Enforce Project Boundaries
If you partition your code into well-defined cohesive units, even a small organization will end up with a dozen apps and dozens or hundreds of libs. If all of them can depend on each other freely, chaos will ensue, and the workspace will become unmanageable.
To help with that Nx uses code analysis to make sure projects can only depend on each other's well-defined public API. It also allows you to declaratively impose constraints on how projects can depend on each other.
Project APIs
Nx provides an enforce-module-boundaries
eslint rule that enforces the public API of projects in the repo. Each project defines its public API in an index.ts
(or index.js
) file. If another project tries to import a variable from a file deep within a different project, an error will be thrown during linting.
To set up the lint rule, install these dependencies:
npm i @nx/eslint-plugin @nx/devkit
And configure the rule in your root .eslintrc.json
file:
{
"plugins": ["@nx"],
// ...
"rules": {
"@nx/enforce-module-boundaries": [
"error",
{
/* options */
}
]
}
}
Tags
Nx comes with a generic mechanism for expressing constraints on project dependencies: tags.
First, use your project configuration (in project.json
or package.json
) to annotate your projects with tags
. In this example, we will use three tags: scope:client
. scope:admin
, scope:shared
.
{
// ... more project configuration here
"nx": {
"tags": ["scope:client"]
}
}
{
// ... more project configuration here
"nx": {
"tags": ["scope:admin"]
}
}
{
// ... more project configuration here
"nx": {
"tags": ["scope:shared"]
}
}
Next you should update your root lint configuration:
- If you are using ESLint you should look for an existing rule entry in your root
.eslintrc.json
called"@nx/enforce-module-boundaries"
and you should update the"depConstraints"
:
{
// ... more ESLint config here
// @nx/enforce-module-boundaries should already exist within an "overrides" block using `"files": ["*.ts", "*.tsx", "*.js", "*.jsx",]`
"@nx/enforce-module-boundaries": [
"error",
{
"allow": [],
// update depConstraints based on your tags
"depConstraints": [
{
"sourceTag": "scope:shared",
"onlyDependOnLibsWithTags": ["scope:shared"]
},
{
"sourceTag": "scope:admin",
"onlyDependOnLibsWithTags": ["scope:shared", "scope:admin"]
},
{
"sourceTag": "scope:client",
"onlyDependOnLibsWithTags": ["scope:shared", "scope:client"]
}
]
}
]
// ... more ESLint config here
}
With these constraints in place, scope:client
projects can only depend on other scope:client
projects or on scope:shared
projects. And scope:admin
projects can only depend on other scope:admin
projects or on scope:shared
projects. So scope:client
and scope:admin
cannot depend on each other.
Projects without any tags cannot depend on any other projects, unless you allow all tags (see below).
If you try to violate the constraints, you will get an error when linting:
A project tagged with "scope:admin" can only depend on projects
tagged with "scoped:shared" or "scope:admin".
Tag formats
string
: allow exact tags
Example: projects tagged with scope:client
can only depend on projects tagged scope:client
{
"sourceTag": "scope:client",
"onlyDependOnLibsWithTags": ["scope:client"]
}
*
: allow all tags
Example: projects with any tags (including untagged) can depend on any other project.
{
"sourceTag": "*",
"onlyDependOnLibsWithTags": ["*"]
}
regex
: allow tags matching the regular expression
Example: projects tagged with scope:client
can depend on projects with a tag matching the regular expression /^scope.*/
. In this case scope:a
, scope:b
, etc are all allowed tags for dependencies.
{
"sourceTag": "scope:client",
"onlyDependOnLibsWithTags": ["/^scope.*/"]
}
glob
: allow tags matching the glob
Example: projects with a tag starting with scope:
can depend on projects with a tag that starts with scope:*
. In this case scope:a
, scope:b
, etc are all allowed tags for dependencies.
{
"sourceTag": "scope:*",
"onlyDependOnLibsWithTags": ["scope:*"]
}