Skip to content

Commit f55da25

Browse files
committed
cleanup quota.disallow_blocked_groups flag
1 parent 32cfba1 commit f55da25

File tree

2 files changed

+10
-103
lines changed

2 files changed

+10
-103
lines changed

enterprise/server/quota/quota_manager.go

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,6 @@ const (
3333
maxRedisRetry = 3
3434
redisQuotaKeyPrefix = "quota"
3535
bucketQuotaExperimentName = "quota.buckets"
36-
disallowBlockedGroupsFlagKey = "quota.disallow_blocked_groups"
3736
quotaExceededMessageTemplate = "quota exceeded for %q - to increase quota, request a quote at https://buildbuddy.io/request-quote"
3837
)
3938

@@ -69,10 +68,6 @@ func (qm *QuotaManager) checkGroupBlocked(ctx context.Context) error {
6968
return nil
7069
}
7170

72-
if !fp.Boolean(ctx, disallowBlockedGroupsFlagKey, false) {
73-
return nil
74-
}
75-
7671
c, err := claims.ClaimsFromContext(ctx)
7772
if err != nil {
7873
return nil

enterprise/server/quota/quota_manager_test.go

Lines changed: 10 additions & 98 deletions
Original file line numberDiff line numberDiff line change
@@ -383,27 +383,18 @@ func TestConcurrentBucketAccess(t *testing.T) {
383383
func TestCheckGroupBlocked(t *testing.T) {
384384
env := testenv.GetTestEnv(t)
385385
ctx := context.Background()
386-
qm, err := newQuotaManager(env, createTestBucket)
387-
require.NoError(t, err)
388386

389-
t.Run("blocked group with flag enabled", func(t *testing.T) {
390-
flags := map[string]memprovider.InMemoryFlag{
391-
disallowBlockedGroupsFlagKey: {
392-
State: memprovider.Enabled,
393-
DefaultVariant: "on",
394-
Variants: map[string]any{
395-
"on": true,
396-
},
397-
},
398-
}
399-
provider := memprovider.NewInMemoryProvider(flags)
400-
domain := t.Name()
401-
require.NoError(t, openfeature.SetNamedProviderAndWait(domain, provider))
387+
provider := memprovider.NewInMemoryProvider(map[string]memprovider.InMemoryFlag{})
388+
domain := t.Name()
389+
require.NoError(t, openfeature.SetNamedProviderAndWait(domain, provider))
390+
fp, err := experiments.NewFlagProvider(domain)
391+
require.NoError(t, err)
392+
env.SetExperimentFlagProvider(fp)
402393

403-
fp, err := experiments.NewFlagProvider(domain)
404-
require.NoError(t, err)
405-
env.SetExperimentFlagProvider(fp)
394+
qm, err := newQuotaManager(env, createTestBucket)
395+
require.NoError(t, err)
406396

397+
t.Run("blocked group", func(t *testing.T) {
407398
blockedClaims := &claims.Claims{
408399
APIKeyID: "AK001",
409400
UserID: "US001",
@@ -417,24 +408,7 @@ func TestCheckGroupBlocked(t *testing.T) {
417408
assert.Equal(t, errBlocked, err)
418409
})
419410

420-
t.Run("enterprise group with flag enabled", func(t *testing.T) {
421-
flags := map[string]memprovider.InMemoryFlag{
422-
disallowBlockedGroupsFlagKey: {
423-
State: memprovider.Enabled,
424-
DefaultVariant: "on",
425-
Variants: map[string]any{
426-
"on": true,
427-
},
428-
},
429-
}
430-
provider := memprovider.NewInMemoryProvider(flags)
431-
domain := t.Name()
432-
require.NoError(t, openfeature.SetNamedProviderAndWait(domain, provider))
433-
434-
fp, err := experiments.NewFlagProvider(domain)
435-
require.NoError(t, err)
436-
env.SetExperimentFlagProvider(fp)
437-
411+
t.Run("enterprise group", func(t *testing.T) {
438412
enterpriseClaims := &claims.Claims{
439413
APIKeyID: "AK001",
440414
UserID: "US001",
@@ -445,52 +419,7 @@ func TestCheckGroupBlocked(t *testing.T) {
445419
assert.NoError(t, qm.checkGroupBlocked(authedCtx))
446420
})
447421

448-
t.Run("blocked group with flag disabled", func(t *testing.T) {
449-
flags := map[string]memprovider.InMemoryFlag{
450-
disallowBlockedGroupsFlagKey: {
451-
State: memprovider.Enabled,
452-
DefaultVariant: "off",
453-
Variants: map[string]any{
454-
"off": false,
455-
},
456-
},
457-
}
458-
provider := memprovider.NewInMemoryProvider(flags)
459-
domain := t.Name()
460-
require.NoError(t, openfeature.SetNamedProviderAndWait(domain, provider))
461-
462-
fp, err := experiments.NewFlagProvider(domain)
463-
require.NoError(t, err)
464-
env.SetExperimentFlagProvider(fp)
465-
466-
blockedClaims := &claims.Claims{
467-
APIKeyID: "AK001",
468-
UserID: "US001",
469-
GroupID: "GR001",
470-
GroupStatus: grpb.Group_BLOCKED_GROUP_STATUS,
471-
}
472-
authedCtx := testauth.WithAuthenticatedUserInfo(ctx, blockedClaims)
473-
assert.NoError(t, qm.checkGroupBlocked(authedCtx))
474-
})
475-
476422
t.Run("request without API key", func(t *testing.T) {
477-
flags := map[string]memprovider.InMemoryFlag{
478-
disallowBlockedGroupsFlagKey: {
479-
State: memprovider.Enabled,
480-
DefaultVariant: "on",
481-
Variants: map[string]any{
482-
"on": true,
483-
},
484-
},
485-
}
486-
provider := memprovider.NewInMemoryProvider(flags)
487-
domain := t.Name()
488-
require.NoError(t, openfeature.SetNamedProviderAndWait(domain, provider))
489-
490-
fp, err := experiments.NewFlagProvider(domain)
491-
require.NoError(t, err)
492-
env.SetExperimentFlagProvider(fp)
493-
494423
webClaims := &claims.Claims{
495424
UserID: "US001",
496425
GroupID: "GR001",
@@ -501,23 +430,6 @@ func TestCheckGroupBlocked(t *testing.T) {
501430
})
502431

503432
t.Run("impersonating request", func(t *testing.T) {
504-
flags := map[string]memprovider.InMemoryFlag{
505-
disallowBlockedGroupsFlagKey: {
506-
State: memprovider.Enabled,
507-
DefaultVariant: "on",
508-
Variants: map[string]any{
509-
"on": true,
510-
},
511-
},
512-
}
513-
provider := memprovider.NewInMemoryProvider(flags)
514-
domain := t.Name()
515-
require.NoError(t, openfeature.SetNamedProviderAndWait(domain, provider))
516-
517-
fp, err := experiments.NewFlagProvider(domain)
518-
require.NoError(t, err)
519-
env.SetExperimentFlagProvider(fp)
520-
521433
impersonatingClaims := &claims.Claims{
522434
APIKeyID: "AK001",
523435
UserID: "US001",

0 commit comments

Comments
 (0)