Skip to main content

Feature Flags

Background

Support for feature flags was added based on ADR 0018. Some highlights:

  • Context is provided when requesting the state of a flag. We currently allow targeting on user, organization, and machine account (previously known as service account). Only the IDs are sent to LaunchDarkly to avoid PII sharing.
  • All available feature flag states are provided to clients calling the configuration API.
  • Environments (production, QA, and development for now) exist to segment flag states further. This will be automatic based on where code is running.

Flag data sources

When consuming feature flags in either the client or server code, it is important to understand where the flags are sourced.

The source of the flags is dependent upon the Bitwarden server instance that is being used, as for client development the flags are served from the Bitwarden API.

Server configurationFlag source
Local developmentLocal application settings, JSON file, or code modification
Self-hostedFlags are "off" unless above local configuration is provided
QA CloudLaunchDarkly QA
Production CloudLaunchDarkly Production
Self-hosted support

Feature flags are not officially supported for self-hosted customers. Using application settings or a JSON file is not a supported method of sourcing feature flag values, outside of Bitwarden internal testing. See Self-hosted considerations for how feature flagging applies to self-hosted.

Local development server instances will not query LaunchDarkly for feature flag values.

If you need to change any feature flag values from their defaults during local development, you will need to set up either local application settings or a file-based data source. Without the local data store, all flag values will resolve as their default ("off") value.

Local configuration: user secrets

To set up a data source via application settings, place the following in your user secrets:

{
"globalSettings": {
"launchDarkly": {
"flagValues": {
"example-boolean-key": true,
"example-string-key": "value"
}
}
}
}

Replace example-boolean-key and example-string-key with your flag names and update the flag values accordingly.

Remember to run dev/setup_secrets.ps1 and restart your server for the new secrets to take effect.

Environment variables can also be used like with other application setting overrides.

Local configuration: JSON file

To set up a data source via a local file, create a flags.json file as follows:

{
"flagValues": {
"example-boolean-key": true,
"example-string-key": "value"
}
}

Replace example-boolean-key and example-string-key with your flag names and update the flag values accordingly.

By default, the LaunchDarkly startup will look for this file in the root project directory (e.g. /src/Api/ for the Api project), where it will be deployed to the build output directory. However, if you prefer to store the file in a different location, the FlagDataFilePath configuration setting can be used to override it. The file must be present before building the solution, but once there you can change the file contents and see immediate results in running / debugging code.

Local configuration: code modification

In some situations there may be a need to change a feature flag value to be something other than its default state before cleanup activities can fully complete, especially when deployed clients are still depending on the flag value being returned to ensure certain functionality. In the server codebase there exists a method GetLocalOverrideFlagValues() alongside the feature flag constants definition where overrides can be placed as dictionary key-value pairs:

return new Dictionary<string, string>()
{
{ ExampleBooleanKey, "true" }
};

This should only be used temporarily and as part of the feature flag cleanup process, as well as to enable rapid feature availability for installations that are not using or aware of alternative configuration methods.

Local data source for flags used in the client

For consuming feature flags in the clients, the above setup should be defined in the Api project -- this is because the /config endpoint that clients use to query for feature flags is in Api. Doing this will ensure that the proper flag values get retrieved and sent to the client.

Creating a new flag

When beginning work on a new feature, discuss with your team whether it should be placed behind a feature flag. The team should agree on the scope of what is flagged and where the flag should be applied - both client-side and server-side. While there is no precise rule on what constitutes a "feature", work together on the best balance of flags and their respective purposes.

Once you have decided that a feature flag is necessary, the first step is to decide on a name. Recommendations for naming are:

  • Name the flag using kebab-case (lowercase and dash-separated, such as enable-feature).
  • For Boolean flags, it is not necessary to include the enable verb, as it is implied by it being a feature flag. For example, new-feature is recommended instead of enable-new-feature.
  • Keep key names succinct.

Once a name has been decided, add the feature flag to the FeatureFlagKeys constants file on the server. This will allow the flag to be retrieved from LaunchDarkly via whichever data source you configure below.

Local development

As you begin work on the feature, use one of the local configuration options to surface the flag to your consuming code to make sure that behavior is correct for all supported flag values. Since feature flags don’t have to exist in LaunchDarkly for initial development, don’t create them online until you’re sure about the final implementation.

Local client development

Keep in mind that for client local development, the source for the feature flag is dependent upon the server instance you're using. For example, if you are developing client-side code and referencing the QA Cloud Bitwarden API, the flag must be configured there and not in the local data store.

Definition in LaunchDarkly

In order to test the feature flag in any deployed environment, it must first be defined in the LaunchDarkly web app. To do this, request the flag from your Engineering Manager -- they will have the appropriate access. You should discuss:

  • The data type of the flag.
  • The default value of the flag.
  • The possible values of the flag (for non-boolean types).
  • Any context-based rules that should drive flag behavior.
When should I request the flags in LaunchDarkly?

As a general rule, feature flags should be requested for creation in LaunchDarkly as part of merging the code using the flag into a mainline branch. Since local development and QA testing with their self-hosted instances will use local data sources, the first time that a flag in LaunchDarkly would be referenced is when the code is deployed to a cloud environment.

Consuming feature flags in code

When coding against a feature flag, default to an "off" state whenever possible – code defensively so that existing functionality is maintained should a flag be unavailable altogether. When an interface supports it, also provide default values implying "off" to feature flag accessors.

Offline mode makes default values even more important, and local development as well as self-hosted installations imply being offline. Set a safe default value not just in the flag definition online in LaunchDarkly but also in code.

Clients

All clients retrieve their feature flags by querying the /config endpoint on the Bitwarden API. Clients do not directly reference the LaunchDarkly client-side SDK.

In order to optimize the use of feature flags, they are not retrieved from the server on every request for the flag value. Rather, the flags are retrieved from the server on the following interval:

  • On application startup.
  • Every hour after application startup.
  • On sync (both automatic and manual).
  • On environment change.

Requesting a flag value from the services defined below will provide the consuming component with the most recent value from one of these retrieval events.

Web

The feature flag values are retrieved through the fetchServerConfig() method on the ConfigService.

To use a feature flag, you should first define the new feature flag as an enum value in the FeatureFlags enum.

Once that is defined, the value can be retrieved by injecting the ConfigService and using one of the retrieval methods:

  • getFeatureFlagBool()
  • getFeatureFlagString()
  • getFeatureFlagNumber()

Mobile

The feature flag values are retrieved through the GetAsync() method on the ConfigService.

To use a feature flag, you should first define the new feature flag as a string constant value in the Constants file.

Once that is defined, the value can be retrieved by injecting the IConfigService and using one of the retrieval methods:

  • GetFeatureFlagBoolAsync()
  • GetFeatureFlagStringAsync()
  • GetFeatureFlagNumberAsync()

Server

  1. Inject IFeatureService where you need a feature flag. Note that you’ll also need ICurrentContext when accessing the feature state.
  2. Find the constant in the FeatureFlagKeys list for the key you plan on using. It should have been added when creating a new flag.
  3. Utilize the above key constant with the appropriate method on the feature service:
  • IsEnabled for Booleans, with false an assumed default.
  • GetIntVariation for integers, with 0 an assumed default.
  • GetStringVariation for strings, with null an assumed default.

Feature flag lifecycle

Let your management know when you need to change something about a feature online inside LaunchDarkly. Only a small number of users have accounts with LaunchDarkly to save on licensing costs.

Feature flags don’t necessarily have to ever be deleted from LaunchDarkly, just unused. Linking them to Jira helps create a history of the feature and there are copious logs and audit records online that can be kept. Feature flags not accessed for a long period of time will automatically move to an "inactive" state that can also help with identifying technical debt to clean up.

While feature flags can be left indefinitely in LaunchDarkly without accumulating technical debt, it is essential that any logic based on these flags be removed from code as soon as the feature launches successfully. When defining the tasks for feature-flagged code, be sure to include a cleanup task for removing this logic. You may want to consider multiple tasks - one for each of the steps in the removal process.

Unwinding a feature flag

Due to the complexity of the different client deployments and how we expose feature flags through our API, it is important that each feature flag be removed in the appropriate sequence.

First, remove all business logic that relies on the flag from both client and server code. This includes all references in the client codebase, and also any business logic on the server that checks the flag value. This does not include removing the flag from the FeatureFlagKeys on the server -- we must leave this here so that old clients who have not updated continue to be served the correct "on" value when querying for the flag.

This code should then be deployed to all clients and to the server.

Self-hosted customers

Once the code referencing the flag has been removed and clients have updated, self-hosted customers can update to the latest version to begin using the feature. See Self-hosted considerations below for more detail.

Once we have satisfied the requirements of backward compatibility for our clients, we can completely remove the feature flag from the server codebase. This can be done by removing the flag value from the FeatureFlagKeys. This should then be deployed to the server to complete the removal process.

Self-hosted considerations

Self-hosted instances will not have access to LaunchDarkly, so the server configuration retrieved from the API will assess all feature flags as their default state unless the server is configured otherwise. What this means in practice is that the feature flag must be removed from the code before the feature is available for self-hosted instances. This implies a staged feature release cycle, as follows:

  1. Release cloud and self-hosted with feature flag off
  2. Turn on feature flag, enabling the feature for cloud instances only
  3. Release cloud and self-hosted with the feature flag removed, therefore enabling the feature for self-hosted instances

A self-hosted installation may choose to configure alternative data sources to more quickly adopt a feature.