forked from aws-powertools/powertools-lambda-python
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathfeature_flags.py
434 lines (361 loc) · 19.1 KB
/
feature_flags.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
from __future__ import annotations
import logging
from typing import Any, Callable, Dict, List, Optional, TypeVar, Union, cast
from typing_extensions import ParamSpec
from aws_lambda_powertools.logging import Logger
from aws_lambda_powertools.utilities.feature_flags import schema
from aws_lambda_powertools.utilities.feature_flags.base import StoreProvider
from aws_lambda_powertools.utilities.feature_flags.comparators import (
compare_all_in_list,
compare_any_in_list,
compare_datetime_range,
compare_days_of_week,
compare_modulo_range,
compare_none_in_list,
compare_time_range,
)
from aws_lambda_powertools.utilities.feature_flags.exceptions import ConfigurationStoreError
from aws_lambda_powertools.utilities.feature_flags.types import JSONType
T = TypeVar("T")
P = ParamSpec("P")
RULE_ACTION_MAPPING = {
schema.RuleAction.EQUALS.value: lambda a, b: a == b,
schema.RuleAction.NOT_EQUALS.value: lambda a, b: a != b,
schema.RuleAction.KEY_GREATER_THAN_VALUE.value: lambda a, b: a > b,
schema.RuleAction.KEY_GREATER_THAN_OR_EQUAL_VALUE.value: lambda a, b: a >= b,
schema.RuleAction.KEY_LESS_THAN_VALUE.value: lambda a, b: a < b,
schema.RuleAction.KEY_LESS_THAN_OR_EQUAL_VALUE.value: lambda a, b: a <= b,
schema.RuleAction.STARTSWITH.value: lambda a, b: a.startswith(b),
schema.RuleAction.ENDSWITH.value: lambda a, b: a.endswith(b),
schema.RuleAction.IN.value: lambda a, b: a in b,
schema.RuleAction.NOT_IN.value: lambda a, b: a not in b,
schema.RuleAction.KEY_IN_VALUE.value: lambda a, b: a in b,
schema.RuleAction.KEY_NOT_IN_VALUE.value: lambda a, b: a not in b,
schema.RuleAction.VALUE_IN_KEY.value: lambda a, b: b in a,
schema.RuleAction.VALUE_NOT_IN_KEY.value: lambda a, b: b not in a,
schema.RuleAction.ALL_IN_VALUE.value: lambda a, b: compare_all_in_list(a, b),
schema.RuleAction.ANY_IN_VALUE.value: lambda a, b: compare_any_in_list(a, b),
schema.RuleAction.NONE_IN_VALUE.value: lambda a, b: compare_none_in_list(a, b),
schema.RuleAction.SCHEDULE_BETWEEN_TIME_RANGE.value: lambda a, b: compare_time_range(a, b),
schema.RuleAction.SCHEDULE_BETWEEN_DATETIME_RANGE.value: lambda a, b: compare_datetime_range(a, b),
schema.RuleAction.SCHEDULE_BETWEEN_DAYS_OF_WEEK.value: lambda a, b: compare_days_of_week(a, b),
schema.RuleAction.MODULO_RANGE.value: lambda a, b: compare_modulo_range(a, b),
}
class FeatureFlags:
def __init__(self, store: StoreProvider, logger: Optional[Union[logging.Logger, Logger]] = None):
"""Evaluates whether feature flags should be enabled based on a given context.
It uses the provided store to fetch feature flag rules before evaluating them.
Examples
--------
```python
from aws_lambda_powertools.utilities.feature_flags import FeatureFlags, AppConfigStore
app_config = AppConfigStore(
environment="test",
application="powertools",
name="test_conf_name",
max_age=300,
envelope="features"
)
feature_flags: FeatureFlags = FeatureFlags(store=app_config)
```
Parameters
----------
store: StoreProvider
Store to use to fetch feature flag schema configuration.
logger: A logging object
Used to log messages. If None is supplied, one will be created.
"""
self.store = store
self.logger = logger or logging.getLogger(__name__)
self._exception_handlers: dict[Exception, Callable] = {}
def _match_by_action(self, action: str, condition_value: Any, context_value: Any) -> bool:
try:
func = RULE_ACTION_MAPPING.get(action, lambda a, b: False)
return func(context_value, condition_value)
except Exception as exc:
self.logger.debug(f"caught exception while matching action: action={action}, exception={str(exc)}")
handler = self._lookup_exception_handler(exc)
if handler:
self.logger.debug("Exception handler found! Delegating response.")
return handler(exc)
return False
def _evaluate_conditions(
self,
rule_name: str,
feature_name: str,
rule: Dict[str, Any],
context: Dict[str, Any],
) -> bool:
"""Evaluates whether context matches conditions, return False otherwise"""
rule_match_value = rule.get(schema.RULE_MATCH_VALUE)
conditions = cast(List[Dict], rule.get(schema.CONDITIONS_KEY))
if not conditions:
self.logger.debug(
f"rule did not match, no conditions to match, rule_name={rule_name}, rule_value={rule_match_value}, "
f"name={feature_name} ",
)
return False
for condition in conditions:
context_value = context.get(condition.get(schema.CONDITION_KEY, ""))
cond_action = condition.get(schema.CONDITION_ACTION, "")
cond_value = condition.get(schema.CONDITION_VALUE)
# time based rule actions have no user context. the context is the condition key
if cond_action in (
schema.RuleAction.SCHEDULE_BETWEEN_TIME_RANGE.value,
schema.RuleAction.SCHEDULE_BETWEEN_DATETIME_RANGE.value,
schema.RuleAction.SCHEDULE_BETWEEN_DAYS_OF_WEEK.value,
):
context_value = condition.get(schema.CONDITION_KEY) # e.g., CURRENT_TIME
if not self._match_by_action(action=cond_action, condition_value=cond_value, context_value=context_value):
self.logger.debug(
f"rule did not match action, rule_name={rule_name}, rule_value={rule_match_value}, "
f"name={feature_name}, context_value={str(context_value)} ",
)
return False # context doesn't match condition
self.logger.debug(f"rule matched, rule_name={rule_name}, rule_value={rule_match_value}, name={feature_name}")
return True
def _evaluate_rules(
self,
*,
feature_name: str,
context: Dict[str, Any],
feat_default: Any,
rules: Dict[str, Any],
boolean_feature: bool,
) -> bool:
"""Evaluates whether context matches rules and conditions, otherwise return feature default"""
for rule_name, rule in rules.items():
rule_match_value = rule.get(schema.RULE_MATCH_VALUE)
# Context might contain PII data; do not log its value
self.logger.debug(
f"Evaluating rule matching, rule={rule_name}, feature={feature_name}, default={str(feat_default)}, boolean_feature={boolean_feature}", # noqa: E501
)
if self._evaluate_conditions(rule_name=rule_name, feature_name=feature_name, rule=rule, context=context):
# Maintenance: Revisit before going GA.
return bool(rule_match_value) if boolean_feature else rule_match_value
# no rule matched, return default value of feature
self.logger.debug(
f"no rule matched, returning feature default, default={str(feat_default)}, name={feature_name}, boolean_feature={boolean_feature}", # noqa: E501
)
return feat_default
def get_configuration(self) -> Dict:
"""Get validated feature flag schema from configured store.
Largely used to aid testing, since it's called by `evaluate` and `get_enabled_features` methods.
Raises
------
ConfigurationStoreError
Any propagated error from store
SchemaValidationError
When schema doesn't conform with feature flag schema
Returns
------
Dict[str, Dict]
parsed JSON dictionary
**Example**
```python
{
"premium_features": {
"default": False,
"rules": {
"customer tier equals premium": {
"when_match": True,
"conditions": [
{
"action": "EQUALS",
"key": "tier",
"value": "premium",
}
],
}
},
},
"feature_two": {
"default": False
}
}
```
"""
# parse result conf as JSON, keep in cache for max age defined in store
self.logger.debug(f"Fetching schema from registered store, store={self.store}")
config: Dict = self.store.get_configuration()
validator = schema.SchemaValidator(schema=config, logger=self.logger)
validator.validate()
return config
def evaluate(self, *, name: str, context: Optional[Dict[str, Any]] = None, default: JSONType) -> JSONType:
"""Evaluate whether a feature flag should be enabled according to stored schema and input context
**Logic when evaluating a feature flag**
1. Feature exists and a rule matches, returns when_match value
2. Feature exists but has either no rules or no match, return feature default value
3. Feature doesn't exist in stored schema, encountered an error when fetching -> return default value provided
┌────────────────────────┐ ┌────────────────────────┐ ┌────────────────────────┐
│ Feature flags │──────▶ Get Configuration ├───────▶ Evaluate rules │
└────────────────────────┘ │ │ │ │
│┌──────────────────────┐│ │┌──────────────────────┐│
││ Fetch schema ││ ││ Match rule ││
│└───────────┬──────────┘│ │└───────────┬──────────┘│
│ │ │ │ │ │
│┌───────────▼──────────┐│ │┌───────────▼──────────┐│
││ Cache schema ││ ││ Match condition ││
│└───────────┬──────────┘│ │└───────────┬──────────┘│
│ │ │ │ │ │
│┌───────────▼──────────┐│ │┌───────────▼──────────┐│
││ Validate schema ││ ││ Match action ││
│└──────────────────────┘│ │└──────────────────────┘│
└────────────────────────┘ └────────────────────────┘
Parameters
----------
name: str
feature name to evaluate
context: Optional[Dict[str, Any]]
Attributes that should be evaluated against the stored schema.
for example: `{"tenant_id": "X", "username": "Y", "region": "Z"}`
default: JSONType
default value if feature flag doesn't exist in the schema,
or there has been an error when fetching the configuration from the store
Can be boolean or any JSON values for non-boolean features.
Examples
--------
```python
from aws_lambda_powertools.utilities.feature_flags import AppConfigStore, FeatureFlags
from aws_lambda_powertools.utilities.typing import LambdaContext
app_config = AppConfigStore(environment="dev", application="product-catalogue", name="features")
feature_flags = FeatureFlags(store=app_config)
def lambda_handler(event: dict, context: LambdaContext):
# Get customer's tier from incoming request
ctx = {"tier": event.get("tier", "standard")}
# Evaluate whether customer's tier has access to premium features
# based on `has_premium_features` rules
has_premium_features: bool = feature_flags.evaluate(name="premium_features", context=ctx, default=False)
if has_premium_features:
# enable premium features
...
```
Returns
------
JSONType
whether feature should be enabled (bool flags) or JSON value when non-bool feature matches
Raises
------
SchemaValidationError
When schema doesn't conform with feature flag schema
"""
if context is None:
context = {}
try:
features = self.get_configuration()
except ConfigurationStoreError as err:
self.logger.debug(f"Failed to fetch feature flags from store, returning default provided, reason={err}")
return default
feature = features.get(name)
if feature is None:
self.logger.debug(f"Feature not found; returning default provided, name={name}, default={default}")
return default
rules = feature.get(schema.RULES_KEY)
feat_default = feature.get(schema.FEATURE_DEFAULT_VAL_KEY)
# Maintenance: Revisit before going GA. We might to simplify customers on-boarding by not requiring it
# for non-boolean flags. It'll need minor implementation changes, docs changes, and maybe refactor
# get_enabled_features. We can minimize breaking change, despite Beta label, by having a new
# method `get_matching_features` returning Dict[feature_name, feature_value]
boolean_feature = feature.get(
schema.FEATURE_DEFAULT_VAL_TYPE_KEY,
True,
) # backwards compatibility, assume feature flag
if not rules:
self.logger.debug(
f"no rules found, returning feature default, name={name}, default={str(feat_default)}, boolean_feature={boolean_feature}", # noqa: E501
)
# Maintenance: Revisit before going GA. We might to simplify customers on-boarding by not requiring it
# for non-boolean flags.
return bool(feat_default) if boolean_feature else feat_default
self.logger.debug(
f"looking for rule match, name={name}, default={str(feat_default)}, boolean_feature={boolean_feature}", # noqa: E501
)
return self._evaluate_rules(
feature_name=name,
context=context,
feat_default=feat_default,
rules=rules,
boolean_feature=boolean_feature,
)
def get_enabled_features(self, *, context: Optional[Dict[str, Any]] = None) -> List[str]:
"""Get all enabled feature flags while also taking into account context
(when a feature has defined rules)
Parameters
----------
context: Optional[Dict[str, Any]]
dict of attributes that you would like to match the rules
against, can be `{'tenant_id: 'X', 'username':' 'Y', 'region': 'Z'}` etc.
Returns
----------
List[str]
list of all feature names that either matches context or have True as default
**Example**
```python
["premium_features", "my_feature_two", "always_true_feature"]
```
Raises
------
SchemaValidationError
When schema doesn't conform with feature flag schema
"""
if context is None:
context = {}
features_enabled: List[str] = []
try:
features: Dict[str, Any] = self.get_configuration()
except ConfigurationStoreError as err:
self.logger.debug(f"Failed to fetch feature flags from store, returning empty list, reason={err}")
return features_enabled
self.logger.debug("Evaluating all features")
for name, feature in features.items():
rules = feature.get(schema.RULES_KEY, {})
feature_default_value = feature.get(schema.FEATURE_DEFAULT_VAL_KEY)
boolean_feature = feature.get(
schema.FEATURE_DEFAULT_VAL_TYPE_KEY,
True,
) # backwards compatibility, assume feature flag
if feature_default_value and not rules:
self.logger.debug(f"feature is enabled by default and has no defined rules, name={name}")
features_enabled.append(name)
elif self._evaluate_rules(
feature_name=name,
context=context,
feat_default=feature_default_value,
rules=rules,
boolean_feature=boolean_feature,
):
self.logger.debug(f"feature's calculated value is True, name={name}")
features_enabled.append(name)
return features_enabled
def validation_exception_handler(self, exc_class: Exception | list[Exception]):
"""Registers function to handle unexpected validation exceptions when evaluating flags.
It does not override the function of a default flag value in case of network and IAM permissions.
For example, you won't be able to catch ConfigurationStoreError exception.
Parameters
----------
exc_class : Exception | list[Exception]
One or more exceptions to catch
Examples
--------
```python
feature_flags = FeatureFlags(store=app_config)
@feature_flags.validation_exception_handler(Exception) # any exception
def catch_exception(exc):
raise TypeError("re-raised") from exc
```
"""
def register_exception_handler(func: Callable[P, T]) -> Callable[P, T]:
if isinstance(exc_class, list):
for exp in exc_class:
self._exception_handlers[exp] = func
else:
self._exception_handlers[exc_class] = func
return func
return register_exception_handler
def _lookup_exception_handler(self, exc: BaseException) -> Callable | None:
# Use "Method Resolution Order" to allow for matching against a base class
# of an exception
for cls in type(exc).__mro__:
if cls in self._exception_handlers:
return self._exception_handlers[cls] # type: ignore[index] # index is correct
return None