-
Notifications
You must be signed in to change notification settings - Fork 32
Adding Policy Evaluations as an exception to "hard-mandatory" #505
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Adding Policy Evaluations as an exception to "hard-mandatory" #505
Conversation
Adding Policy Evaluations as an exception because "hard-mandatory" failures can be overridden in Agent mode.
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement Learn more about why HashiCorp requires a CLA and what the CLA includes Have you signed the CLA already but the status is still pending? Recheck it. |
Vercel Previews Deployed
|
Broken Link CheckerNo broken links found! 🎉 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for adding this information. I added an extremely minor tweak for style but approved so you can proceed after addressing it.
@@ -60,7 +60,7 @@ Sentinel provides three policy enforcement levels: | |||
|
|||
- **advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI. | |||
- **soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/cloud-docs/users-teams-organizations/permissions#manage-policy-overrides) can override these failures and allow the run to complete. | |||
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure. | |||
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure. Some exceptions apply, see documentation on [Policy Evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure. Some exceptions apply, see documentation on [Policy Evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations). | |
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure. Some exceptions apply. Refer to [Policy Evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) for more information. |
Adding Policy Evaluations as an exception because "hard-mandatory" failures can be overridden in Agent mode.