CtrlK
BlogDocsLog inGet started
Tessl Logo

nicholasjackson/opa-rego-language

Rego is the declarative policy language used by Open Policy Agent (OPA). This tile covers writing and testing Rego policies for Kubernetes admission control, Terraform and infrastructure-as-code plan validation, Docker container authorization, HTTP API authorization, RBAC and role-based access control, data filtering, metadata annotations with opa inspect, and OPA policy testing with opa test.

99

1.19x

Quality

Pending

Does it follow best practices?

Impact

99%

1.19x

Average score across 31 eval scenarios

SecuritybySnyk

Pending

The risk profile of this skill

Overview
Eval results
Files

task.mdevals/scenario-20/

HTTP API: Rate Limiting with Per-User Limits

Write a Rego policy that enforces rate limits. Different users have different request limits per minute. Users not in the limit table fall back to a default limit.

Input

{
  "user": "alice",
  "request_count": 120
}

Data

data.request_counts maps users to their current request count in the last minute.

Per-user limits:

  • premium users: 1000 requests/min
  • standard users: 100 requests/min
  • Default (unknown tier): 10 requests/min

User tiers are in data.user_tiers:

{
  "alice": "premium",
  "bob": "standard"
}

Expected behaviour

  • Alice (premium) is allowed up to 1000 requests
  • Bob (standard) is allowed up to 100 requests
  • An unknown user is allowed up to 10 requests (default)
  • allow is false when input.request_count exceeds the user's limit

README.md

rules.md

tile.json