Announcing Terraform 0.12 Beta 1
We’d like to invite the community to try the first Terraform 0.12 Beta release. This release includes major Terraform language improvements and a tool for automatically upgrading most aspects of your existing configuration to work with 0.12.
To get started, we recommend you download the release tagged terraform_0.12.0-beta1. From here you can review the HCL language changes and write a new configuration, or take an existing configuration and try the terraform 0.12upgrade
command. Then dive into a plan and see what the diff looks like.
Some things to note:
-
Please note that this is a pre-release build and so it may still contain bugs. Please do not use it against your production infrastructure.
-
The configuration upgrade tool covers a number of common cases we've found during testing, but may not cover all cases. Please let us know if you find any situations it doesn't handle, with as much detail as possible.
-
Provider releases for v0.12 compatibility are ongoing, so when using
terraform init
you will find some providers that are not yet compatible. If theinit
command tells you the provider isn’t supported yet, you can try installing the provided development snapshots as third-party providers. These may have some bugs while the team works hard to update them. Provider support will improve in future beta releases. When a provider is officially supported it will be available viaterraform init
.
We’re extremely keen to hear your feedback. If you run into an issue, please file a new Bug Report in GitHub. Please check the 0.12 milestone before filing to see if your issue has already been reported.
Sign up for the latest HashiCorp news
More blog posts like this one
![Terraform extension for VS Code speeds up loading of large workspaces](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714155806-blog-library-product-terraform-dark-gradient.jpg&w=3840&q=75)
Terraform extension for VS Code speeds up loading of large workspaces
New releases of the HashiCorp Terraform extension for Visual Studio Code and Terraform language server significantly reduce memory usage and start up time for large workspaces.
![Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1572286031-vault-terraform-background.png&w=1920&q=75)
Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?
Learn how HCP Terraform and Terraform Enterprise users can use Vault-backed dynamic credentials to secure their infrastructure during provisioning better than the base-level dynamic provider credentials.
![HCP Terraform adds granular API access for audit trails](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714170900-blog-library-product-hcp-terraform-dark.jpg&w=3840&q=75)
HCP Terraform adds granular API access for audit trails
HCP Terraform eliminates the need to rely on organization permissions to the audit trails endpoint, streamlining permissions workflows and reducing risk.