You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+26Lines changed: 26 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,32 @@ Getting started with Finch Daemon on Linux only requires a few steps:
35
35
5. Test any changes with `make test-unit` and `sudo make test-e2e`
36
36
37
37
38
+
## Experimental Features
39
+
40
+
Finch Daemon includes experimental features that can be enabled using the `--experimental` flag. These features are under development and may change in future releases.
41
+
42
+
### Using Experimental Features
43
+
44
+
To enable experimental features, use the `--experimental` flag when starting the daemon:
The OPA (Open Policy Agent) middleware allows you to define authorization policies for API requests using Rego policy language. This feature requires both the `--experimental` flag and the `--rego-file` flag to be set.
rootCmd.Flags().BoolVar(&options.skipRegoPermCheck, "skip-rego-perm-check", false, "skip the rego file permission check (allows permissions more permissive than 0600)")
returnnil, fmt.Errorf("rego file provided without experimental flag - OPA middleware is an experimental feature, please enable it with '--experimental' flag")
Copy file name to clipboardExpand all lines: docs/opa-middleware.md
+22-6Lines changed: 22 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,20 @@
1
-
# Applying OPA authz policies
1
+
# OPA Authorization Middleware (Experimental)
2
2
3
-
This guide provides instructions for setting up [OPA](https://github.com/open-policy-agent/opa) authz policies with the finch-daemon. Authz policies allow users to allowlist or deny certain resources based on policy rules.
3
+
> ⚠️ **Experimental Feature**: The OPA authorization middleware is being introduced as an experimental feature.
4
+
5
+
This guide provides instructions for setting up [OPA](https://github.com/open-policy-agent/opa) authorization policies with the finch-daemon. These policies allow users to allowlist or deny certain resources based on policy rules.
6
+
7
+
## Experimental Status
8
+
9
+
This feature is being released as experimental because:
10
+
- Integration patterns and best practices are still being established
11
+
- Performance characteristics are being evaluated
12
+
13
+
As an experimental feature:
14
+
- Breaking changes may occur in any release
15
+
- Long-term backward compatibility is not guaranteed
16
+
- Documentation and examples may evolve substantially
17
+
- Production use is not recommended at this stage
4
18
5
19
## What Is OPA Authz implementation
6
20
Open Policy Agent (OPA) is an open-source, general-purpose policy engine that enables unified, context-aware policy enforcement across the entire stack. OPA provides a high-level declarative language, Rego, for specifying policy as code and simple APIs to offload policy decision-making from your software.
@@ -34,24 +48,26 @@ Use the [Rego playground](https://play.openpolicyagent.org/) to fine tune your r
34
48
35
49
## Enable OPA Middleware
36
50
37
-
Once you are ready with your policy document, use the `--enable-opa-middleware` flag to tell the finch-daemon to enable the OPA middleware. The daemon will then look for the policy document provided by the `--rego-file` flag.
51
+
Once you are ready with your policy document, use the `--experimental` flag to enable experimental features including OPA middleware. The daemon will then look for the policy document provided by the `--rego-file` flag.
38
52
39
-
Note: The `--rego-file` flag is required when `--enable-opa-middleware` is set.
53
+
Note: Since OPA middleware is an experimental feature, the `--experimental` flag is required when using `--rego-file`.
40
54
41
55
The daemon enforces strict permissions (0600 or more restrictive) on the Rego policy file to prevent unauthorized modifications. You can bypass this check using the `--skip-rego-perm-check` flag.
0 commit comments