Skip to content

Commit 5046189

Browse files
authored
Remove policy check deprecation messages from HCPTF and last two TFE versions (#469)
2 parents 9d76b7b + 6fc4f01 commit 5046189

File tree

15 files changed

+81
-51
lines changed

15 files changed

+81
-51
lines changed

content/terraform-docs-common/docs/cloud-docs/api-docs/policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ This endpoint uploads code to an existing Sentinel or OPA policy.
308308

309309
This PUT endpoint requires the text of a valid Sentinel or OPA policy with a `Content-Type` of `application/octet-stream`.
310310

311-
- Refer to [Defining Sentinel Policies](/terraform/cloud-docs/policy-enforcement/sentinel) for details about writing Sentinel code.
311+
- Refer to [Defining Sentinel Policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) for details about writing Sentinel code.
312312
- Refer to [Defining OPA Policies](/terraform/cloud-docs/policy-enforcement/opa) for details about writing OPA code.
313313

314314
### Sample Payload

content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ description: >-
4545
Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data.
4646
This set of APIs provides endpoints to get, list, and override policy checks.
4747

48-
~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions.
48+
@include 'deprecation/policy-checks.mdx'
4949

5050
## List Policy Checks
5151

content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: >-
66

77
# Manage policies and policy sets in HCP Terraform
88

9-
Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks.
9+
Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks.
1010

1111
<!-- BEGIN: TFC:only name:pnp-callout -->
1212

@@ -28,11 +28,11 @@ Policy checks and evaluations can access different types of data and enable slig
2828

2929
Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel.
3030

31-
~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions.
31+
@include 'deprecation/policy-checks.mdx'
3232

3333
### Policy evaluations
3434

35-
OPA policy sets can only run as policy evaluations, and you can enable policy evaluations for Sentinel policy sets by selecting the `Agent` policy set type.
35+
OPA policy sets can only run as policy evaluations, and you can enable policy evaluations for Sentinel policy sets by selecting the `Agent` policy set type.
3636

3737
HCP Terraform runs a workspace's policy evaluation in your self-managed agent pool if you meet the following requirements:
3838

content/terraform-docs-common/docs/cloud-docs/run/states.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ _Leaving this stage:_
6868
- If the plan succeeded with no changes and neither cost estimation nor Sentinel policy checks will be done, HCP Terraform considers the run complete (**Planned and Finished** state).
6969
- If the plan succeeded and requires changes:
7070
- If cost estimation is enabled, the run proceeds automatically to the cost estimation stage.
71-
- If cost estimation is disabled and [Sentinel policies](/terraform/enterprise/policy-enforcement/sentinel) are enabled, the run proceeds automatically to the policy check stage.
71+
- If cost estimation is disabled and [Sentinel policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) are enabled, the run proceeds automatically to the policy check stage.
7272
- If there are no Sentinel policies and the plan can be auto-applied, the run proceeds automatically to the apply stage. Plans can be auto-applied if the auto-apply setting is enabled on the workspace and the plan was queued by a new VCS commit or by a user with permission to apply runs. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions))
7373
- If there are no Sentinel policies and HCP Terraform cannot auto-apply the plan, the run pauses in the **Needs Confirmation** state until a user with permission to apply runs takes action. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions)) If an authorized user approves the apply, the run proceeds to the apply stage. If an authorized user rejects the apply, the run does not continue (**Discarded** state).
7474

@@ -133,7 +133,7 @@ _Leaving this stage:_
133133

134134
## The Sentinel Policy Check Stage
135135

136-
This stage only occurs if [Sentinel policies](/terraform/cloud-docs/policy-enforcement/sentinel) are enabled. After a successful `terraform plan`, HCP Terraform checks whether the plan obeys policy to determine whether it can be applied.
136+
This stage only occurs if [Sentinel policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) are enabled. After a successful `terraform plan`, HCP Terraform checks whether the plan obeys policy to determine whether it can be applied.
137137

138138
_States in this stage:_
139139

content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This topic provides overview information about how to create and manage organiza
1616

1717
## Requirements
1818

19-
The **admin** permission preset must be enabled on your profile to create and manage organizations in the HCP Terraform UI. Refer to [Permissions](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions) for additional information.
19+
The **admin** permission preset must be enabled on your profile to create and manage organizations in the HCP Terraform UI. Refer to [Permissions](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions) for additional information.
2020

2121
## API and Terraform Enterprise Provider
2222

@@ -41,7 +41,7 @@ To join an organization, the organization [owners][] or a user with specific [te
4141
## Leave an organization
4242

4343
1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and click the Terraform logo in the page header to navigate to the **Organizations** page.
44-
1. Open the **...** ellipses menu next to the organization and select **Leave organization**.
44+
1. Open the **...** ellipses menu next to the organization and select **Leave organization**.
4545

4646
You do not need permission from the owners to leave an organization, but you cannot leave if you are the last member of the owners team. Either add a new owner and then leave, or [delete the organization](/terraform/cloud-docs/users-teams-organizations/organizations#general).
4747

@@ -78,7 +78,7 @@ You can view your organization's managed resource count on the **Usage** page.
7878

7979
~> **Reserved tag keys are in beta**: We do not recommend using beta features in production environments.
8080

81-
You can define reserved tag keys that appear as suggested labels when managers want to add tags to their projects and workspaces in the organization. Refer to [Create and manage reserved tag keys](/terraform/cloud-docs/users-teams-organizations/organizations/manage-reserved-tags) for instructions.
81+
You can define reserved tag keys that appear as suggested labels when managers want to add tags to their projects and workspaces in the organization. Refer to [Create and manage reserved tag keys](/terraform/cloud-docs/users-teams-organizations/organizations/manage-reserved-tags) for instructions.
8282

8383
You can also view single-value tags that may already be attached to projects and workspaces. Refer to [Tags](#tags) in the organization settings reference for additional information.
8484

@@ -130,17 +130,17 @@ Click the **Tags** tab in the **Tags Management** screen to view single-value ta
130130

131131
The only action you can perform in the UI is deleting single-value tags from the system. You can use the following methods to delete single-value tags:
132132

133-
1. Select one or more tags and click **Delete tags**.
134-
1. Select the **Name** header to select all tags, then click **Delete tags**.
135-
1. Click the trash icon for a tag and confirm that you want to permanently delete it when prompted.
133+
1. Select one or more tags and click **Delete tags**.
134+
1. Select the **Name** header to select all tags, then click **Delete tags**.
135+
1. Click the trash icon for a tag and confirm that you want to permanently delete it when prompted.
136136

137137
#### Teams
138138

139139
<!-- BEGIN: TFC:only name:pnp-callout -->
140140
@include 'tfc-package-callouts/team-management.mdx'
141141
<!-- END: TFC:only name:pnp-callout -->
142142

143-
All users in an organization can access the **Teams** page, which displays a list of [teams][] within the organization.
143+
All users in an organization can access the **Teams** page, which displays a list of [teams][] within the organization.
144144

145145
Organization owners and users with the [include secret teams permission](/terraform/cloud-docs/users-teams-organizations/permissions#include-secret-teams) can:
146146
* view all [secret teams](/terraform/cloud-docs/users-teams-organizations/teams/manage#team-visibility)
@@ -196,14 +196,14 @@ From the Workspaces page, click **Settings** in the sidebar, then **Runs** to vi
196196
- A button allowing you to cancel that run
197197

198198
You can apply the following filters to limit the runs HCP Terraform displays:
199-
- Click **Needs Attention** to display runs that require user input to continue, such as approving a plan or overriding a policy.
199+
- Click **Needs Attention** to display runs that require user input to continue, such as approving a plan or overriding a policy.
200200
- Click **Running** to display runs that are in progress.
201201
- Click **On Hold** to display paused runs.
202202

203203

204204
For precise filtering, click **More filters** and check the boxes to filter runs by specific [run statuses](/terraform/cloud-docs/run/states), [run operations](/terraform/cloud-docs/run/modes-and-options), workspaces, or [agent pools](/terraform/cloud-docs/agents/agent-pools). Click **Apply filters** to list the runs that match your criteria.
205205

206-
You can dismiss any of your filtering criteria by clicking the **X** next to the filter name above the table displaying your runs.
206+
You can dismiss any of your filtering criteria by clicking the **X** next to the filter name above the table displaying your runs.
207207

208208
For more details about run states, refer to [Run States and Stages](/terraform/cloud-docs/run/states).
209209

@@ -219,7 +219,7 @@ Enable and disable the [cost estimation](/terraform/cloud-docs/cost-estimation)
219219
@include 'tfc-package-callouts/policies.mdx'
220220
<!-- END: TFC:only name:pnp-callout -->
221221

222-
Policies let you define and enforce rules for Terraform runs. You can write them using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks and then group them into policy sets that you can apply to workspaces in your organization. To create policies and policy sets, you must have [permission to manage policies](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions).
222+
Policies let you define and enforce rules for Terraform runs. You can write them using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks and then group them into policy sets that you can apply to workspaces in your organization. To create policies and policy sets, you must have [permission to manage policies](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions).
223223

224224
#### Policy Sets
225225

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
<Warning>
2+
3+
Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions.
4+
5+
</Warning>

content/terraform-docs-common/redirects.jsonc

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -245,43 +245,48 @@
245245
// Policy enforcement changes related to pre-written Sentinel policies
246246
{
247247
"source": "/terraform/cloud-docs/policy-enforcement/sentinel",
248-
"destination": "/terraform/cloud-docs/policy-enforcement/define-policies/sentinel",
248+
"destination": "/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel",
249+
"permanent": true
250+
},
251+
{
252+
"source": "/terraform/cloud-docs/policy-enforcement/define-policies/sentinel",
253+
"destination": "/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel",
249254
"permanent": true
250255
},
251256
{
252257
"source": "/terraform/cloud-docs/policy-enforcement/opa",
253258
"destination": "/terraform/cloud-docs/policy-enforcement/define-policies/opa",
254-
"permanent": true
259+
"permanent": true
255260
},
256261
{
257262
"source": "/terraform/cloud-docs/policy-enforcement/sentinel/vcs",
258263
"destination": "/terraform/cloud-docs/policy-enforcement/manage-policy-sets/sentinel-vcs",
259-
"permanent": true
264+
"permanent": true
260265
},
261266
{
262267
"source": "/terraform/cloud-docs/policy-enforcement/opa/vcs",
263268
"destination": "/terraform/cloud-docs/policy-enforcement/manage-policy-sets/opa-vcs",
264-
"permanent": true
269+
"permanent": true
265270
},
266271
{
267272
"source": "/terraform/cloud-docs/policy-enforcement/policy-results",
268273
"destination": "/terraform/cloud-docs/policy-enforcement/view-results",
269-
"permanent": true
274+
"permanent": true
270275
},
271276
{
272277
"source": "/terraform/cloud-docs/policy-enforcement/sentinel/json",
273278
"destination": "/terraform/cloud-docs/policy-enforcement/view-results/json",
274-
"permanent": true
279+
"permanent": true
275280
},
276281
{
277282
"source": "/terraform/cloud-docs/policy-enforcement/sentinel/mock",
278283
"destination": "/terraform/cloud-docs/policy-enforcement/test-sentinel",
279-
"permanent": true
284+
"permanent": true
280285
},
281286
{
282287
"source": "/terraform/cloud-docs/policy-enforcement/sentinel/import/:slug",
283288
"destination": "/terraform/cloud-docs/policy-enforcement/import-reference/:slug",
284-
"permanent": true
289+
"permanent": true
285290
},
286291
// Relocate pre-written Sentinel policies topic
287292
{
@@ -311,4 +316,4 @@
311316
"destination": "/terraform/docs/tools",
312317
"permanent": true
313318
},
314-
]
319+
]

content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ source: terraform-docs-common
4949
Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data.
5050
This set of APIs provides endpoints to get, list, and override policy checks.
5151

52-
~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions.
52+
@include 'deprecation/policy-checks.mdx'
5353

5454
## List Policy Checks
5555

content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ source: terraform-docs-common
88

99
# Manage policies and policy sets in HCP Terraform
1010

11-
Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks.
11+
Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks.
1212

1313
<!-- BEGIN: TFC:only name:pnp-callout -->
1414

@@ -30,7 +30,7 @@ Policy checks and evaluations can access different types of data and enable slig
3030

3131
Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel.
3232

33-
~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions.
33+
@include 'deprecation/policy-checks.mdx'
3434

3535
### Policy evaluations
3636

@@ -127,7 +127,7 @@ To view and manage policy sets, go to the **Policy Sets** section of your organi
127127
The way you set up and configure a new policy set depends on your workflow and where you store policies.
128128

129129
- For [managed policies](#managed-policies), you use the UI to create a policy set and add managed policies.
130-
- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/sentinel/vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details.
130+
- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details.
131131
- For automated workflows like continuous deployment, you can use the UI to create an empty policy set and then use the [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to add policies. You can also use the API or the [`tfe` provider (Sentinel Only)](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/policy_set) to add an entire, packaged policy set.
132132

133133
### Create policy sets
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
<Warning>
2+
3+
Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions.
4+
5+
</Warning>

0 commit comments

Comments
 (0)