Microservice that provides functionality to maintain feature flags at various levels. Initial support for system level, tenant level and user level is provided.
This service provides CRUD APIs to insert values into the feature-toggle specific data tables that can be read while making the decision if a particular feature is allowed or not to the user.
This feature is an extension of the feature-toggle package -- @sourceloop/feature-toggle that provides a method level decorator which will check if that particular API is accessible or not.
Initial implementation for system level, tenant level and user level feature flag is provided.
// import the FeatureToggleServiceComponentimport{FeatureToggleServiceComponent}from'@sourceloop/feature-toggle-service';// add controllers to your application (optional)this.bind(FeatureToggleBindings.Config).to({bindControllers:true,useCustomSequence:false,});// add Component for FeatureToggleServicethis.component(FeatureToggleServiceComponent);
Set up a Loopback4 Datasource with dataSourceName property set to
FeatureToggleDbName. You can see an example datasource here.
If you are using asymmetric token signing and verification, you should have auth datasource present in the service and auth redis datasource on the facade level. Example datasource file for auth database is:-
import{inject,lifeCycleObserver,LifeCycleObserver}from'@loopback/core';import{juggler}from'@loopback/repository';import{AuthDbSourceName}from'@sourceloop/core';constDEFAULT_MAX_CONNECTIONS=25;constDEFAULT_DB_IDLE_TIMEOUT_MILLIS=60000;constDEFAULT_DB_CONNECTION_TIMEOUT_MILLIS=2000;constconfig={name:'auth',connector:'postgresql',host:process.env.DB_HOST,port:process.env.DB_PORT,user:process.env.DB_USER,schema:process.env.DB_SCHEMA,password:process.env.DB_PASSWORD,database:process.env.AUTH_DB,};// Observe application's life cycle to disconnect the datasource when// application is stopped. This allows the application to be shut down// gracefully. The `stop()` method is inherited from `juggler.DataSource`.// Learn more at https://loopback.io/doc/en/lb4/Life-cycle.html@lifeCycleObserver('datasource')exportclassAuthDataSourceextendsjuggler.DataSourceimplementsLifeCycleObserver{staticdataSourceName=AuthDbSourceName;staticreadonlydefaultConfig=config;constructor(@inject('datasources.config.auth',{optional:true})dsConfig:object=config,){if(!!+(process.env.ENABLE_DB_CONNECTION_POOLING??0)){constdbPool={max:+(process.env.DB_MAX_CONNECTIONS??DEFAULT_MAX_CONNECTIONS),idleTimeoutMillis:+(process.env.DB_IDLE_TIMEOUT_MILLIS??DEFAULT_DB_IDLE_TIMEOUT_MILLIS),connectionTimeoutMillis:+(process.env.DB_CONNECTION_TIMEOUT_MILLIS??DEFAULT_DB_CONNECTION_TIMEOUT_MILLIS),};dsConfig={...dsConfig,...dbPool};}super(dsConfig);}}
The migrations required for this service are processed during the installation automatically if you set the FEATURETOGGLE_MIGRATION or SOURCELOOP_MIGRATION env variable. The migrations use db-migrate with db-migrate-pg driver for migrations, so you will have to install these packages to use auto-migration. Please note that if you are using some pre-existing migrations or database, they may be effected. In such scenario, it is advised that you copy the migration files in your project root, using the FEATURETOGGLE_MIGRATION_COPY or SOURCELOOP_MIGRATION_COPY env variables. You can customize or cherry-pick the migrations in the copied files according to your specific requirements and then apply them to the DB.
This migration script supports both MySQL and PostgreSQL databases, controlled by environment variables. By setting MYSQL_MIGRATION to 'true', the script runs migrations using MySQL configuration files; otherwise, it defaults to PostgreSQL. .
Additionally, there is now an option to choose between SQL migration or PostgreSQL migration.
NOTE : For @sourceloop/cli users, this choice can be specified during the scaffolding process by selecting the "type of datasource" option.
Authorization: Bearer where is a JWT token signed using JWT issuer and secret.
Content-Type: application/json in the response and in request if the API method is NOT GET
200: Successful Response. Response body varies w.r.t API
401: Unauthorized: The JWT token is missing or invalid
403: Forbidden : Not allowed to execute the concerned API
404: Entity Not Found
400: Bad Request (Error message varies w.r.t API)
201: No content: Empty Response