Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: adds RequireFlagsEnabled decorator #1159

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

kaushalkapasi
Copy link

@kaushalkapasi kaushalkapasi commented Mar 14, 2025

This PR

  • Feature: Adds a RequireFlagsEnabled decorator to allow a simple, reusable way to block access to a specific controller or endpoint based on the value of a list of one, or many, boolean flags

Notes

  • Discussions on the approach & implementation are welcome!

Follow-up Tasks

  • Update OpenFeature NestJS docs to include new RequireFlagsEnabled decorator & usage examples

How to test

npx jest --selectProject=nest

@toddbaert
Copy link
Member

I think this is a good idea, and it "feels right" to me ergonomically.

Make sure you add something to the test-app to test and document this.

@kaushalkapasi kaushalkapasi force-pushed the feat/require-flags-decorator branch 2 times, most recently from ca912f0 to a67cc35 Compare March 25, 2025 17:59
@kaushalkapasi kaushalkapasi marked this pull request as ready for review March 25, 2025 18:00
@kaushalkapasi kaushalkapasi requested a review from a team as a code owner March 25, 2025 18:00
Copy link
Member

@lukas-reining lukas-reining left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I really like the addition!
Added some optional additions to it. Feel free to add them, otherwise we can add them in another PR :)
Thank you!

* Defaults to a 404 Not Found exception.
* @see {@link HttpException}
*/
exception?: HttpException;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it is okay to constrain the exceptions to HTTP exceptions, even though it might make sense to broaden this to general exceptions.
Sometimes custom filters are built for more complex cases so I think one could argue for being strict on that or allowing any exception to be thrown.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since these decorators are meant to be used at a Controller or Route level in Nest, I opted to limit the exception type to be an HTTPException since it can then be handled by the caller in a predictable manner.

/**
* Options for injecting a feature flag into a route handler.
*/
interface RequireFlagsEnabledProps {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we could have some optional static evaluation context given here too.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What would this look like? Is there an example you could share (maybe in another SDK) since I'm not fully familiar with that concept.

/**
* Options for injecting a feature flag into a route handler.
*/
interface RequireFlagsEnabledProps {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also we could have a context factory here too. Basically what we globally have for the OpenFeatureModule:

contextFactory?: ContextFactory;

But this would be optional to me. We do not have it for the other decorators too:

interface FeatureProps<T extends FlagValue> {

So to me this is optional for this PR but it would be a great addition.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good, will do.

Comment on lines 29 to 40
/**
* Returns a domain scoped or the default OpenFeature client with the given context.
* @param {string} domain The domain of the OpenFeature client.
* @returns {Client} The OpenFeature client.
*/
function getClientForEvaluation(domain?: string) {
return domain ? OpenFeature.getClient(domain) : OpenFeature.getClient();
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We already have this function:

function getClientForEvaluation(domain?: string, context?: EvaluationContext) {

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should I change that to be an exported function in a utils.ts file that can be imported across decorators? Additionally, should the decorators live in their own folder or folders, along the lines of: nest/src/decorators/require-flags-enabled/require-flags-enabled.ts?

Comment on lines +56 to +67
export const RequireFlagsEnabled = (props: RequireFlagsEnabledProps): ClassDecorator & MethodDecorator =>
applyDecorators(UseInterceptors(FlagsEnabledInterceptor(props)));
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think there could be value in similar function like: RequireFlagEquals.
But this could also be added in another PR.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah! I opted to implement this first as the "easiest" option, a follow up would be to take a flag key and expected value combination to support String, Number and Object type flags.

Copy link
Member

@toddbaert toddbaert Mar 27, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep that makes sense to me. I think most people would use this current decorator, which could basically just be a shorthand for a RequireFlagEquals implementation. I think instead of a key/value combination though, a lambda predicate might be easier (a lambda taking the EvalutionDetails which will run to decide to run the request or not). For RequireFlagsEnabled, the lambda would just be evalutationDetails.value === true

const client = getClientForEvaluation(props.domain);

for (const flagKey of props.flagKeys) {
const endpointAccessible = await client.getBooleanValue(flagKey, false);
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sometimes there are cases where it is better to fall back to true as default value if the flag evaluation fails.
I think it would be worth it adding the default value as a parameter, defaulting to false.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good, will do.

flagKeys: string[];
/**
* The exception to throw if any of the required feature flags are not enabled.
* Defaults to a 404 Not Found exception.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am not entirely sure why you chose 404 here.
Is it to prevent unwanted information disclosure in the case the feature is meant to be hidden?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's right. Defaulting to 404 as the preferred behaviour is to "hide" the existence of the Controller or Route from the caller entirely. This could also be integrated with any API documentation that the end user may generate.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ya I actually think for security reasons this is the most reasonable default.

@lukas-reining
Copy link
Member

I will have a look at what is wrong with the e2e test tomorrow @kaushalkapasi :)

@toddbaert
Copy link
Member

toddbaert commented Mar 27, 2025

I will have a look at what is wrong with the e2e test tomorrow @kaushalkapasi :)

@lukas-reining @kaushalkapasi

Seems to me like the test-harness git submodule was simply deleted. I've added it back in the latest commit. The e2e tests are working now but you have some small lint errors causing CI failures.

* Global {@link EvaluationContext} for OpenFeature.
* @see {@link OpenFeature#setContext}
*/
context?: EvaluationContext;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm a bit confused as to why we'd want to set the global context here?

It seems like a bit of a separation-of-concerns violation. Can somebody help me understand why it's useful here?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's a mistake, it shouldn't be the global context. Will be updated to: * The {@link EvaluationContext} for evaluating the feature flag.

Comment on lines 26 to 36
testBooleanFlag2: {
defaultVariant: 'default',
variants: { default: false, enabled: true },
disabled: false,
},
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we add another integration test where we use a flag with a simple targeting rule, which requires an evaluation context value (which is injected in an interceptor) to be present? That would ensure that we are using a per-request context as expected in our decorator(s).

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good, will add the test.

@toddbaert toddbaert self-requested a review March 27, 2025 19:16
Copy link
Member

@toddbaert toddbaert left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have a couple questions, and one request for an additional test (please let me know if you think this is not necessary) but this looks really cool. Great work!

Happy to approve from my perspective after these are resolved.

kaushalkapasi and others added 7 commits March 31, 2025 11:51
…er & endpoint access based on boolean flag values

Signed-off-by: Kaushal Kapasi <[email protected]>
…text and allow for flags to change the default value for flag evaluation. move getClientForEvaluation method to utils file

Signed-off-by: Kaushal Kapasi <[email protected]>
Signed-off-by: Todd Baert <[email protected]>
…add tests with targeting rules defined for the InMemoryProvider

Signed-off-by: Kaushal Kapasi <[email protected]>
@kaushalkapasi kaushalkapasi force-pushed the feat/require-flags-decorator branch from aa03a3a to ba2c4d6 Compare March 31, 2025 15:53
@kaushalkapasi kaushalkapasi requested a review from toddbaert March 31, 2025 15:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants