- Added
hide_skip_approvals
field to the info section. It dynamically controls "Skip Action Approvals" visibility.
- Fixed issue where policy incident would show incorrect
Days Until Expiration
for several resources
- Added ability to delete Azure certificates automatically or manually
- Several parameters altered to be more descriptive and human-readable
- Added ability to use Subscription filter as an allow or a deny list
- Added ability to filter resources by multiple tag key:value pairs
- Added ability to filter resources by region
- Added additional context to incident description
- Normalized incident export to be consistent with other policies
- Added human-readable recommendation to incident export
- Policy no longer raises new escalations if inconsequential metadata like tag values change
- Streamlined code for better readability and faster execution
- Added default value for parameters that do not require user input
- Fixed error where policy would fail completely when trying to access resources credential does not have access to. Policy will now simply skip these resources.
- Changed internal name of escalation code to ensure "Meta Policy" works as expected
- Renamed Subscription List parameter for consistency and accuracy
- Added logic required for "Meta Policy" use-cases
- Policy now requires a valid Flexera credential to facilitate "Meta Policy" use-cases
- Replaced the term whitelist with allowed list.
- Added
ignore_status [400,403,404]
for API calls to Azure API to ignore errors related to legacy subscription types
- Replaced references
github.com/rightscale/policy_templates
andgithub.com/flexera/policy_templates
withgithub.com/flexera-public/policy_templates
- updated README.md rightscale documentation links with docs.flexera documentation links
- Added subscription filter option and ability to specify Azure API endpoint
- Initial Release