From 4f55d9963b4d648d51a6c2b917baf0939c3bb3aa Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Thu, 5 Jun 2025 16:09:26 -0700 Subject: [PATCH 01/11] Remove policy check deprecation messages from HCP TF and TFE last two versions --- .../docs/cloud-docs/api-docs/policy-checks.mdx | 6 +++++- .../policy-enforcement/manage-policy-sets/index.mdx | 4 ++-- .../docs/partials/deprecation/policy-checks.mdx | 5 +++++ .../v202504-1/docs/enterprise/api-docs/policy-checks.mdx | 2 +- .../policy-enforcement/manage-policy-sets/index.mdx | 2 +- .../v202504-1/docs/partials/deprecation/policy-checks.mdx | 5 +++++ .../v202505-1/docs/enterprise/api-docs/policy-checks.mdx | 2 +- .../policy-enforcement/manage-policy-sets/index.mdx | 4 ++-- .../v202505-1/docs/partials/deprecation/policy-checks.mdx | 5 +++++ 9 files changed, 27 insertions(+), 8 deletions(-) create mode 100644 content/terraform-docs-common/docs/partials/deprecation/policy-checks.mdx create mode 100644 content/terraform-enterprise/v202504-1/docs/partials/deprecation/policy-checks.mdx create mode 100644 content/terraform-enterprise/v202505-1/docs/partials/deprecation/policy-checks.mdx diff --git a/content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx b/content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx index cfc22c39ce..5d62abe318 100644 --- a/content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx @@ -45,7 +45,11 @@ description: >- Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data. This set of APIs provides endpoints to get, list, and override policy checks. -~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions. + + +Policy checks support Sentinel versions up to 0.40.x. Policy checks do not support newer Sentinel versions. + + ## List Policy Checks diff --git a/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx index 2c6e54d081..92fc8e4f2a 100644 --- a/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx @@ -28,11 +28,11 @@ Policy checks and evaluations can access different types of data and enable slig Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel. -~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions. +@include '/deprecation/policy-checks.mdx' ### Policy evaluations -OPA policy sets can only run as policy evaluations, and you can enable policy evaluations for Sentinel policy sets by selecting the `Agent` policy set type. +OPA policy sets can only run as policy evaluations, and you can enable policy evaluations for Sentinel policy sets by selecting the `Agent` policy set type. HCP Terraform runs a workspace's policy evaluation in your self-managed agent pool if you meet the following requirements: diff --git a/content/terraform-docs-common/docs/partials/deprecation/policy-checks.mdx b/content/terraform-docs-common/docs/partials/deprecation/policy-checks.mdx new file mode 100644 index 0000000000..5f624f96d6 --- /dev/null +++ b/content/terraform-docs-common/docs/partials/deprecation/policy-checks.mdx @@ -0,0 +1,5 @@ + + +Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions. + + diff --git a/content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx b/content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx index 621f40d368..b75a8647d5 100644 --- a/content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx +++ b/content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx @@ -49,7 +49,7 @@ source: terraform-docs-common Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data. This set of APIs provides endpoints to get, list, and override policy checks. -~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions. +@include '/deprecation/policy-checks.mdx' ## List Policy Checks diff --git a/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index c5cf8a8a88..90bbbadb07 100644 --- a/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -30,7 +30,7 @@ Policy checks and evaluations can access different types of data and enable slig Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel. -~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions. +@include '/deprecation/policy-checks.mdx' ### Policy evaluations diff --git a/content/terraform-enterprise/v202504-1/docs/partials/deprecation/policy-checks.mdx b/content/terraform-enterprise/v202504-1/docs/partials/deprecation/policy-checks.mdx new file mode 100644 index 0000000000..5f624f96d6 --- /dev/null +++ b/content/terraform-enterprise/v202504-1/docs/partials/deprecation/policy-checks.mdx @@ -0,0 +1,5 @@ + + +Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions. + + diff --git a/content/terraform-enterprise/v202505-1/docs/enterprise/api-docs/policy-checks.mdx b/content/terraform-enterprise/v202505-1/docs/enterprise/api-docs/policy-checks.mdx index 621f40d368..b75a8647d5 100644 --- a/content/terraform-enterprise/v202505-1/docs/enterprise/api-docs/policy-checks.mdx +++ b/content/terraform-enterprise/v202505-1/docs/enterprise/api-docs/policy-checks.mdx @@ -49,7 +49,7 @@ source: terraform-docs-common Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data. This set of APIs provides endpoints to get, list, and override policy checks. -~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions. +@include '/deprecation/policy-checks.mdx' ## List Policy Checks diff --git a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index c64a99593a..51a4f6850e 100644 --- a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -30,11 +30,11 @@ Policy checks and evaluations can access different types of data and enable slig Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel. -~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions. +@include '/deprecation/policy-checks.mdx' ### Policy evaluations -OPA policy sets can only run as policy evaluations, and you can enable policy evaluations for Sentinel policy sets by selecting the `Agent` policy set type. +OPA policy sets can only run as policy evaluations, and you can enable policy evaluations for Sentinel policy sets by selecting the `Agent` policy set type. HCP Terraform runs a workspace's policy evaluation in your self-managed agent pool if you meet the following requirements: diff --git a/content/terraform-enterprise/v202505-1/docs/partials/deprecation/policy-checks.mdx b/content/terraform-enterprise/v202505-1/docs/partials/deprecation/policy-checks.mdx new file mode 100644 index 0000000000..5f624f96d6 --- /dev/null +++ b/content/terraform-enterprise/v202505-1/docs/partials/deprecation/policy-checks.mdx @@ -0,0 +1,5 @@ + + +Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions. + + From 7e54e109874696343b1b447fed6a9ae71fbb8aa7 Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Thu, 5 Jun 2025 16:10:49 -0700 Subject: [PATCH 02/11] fix url --- .../docs/cloud-docs/api-docs/policy-checks.mdx | 6 +----- .../policy-enforcement/manage-policy-sets/index.mdx | 2 +- .../v202504-1/docs/enterprise/api-docs/policy-checks.mdx | 2 +- .../policy-enforcement/manage-policy-sets/index.mdx | 2 +- .../v202505-1/docs/enterprise/api-docs/policy-checks.mdx | 2 +- .../policy-enforcement/manage-policy-sets/index.mdx | 2 +- 6 files changed, 6 insertions(+), 10 deletions(-) diff --git a/content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx b/content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx index 5d62abe318..e901d7b727 100644 --- a/content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/api-docs/policy-checks.mdx @@ -45,11 +45,7 @@ description: >- Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data. This set of APIs provides endpoints to get, list, and override policy checks. - - -Policy checks support Sentinel versions up to 0.40.x. Policy checks do not support newer Sentinel versions. - - +@include 'deprecation/policy-checks.mdx' ## List Policy Checks diff --git a/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx index 92fc8e4f2a..752e60046e 100644 --- a/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx @@ -28,7 +28,7 @@ Policy checks and evaluations can access different types of data and enable slig Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel. -@include '/deprecation/policy-checks.mdx' +@include 'deprecation/policy-checks.mdx' ### Policy evaluations diff --git a/content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx b/content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx index b75a8647d5..9d2ec7e61a 100644 --- a/content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx +++ b/content/terraform-enterprise/v202504-1/docs/enterprise/api-docs/policy-checks.mdx @@ -49,7 +49,7 @@ source: terraform-docs-common Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data. This set of APIs provides endpoints to get, list, and override policy checks. -@include '/deprecation/policy-checks.mdx' +@include 'deprecation/policy-checks.mdx' ## List Policy Checks diff --git a/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index 90bbbadb07..8040aece1c 100644 --- a/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -30,7 +30,7 @@ Policy checks and evaluations can access different types of data and enable slig Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel. -@include '/deprecation/policy-checks.mdx' +@include 'deprecation/policy-checks.mdx' ### Policy evaluations diff --git a/content/terraform-enterprise/v202505-1/docs/enterprise/api-docs/policy-checks.mdx b/content/terraform-enterprise/v202505-1/docs/enterprise/api-docs/policy-checks.mdx index b75a8647d5..9d2ec7e61a 100644 --- a/content/terraform-enterprise/v202505-1/docs/enterprise/api-docs/policy-checks.mdx +++ b/content/terraform-enterprise/v202505-1/docs/enterprise/api-docs/policy-checks.mdx @@ -49,7 +49,7 @@ source: terraform-docs-common Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data. This set of APIs provides endpoints to get, list, and override policy checks. -@include '/deprecation/policy-checks.mdx' +@include 'deprecation/policy-checks.mdx' ## List Policy Checks diff --git a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index 51a4f6850e..86a63e8ca1 100644 --- a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -30,7 +30,7 @@ Policy checks and evaluations can access different types of data and enable slig Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel. -@include '/deprecation/policy-checks.mdx' +@include 'deprecation/policy-checks.mdx' ### Policy evaluations From ff8c06dc1377329aeeb51f5c4494fd9dea3f662e Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Thu, 5 Jun 2025 16:45:20 -0700 Subject: [PATCH 03/11] fix enterprise link --- .../v202504-1/docs/partials/deprecation/policy-checks.mdx | 2 +- .../v202505-1/docs/partials/deprecation/policy-checks.mdx | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/content/terraform-enterprise/v202504-1/docs/partials/deprecation/policy-checks.mdx b/content/terraform-enterprise/v202504-1/docs/partials/deprecation/policy-checks.mdx index 5f624f96d6..bf8bacea4e 100644 --- a/content/terraform-enterprise/v202504-1/docs/partials/deprecation/policy-checks.mdx +++ b/content/terraform-enterprise/v202504-1/docs/partials/deprecation/policy-checks.mdx @@ -1,5 +1,5 @@ -Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions. +Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions. diff --git a/content/terraform-enterprise/v202505-1/docs/partials/deprecation/policy-checks.mdx b/content/terraform-enterprise/v202505-1/docs/partials/deprecation/policy-checks.mdx index 5f624f96d6..bf8bacea4e 100644 --- a/content/terraform-enterprise/v202505-1/docs/partials/deprecation/policy-checks.mdx +++ b/content/terraform-enterprise/v202505-1/docs/partials/deprecation/policy-checks.mdx @@ -1,5 +1,5 @@ -Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/cloud-docs/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions. +Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions. From 727ea085166b1893a1fcf7f6472bc366f61342aa Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Fri, 6 Jun 2025 09:24:56 -0700 Subject: [PATCH 04/11] trying to fix the link checker failure --- .../policy-enforcement/manage-policy-sets/index.mdx | 4 ++-- .../policy-enforcement/manage-policy-sets/index.mdx | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index 8040aece1c..c118eefe10 100644 --- a/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -8,7 +8,7 @@ source: terraform-docs-common # Manage policies and policy sets in HCP Terraform -Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. +Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/define-policies/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. @@ -127,7 +127,7 @@ To view and manage policy sets, go to the **Policy Sets** section of your organi The way you set up and configure a new policy set depends on your workflow and where you store policies. - For [managed policies](#managed-policies), you use the UI to create a policy set and add managed policies. -- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/sentinel/vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. +- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/define-policies/sentinel/vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. - For automated workflows like continuous deployment, you can use the UI to create an empty policy set and then use the [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to add policies. You can also use the API or the [`tfe` provider (Sentinel Only)](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/policy_set) to add an entire, packaged policy set. ### Create policy sets diff --git a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index 86a63e8ca1..fdf84b6510 100644 --- a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -8,7 +8,7 @@ source: terraform-docs-common # Manage policies and policy sets in HCP Terraform -Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. +Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/define-policies/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. @@ -135,7 +135,7 @@ To view and manage policy sets, go to the **Policy Sets** section of your organi The way you set up and configure a new policy set depends on your workflow and where you store policies. - For [managed policies](#managed-policies), you use the UI to create a policy set and add managed policies. -- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/sentinel/vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. +- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/define-policies/sentinel/vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. - For automated workflows like continuous deployment, you can use the UI to create an empty policy set and then use the [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to add policies. You can also use the API or the [`tfe` provider (Sentinel Only)](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/policy_set) to add an entire, packaged policy set. ### Create policy sets From 4efd825abc115f9f56c78cb18d5753113dc798ce Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Fri, 6 Jun 2025 09:25:52 -0700 Subject: [PATCH 05/11] Fix cloud links --- .../cloud-docs/policy-enforcement/manage-policy-sets/index.mdx | 2 +- content/terraform-docs-common/docs/cloud-docs/run/states.mdx | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx index 752e60046e..ad00b788d7 100644 --- a/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx @@ -6,7 +6,7 @@ description: >- # Manage policies and policy sets in HCP Terraform -Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks. +Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks. diff --git a/content/terraform-docs-common/docs/cloud-docs/run/states.mdx b/content/terraform-docs-common/docs/cloud-docs/run/states.mdx index 0d615e82f9..df231ee959 100644 --- a/content/terraform-docs-common/docs/cloud-docs/run/states.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/run/states.mdx @@ -68,7 +68,7 @@ _Leaving this stage:_ - If the plan succeeded with no changes and neither cost estimation nor Sentinel policy checks will be done, HCP Terraform considers the run complete (**Planned and Finished** state). - If the plan succeeded and requires changes: - If cost estimation is enabled, the run proceeds automatically to the cost estimation stage. - - If cost estimation is disabled and [Sentinel policies](/terraform/enterprise/policy-enforcement/sentinel) are enabled, the run proceeds automatically to the policy check stage. + - If cost estimation is disabled and [Sentinel policies](/terraform/cloud-docs/policy-enforcement/sentinel) are enabled, the run proceeds automatically to the policy check stage. - If there are no Sentinel policies and the plan can be auto-applied, the run proceeds automatically to the apply stage. Plans can be auto-applied if the auto-apply setting is enabled on the workspace and the plan was queued by a new VCS commit or by a user with permission to apply runs. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions)) - If there are no Sentinel policies and HCP Terraform cannot auto-apply the plan, the run pauses in the **Needs Confirmation** state until a user with permission to apply runs takes action. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions)) If an authorized user approves the apply, the run proceeds to the apply stage. If an authorized user rejects the apply, the run does not continue (**Discarded** state). From 72b15f578c5ce6f0aa427622021b7c679060adc5 Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Fri, 6 Jun 2025 12:24:20 -0700 Subject: [PATCH 06/11] Redirect had the wrong URL --- content/terraform-docs-common/redirects.jsonc | 23 +++++++++++-------- 1 file changed, 14 insertions(+), 9 deletions(-) diff --git a/content/terraform-docs-common/redirects.jsonc b/content/terraform-docs-common/redirects.jsonc index 6c3cfdfff3..dfd1c09447 100644 --- a/content/terraform-docs-common/redirects.jsonc +++ b/content/terraform-docs-common/redirects.jsonc @@ -245,43 +245,48 @@ // Policy enforcement changes related to pre-written Sentinel policies { "source": "/terraform/cloud-docs/policy-enforcement/sentinel", - "destination": "/terraform/cloud-docs/policy-enforcement/define-policies/sentinel", + "destination": "/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel", + "permanent": true + }, + { + "source": "/terraform/cloud-docs/policy-enforcement/define-policies/sentinel", + "destination": "/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel", "permanent": true }, { "source": "/terraform/cloud-docs/policy-enforcement/opa", "destination": "/terraform/cloud-docs/policy-enforcement/define-policies/opa", - "permanent": true + "permanent": true }, { "source": "/terraform/cloud-docs/policy-enforcement/sentinel/vcs", "destination": "/terraform/cloud-docs/policy-enforcement/manage-policy-sets/sentinel-vcs", - "permanent": true + "permanent": true }, { "source": "/terraform/cloud-docs/policy-enforcement/opa/vcs", "destination": "/terraform/cloud-docs/policy-enforcement/manage-policy-sets/opa-vcs", - "permanent": true + "permanent": true }, { "source": "/terraform/cloud-docs/policy-enforcement/policy-results", "destination": "/terraform/cloud-docs/policy-enforcement/view-results", - "permanent": true + "permanent": true }, { "source": "/terraform/cloud-docs/policy-enforcement/sentinel/json", "destination": "/terraform/cloud-docs/policy-enforcement/view-results/json", - "permanent": true + "permanent": true }, { "source": "/terraform/cloud-docs/policy-enforcement/sentinel/mock", "destination": "/terraform/cloud-docs/policy-enforcement/test-sentinel", - "permanent": true + "permanent": true }, { "source": "/terraform/cloud-docs/policy-enforcement/sentinel/import/:slug", "destination": "/terraform/cloud-docs/policy-enforcement/import-reference/:slug", - "permanent": true + "permanent": true }, // Relocate pre-written Sentinel policies topic { @@ -311,4 +316,4 @@ "destination": "/terraform/docs/tools", "permanent": true }, -] \ No newline at end of file +] From c3f052dae6f08de239c7b951b442582cb4421fc4 Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Fri, 6 Jun 2025 17:25:22 -0700 Subject: [PATCH 07/11] fix links --- .../docs/cloud-docs/api-docs/policies.mdx | 2 +- .../docs/cloud-docs/run/states.mdx | 4 ++-- .../organizations/index.mdx | 20 +++++++++---------- 3 files changed, 13 insertions(+), 13 deletions(-) diff --git a/content/terraform-docs-common/docs/cloud-docs/api-docs/policies.mdx b/content/terraform-docs-common/docs/cloud-docs/api-docs/policies.mdx index af1dbd35cf..ad5aafa0a2 100644 --- a/content/terraform-docs-common/docs/cloud-docs/api-docs/policies.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/api-docs/policies.mdx @@ -308,7 +308,7 @@ This endpoint uploads code to an existing Sentinel or OPA policy. This PUT endpoint requires the text of a valid Sentinel or OPA policy with a `Content-Type` of `application/octet-stream`. -- Refer to [Defining Sentinel Policies](/terraform/cloud-docs/policy-enforcement/sentinel) for details about writing Sentinel code. +- Refer to [Defining Sentinel Policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) for details about writing Sentinel code. - Refer to [Defining OPA Policies](/terraform/cloud-docs/policy-enforcement/opa) for details about writing OPA code. ### Sample Payload diff --git a/content/terraform-docs-common/docs/cloud-docs/run/states.mdx b/content/terraform-docs-common/docs/cloud-docs/run/states.mdx index df231ee959..5008f92f51 100644 --- a/content/terraform-docs-common/docs/cloud-docs/run/states.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/run/states.mdx @@ -68,7 +68,7 @@ _Leaving this stage:_ - If the plan succeeded with no changes and neither cost estimation nor Sentinel policy checks will be done, HCP Terraform considers the run complete (**Planned and Finished** state). - If the plan succeeded and requires changes: - If cost estimation is enabled, the run proceeds automatically to the cost estimation stage. - - If cost estimation is disabled and [Sentinel policies](/terraform/cloud-docs/policy-enforcement/sentinel) are enabled, the run proceeds automatically to the policy check stage. + - If cost estimation is disabled and [Sentinel policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) are enabled, the run proceeds automatically to the policy check stage. - If there are no Sentinel policies and the plan can be auto-applied, the run proceeds automatically to the apply stage. Plans can be auto-applied if the auto-apply setting is enabled on the workspace and the plan was queued by a new VCS commit or by a user with permission to apply runs. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions)) - If there are no Sentinel policies and HCP Terraform cannot auto-apply the plan, the run pauses in the **Needs Confirmation** state until a user with permission to apply runs takes action. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions)) If an authorized user approves the apply, the run proceeds to the apply stage. If an authorized user rejects the apply, the run does not continue (**Discarded** state). @@ -133,7 +133,7 @@ _Leaving this stage:_ ## The Sentinel Policy Check Stage -This stage only occurs if [Sentinel policies](/terraform/cloud-docs/policy-enforcement/sentinel) are enabled. After a successful `terraform plan`, HCP Terraform checks whether the plan obeys policy to determine whether it can be applied. +This stage only occurs if [Sentinel policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) are enabled. After a successful `terraform plan`, HCP Terraform checks whether the plan obeys policy to determine whether it can be applied. _States in this stage:_ diff --git a/content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx b/content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx index 8cc5cf71ee..f471be5ff6 100644 --- a/content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx @@ -16,7 +16,7 @@ This topic provides overview information about how to create and manage organiza ## Requirements -The **admin** permission preset must be enabled on your profile to create and manage organizations in the HCP Terraform UI. Refer to [Permissions](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions) for additional information. +The **admin** permission preset must be enabled on your profile to create and manage organizations in the HCP Terraform UI. Refer to [Permissions](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions) for additional information. ## API and Terraform Enterprise Provider @@ -41,7 +41,7 @@ To join an organization, the organization [owners][] or a user with specific [te ## Leave an organization 1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and click the Terraform logo in the page header to navigate to the **Organizations** page. -1. Open the **...** ellipses menu next to the organization and select **Leave organization**. +1. Open the **...** ellipses menu next to the organization and select **Leave organization**. You do not need permission from the owners to leave an organization, but you cannot leave if you are the last member of the owners team. Either add a new owner and then leave, or [delete the organization](/terraform/cloud-docs/users-teams-organizations/organizations#general). @@ -78,7 +78,7 @@ You can view your organization's managed resource count on the **Usage** page. ~> **Reserved tag keys are in beta**: We do not recommend using beta features in production environments. -You can define reserved tag keys that appear as suggested labels when managers want to add tags to their projects and workspaces in the organization. Refer to [Create and manage reserved tag keys](/terraform/cloud-docs/users-teams-organizations/organizations/manage-reserved-tags) for instructions. +You can define reserved tag keys that appear as suggested labels when managers want to add tags to their projects and workspaces in the organization. Refer to [Create and manage reserved tag keys](/terraform/cloud-docs/users-teams-organizations/organizations/manage-reserved-tags) for instructions. You can also view single-value tags that may already be attached to projects and workspaces. Refer to [Tags](#tags) in the organization settings reference for additional information. @@ -130,9 +130,9 @@ Click the **Tags** tab in the **Tags Management** screen to view single-value ta The only action you can perform in the UI is deleting single-value tags from the system. You can use the following methods to delete single-value tags: -1. Select one or more tags and click **Delete tags**. -1. Select the **Name** header to select all tags, then click **Delete tags**. -1. Click the trash icon for a tag and confirm that you want to permanently delete it when prompted. +1. Select one or more tags and click **Delete tags**. +1. Select the **Name** header to select all tags, then click **Delete tags**. +1. Click the trash icon for a tag and confirm that you want to permanently delete it when prompted. #### Teams @@ -140,7 +140,7 @@ The only action you can perform in the UI is deleting single-value tags from the @include 'tfc-package-callouts/team-management.mdx' -All users in an organization can access the **Teams** page, which displays a list of [teams][] within the organization. +All users in an organization can access the **Teams** page, which displays a list of [teams][] within the organization. Organization owners and users with the [include secret teams permission](/terraform/cloud-docs/users-teams-organizations/permissions#include-secret-teams) can: * view all [secret teams](/terraform/cloud-docs/users-teams-organizations/teams/manage#team-visibility) @@ -196,14 +196,14 @@ From the Workspaces page, click **Settings** in the sidebar, then **Runs** to vi - A button allowing you to cancel that run You can apply the following filters to limit the runs HCP Terraform displays: -- Click **Needs Attention** to display runs that require user input to continue, such as approving a plan or overriding a policy. +- Click **Needs Attention** to display runs that require user input to continue, such as approving a plan or overriding a policy. - Click **Running** to display runs that are in progress. - Click **On Hold** to display paused runs. For precise filtering, click **More filters** and check the boxes to filter runs by specific [run statuses](/terraform/cloud-docs/run/states), [run operations](/terraform/cloud-docs/run/modes-and-options), workspaces, or [agent pools](/terraform/cloud-docs/agents/agent-pools). Click **Apply filters** to list the runs that match your criteria. -You can dismiss any of your filtering criteria by clicking the **X** next to the filter name above the table displaying your runs. +You can dismiss any of your filtering criteria by clicking the **X** next to the filter name above the table displaying your runs. For more details about run states, refer to [Run States and Stages](/terraform/cloud-docs/run/states). @@ -219,7 +219,7 @@ Enable and disable the [cost estimation](/terraform/cloud-docs/cost-estimation) @include 'tfc-package-callouts/policies.mdx' -Policies let you define and enforce rules for Terraform runs. You can write them using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks and then group them into policy sets that you can apply to workspaces in your organization. To create policies and policy sets, you must have [permission to manage policies](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions). +Policies let you define and enforce rules for Terraform runs. You can write them using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks and then group them into policy sets that you can apply to workspaces in your organization. To create policies and policy sets, you must have [permission to manage policies](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions). #### Policy Sets From 734af0be534f62793ffef97e2c4719fceaa7bc44 Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Fri, 6 Jun 2025 17:26:40 -0700 Subject: [PATCH 08/11] Fix last link --- .../cloud-docs/policy-enforcement/manage-policy-sets/index.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx index ad00b788d7..80c06c773a 100644 --- a/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-docs-common/docs/cloud-docs/policy-enforcement/manage-policy-sets/index.mdx @@ -6,7 +6,7 @@ description: >- # Manage policies and policy sets in HCP Terraform -Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks. +Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/cloud-docs/policy-enforcement/opa) policy-as-code frameworks. From 97dc1e6a626b8084bf274fa3ab2dc01c893513fa Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Fri, 6 Jun 2025 17:30:45 -0700 Subject: [PATCH 09/11] Fix the enterprise redirects --- .../v202504-1/redirects.jsonc | 21 ++++++++++++------- .../v202505-1/redirects.jsonc | 21 ++++++++++++------- 2 files changed, 26 insertions(+), 16 deletions(-) diff --git a/content/terraform-enterprise/v202504-1/redirects.jsonc b/content/terraform-enterprise/v202504-1/redirects.jsonc index 5b17d05fe3..85bc63819f 100644 --- a/content/terraform-enterprise/v202504-1/redirects.jsonc +++ b/content/terraform-enterprise/v202504-1/redirects.jsonc @@ -737,43 +737,48 @@ // Policy enforcement changes related to pre-written Sentinel policies { "source": "/terraform/enterprise/policy-enforcement/sentinel", - "destination": "/terraform/enterprise/policy-enforcement/define-policies/sentinel", + "destination": "/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel", + "permanent": true + }, + { + "source": "/terraform/enterprise/policy-enforcement/define-policies/sentinel", + "destination": "/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel", "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/opa", "destination": "/terraform/enterprise/policy-enforcement/define-policies/opa", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/sentinel/vcs", "destination": "/terraform/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/opa/vcs", "destination": "/terraform/enterprise/policy-enforcement/manage-policy-sets/opa-vcs", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/policy-results", "destination": "/terraform/enterprise/policy-enforcement/view-results", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/sentinel/json", "destination": "/terraform/enterprise/policy-enforcement/view-results/json", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/sentinel/mock", "destination": "/terraform/enterprise/policy-enforcement/test-sentinel", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/sentinel/import/:slug", "destination": "/terraform/enterprise/policy-enforcement/import-reference/:slug", - "permanent": true + "permanent": true }, // Relocate pre-written Sentinel policies topic { diff --git a/content/terraform-enterprise/v202505-1/redirects.jsonc b/content/terraform-enterprise/v202505-1/redirects.jsonc index 5b17d05fe3..85bc63819f 100644 --- a/content/terraform-enterprise/v202505-1/redirects.jsonc +++ b/content/terraform-enterprise/v202505-1/redirects.jsonc @@ -737,43 +737,48 @@ // Policy enforcement changes related to pre-written Sentinel policies { "source": "/terraform/enterprise/policy-enforcement/sentinel", - "destination": "/terraform/enterprise/policy-enforcement/define-policies/sentinel", + "destination": "/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel", + "permanent": true + }, + { + "source": "/terraform/enterprise/policy-enforcement/define-policies/sentinel", + "destination": "/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel", "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/opa", "destination": "/terraform/enterprise/policy-enforcement/define-policies/opa", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/sentinel/vcs", "destination": "/terraform/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/opa/vcs", "destination": "/terraform/enterprise/policy-enforcement/manage-policy-sets/opa-vcs", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/policy-results", "destination": "/terraform/enterprise/policy-enforcement/view-results", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/sentinel/json", "destination": "/terraform/enterprise/policy-enforcement/view-results/json", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/sentinel/mock", "destination": "/terraform/enterprise/policy-enforcement/test-sentinel", - "permanent": true + "permanent": true }, { "source": "/terraform/enterprise/policy-enforcement/sentinel/import/:slug", "destination": "/terraform/enterprise/policy-enforcement/import-reference/:slug", - "permanent": true + "permanent": true }, // Relocate pre-written Sentinel policies topic { From 2b0c55c0716d07d8b0bf19abea25c7cccc2764a7 Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Fri, 6 Jun 2025 17:35:40 -0700 Subject: [PATCH 10/11] Fix links --- .../policy-enforcement/manage-policy-sets/index.mdx | 4 ++-- .../policy-enforcement/manage-policy-sets/index.mdx | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index c118eefe10..91f493869f 100644 --- a/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202504-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -8,7 +8,7 @@ source: terraform-docs-common # Manage policies and policy sets in HCP Terraform -Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/define-policies/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. +Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. @@ -127,7 +127,7 @@ To view and manage policy sets, go to the **Policy Sets** section of your organi The way you set up and configure a new policy set depends on your workflow and where you store policies. - For [managed policies](#managed-policies), you use the UI to create a policy set and add managed policies. -- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/define-policies/sentinel/vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. +- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. - For automated workflows like continuous deployment, you can use the UI to create an empty policy set and then use the [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to add policies. You can also use the API or the [`tfe` provider (Sentinel Only)](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/policy_set) to add an entire, packaged policy set. ### Create policy sets diff --git a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index fdf84b6510..9022b5893c 100644 --- a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -135,7 +135,7 @@ To view and manage policy sets, go to the **Policy Sets** section of your organi The way you set up and configure a new policy set depends on your workflow and where you store policies. - For [managed policies](#managed-policies), you use the UI to create a policy set and add managed policies. -- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/define-policies/sentinel/vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. +- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/policy-enforcement/manage-policy-sets/sentinel-vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. - For automated workflows like continuous deployment, you can use the UI to create an empty policy set and then use the [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to add policies. You can also use the API or the [`tfe` provider (Sentinel Only)](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/policy_set) to add an entire, packaged policy set. ### Create policy sets From 6fc4f018b92e98e5b9d9b9d757d0daff0abc83ef Mon Sep 17 00:00:00 2001 From: rkoron007 Date: Mon, 9 Jun 2025 09:17:51 -0700 Subject: [PATCH 11/11] Fix the last two links --- .../policy-enforcement/manage-policy-sets/index.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx index 9022b5893c..7c908921b4 100644 --- a/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx +++ b/content/terraform-enterprise/v202505-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -8,7 +8,7 @@ source: terraform-docs-common # Manage policies and policy sets in HCP Terraform -Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/define-policies/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. +Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. @@ -135,7 +135,7 @@ To view and manage policy sets, go to the **Policy Sets** section of your organi The way you set up and configure a new policy set depends on your workflow and where you store policies. - For [managed policies](#managed-policies), you use the UI to create a policy set and add managed policies. -- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/policy-enforcement/manage-policy-sets/sentinel-vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. +- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. - For automated workflows like continuous deployment, you can use the UI to create an empty policy set and then use the [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to add policies. You can also use the API or the [`tfe` provider (Sentinel Only)](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/policy_set) to add an entire, packaged policy set. ### Create policy sets