Pulumi-policy

Latest version: v1.14.0

Safety actively analyzes 723200 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 4 of 4

0.2.0

- API changes to enable new types of policies (i.e. validating all resource in a stack) and passing
additional information to validation functions (https://github.com/pulumi/pulumi-policy/pull/131).

- `Policy.rules` is now `ResourceValidationPolicy.validateResource`.
- `typedRule` is now `validateTypedResource`.
- Policy violations are now reported through a `reportViolation` callback, rather than using asserts.
- A new `StackValidationPolicy` policy type is available for defining policies that check all resources
in a stack.
- Validation functions can now be async and return `Promise<void>`.

Example:

typescript
new PolicyPack("aws-policy-pack", {
policies: [{
name: "s3-no-public-read",
description: "Prohibits setting the publicRead or publicReadWrite permission on AWS S3 buckets.",
enforcementLevel: "mandatory",
validateResource: validateTypedResource(aws.s3.Bucket, (bucket, args, reportViolation) => {
if (bucket.acl === "public-read" || bucket.acl === "public-read-write") {
reportViolation(
"You cannot set public-read or public-read-write on an S3 bucket. " +
"Read more about ACLs here: https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html");
}
}),
}],
});


- Allow policies to deal with Pulumi secret values
(https://github.com/pulumi/pulumi-policy/pull/115).

0.1.1

- Make policy violation error messages two lines (https://github.com/pulumi/pulumi-policy/pull/95).
- Fix polarity issue in policy violation reports (https://github.com/pulumi/pulumi-policy/pull/95).

0.1.0

- Add initial Policy server.

Page 4 of 4

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.