github.com/hugorut/terraform@v1.1.3/website/docs/language/v1-compatibility-promises.mdx (about)

     1  ---
     2  page_title: Terraform v1.0 Compatibility Promises
     3  description: |-
     4    From Terraform v1.0 onwards the Terraform team promises to preserve backward
     5    compatibility for most of the Terraform language and the primary CLI
     6    workflow, until the next major release.
     7  ---
     8  
     9  # Terraform v1.0 Compatibility Promises
    10  
    11  The release of Terraform v1.0 represents an important milestone in the
    12  development of the Terraform language and workflow. Terraform v1.0 is a stable
    13  platform for describing and managing infrastructure.
    14  
    15  In this release we're defining a number of Terraform behaviors that we intend
    16  to remain compatible with throughout the 1.x releases:
    17  
    18  * A large subset of Terraform language features.
    19  * A more conservative subset of the Terraform CLI workflow commands.
    20  * The wire protocol for communication between Terraform Core and Terraform
    21    providers.
    22  * The wire protocols for installation of Terraform providers and external
    23    Terraform modules.
    24  
    25  Our intention is that Terraform modules written for Terraform v1.0 will
    26  continue to plan and apply successfully, without required changes, throughout
    27  the v1.x releases.
    28  
    29  We also intend that automation built around the workflow subset described in
    30  this document will work without changes in all future v1.x releases.
    31  
    32  Finally, we intend that providers built against the currently-documented
    33  provider wire protocol will be compatible with all future Terraform v1.x
    34  releases targeting the same operating system and architecture, without the
    35  need for source code modification or binary recompilation.
    36  
    37  In short, we aim to make upgrades between v1.x releases straightforward,
    38  requiring no changes to your configuration, no extra commands to run upgrade
    39  steps, and no changes to any automation you've set up around Terraform.
    40  
    41  The Terraform v1.x series will be actively maintained for at least 18 months
    42  after v1.0.
    43  
    44  The following sections include some specific guidance on what we will promise
    45  throughout the v1.x series, for those who would like full details. At
    46  a higher level though, we don't intend to make any changes that would cause
    47  existing modules or automation to require changes when upgrading to a new
    48  v1.x release. We will generally treat compatibility problems in new Terraform
    49  CLI releases as bugs to be fixed unless there was a very significant
    50  justification for the change, such as in addressing a critical security
    51  problem or matching with a breaking change to a remote dependency that isn't
    52  directly under our control.
    53  
    54  ## The Terraform Language
    55  
    56  The main Terraform Language includes the language syntax, the top-level
    57  structures such as `resource`, `module`, and `provider` blocks, the
    58  "meta-arguments" in those blocks, and the documented semantics and behaviors
    59  for the operators and built-in functions available for use in expressions.
    60  
    61  There is not a single formal specification for the Terraform language, but the
    62  Configuration section of the documentation on the Terraform website serves as a
    63  description of the language features and their intended behaviors.
    64  
    65  The following top-level blocks and their defined "meta-arguments" (that is,
    66  arguments defined by Terraform Core rather than by external plugins such as
    67  providers) will retain their current functionality:
    68  
    69  * [`resource`](/language/resources) and
    70    [`data`](/language/data-sources) blocks to
    71    declare resources, including their nested block types `lifecycle`,
    72    `connection`, and `provisioner`, and their meta-argument `provider`.
    73  * [`module`](/language/modules/syntax) blocks to call other modules,
    74    and its meta-argument `providers`.
    75  * The [`count`](/language/meta-arguments/count),
    76    [`for_each`](/language/meta-arguments/for_each), and
    77    [`depends_on`](/language/meta-arguments/depends_on) meta-arguments
    78    in `resource`, `data`, and `module` blocks.
    79  * [`provider`](/language/providers/configuration) blocks to configure
    80    providers, and the `alias` meta-argument.
    81  * [`variable`](/language/values/variables#declaring-an-input-variable),
    82    [`output`](/language/values/outputs#declaring-an-output-value), and
    83    [`locals`](/language/values/locals#declaring-a-local-value) blocks
    84    for declaring the various kinds of named values in a module.
    85  * [`terraform`](/language/settings) blocks, including the nested
    86    [`required_version`](/language/settings#specifying-a-required-terraform-version)
    87    and
    88    [`required_providers`](/language/providers/requirements#requiring-providers)
    89    arguments, and nested
    90    [`backend`](/language/settings/backends/configuration#using-a-backend-block)
    91    blocks for backend configuration.
    92  
    93  We also intend to keep compatibility with all
    94  [expression operators](/language/expressions) and
    95  [built-in functions](/language/functions), with the exception of
    96  references to
    97  [`terraform.workspace`](/language/expressions/references#terraform-workspace),
    98  whose behavior may change as part of future changes to the workspace model.
    99  
   100  We intend to retain broad compatibility with Terraform language features, with
   101  a few specific caveats:
   102  
   103  * We consider a configuration to be valid if Terraform can create and apply
   104    a plan for it without reporting any errors.
   105  
   106    A configuration that currently produces errors might generate different
   107    errors or exhibit other non-error behaviors in a future version of
   108    Terraform. A configuration that generates errors during the apply phase
   109    might generate similar errors at an earlier phase in future, because
   110    we generally consider it better to detect errors in as early a phase as
   111    possible.
   112  
   113    Generally-speaking, the compatibility promises described in this document
   114    apply only to valid configurations. Handling of invalid configurations is
   115    always subject to change in future Terraform releases.
   116  * If the actual behavior of a feature differs from what we explicitly
   117    documented as the feature's behavior, we will usually treat that as a bug
   118    and change the feature to match the documentation, although we will avoid
   119    making such changes if they seem likely to cause broad compatibility problems.
   120    We cannot promise to always remain "bug-compatible" with previous releases,
   121    but we will consider such fixes carefully to minimize their impact.
   122  * Any experimental features may change or may be removed entirely from future
   123    releases. Terraform always produces a warning when an experimental language
   124    feature is active, to make you aware of that risk. We don't recommend using
   125    experimental features in production modules.
   126  * We will introduce new language features, and if you start using them then
   127    your configuration won't work with prior Terraform versions that didn't
   128    support those features yet.
   129  * Terraform Providers are separate plugins which can change independently of
   130    Terraform Core and are therefore not subject to these compatibility promises.
   131    If you upgrade any of the providers you are using then you might need to
   132    change provider or resource configurations related to those providers.
   133  * A small number of features remain deprecated with explicit warnings in
   134    Terraform v1.0. Those deprecation cycles will end in a future v1.x release,
   135    at which point we will remove the corresponding features.
   136  
   137  ## Workflow
   138  
   139  There is a set of often used Terraform workflows, which we are calling
   140  _protected workflows_. We will not remove these commands, subcommands, and
   141  flags or make backward-incompatible changes to protected workflow
   142  functionality. If we accidentally change these, we will consider
   143  backwards-incompatible changes to core workflows as bugs to be fixed. For a
   144  list of the command and option combinations that are part of protected
   145  workflows, see [Protected Workflow Commands](#protected-workflow-commands).
   146  There is another set of commands that we are explicitly _not_ making
   147  compatibility promises about, because we expect their functionality to change
   148  in v1.x releases: see [Commands That Might Change](#commands-that-might-change).
   149  
   150  The supported ways for external software to interact with Terraform are via
   151  the JSON output modes offered by some commands and via exit status codes.
   152  We may extend certain JSON formats with new object properties but we will not
   153  remove or make breaking changes to the definitions of existing properties.
   154  
   155  Natural language command output or log output is not a stable interface and
   156  may change in any new version. If you write software that parses this output
   157  then it may need to be updated when you upgrade Terraform. If you need access
   158  to data that is not currently available via one of the machine-readable JSON
   159  interfaces, we suggest opening a feature request to discuss your use-case.
   160  
   161  ## Upgrading and Downgrading
   162  
   163  Throughout the v1.x series of releases, we intend that you should be able to
   164  switch to a newer Terraform version and use it just as before, without any
   165  special upgrade steps.
   166  
   167  You should be able to upgrade from any v1.x release to any later v1.x release.
   168  You might also be able to downgrade to an earlier v1.x release, but that isn't
   169  guaranteed: later releases may introduce new features that earlier versions
   170  cannot understand, including new storage formats for Terraform state snapshots.
   171  
   172  If you make use of features introduced in a later v1.x release, your
   173  configuration won't be compatible with releases that predate that feature.
   174  For example, if a language feature is added in v1.3 and you start using it, your
   175  Terraform configuration will no longer be compatible with Terraform v1.2.
   176  
   177  ## Providers
   178  
   179  Terraform providers are separate plugins which communicate with Terraform using
   180  a documented protocol. Therefore these compatibility promises can only cover
   181  the "client" side of this protocol as implemented by Terraform Core; the
   182  behaviors of individual providers, including which resource types they support
   183  and which arguments they expect, are decided by the provider development teams
   184  and can change independently of Terraform Core releases.
   185  
   186  If you upgrade to a new version of a provider then you might need to change
   187  the parts of your configuration which are interpreted by that provider, even
   188  if you are still using a Terraform v1.x release.
   189  
   190  ### Provider Installation Methods
   191  
   192  Terraform normally installs providers from a provider registry implementing
   193  [the Provider Registry Protocol](/internals/provider-registry-protocol),
   194  version 1. All Terraform v1.x releases will remain compatible with that
   195  protocol, and so correctly-implemented provider registries will stay compatible.
   196  
   197  Terraform also supports installation of providers from
   198  [local filesystem directories](/cli/config/config-file#filesystem_mirror)
   199  (filesystem mirrors) and from
   200  [network mirrors](/cli/config/config-file#network_mirror)
   201  (implementing [the Provider Mirror Protocol](/internals/provider-network-mirror-protocol).
   202  All Terraform v1.x releases will remain compatible with those installation
   203  methods, including
   204  [the Implied Local Mirror Directories](/cli/config/config-file#implied-local-mirror-directories).
   205  
   206  Specific provider registries or network mirrors are run independently from
   207  Terraform itself and so their own behaviors are not subject to these
   208  compatibility promises.
   209  
   210  ### Provider Protocol Versions
   211  
   212  The current major version of the provider plugin protocol as of Terraform v1.0
   213  is version 5, which is defined by a combination of a Protocol Buffers schema
   214  describing the physical wire formats and by additional prose documentation
   215  describing the expected provider behaviors.
   216  
   217  We will support protocol version 5 throughout the Terraform v1.x releases. If
   218  we make new minor revisions to protocol version 5 in later releases then we
   219  will design them such that existing plugins will continue to work, as long as
   220  they correctly implemented the protocol.
   221  
   222  We may introduce new major versions of the protocol during the v1.x series. If
   223  so, we will continue to support protocol version 5 alongside those new versions.
   224  Individual provider teams might decide to remove support for protocol version 5
   225  in later releases, in which case those new provider releases will not be
   226  compatible with all of the Terraform v1.x releases.
   227  
   228  ## External Modules
   229  
   230  Terraform modules are reusable infrastructure components written in the
   231  Terraform language. Some modules are "external" in the sense that Terraform
   232  automatically installs them from a location other than the current
   233  configuration directory, in which case their contents could change
   234  independently of changes to your local modules, of the providers you use,
   235  and of Terraform itself.
   236  
   237  ### Module Installation Methods
   238  
   239  Terraform supports installing child modules from a number of different
   240  [module source types](/language/modules/sources). We will continue
   241  to support all of the existing source types throughout the v1.x releases.
   242  
   243  One of the supported source types is a module registry implementing
   244  [the Module Registry Protocol](/internals/module-registry-protocol)
   245  version 1. All Terraform v1.x releases will remain compatible with correct
   246  implementations of that protocol.
   247  
   248  Some module source types work directly with services or protocols defined and
   249  run by third parties. Although we will not remove Terraform's own client-side
   250  support for those, we cannot guarantee that their owners will keep those
   251  services running or that they will remain compatible with Terraform's client
   252  implementations.
   253  
   254  ### External Module Compatibility
   255  
   256  If your configuration depends on external modules, newer versions of those
   257  modules may include breaking changes. External modules are not part of
   258  Terraform and are therefore not subject to these compatibility promises.
   259  
   260  ## Provisioners
   261  
   262  We will maintain compatibility for the `file`, `local-exec`, and `remote-exec`
   263  provisioner types through all v1.x releases.
   264  
   265  Some additional vendor-specific provisioners were available in earlier
   266  Terraform versions but were deprecated in Terraform v0.13 and removed in
   267  Terraform v0.15.
   268  
   269  Terraform supports loading additional provisioners as plugins from certain
   270  local filesystem directories. We'll continue to support that throughout the
   271  Terraform v1.x releases, but since such plugins are separate from Terraform
   272  Core itself their own behaviors cannot be subject to these compatibility
   273  promises. However, we will continue to support the plugin wire protocol as
   274  defined in Terraform v1.0 throughout the v1.x releases, and so
   275  correctly-implemented provisioner plugins should remain compatible with future
   276  Terraform releases.
   277  
   278  ## State Storage Backends
   279  
   280  When you use _remote state_, Terraform interacts with remote services over
   281  the network in order to store and manage locks for Terraform state.
   282  
   283  For historical reasons, all supported state storage backends are included as
   284  part of Terraform CLI but not all are supported directly by the Terraform
   285  Team. Only the following backends maintained by the Terraform team are subject
   286  to compatibility promises:
   287  
   288  * `local` (the default, when you are not using remote state)
   289  * `http`
   290  
   291  The other state storage backends are maintained by external teams via
   292  contributions to the Terraform CLI codebase, and so their expected
   293  configuration arguments or behaviors might change even in v1.x releases,
   294  although we will aim to still ensure a good migration path in such cases,
   295  where possible.
   296  
   297  We are considering allowing external state storage backend implementations
   298  via plugins, similar to provider plugins. If we introduce such a mechanism
   299  during the v1.x releases then you may need to make configuration changes in
   300  order to use those plugins, and state storage backends other than those
   301  listed above may be removed from later versions of Terraform CLI once
   302  equivalent plugins are available.
   303  
   304  ### The `remote` Backend and Terraform Cloud
   305  
   306  The `remote` backend is maintained by the Terraform Cloud team and so its
   307  behavior may change along with ongoing changes to Terraform Cloud.
   308  
   309  There will be a supported mechanism to use Terraform CLI with Terraform Cloud
   310  throughout the v1.x releases, but the exact details may change. Terraform Cloud
   311  evolves independently of Terraform CLI and is therefore not subject to these
   312  compatibility promises.
   313  
   314  ## Community-maintained State Storage Backends
   315  
   316  The `azurerm`, `consul`, `s3`, and `kubernetes` backends are maintained by
   317  other teams at HashiCorp. Those teams intend to continue basic maintenence at
   318  the level of bug fixes through the v1.x releases, unless we implement a plugin
   319  protocol for backends at which point development of these backends is likely
   320  to continue in the external plugins only, which may require configuration
   321  changes to switch to the plugin equivalents.
   322  
   323  The `cos`, `oss`, `pg`, `gcs`, and `etcdv3` backends are maintained by outside
   324  contributors and are not subject to these compatibility promises.
   325  
   326  ### Unmaintained State Storage Backends
   327  
   328  The `artifactory`, `etcdv2`, `manta`, and `swift` state storage backends do not
   329  currently have any maintainers and thus remain in Terraform CLI releases on
   330  a best-effort basis. They may be removed in later v1.x releases, and will not
   331  be updated in case of any breaking changes to the services they integrate with.
   332  
   333  ## Supported Platforms
   334  
   335  Throughout the v1.x series we will continue to produce official releases for
   336  the following platforms, and make changes as necessary to support new
   337  releases of these operating systems:
   338  
   339  * macOS on x64 CPUs (`darwin_amd64`)
   340  * Windows on x64 CPUs (`windows_amd64`)
   341  * Linux on x64, 32-bit ARMv6, and 64-bit ARMv8 (`linux_amd64`, `linux_arm`, and `linux_arm64` respectively)
   342  
   343  Over time we may require newer versions of these operating systems. For
   344  example, subsequent Terraform releases in the v1.x series might end support
   345  for earlier versions of macOS or Windows, or earlier Linux kernel releases.
   346  
   347  We have historically produced official releases for a number of other platforms
   348  as a convenience to users of those platforms, and we have no current plans to
   349  stop publishing them but we cannot promise ongoing releases or bug fixes for
   350  the other platforms throughout the v1.x series. We do not routinely test
   351  Terraform on any platforms other than those listed above.
   352  
   353  We might add support for new platforms in later v1.x releases. If so, earlier
   354  Terraform releases prior to that support will not be available on those
   355  platforms.
   356  
   357  All Terraform plugins, including provider plugins, are separate programs that
   358  have their own policies for which platforms they support. We cannot guarantee
   359  that all providers currently support or will continue to support the platforms
   360  listed above, even though Terraform CLI itself will support them.
   361  
   362  ## Later Revisions to These Promises
   363  
   364  We may extend or refine these promises throughout the v1.x series in order to
   365  describe promises related to new features or to clarify existing promises if
   366  we find via feedback that our earlier statements had been unclear.
   367  
   368  Promises for new features will be additive in the sense that they will add
   369  further promises without retracting any existing ones. For promises that only
   370  apply to later v1.x releases we will mention the earliest version(s) those
   371  promises apply to.
   372  
   373  Even if we don't add an explicit statement to this document, we intend that
   374  any non-experimental features added in later v1.x releases will remain
   375  compatible at least through the remainder of the v1.x series, unless otherwise
   376  stated.
   377  
   378  ## Appendices
   379  
   380  ### Protected Workflow Commands
   381  
   382  The following is the list of Terraform CLI subcommands and options that are
   383  subject to these compatibility promises. If you build automation around
   384  these commands then it should be compatible with all later v1.x releases.
   385  
   386  As noted above, compatibility with external software is limited to
   387  explicitly-machine-readable output (`-json` and `-raw` modes) and exit codes.
   388  Any natural-language output from these commands might change in later releases.
   389  
   390  * [`init`](/cli/commands/init)
   391    * `-backend=false`
   392    * `-backend-config=FILE`
   393    * `-backend-config="KEY=VALUE"`
   394    * `-force-copy`
   395    * `-get=false`
   396    * `-input=false`
   397    * `-migrate-state`
   398    * `-no-color`
   399    * `-plugin-dir=DIR`
   400    * `-reconfigure`
   401    * `-upgrade`
   402  * [`validate`](/cli/commands/validate)
   403    * `-json`
   404    * `-no-color`
   405  * [`plan`](/cli/commands/plan)
   406    * `-compact-warnings`
   407    * `-destroy`
   408    * `-detailed-exitcode`
   409    * `-lock=false`
   410    * `-lock-timeout=DURATION`
   411    * `-input=false`
   412    * `-json`
   413    * `-no-color`
   414    * `-out=FILE`
   415    * `-parallelism=N`
   416    * `-refresh=false`
   417    * `-refresh-only`
   418    * `-replace=ADDRESS`
   419    * `-target=ADDRESS`
   420    * `-var 'NAME=VALUE'`
   421    * `-var-file=FILE`
   422  * [`apply`](/cli/commands/apply)
   423    * `-auto-approve`
   424    * `-compact-warnings`
   425    * `-lock=false`
   426    * `-lock-timeout=DURATION`
   427    * `-input=false`
   428    * `-json`
   429    * `-no-color`
   430    * `-parallelism=N`
   431    * `-refresh=false`
   432    * `-refresh-only`
   433    * `-replace=ADDRESS`
   434    * `-target=ADDRESS`
   435    * `-var 'NAME=VALUE'`
   436    * `-var-file=FILE`
   437  * [`show`](/cli/commands/show)
   438    * `-no-color`
   439    * `-json`
   440    * (both with and without a plan file)
   441  * [`providers`](/cli/commands/providers) (with no subcommand)
   442  * [`providers lock`](/cli/commands/providers/lock)
   443    * `-fs-mirror=PATH`
   444    * `-net-mirror=URL`
   445    * `-platform=OS_ARCH`
   446  * [`providers mirror`](/cli/commands/providers/mirror)
   447    * `-platform=OS_ARCH`
   448  * [`providers schema`](/cli/commands/providers/schema)
   449    * `-json`
   450  * [`fmt`](/cli/commands/fmt)
   451    * `-list=false`
   452    * `-write=false`
   453    * `-diff`
   454    * `-recursive`
   455    * `-check`
   456  * [`version`](/cli/commands/version)
   457    * `-json`
   458  * [`output`](/cli/commands/output)
   459    * `-no-color`
   460    * `-json`
   461    * `-raw`
   462  * [`taint`](/cli/commands/taint)
   463    * `-allow-missing`
   464    * `-lock=false`
   465    * `-lock-timeout=DURATION`
   466    * `-ignore-remote-version`
   467  * [`untaint`](/cli/commands/untaint)
   468    * `-allow-missing`
   469    * `-lock=false`
   470    * `-lock-timeout=DURATION`
   471    * `-ignore-remote-version`
   472  * [`force-unlock`](/cli/commands/force-unlock)
   473    * `-force`
   474  * [`state list`](/cli/commands/state/list)
   475    * `-id=ID`
   476  * [`state pull`](/cli/commands/state/pull)
   477  * [`state push`](/cli/commands/state/push)
   478    * `-force`
   479    * `-lock=false`
   480    * `-lock-timeout=DURATION`
   481  * [`state show`](/cli/commands/state/show)
   482    * `-ignore-remote-version`
   483  * [`login`](/cli/commands/login)
   484  
   485  For commands or options not in the above list, we will still avoid breaking
   486  changes where possible, but can't promise full compatibility throughout the
   487  v1.x series. If you are building automation around Terraform, use only the
   488  commands above to avoid the need for changes when upgrading.
   489  
   490  Please note that although Terraform's internal logs (via the `TF_LOG`
   491  environment variable) are available in a JSON format, the particular syntax
   492  or structure of those log lines is _not_ a supported integration interface.
   493  The logs are available as JSON only to help with ad-hoc filtering and
   494  processing of logs by Terraform developers.
   495  
   496  ### Commands That Might Change
   497  
   498  All of the following commands and their subcommands/options are _not_ subject
   499  to compatibility promises, either because we have existing plans to improve
   500  them during the v1.x series or because we are aware of shortcomings in their
   501  design that might require breaking changes for ongoing maintenence.
   502  
   503  While you can freely use these commands when running Terraform interactively
   504  as long as they remain supported, we don't recommend using them as part of
   505  any automation unless you are willing to potentially update that automation
   506  when upgrading to a later v1.x release.
   507  
   508  * `destroy` (consider `terraform apply -destroy` instead)
   509  * `console`
   510  * `get` (consider `terraform init` instead)
   511  * `graph`
   512  * `import`
   513  * `push`
   514  * `refresh` (consider `terraform apply -refresh-only` instead)
   515  * `state mv`
   516  * `state replace-provider`
   517  * `state rm`
   518  * all subcommands of `workspace` (and its deprecated alias `env`)
   519  
   520  While we do intend to retain support for the main use-cases associated with
   521  these commands in future releases, we cannot promise to retain the exact
   522  command names or options used to meet those use-cases.
   523  
   524  ## How We Will Keep These Promises
   525  
   526  ### Automated Regression Testing
   527  
   528  The Terraform codebase includes various unit and integration tests intended to
   529  help us to notice accidental behavior regressions before they ship in a stable
   530  version.
   531  
   532  However, Terraform is a relatively complex system with many different features
   533  that can interact in interesting ways. In the past we've seen reports of
   534  behavior differences that appeared only when combining two or more features in
   535  a way we hadn't previously anticipated or written automated tests for.
   536  
   537  In each case we have both implemented a change to resolve the compatibility
   538  problem _and_ added one or more integration tests representing the behavior
   539  of that combination of features. We intend to continue this approach, so we can
   540  improve Terraform's test coverage over time.
   541  
   542  ### Prerelease Versions
   543  
   544  We intend that most accidental changes in behavior covered by these promises
   545  will be caught by existing tests. However, we also accept that our test suite
   546  can never have perfect coverage of all possible feature interactions or other
   547  edge cases, and so we aim for each significant change to be included in both
   548  alpha and beta releases before eventual inclusion in a final release.
   549  
   550  For minor releases we will typically also issue at least one release candidate
   551  prior to the final release. A release candidate represents that planned
   552  development is concluded and that we've fixed any regressions reported based
   553  on the alpha and beta releases, and thus the final release that follows should
   554  typically match exactly or almost exactly its most recent release candidate.
   555  
   556  ### Regressions in Final Releases
   557  
   558  For more obscure combinations of features it is possible that a regression
   559  could be undetected during prerelease the prerelease periods and thus included
   560  in a final release.
   561  
   562  If someone finds and reports such a regression soon after its release then we
   563  will treat it as a bug and fix it to restore the previous behavior in future
   564  releases, unless there is a very significant justification such as a security
   565  advisory. In these cases, we'll typically recommend anyone affected by the
   566  regression remain on the previous version until the problem is fixed and then
   567  skip forward directly to the new release containing that fix.
   568  
   569  You can minimize the risk of being affected by missed regressions in final
   570  releases by proactively testing modules against alpha, beta, and release
   571  candidate packages. We recommend doing so only in isolated development or
   572  staging environments rather than against your production infrastructure. If you
   573  find a change in behavior in a prerelease build that seems contrary to the
   574  promises in this document, please open an issue in Terraform's GitHub
   575  repository to discuss it.
   576  
   577  ### Late-reported Regressions
   578  
   579  In the most extreme case, there may be a regression with a combination of
   580  features that is so rare that it remains undetected for a long time.
   581  
   582  After a change has been included in more releases it becomes increasingly
   583  likely that other users will have depended on the newer behavior and thus we
   584  will need to make a tradeoff to decide whether restoring the behavior would
   585  have a greater negative impact than retaining the new behavior. We will always
   586  make this decision with due consideration to the implications of each unique
   587  situation.
   588  
   589  You can minimize the risk of your modules being affected by late-reported
   590  regressions by upgrading promptly to new minor and patch releases of Terraform
   591  and reporting any compatibility problems you encounter in Terraform's GitHub
   592  repository.
   593  
   594  ### Pragmatic Exceptions
   595  
   596  We are making the promises above in good faith, with the intent that your
   597  investment in writing Terraform modules or automation will not be invalidated
   598  by future changes to Terraform. However, broad promises like the above can't
   599  possibly cover all nuances of practical problems that might arise as we
   600  continue to develop Terraform.
   601  
   602  For that reason, there are some situations where we may still need to make
   603  changes that may impact existing modules or automation:
   604  
   605  * Security problems: We may become aware of a design problem that has an
   606    important security impact. Depending on our determination of the associated
   607    risk, we may choose to break compatibility to achieve a more secure system.
   608  * External Dependencies: Terraform's behavior depends on interfaces provided
   609    by external codebases, including your chosen operating system and including
   610    some remote network services for situations such as module and provider
   611    installation. These external systems can change outside of our control,
   612    including potentially removing or changing features that Terraform's own
   613    features depend on. In that case, if there is no suitable replacement
   614    mechanism then we may need to change Terraform's design to work within the
   615    new constraints.
   616  * Opt-in Compatibility Breaks: The design of a language new feature may require
   617    changing the behavior or configuration representation of an existing feature.
   618    If so, we will typically make the new feature opt-in only in order to avoid
   619    breaking existing modules, but if you change your module to opt in to the
   620    new feature then you may also then be required to change other parts of your
   621    configuration to work with the new language design.
   622  * Bugs in New Features: If we introduce a new feature to Terraform and the
   623    initial implementation has problems that cause it to not match the documented
   624    design intent at release, we may make a follow-up release that corrects
   625    the implementation to match the documented design, even if that represents
   626    a minor compatibility regression compared to the initial implementation.
   627    However, once a feature is well-established and in common use we will usually
   628    defer to the implemented behavior and instead change the documentation to
   629    reflect it.
   630  * Regressions in Existing Features: If we learn that a new Terraform release
   631    includes a regression for an existing feature that wasn't detected during
   632    the development and prerelease periods, and that learning comes promptly
   633    after the new release, we will typically restore the previous behavior at
   634    the expense of technically therefore breaking compatibility with the behavior
   635    of the new release, under the assumption that more users will have systems
   636    affected by the regression than will have systems depending on the
   637    newly-introduced behavior.
   638  * Late-reported regressions: As described in the previous section, if we
   639    learn that there was an unintentional regression of a rarely-used feature or
   640    combination of features in a much earlier release then restoring the previous
   641    behavior may appear as a regression to later adopters. If we believe that
   642    fixing the regression would affect more users than the regression itself
   643    affects then we may choose to accept the regression as the new promised
   644    behavior.
   645  * Situations we cannot anticipate: Although we've made an effort to consider
   646    various specific exceptional situations here, Terraform and its development
   647    process are not isolated from broader context, and so we must consider that
   648    there may be situations that we cannot possibly anticipate that would affect
   649    the future of Terraform. In those situations, we will always do our best to
   650    find a course of action that will minimize as much as possible the impact to
   651    existing modules and automation.
   652  
   653  Our intent with these pragmatic exceptions is only to acknowledge that there
   654  will always be situations that general compatibility promises cannot address.
   655  We will use these exceptions only with due consideration and as a last resort.