 records total.
Reseed (drop existing data)
docker compose down -v # or: docker compose --profile mongodb down -v
docker compose up -d # start your chosen backend
docker compose --profile seed up seed # or: --profile seed-mongo up seed-mongo
Architecture
reso-reference-server/
├── server/ # Node/Express/TypeScript OData server
├── ui/ # React SPA for browsing/editing records (Vite + Tailwind)
├── compliance/ # RESO compliance test infrastructure (Docker)
├── docker-compose.yml
└── CLAUDE.md # Coding conventions
The server is metadata-driven: it reads server-metadata.json (RESO Data Dictionary 2.0) at startup and dynamically:
- Creates database schema (PostgreSQL tables, MongoDB collections/indexes, or SQLite tables) for each target resource
- Registers OData CRUD routes with proper headers, annotations, and error format
- Generates EDMX XML metadata at
/$metadata - Generates OpenAPI 3.0 documentation at
/api-docs
The DataAccessLayer interface abstracts persistence, allowing the same OData handlers to work with PostgreSQL, MongoDB, or SQLite. See server/README.md for backend-specific details.
Supported Resources
| Resource | Primary Key | Fields |
|---|---|---|
| Property | ListingKey | 652 |
| Member | MemberKey | 87 |
| Office | OfficeKey | 73 |
| Media | MediaKey | 41 |
| OpenHouse | OpenHouseKey | 26 |
| Showing | ShowingKey | 44 |
| PropertyGreenVerification | GreenVerificationKey | 15 |
| PropertyPowerProduction | PowerProductionKey | 12 |
| PropertyRooms | RoomKey | 19 |
| PropertyUnitTypes | UnitTypeKey | 17 |
| Teams | TeamKey | 45 |
| TeamMembers | TeamMemberKey | 21 |
| OUID | OUIDKey | 46 |
OData Compliance
The server implements OData 4.01 features required by the RESO Web API Add/Edit Endorsement (RCP-010):
OData-Version: 4.01response headerPrefer: return=representationandreturn=minimalsupportLocation,EntityId,Preference-Appliedresponse headers@odata.context,@odata.id,@odata.editLink,@odata.etagannotations- OData error format with
error.code,error.message,error.details[].target - OData key syntax:
/{Resource}('{key}') - EDMX 4.0 metadata at
/$metadata
API Endpoints
| Method | Path | Description |
|---|---|---|
| GET | /$metadata |
EDMX XML metadata document |
| GET | /api-docs |
Swagger UI documentation |
| GET | /health |
Health check |
| POST | /oauth/token |
Mock OAuth2 token endpoint |
| GET | /{Resource} |
Query collection ($filter, $select, $orderby, $top, $skip, $count, $expand) |
| POST | /{Resource} |
Create a new record |
| GET | /{Resource}('{key}') |
Get a record by key (supports $expand) |
| PATCH | /{Resource}('{key}') |
Update a record |
| DELETE | /{Resource}('{key}') |
Delete a record |
| GET | /admin/data-generator/status |
Resource counts and available generators |
| POST | /admin/data-generator |
Generate seed data (supports resolveDependencies) |
Enumeration Modes
The server supports two enumeration representations via ENUM_MODE environment variable:
string(default) — Enum fields useEdm.StringwithLookupNameannotations. A Lookup Resource at/Lookupexposes all 3,634 valid values. Human-readable display names (e.g., “Active Under Contract”).enum-type— Enum fields referenceEdm.EnumTypedefinitions in EDMX metadata. PascalCase member names (e.g.,ActiveUnderContract). No Lookup Resource.
# Start in enum-type mode
ENUM_MODE=enum-type docker compose up -d --build
# Run compliance in enum-type mode
ENUM_MODE=enum-type docker compose --profile compliance-core up compliance-core
Both modes pass all Web API Core 2.0.0 compliance tests.
Compliance Testing
The server includes Docker-based compliance testing against RESO certification tools and a custom Add/Edit test runner. Tests run against seeded data and validate OData protocol compliance, metadata structure, field mappings, and query behavior.
Web API Core 2.0.0
Validates OData query operations ($filter, $select, $orderby, $top, $skip, $count, $expand), response formats, metadata, and service document compliance. Uses the RESO web-api-commander.
Current status: 42 passed, 0 failed, 3 skipped (3 skipped: has operator tests, N/A for string enumerations)
# PostgreSQL
docker compose up -d --build --wait
docker compose --profile seed up --exit-code-from seed
docker compose --profile compliance-core up --build --exit-code-from compliance-core
# MongoDB
docker compose --profile mongodb up -d --build --wait mongodb server-mongo ui-mongo
docker compose --profile mongodb --profile seed-mongo up seed-mongo
docker compose --profile compliance-core-mongo up --build --exit-code-from compliance-core-mongo
# SQLite
docker compose --profile sqlite up -d --build --wait server-sqlite
docker compose --profile sqlite --profile seed-sqlite up seed-sqlite
docker compose --profile sqlite --profile compliance-core-sqlite up --build --exit-code-from compliance-core-sqlite
The test generates RESOScript XML configs dynamically from live server data (compliance/generate-resoscripts.sh), sampling records to find appropriate field values for each data type (integer, decimal, date, timestamp, single/multi-value lookups).
Data Dictionary 2.0
Validates metadata compliance, field mappings, and data availability against the RESO Data Dictionary 2.0 specification. Uses the RESO reso-certification-utils.
Current status: 1,034 passed, 570 skipped, 0 failed, 0 schema validation errors
# PostgreSQL
docker compose --profile compliance-dd up --build --exit-code-from compliance-dd
# MongoDB
docker compose --profile compliance-dd-mongo up --build --exit-code-from compliance-dd-mongo
# SQLite
docker compose --profile sqlite --profile compliance-dd-sqlite up --build --exit-code-from compliance-dd-sqlite
Web API Add/Edit (RCP-010)
Validates Create, Update, and Delete operations with representation and minimal response modes. Uses the custom @reso/certification-add-edit test runner.
Current status: 8 passed, 0 failed
# Docker
docker compose --profile compliance-addedit up --build --exit-code-from compliance-addedit
# Local CLI
cd ../certification/add-edit
npx reso-cert-add-edit \
--server-url http://localhost:8080 \
--resource Property \
--auth-token test \
--compliance-report ./compliance-report.json \
--spec-version 2.0.0
The --compliance-report flag generates a structured JSON compliance report with per-scenario details suitable for API submission.
CI/CD
Compliance tests run automatically on push to main and on pull requests via GitHub Actions (.github/workflows/compliance.yml). Both PostgreSQL and MongoDB backends are tested in parallel. Results are uploaded as build artifacts.
Development
See server/README.md for development setup and testing instructions.
License
See LICENSE in the repository root.