Skip to content

Adding Policy Evaluations as an exception to "hard-mandatory" #505

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

calvinliu-hashicorp
Copy link

Adding Policy Evaluations as an exception because "hard-mandatory" failures can be overridden in Agent mode.

Adding Policy Evaluations as an exception because "hard-mandatory" failures can be overridden in Agent mode.
@calvinliu-hashicorp calvinliu-hashicorp requested a review from a team as a code owner June 19, 2025 20:15
Copy link

CLA assistant check

Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement

Learn more about why HashiCorp requires a CLA and what the CLA includes

Have you signed the CLA already but the status is still pending? Recheck it.

Copy link

github-actions bot commented Jun 19, 2025

Vercel Previews Deployed

Name Status Preview Updated (UTC)
Dev Portal ✅ Ready (Inspect) Visit Preview Thu Jun 19 20:34:53 UTC 2025
Unified Docs API ✅ Ready (Inspect) Visit Preview Thu Jun 19 20:29:55 UTC 2025

Copy link

Broken Link Checker

No broken links found! 🎉

Copy link
Contributor

@trujillo-adam trujillo-adam left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for adding this information. I added an extremely minor tweak for style but approved so you can proceed after addressing it.

@@ -60,7 +60,7 @@ Sentinel provides three policy enforcement levels:

- **advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI.
- **soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/cloud-docs/users-teams-organizations/permissions#manage-policy-overrides) can override these failures and allow the run to complete.
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure.
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure. Some exceptions apply, see documentation on [Policy Evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure. Some exceptions apply, see documentation on [Policy Evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations).
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure. Some exceptions apply. Refer to [Policy Evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) for more information.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants