CtrlK
BlogDocsLog inGet started
Tessl Logo

nicholasjackson/opa-rego-language

Rego is the declarative policy language used by Open Policy Agent (OPA). This tile covers writing and testing Rego policies for Kubernetes admission control, Terraform and infrastructure-as-code plan validation, Docker container authorization, HTTP API authorization, RBAC and role-based access control, data filtering, metadata annotations with opa inspect, and OPA policy testing with opa test.

99

1.19x

Quality

Pending

Does it follow best practices?

Impact

99%

1.19x

Average score across 31 eval scenarios

SecuritybySnyk

Pending

The risk profile of this skill

Overview
Eval results
Files

task.mdevals/scenario-25/

Regal: Default Rules — Tiered Rate Limit Values

Write a Rego policy in the package api.limits that returns a max_requests value based on the user's subscription tier stored in data.user_tiers. Use a default declaration for the fallback value (10 requests). Override for "standard" tier (100 requests) and "premium" tier (1000 requests). The default must be declared at the top of the rule group, not at the bottom.

Input

{"user_id": "alice"}

Data

{
  "user_tiers": {
    "alice": "premium",
    "bob": "standard"
  }
}

Expected behaviour

  • alice (premium) → max_requests = 1000
  • bob (standard) → max_requests = 100
  • carol (no tier / unknown) → max_requests = 10 (default)

README.md

rules.md

tile.json