Skip to main content

Sitecore - Module based approach

Okay so this is something I picked up from a recent developer group thingy and have been annoying my colleagues about this since then.
Instead of thinking Sitecore as one project (MVC) solution why not treat it like a module/deliverable based implementation.
I have created a sample solution which is here: https://bitbucket.org/ali_nahid/sckitchensync
 
The idea is pretty simple (Just like DDD pattern):
You get a rough idea of the entire implementation like what are the deliverable, functionalities etc etc and group them. Then just like the way you plan renderings on your page you plan bunch of different modules to implement in your solution.
In my case I divided my sitecore implementation into the following modules:
1.      The core:
This module contains the layouts and core renderings. In my case
1 standard layout that just defines the top level placeholders. Like header, footer, content etc.
And a “_MainContent” rendering that defines the other placeholders like bodycontent, bannerimage
And obviously the header, footer type of things that are going to be pretty much same throughout the entire site.
I’d give this task to “Gru” the evil genius.
2.      The Meta:
This module only handles the meta content (google meta, facebook meta, perhaps some GA code etc) of the site.
Let’s say “donny” the minion does it.
3.      The Navigation:
This module handles anything to do with site navigation like top navigation menu, breadcrumb, footer menu etc.
Let’s say “dave” the minion does it.
4.      The Imagery:
This module handles thing like “Banner”, Background, Carousel etc.
Let’s say “carl” the one eyed minion does it.
Each of these modules deal with their own set of sitecore renderings.
Interesting thing about this approach is these modules are MVC projects of its own. Sitecore is not restricting you from doing so. Who said only one MVC project for one sitecore website?
Ofcourse the "Domain POCOs" and "Service" and "Repository" layer concept exists as it is. And you can either separate them as per module or have them in their own projects is a personal preference.
 
Visualizing the above description:

instead of doing this:


We do this:


The few pros about this approach I could think of are:
1.      It can be very efficient in doing something like the following:
So you deliver a basic site with “Core, Navigation” module. Then you install/put “Imagery” Module. Then “The fancy” looking landing page module. And so on.  Each of these deliverable are independent to each other. So very less chance of breaking one while delivering the new feature because they’re all separate set of dlls.
 
2.     Easy to distribute work:
As per description each minion can take care of and be responsible for each module. This can come in handy to track progress.
3.      Once done maintaining becomes easier:
Because if something goes wrong or some changes required to make to the, for example Imagery module, you only look into “KitchenSync.Imagery.MVC” project as opposed to be bombarded by a massive MVC project.
4.      Creates a repository of re-usable components/modules. So there can be “Oakton sitecore repository” where you can search and download a module.
For example you need a navigation on your project download the navigation module from the repository.. you probably will need to made the tweak in the cshtml file to match the markup but the logic of how the navigation work remains the same. As a result you save yourself from creating bunch of sitecore renderings and classes.
5.      If gets follow through then this approach enforces a consistent culture of naming convention, field definition etc.
For example, on a page there’re often commonly 2 fields that exists. A summary and a description. Some calls it Short Description, Long Description and some calls it Summary and Description. Why not agree to one. They both mean the same.
6.      Testing is easier too. As you are testing one module at a time.
 
If you’re worried about how you launch it with IIS if there’re multiple MVC projects in the implementation, that’s not an issue either. So this is what I have done:
I have a typical sitecore installation which my IIS is pointing to and I am treating it as publish directory. My build settings puts the dlls to the publish directory /bin location so they become available to sitecore.
Then a simple powershell script copies the views to the publish directory’s Views accordingly. This script can be hooked to a VS post publish (I still don’t know how to do it)

So what you think? Worth it not Worth it? 

Comments

Popular posts from this blog

Managing devices using Edge Manager

Managing edge devices has been a complex process as traditional IT ops tools fall short in distributed, low-connectivity environment to manage huge quantity of devices.  Red Hat Edge Manager  (Open source project: FlightControl , GA'd by Red Hat on late Jan, 2026) solves these challenges by providing streamlined management of edge devices and applications through a declarative approach . Now, there's a fair bit to unpack here. But for simplicity this is how I am going to map those 3 things here: Management of edge devices: I am mapping this to LCM (including upgrade, patch etc) of the underlying OS (in this case RHEL OS of BootC flavor or at least UBI based RHEL ). Managing applications: Mapping this to deploying applications and LCM of the applications stack on the OS. Declarative approach: This one is super interesting. To me this is very K8s-yy but in the world of edge devices running linux (RHEL OS, as of today). And then this thing also has MCP : This is my next prob...

The story of a Hack Job

"So, you have hacked it" -- Few days ago one of the guys at work passed me this comment on a random discussion about something I built. I paused for a moment and pondered: Do I reply defending how that's not a hack. OR Do I just not bother I picked the second option for 2 reasons: It was late. It probably isn't worth defending the "hack vs" topic as the comment passed was out of context. So I chose the next best action and replied "Yep, sure did and it is working great.". I felt like Batman in the moment. In this post I will rant about the knowledge gap around hacking and then describe about one of the components of my home automation project (really, this is the main reason for this post) and use that as an example how hacking is cool and does not always mean bad. But first lets align on my definition of hacking: People use this term in good and bad, both ways. For example: "He/she did a hack job" -- Yeah, that probably...

Speeding using Crossplane and ServiceBinding

Software development and release processes continues to improve to deliver value to the users faster and better to support business growth and relevance in this competitive market. To achieve this we focus on automating the path to production and any people or process related obstacles of a software on its way to the user. Generally, some of the goals of the golden paths, are: Remove interdependency and promote self service and  provider & consumer relationship. Shift left - from people & process to technology & automation . Treat Platform-as-product and provide PaaS Secured and standardised by design In this post, I will describe how Crossplane and ServiceBinding can help achieve these goals in the context of applications development and delivery and their consumption of external resources / services in the process. Note:   Crossplane and  ServiceBinding both are capable of covering beyond just database connectivity. In this blog post I am describing Dat...

Passwordless Auth to Azure Key Vault using External Secret and Workload Identity

I want to fetch my secrets from Azure KV and I don't want to use any password for it. Let's see how this can be implemented. This is yet another blog post (YABP) about ESO and Azure Workload Identity. Why Passwordless Auth: It is a common practice to use some sort of "master password" (spn clienid, clientsecret etc) to access Secret Vaults (in this case it is AZ KV) but that master password becomes a headache to manage (rotate, prevent leak etc). So, the passwordless auth to AKV is ideal.  Why ESO: This is discussed and addressed in the conclusion section. Workload Identity (Passwordless Auth): Lets make a backward start (just for a change). I will try to explain how the passwordless auth will work. This will make more sense when you will read through the detailed implementation section. Here's a sequence diagram to explain it: There's no magic here. This is a well documented process by microsoft  here . The below diagram (directly copied from the official doc...

A modern cloud native (and self serve) way to manage Virtual Machines

Really!! Are there could native way to deploy, LCM VMs and add Self Serve on top ???? In this post I will describe an art of the possibility using the below tools: RHDH: Red Hat Developer Hub (Open source project: Backstage ) OCP Virtualization: Red Hat OpenShift Virtualization (Open source project: KubeVirt ) AAP: Red Hat Ansible Automation Platform (Open source project: Ansible / AWX ) RHEL BootC: Image mode for Red Hat Enterprise Linux (Open source project: bootc ) GitOps: Red Hat OpenShift GitOps (Open source project: ArgoCD ) Quay Registry or any other OCI compliant registry All of these projects can be run on Red Hat OpenShift (Open source project: OKD ) OR on other Kubernetes distribution or on VMs (you pick your underlying infra. For this post I have used OpenShift for simplicity of deployment, integrated tools and narrowly focusing on the usecases instead of the deployment of the tools).  The main goal here is to: Easily deploy and lifecycle applications and stuffs ...

Deciphering the hype of Service Mesh

Service Mesh is not a new topic anymore. Most of us in the industry are already familiar with it. There are also tons of article in the internet about its why and how. In my opinion, it has a significant influence on the application architecture. Here's a DevSecOps humor to start the discussion (and it will make sense as you read along).  This is part 1 of my 3 parts blog posts on Service Mesh. Part 1:   Deciphering the hype of Service Mesh Part 2:   Understanding The Ingress and The Mesh components of Service Mesh. Part 3:  Understanding the observability component of Service Mesh (TBD).  In this post, I am going approach Service Mesh from an application architecture point of view. I will also score some of its basic features on a scale of 1 to 5, where 1 being the least important to me and 5 being the most important.  Table of contents: Common Q&As Features mTLS Service Discovery Meshing Ingress, Gateways etc Telemetries Enterprise products and offeri...