Announcing Terraform 0.12 Beta 1
We’d like to invite the community to try the first Terraform 0.12 Beta release. This release includes major Terraform language improvements and a tool for automatically upgrading most aspects of your existing configuration to work with 0.12.
To get started, we recommend you download the release tagged terraform_0.12.0-beta1. From here you can review the HCL language changes and write a new configuration, or take an existing configuration and try the terraform 0.12upgrade
command. Then dive into a plan and see what the diff looks like.
Some things to note:
-
Please note that this is a pre-release build and so it may still contain bugs. Please do not use it against your production infrastructure.
-
The configuration upgrade tool covers a number of common cases we've found during testing, but may not cover all cases. Please let us know if you find any situations it doesn't handle, with as much detail as possible.
-
Provider releases for v0.12 compatibility are ongoing, so when using
terraform init
you will find some providers that are not yet compatible. If theinit
command tells you the provider isn’t supported yet, you can try installing the provided development snapshots as third-party providers. These may have some bugs while the team works hard to update them. Provider support will improve in future beta releases. When a provider is officially supported it will be available viaterraform init
.
We’re extremely keen to hear your feedback. If you run into an issue, please file a new Bug Report in GitHub. Please check the 0.12 milestone before filing to see if your issue has already been reported.
Sign up for the latest HashiCorp news
More blog posts like this one

Build secure, AI-driven workflows with Terraform and Vault MCP servers
At AWS Summit New York, HashiCorp introduced new capabilities that bring Terraform, Vault, and Vault Radar into the age of AI agents — advancing secure, automated infrastructure through composable, agentic systems.

Terraform without writing code: How to build self-service with no-code modules
Terraform no-code modules are an advanced infrastructure as code best practice that helps everyone in the org use standard, approved modules, even if you don’t know Terraform.

Helvetia’s journey building an enterprise serverless product with Terraform
What started as a basic compliance challenge for one team at Helvetia Insurance evolved into a comprehensive enterprise solution for running self-managed installations like a cloud service, using Terraform to manage a serverless architecture.