UX-Engineer

The UX Engineer Role

Congratulations! For the next 4–8 sprints, you're a UX Engineer 🎉

As a UX Engineer, you'll serve as the design lead for your team. You'll work to set the vision and direction for your team's user interface and experience (UI/UX) work. You'll craft design planning artifacts like user flows and wireframes, then generate tickets for your product's design backlog to drive development. You'll also work closely with your TPM(s) to scope realistic design goals for each sprint, and then with frontend engineers to implement your plan and achieve them.

As a UX Engineer, you'll be directly responsible for:

  • Communicating the UI/UX vision to your TPM(s) and your team.

  • Generating and maintaining design artifacts (including user flows and wireframes) to plan and document UI/UX.

  • Working to generate, prioritize, and achieve shippable implementation of tickets in your product's design backlog.

  • Crafting UI components and data visualizations alongside frontend developers and data scientists on your team and product.

  • Representing UI/UX progress and vision in product reviews and stakeholder meetings.

  • Working under the direction of the Design Manager to push your team to follow best practices for developing modern user interfaces.

Your Objectives

Throughout Labs, your goal is to work toward your objectives.

You can track your progress in your Objectives course in Canvas. There, you'll also find a sprint-by-sprint breakdown suggesting a path to achieve all your objectives in four sprints.

As a UX Engineer, here's what you'll need to achieve to pass Labs and graduate:

  • [ ] Attend at least two Stakeholder Meetings for your product

  • [ ] Attend at least four Product Reviews for your product

  • [ ] Attend at least four Design Critique sessions

  • [ ] Pass Labs course

  • [ ] Pass Labs: UX Engineer course

  • [ ] Pass Career Readiness course

  • [ ] Peer-review at least six teammates on Searchlight

  • [ ] Submit at least five qualified pull requests

  • [ ] Review at least 10 pull requests from your team

  • [ ] Have at least one pull request merged

For more information, visit the Labs Docs (Links to an external site.)!

Labs Engineering Docs

Labs Guides

Labs Scaffolding

Please read this carefully!

The internet is full of very powerful platforms for supporting your application (AWS, Heroku, etc.). These platforms require the use of secrets (passwords, keys, tokens, etc.) to access and use their services.

🎗 It is your responsibility to always protect the secret keys and tokens you use to access these platforms. A single compromise of your application resources can have major a significant impact on the life of your application and potentially on the lives of people affected.

🔐 Always protect your secrets! The secrets you use to access these services should be protected at all times with extreme care! Exposing secrets to anyone not entitled to have them can hurt your career, your product, your company, your colleagues and in many cases the public.

❌ Never commit your secrets to a code repository! This is the most common mistake that you can make when handling secrets. You will never need to or should commit a secret to a code repository for any reason whatsoever.

🔒 Keep your secrets hidden! Your secrets should never be hardcoded into your application code. Instead, they must always be passed to your code after your code is running. Every platform you use will have some mechanism for passing secrets to your code at runtime. In general, the system environment is where you should get your secrets after your application starts up.

👀 Heroku provides a mechanism for getting runtime variables to your application after it is running, which is how you should be getting your secrets to your application: https://devcenter.heroku.com/articles/config-vars

The AWS security team scans for AWS keys in public repositories. If they find them, they notify the Lambda School engineering team who will rotate the keys and may lock out individual students or the entire team. Please be very careful not to commit secrets into your repository.

💥 Please be careful, you are responsible!

If you cannot think of a way to get your secrets to your application without hardcoding... stop! Talk to your TPL, APL or an Engineering Manager for a solution. Please do not ever commit your secret keys into your code repository or expose them in any other way.

Install git-secrets right now! All students using Git are required to install git-secrets (https://github.com/awslabs/git-secrets) which will greatly reduce the possibility of pushing secrets to your code repository. All students are should install and use git-secrets while working in Labs. Of course, it's also a good idea to use git-secrets whenever and wherever you're writing code. Be sure to follow the Advanced Configuration steps to be sure that all current and new repos have git-secrets enabled.

Install dotenv right now! You can use dotenv or another similar tool to automatically load secrets and other runtime parameters as your application starts. These tools help to keep secrets safe by ensuring they can be easily loaded without needing to hardcode them. Be sure to that the .env file is in your .gitignore file.

Never commit the contents of your .env file to your repository!

Add the line.env* to your.gitignorefile to be sure you never accidentally commit a .env file.

Never hardcode any secrets! Don't do it! Not even for a minute for a quick test! Chances are you'll be so happy your code works you'll forget about the hardcoded key, commit the code, push it to GitHub and will get your app shutdown or pwned and all your data exposed and your commit of a secret key will be forever tied to your GitHub ID. Use dotenv to be make managing secrets easier and use git-secrets to prevent accidents.

Don't ignore or hide mistakes! If you mess up, it's fine! The only thing that makes it not fine is if you try to hide your mistake. We might not find it, but someone will. If you expose a secret by pushing it to a repo, let your TPL or APL know immediately. We can then invalidate the secret (change the password, rotate the key) and move on.

Last updated