You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description: >-
6
6
7
7
# Manage policies and policy sets in HCP Terraform
8
8
9
-
Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks.
9
+
Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks.
10
10
11
11
<!--BEGIN:TFC:onlyname:pnp-callout-->
12
12
@@ -28,11 +28,11 @@ Policy checks and evaluations can access different types of data and enable slig
Copy file name to clipboardExpand all lines: content/terraform-docs-common/docs/cloud-docs/run/states.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ _Leaving this stage:_
68
68
- If the plan succeeded with no changes and neither cost estimation nor Sentinel policy checks will be done, HCP Terraform considers the run complete (**Planned and Finished** state).
69
69
- If the plan succeeded and requires changes:
70
70
- If cost estimation is enabled, the run proceeds automatically to the cost estimation stage.
71
-
- If cost estimation is disabled and [Sentinel policies](/terraform/enterprise/policy-enforcement/sentinel) are enabled, the run proceeds automatically to the policy check stage.
71
+
- If cost estimation is disabled and [Sentinel policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) are enabled, the run proceeds automatically to the policy check stage.
72
72
- If there are no Sentinel policies and the plan can be auto-applied, the run proceeds automatically to the apply stage. Plans can be auto-applied if the auto-apply setting is enabled on the workspace and the plan was queued by a new VCS commit or by a user with permission to apply runs. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions))
73
73
- If there are no Sentinel policies and HCP Terraform cannot auto-apply the plan, the run pauses in the **Needs Confirmation** state until a user with permission to apply runs takes action. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions)) If an authorized user approves the apply, the run proceeds to the apply stage. If an authorized user rejects the apply, the run does not continue (**Discarded** state).
74
74
@@ -133,7 +133,7 @@ _Leaving this stage:_
133
133
134
134
## The Sentinel Policy Check Stage
135
135
136
-
This stage only occurs if [Sentinel policies](/terraform/cloud-docs/policy-enforcement/sentinel) are enabled. After a successful `terraform plan`, HCP Terraform checks whether the plan obeys policy to determine whether it can be applied.
136
+
This stage only occurs if [Sentinel policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) are enabled. After a successful `terraform plan`, HCP Terraform checks whether the plan obeys policy to determine whether it can be applied.
Copy file name to clipboardExpand all lines: content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ This topic provides overview information about how to create and manage organiza
16
16
17
17
## Requirements
18
18
19
-
The **admin** permission preset must be enabled on your profile to create and manage organizations in the HCP Terraform UI. Refer to [Permissions](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions) for additional information.
19
+
The **admin** permission preset must be enabled on your profile to create and manage organizations in the HCP Terraform UI. Refer to [Permissions](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions) for additional information.
20
20
21
21
## API and Terraform Enterprise Provider
22
22
@@ -41,7 +41,7 @@ To join an organization, the organization [owners][] or a user with specific [te
41
41
## Leave an organization
42
42
43
43
1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and click the Terraform logo in the page header to navigate to the **Organizations** page.
44
-
1. Open the **...** ellipses menu next to the organization and select **Leave organization**.
44
+
1. Open the **...** ellipses menu next to the organization and select **Leave organization**.
45
45
46
46
You do not need permission from the owners to leave an organization, but you cannot leave if you are the last member of the owners team. Either add a new owner and then leave, or [delete the organization](/terraform/cloud-docs/users-teams-organizations/organizations#general).
47
47
@@ -78,7 +78,7 @@ You can view your organization's managed resource count on the **Usage** page.
Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions.
Copy file name to clipboardExpand all lines: content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ source: terraform-docs-common
8
8
9
9
# Manage policies and policy sets in HCP Terraform
10
10
11
-
Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks.
11
+
Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks.
12
12
13
13
<!--BEGIN:TFC:onlyname:pnp-callout-->
14
14
@@ -30,7 +30,7 @@ Policy checks and evaluations can access different types of data and enable slig
Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions.
0 commit comments