Microservice that provides functionality to maintain feature flags at various levels. Initial support for system level, tenant level and user level is provided.
This service provides method level decorators - @featuresFlag that takes name of feature and an array of provider keys, i.e., strategies, as metadata and verifies if the feature flags are enabled or disabled, it uses an AND operator to check for multiple strategies. Read more about creating loopback-4 decorators. To check if a feature is enabled or not add the following decorator over a controller method:
@featuresFlag({
featureKey: 'feature_key',
strategies: [
StrategyBindings.SYSTEM_STRATEGY,
StrategyBindings.TENANT_STRATEGY,
StrategyBindings.USER_STRATEGY,
],
})and if you want to skip all the feature checks:
@featuresFlag({
featureKey: 'feature_key',
strategies: [ '*' ],
})Initial implementation for system level, tenant level and user level feature flag is provided.
npm i @sourceloop/feature-toggle-service
- Create a new Loopback4 Application (If you don't have one already) lb4 testapp
- Install the service - npm i @sourceloop/feature-toggle-service
- Set up the environment variables
- Run the migrations. (this will create respective tables in your Database)
- Add the
FeatureToggleServiceComponentto your Loopback4 Application (inapplication.ts).// import the FeatureToggleServiceComponent import {FeatureToggleServiceComponent} from '@sourceloop/feature-toggle-service'; // add controllers to your application (optional) this.bind(FeatureToggleBindings.Config).to({ bindControllers: true, useCustomSequence: false, }); // add Component for FeatureToggleService this.component(FeatureToggleServiceComponent);
- Set up a Loopback4 Datasource with
dataSourceNameproperty set toFeatureToggleDbName. You can see an example datasource here. - Start the application
npm start
| Name | Required | Default Value | Description |
|---|---|---|---|
NODE_ENV |
Y | Node environment value, i.e. dev, test, prod |
|
LOG_LEVEL |
Y | Log level value, i.e. error, warn, info, verbose, debug |
|
DB_HOST |
Y | Hostname for the database server. | |
DB_PORT |
Y | Port for the database server. | |
DB_USER |
Y | User for the database. | |
DB_PASSWORD |
Y | Password for the database user. | |
DB_DATABASE |
Y | Database to connect to on the database server. | |
DB_SCHEMA |
Y | Database schema used for the data source. In PostgreSQL, this will be public unless a schema is made explicitly for the service. |
|
JWT_SECRET |
Y | Symmetric signing key of the JWT token. | |
JWT_ISSUER |
Y | Issuer of the JWT token. |
Here is a sample Implementation DataSource implementation using environment variables and PostgreSQL as the data source.
import {inject, lifeCycleObserver, LifeCycleObserver} from '@loopback/core';
import {juggler} from '@loopback/repository';
import {FeatureToggleDbName} from '@sourceloop/authentication-service';
const config = {
name: FeatureToggleDbName,
connector: 'postgresql',
url: '',
host: process.env.DB_HOST,
port: process.env.DB_PORT,
user: process.env.DB_USER,
password: process.env.DB_PASSWORD,
database: process.env.DB_DATABASE,
schema: process.env.DB_SCHEMA,
};
@lifeCycleObserver('datasource')
export class FeatureToggleDbDataSource
extends juggler.DataSource
implements LifeCycleObserver
{
static dataSourceName = FeatureToggleDbName;
static readonly defaultConfig = config;
constructor(
@inject('datasources.config.feature', {optional: true})
dsConfig: object = config,
) {
super(dsConfig);
}
}The migrations required for this service are processed during the installation automatically if you set the FEATURETOGGLE_MIGRATION or SOURCELOOP_MIGRATION env variable. The migrations use db-migrate with db-migrate-pg driver for migrations, so you will have to install these packages to use auto-migration. Please note that if you are using some pre-existing migrations or database, they may be effected. In such scenario, it is advised that you copy the migration files in your project root, using the FEATURETOGGLE_MIGRATION_COPY or SOURCELOOP_MIGRATION_COPY env variables. You can customize or cherry-pick the migrations in the copied files according to your specific requirements and then apply them to the DB.
Authorization: Bearer where is a JWT token signed using JWT issuer and secret.
Content-Type: application/json in the response and in request if the API method is NOT GET
{version}: Defines the API Version
200: Successful Response. Response body varies w.r.t API 401: Unauthorized: The JWT token is missing or invalid 403: Forbidden : Not allowed to execute the concerned API 404: Entity Not Found 400: Bad Request (Error message varies w.r.t API) 201: No content: Empty Response
Visit the OpenAPI spec docs
-@2x.png)