Add init-time policy evaluation#38519
Draft
dsa0x wants to merge 1 commit intopolicy-pr4-cli-backendfrom
Draft
Conversation
Contributor
Changelog WarningCurrently this PR would target a v1.16 release. Please add a changelog entry for in the .changes/v1.16 folder, or discuss which release you'd like to target with your reviewer. If you believe this change does not need a changelog entry, please add the 'no-changelog-needed' label. |
3b37dea to
20ce6af
Compare
943bd66 to
49366dd
Compare
20ce6af to
0cd9be4
Compare
49366dd to
93f20ff
Compare
0cd9be4 to
a60d49a
Compare
This was referenced May 5, 2026
93f20ff to
33b149a
Compare
a60d49a to
01c69f8
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This is part of a stacked series to upstream the policy work in smaller, reviewable pieces:
This PR adds policy evaluation during
terraform init. That includes evaluating policy during module installation and provider installation, wiring the init flow through the policy client, and adding the init-specific view/test support needed to surface policy outcomes correctly in that stage of execution.Contrary to the plan/apply workflow, policy failures during init would result in a non-zero exit of the terraform command.
Included here
initwdhook changes needed to support policy checks during module installationTarget Release
1.16.x
Rollback Plan
Changes to Security Controls
Are there any changes to security controls (access controls, encryption, logging) in this pull request? If so, explain.
CHANGELOG entry