-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rfc: feature flags #5017
rfc: feature flags #5017
Conversation
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are there also implications of issue reporting, triaging issues. I'm curious what the support model would look like. Would it be as simple as adding the feature-flags stanza into the issue so bugs can be reproduced?
Title does not follow the guidelines of Conventional Commits. Please adjust title before merge. |
1 similar comment
Title does not follow the guidelines of Conventional Commits. Please adjust title before merge. |
@shivlaks commented:
Yes, that's a great point. Ideally these should be included in |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
TBH, this is somewhat scary! I hope that we use this to the minimum.
I hope we don't get to a day where a feature flags and conditional based on these flags are not littered through our code base.
Could you provide more guidance on when feature flags should, could and must not be used, with stress on the latter? The 'duplicate stack name' is a good example of when it should be used; when should it not be used.
What is the strategy for testing new/existing features behind these flags?
It's probably fair to assume that most of the features flagged through here are going to span multiple L2s, if not multiple modules. We're going to have places in code that should've been flagged off getting missed. This is likely exacerbated by the fact that we don't run our integration tests.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I like this. I'm personally not too worried we'll have 20 of these - it seems unlikely to me, and even if we do, I think that's fine.
We will definitely need this mechanism to have an upgrade story for changing how assets work for CI/CD.
- Add a disclaimer and a requirement to get an approval for using a feature flag. - Add a prefix in the BREAKING CHANGES section.
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Title does not follow the guidelines of Conventional Commits. Please adjust title before merge. |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Co-Authored-By: Mitchell Valine <mitchellvaline@gmail.com>
Title does not follow the guidelines of Conventional Commits. Please adjust title before merge. |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Design proposal for a pattern/mechanism that will allow us to introduce breaking capabilities which will only be applied to new projects created by "cdk init" and won't break old projects without explicit action from the user. Transferred from aws/aws-cdk#5017
Transferred this PR to the RFCs repository: aws/aws-cdk-rfcs#56 |
Design proposal for a pattern/mechanism that will allow us to introduce breaking capabilities which will only be applied to new projects created by "cdk init" and won't break old projects without explicit action from the user. Transferred from aws/aws-cdk#5017 Tracking issue: #55
Design proposal for a pattern/mechanism that will allow us to introduce
breaking capabilities which will only be applied to new projects created
by "cdk init" and won't break old projects without explicit action from the user.
NOTE: this PR is a "re-do" of the feature flags RFC which was already merged to master.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license