Skip to content

feat: adds RequireFlagsEnabled decorator #1159

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 9 commits into
base: main
Choose a base branch
from

Conversation

kaushalkapasi
Copy link

@kaushalkapasi kaushalkapasi commented Mar 14, 2025

This PR

  • Feature: Adds a RequireFlagsEnabled decorator to allow a simple, reusable way to block access to a specific controller or endpoint based on the value of a list of one, or many, boolean flags

Notes

  • Discussions on the approach & implementation are welcome!

Follow-up Tasks

  • Update OpenFeature NestJS docs to include new RequireFlagsEnabled decorator & usage examples

How to test

npx jest --selectProject=nest

@toddbaert
Copy link
Member

I think this is a good idea, and it "feels right" to me ergonomically.

Make sure you add something to the test-app to test and document this.

@kaushalkapasi kaushalkapasi force-pushed the feat/require-flags-decorator branch 2 times, most recently from ca912f0 to a67cc35 Compare March 25, 2025 17:59
@kaushalkapasi kaushalkapasi marked this pull request as ready for review March 25, 2025 18:00
@kaushalkapasi kaushalkapasi requested a review from a team as a code owner March 25, 2025 18:00
Copy link
Member

@lukas-reining lukas-reining left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I really like the addition!
Added some optional additions to it. Feel free to add them, otherwise we can add them in another PR :)
Thank you!

/**
* Options for injecting a feature flag into a route handler.
*/
interface RequireFlagsEnabledProps {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also we could have a context factory here too. Basically what we globally have for the OpenFeatureModule:

contextFactory?: ContextFactory;

But this would be optional to me. We do not have it for the other decorators too:

interface FeatureProps<T extends FlagValue> {

So to me this is optional for this PR but it would be a great addition.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good, will do.

Copy link
Member

@lukas-reining lukas-reining Apr 7, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cool, are you still planning to do it @kaushalkapasi? I can not see it yet, but you re-requested a review.
We can definitely leave it out for now if you want.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lukas-reining I decided not to add this in for now.

Would you be able to elaborate how this would be used and how it would work differently compared to the ability to define the context (as on line 39)?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No worries!
The difference is, that the factory could use the ExecutionContext to get request information like headers or IP address and transform that to evaluation context.
This can currently only be done in the transaction context, having it here would allow e.g. to use a specific http header as context value for the specified flags only.

Comment on lines +56 to +67
export const RequireFlagsEnabled = (props: RequireFlagsEnabledProps): ClassDecorator & MethodDecorator =>
applyDecorators(UseInterceptors(FlagsEnabledInterceptor(props)));
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think there could be value in similar function like: RequireFlagEquals.
But this could also be added in another PR.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah! I opted to implement this first as the "easiest" option, a follow up would be to take a flag key and expected value combination to support String, Number and Object type flags.

Copy link
Member

@toddbaert toddbaert Mar 27, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep that makes sense to me. I think most people would use this current decorator, which could basically just be a shorthand for a RequireFlagEquals implementation. I think instead of a key/value combination though, a lambda predicate might be easier (a lambda taking the EvalutionDetails which will run to decide to run the request or not). For RequireFlagsEnabled, the lambda would just be evalutationDetails.value === true

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@kaushalkapasi do you want to do this in this PR?
Because you requested reviews again but I could not find it yet.
We can also leave it out of here, but it might be really good to have here.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I haven't added the lambda function in this PR. My only concern is that it would complicate the usage of this Boolean only provider.

I would definitely add it when we build a decorator for other flag types (String, Number and Object).

Let me know if you think it should be implemented here and I'd be happy to do so.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If you do it like @toddbaert describes, RequireFlagsEnabled would simply be an alias for RequireFlagEquals with evalutationDetails.value === true.
It would not make the RequireFlagsEnabled more complicated in this case.

I would prefer to have it.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good, I'll update this implementation soon and tag you for a re-review when ready!

@lukas-reining
Copy link
Member

I will have a look at what is wrong with the e2e test tomorrow @kaushalkapasi :)

@toddbaert
Copy link
Member

toddbaert commented Mar 27, 2025

I will have a look at what is wrong with the e2e test tomorrow @kaushalkapasi :)

@lukas-reining @kaushalkapasi

Seems to me like the test-harness git submodule was simply deleted. I've added it back in the latest commit. The e2e tests are working now but you have some small lint errors causing CI failures.

Comment on lines 26 to 37
testBooleanFlag2: {
defaultVariant: 'default',
variants: { default: false, enabled: true },
disabled: false,
},
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we add another integration test where we use a flag with a simple targeting rule, which requires an evaluation context value (which is injected in an interceptor) to be present? That would ensure that we are using a per-request context as expected in our decorator(s).

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good, will add the test.

@toddbaert toddbaert self-requested a review March 27, 2025 19:16
Copy link
Member

@toddbaert toddbaert left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have a couple questions, and one request for an additional test (please let me know if you think this is not necessary) but this looks really cool. Great work!

Happy to approve from my perspective after these are resolved.

@kaushalkapasi kaushalkapasi force-pushed the feat/require-flags-decorator branch from aa03a3a to ba2c4d6 Compare March 31, 2025 15:53
@kaushalkapasi kaushalkapasi requested a review from toddbaert March 31, 2025 15:54
@lukas-reining
Copy link
Member

Sorry for taking time @kaushalkapasi, many of us have been at KubeCon.
Will have a look tomorrow or the day after :)

kaushalkapasi and others added 7 commits April 7, 2025 09:48
…er & endpoint access based on boolean flag values

Signed-off-by: Kaushal Kapasi <[email protected]>
…text and allow for flags to change the default value for flag evaluation. move getClientForEvaluation method to utils file

Signed-off-by: Kaushal Kapasi <[email protected]>
Signed-off-by: Todd Baert <[email protected]>
…add tests with targeting rules defined for the InMemoryProvider

Signed-off-by: Kaushal Kapasi <[email protected]>
@kaushalkapasi kaushalkapasi force-pushed the feat/require-flags-decorator branch from ba2c4d6 to f056ae6 Compare April 7, 2025 13:49
@kaushalkapasi kaushalkapasi requested a review from a team as a code owner April 7, 2025 13:49
Copy link
Member

@lukas-reining lukas-reining left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be great if you could also add something to the README to show the feature and explain the usage, so people know it exists and how to use :)

@lukas-reining lukas-reining requested a review from a team April 7, 2025 14:18
Copy link
Member

@toddbaert toddbaert left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Implementation looks great. Like @lukas-reining says I think we could use some docs so people know how to use this cool new feature... but I'm approving.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants