github.com/hugorut/terraform@v1.1.3/website/docs/language/v1-compatibility-promises.mdx (about) 1 --- 2 page_title: Terraform v1.0 Compatibility Promises 3 description: |- 4 From Terraform v1.0 onwards the Terraform team promises to preserve backward 5 compatibility for most of the Terraform language and the primary CLI 6 workflow, until the next major release. 7 --- 8 9 # Terraform v1.0 Compatibility Promises 10 11 The release of Terraform v1.0 represents an important milestone in the 12 development of the Terraform language and workflow. Terraform v1.0 is a stable 13 platform for describing and managing infrastructure. 14 15 In this release we're defining a number of Terraform behaviors that we intend 16 to remain compatible with throughout the 1.x releases: 17 18 * A large subset of Terraform language features. 19 * A more conservative subset of the Terraform CLI workflow commands. 20 * The wire protocol for communication between Terraform Core and Terraform 21 providers. 22 * The wire protocols for installation of Terraform providers and external 23 Terraform modules. 24 25 Our intention is that Terraform modules written for Terraform v1.0 will 26 continue to plan and apply successfully, without required changes, throughout 27 the v1.x releases. 28 29 We also intend that automation built around the workflow subset described in 30 this document will work without changes in all future v1.x releases. 31 32 Finally, we intend that providers built against the currently-documented 33 provider wire protocol will be compatible with all future Terraform v1.x 34 releases targeting the same operating system and architecture, without the 35 need for source code modification or binary recompilation. 36 37 In short, we aim to make upgrades between v1.x releases straightforward, 38 requiring no changes to your configuration, no extra commands to run upgrade 39 steps, and no changes to any automation you've set up around Terraform. 40 41 The Terraform v1.x series will be actively maintained for at least 18 months 42 after v1.0. 43 44 The following sections include some specific guidance on what we will promise 45 throughout the v1.x series, for those who would like full details. At 46 a higher level though, we don't intend to make any changes that would cause 47 existing modules or automation to require changes when upgrading to a new 48 v1.x release. We will generally treat compatibility problems in new Terraform 49 CLI releases as bugs to be fixed unless there was a very significant 50 justification for the change, such as in addressing a critical security 51 problem or matching with a breaking change to a remote dependency that isn't 52 directly under our control. 53 54 ## The Terraform Language 55 56 The main Terraform Language includes the language syntax, the top-level 57 structures such as `resource`, `module`, and `provider` blocks, the 58 "meta-arguments" in those blocks, and the documented semantics and behaviors 59 for the operators and built-in functions available for use in expressions. 60 61 There is not a single formal specification for the Terraform language, but the 62 Configuration section of the documentation on the Terraform website serves as a 63 description of the language features and their intended behaviors. 64 65 The following top-level blocks and their defined "meta-arguments" (that is, 66 arguments defined by Terraform Core rather than by external plugins such as 67 providers) will retain their current functionality: 68 69 * [`resource`](/language/resources) and 70 [`data`](/language/data-sources) blocks to 71 declare resources, including their nested block types `lifecycle`, 72 `connection`, and `provisioner`, and their meta-argument `provider`. 73 * [`module`](/language/modules/syntax) blocks to call other modules, 74 and its meta-argument `providers`. 75 * The [`count`](/language/meta-arguments/count), 76 [`for_each`](/language/meta-arguments/for_each), and 77 [`depends_on`](/language/meta-arguments/depends_on) meta-arguments 78 in `resource`, `data`, and `module` blocks. 79 * [`provider`](/language/providers/configuration) blocks to configure 80 providers, and the `alias` meta-argument. 81 * [`variable`](/language/values/variables#declaring-an-input-variable), 82 [`output`](/language/values/outputs#declaring-an-output-value), and 83 [`locals`](/language/values/locals#declaring-a-local-value) blocks 84 for declaring the various kinds of named values in a module. 85 * [`terraform`](/language/settings) blocks, including the nested 86 [`required_version`](/language/settings#specifying-a-required-terraform-version) 87 and 88 [`required_providers`](/language/providers/requirements#requiring-providers) 89 arguments, and nested 90 [`backend`](/language/settings/backends/configuration#using-a-backend-block) 91 blocks for backend configuration. 92 93 We also intend to keep compatibility with all 94 [expression operators](/language/expressions) and 95 [built-in functions](/language/functions), with the exception of 96 references to 97 [`terraform.workspace`](/language/expressions/references#terraform-workspace), 98 whose behavior may change as part of future changes to the workspace model. 99 100 We intend to retain broad compatibility with Terraform language features, with 101 a few specific caveats: 102 103 * We consider a configuration to be valid if Terraform can create and apply 104 a plan for it without reporting any errors. 105 106 A configuration that currently produces errors might generate different 107 errors or exhibit other non-error behaviors in a future version of 108 Terraform. A configuration that generates errors during the apply phase 109 might generate similar errors at an earlier phase in future, because 110 we generally consider it better to detect errors in as early a phase as 111 possible. 112 113 Generally-speaking, the compatibility promises described in this document 114 apply only to valid configurations. Handling of invalid configurations is 115 always subject to change in future Terraform releases. 116 * If the actual behavior of a feature differs from what we explicitly 117 documented as the feature's behavior, we will usually treat that as a bug 118 and change the feature to match the documentation, although we will avoid 119 making such changes if they seem likely to cause broad compatibility problems. 120 We cannot promise to always remain "bug-compatible" with previous releases, 121 but we will consider such fixes carefully to minimize their impact. 122 * Any experimental features may change or may be removed entirely from future 123 releases. Terraform always produces a warning when an experimental language 124 feature is active, to make you aware of that risk. We don't recommend using 125 experimental features in production modules. 126 * We will introduce new language features, and if you start using them then 127 your configuration won't work with prior Terraform versions that didn't 128 support those features yet. 129 * Terraform Providers are separate plugins which can change independently of 130 Terraform Core and are therefore not subject to these compatibility promises. 131 If you upgrade any of the providers you are using then you might need to 132 change provider or resource configurations related to those providers. 133 * A small number of features remain deprecated with explicit warnings in 134 Terraform v1.0. Those deprecation cycles will end in a future v1.x release, 135 at which point we will remove the corresponding features. 136 137 ## Workflow 138 139 There is a set of often used Terraform workflows, which we are calling 140 _protected workflows_. We will not remove these commands, subcommands, and 141 flags or make backward-incompatible changes to protected workflow 142 functionality. If we accidentally change these, we will consider 143 backwards-incompatible changes to core workflows as bugs to be fixed. For a 144 list of the command and option combinations that are part of protected 145 workflows, see [Protected Workflow Commands](#protected-workflow-commands). 146 There is another set of commands that we are explicitly _not_ making 147 compatibility promises about, because we expect their functionality to change 148 in v1.x releases: see [Commands That Might Change](#commands-that-might-change). 149 150 The supported ways for external software to interact with Terraform are via 151 the JSON output modes offered by some commands and via exit status codes. 152 We may extend certain JSON formats with new object properties but we will not 153 remove or make breaking changes to the definitions of existing properties. 154 155 Natural language command output or log output is not a stable interface and 156 may change in any new version. If you write software that parses this output 157 then it may need to be updated when you upgrade Terraform. If you need access 158 to data that is not currently available via one of the machine-readable JSON 159 interfaces, we suggest opening a feature request to discuss your use-case. 160 161 ## Upgrading and Downgrading 162 163 Throughout the v1.x series of releases, we intend that you should be able to 164 switch to a newer Terraform version and use it just as before, without any 165 special upgrade steps. 166 167 You should be able to upgrade from any v1.x release to any later v1.x release. 168 You might also be able to downgrade to an earlier v1.x release, but that isn't 169 guaranteed: later releases may introduce new features that earlier versions 170 cannot understand, including new storage formats for Terraform state snapshots. 171 172 If you make use of features introduced in a later v1.x release, your 173 configuration won't be compatible with releases that predate that feature. 174 For example, if a language feature is added in v1.3 and you start using it, your 175 Terraform configuration will no longer be compatible with Terraform v1.2. 176 177 ## Providers 178 179 Terraform providers are separate plugins which communicate with Terraform using 180 a documented protocol. Therefore these compatibility promises can only cover 181 the "client" side of this protocol as implemented by Terraform Core; the 182 behaviors of individual providers, including which resource types they support 183 and which arguments they expect, are decided by the provider development teams 184 and can change independently of Terraform Core releases. 185 186 If you upgrade to a new version of a provider then you might need to change 187 the parts of your configuration which are interpreted by that provider, even 188 if you are still using a Terraform v1.x release. 189 190 ### Provider Installation Methods 191 192 Terraform normally installs providers from a provider registry implementing 193 [the Provider Registry Protocol](/internals/provider-registry-protocol), 194 version 1. All Terraform v1.x releases will remain compatible with that 195 protocol, and so correctly-implemented provider registries will stay compatible. 196 197 Terraform also supports installation of providers from 198 [local filesystem directories](/cli/config/config-file#filesystem_mirror) 199 (filesystem mirrors) and from 200 [network mirrors](/cli/config/config-file#network_mirror) 201 (implementing [the Provider Mirror Protocol](/internals/provider-network-mirror-protocol). 202 All Terraform v1.x releases will remain compatible with those installation 203 methods, including 204 [the Implied Local Mirror Directories](/cli/config/config-file#implied-local-mirror-directories). 205 206 Specific provider registries or network mirrors are run independently from 207 Terraform itself and so their own behaviors are not subject to these 208 compatibility promises. 209 210 ### Provider Protocol Versions 211 212 The current major version of the provider plugin protocol as of Terraform v1.0 213 is version 5, which is defined by a combination of a Protocol Buffers schema 214 describing the physical wire formats and by additional prose documentation 215 describing the expected provider behaviors. 216 217 We will support protocol version 5 throughout the Terraform v1.x releases. If 218 we make new minor revisions to protocol version 5 in later releases then we 219 will design them such that existing plugins will continue to work, as long as 220 they correctly implemented the protocol. 221 222 We may introduce new major versions of the protocol during the v1.x series. If 223 so, we will continue to support protocol version 5 alongside those new versions. 224 Individual provider teams might decide to remove support for protocol version 5 225 in later releases, in which case those new provider releases will not be 226 compatible with all of the Terraform v1.x releases. 227 228 ## External Modules 229 230 Terraform modules are reusable infrastructure components written in the 231 Terraform language. Some modules are "external" in the sense that Terraform 232 automatically installs them from a location other than the current 233 configuration directory, in which case their contents could change 234 independently of changes to your local modules, of the providers you use, 235 and of Terraform itself. 236 237 ### Module Installation Methods 238 239 Terraform supports installing child modules from a number of different 240 [module source types](/language/modules/sources). We will continue 241 to support all of the existing source types throughout the v1.x releases. 242 243 One of the supported source types is a module registry implementing 244 [the Module Registry Protocol](/internals/module-registry-protocol) 245 version 1. All Terraform v1.x releases will remain compatible with correct 246 implementations of that protocol. 247 248 Some module source types work directly with services or protocols defined and 249 run by third parties. Although we will not remove Terraform's own client-side 250 support for those, we cannot guarantee that their owners will keep those 251 services running or that they will remain compatible with Terraform's client 252 implementations. 253 254 ### External Module Compatibility 255 256 If your configuration depends on external modules, newer versions of those 257 modules may include breaking changes. External modules are not part of 258 Terraform and are therefore not subject to these compatibility promises. 259 260 ## Provisioners 261 262 We will maintain compatibility for the `file`, `local-exec`, and `remote-exec` 263 provisioner types through all v1.x releases. 264 265 Some additional vendor-specific provisioners were available in earlier 266 Terraform versions but were deprecated in Terraform v0.13 and removed in 267 Terraform v0.15. 268 269 Terraform supports loading additional provisioners as plugins from certain 270 local filesystem directories. We'll continue to support that throughout the 271 Terraform v1.x releases, but since such plugins are separate from Terraform 272 Core itself their own behaviors cannot be subject to these compatibility 273 promises. However, we will continue to support the plugin wire protocol as 274 defined in Terraform v1.0 throughout the v1.x releases, and so 275 correctly-implemented provisioner plugins should remain compatible with future 276 Terraform releases. 277 278 ## State Storage Backends 279 280 When you use _remote state_, Terraform interacts with remote services over 281 the network in order to store and manage locks for Terraform state. 282 283 For historical reasons, all supported state storage backends are included as 284 part of Terraform CLI but not all are supported directly by the Terraform 285 Team. Only the following backends maintained by the Terraform team are subject 286 to compatibility promises: 287 288 * `local` (the default, when you are not using remote state) 289 * `http` 290 291 The other state storage backends are maintained by external teams via 292 contributions to the Terraform CLI codebase, and so their expected 293 configuration arguments or behaviors might change even in v1.x releases, 294 although we will aim to still ensure a good migration path in such cases, 295 where possible. 296 297 We are considering allowing external state storage backend implementations 298 via plugins, similar to provider plugins. If we introduce such a mechanism 299 during the v1.x releases then you may need to make configuration changes in 300 order to use those plugins, and state storage backends other than those 301 listed above may be removed from later versions of Terraform CLI once 302 equivalent plugins are available. 303 304 ### The `remote` Backend and Terraform Cloud 305 306 The `remote` backend is maintained by the Terraform Cloud team and so its 307 behavior may change along with ongoing changes to Terraform Cloud. 308 309 There will be a supported mechanism to use Terraform CLI with Terraform Cloud 310 throughout the v1.x releases, but the exact details may change. Terraform Cloud 311 evolves independently of Terraform CLI and is therefore not subject to these 312 compatibility promises. 313 314 ## Community-maintained State Storage Backends 315 316 The `azurerm`, `consul`, `s3`, and `kubernetes` backends are maintained by 317 other teams at HashiCorp. Those teams intend to continue basic maintenence at 318 the level of bug fixes through the v1.x releases, unless we implement a plugin 319 protocol for backends at which point development of these backends is likely 320 to continue in the external plugins only, which may require configuration 321 changes to switch to the plugin equivalents. 322 323 The `cos`, `oss`, `pg`, `gcs`, and `etcdv3` backends are maintained by outside 324 contributors and are not subject to these compatibility promises. 325 326 ### Unmaintained State Storage Backends 327 328 The `artifactory`, `etcdv2`, `manta`, and `swift` state storage backends do not 329 currently have any maintainers and thus remain in Terraform CLI releases on 330 a best-effort basis. They may be removed in later v1.x releases, and will not 331 be updated in case of any breaking changes to the services they integrate with. 332 333 ## Supported Platforms 334 335 Throughout the v1.x series we will continue to produce official releases for 336 the following platforms, and make changes as necessary to support new 337 releases of these operating systems: 338 339 * macOS on x64 CPUs (`darwin_amd64`) 340 * Windows on x64 CPUs (`windows_amd64`) 341 * Linux on x64, 32-bit ARMv6, and 64-bit ARMv8 (`linux_amd64`, `linux_arm`, and `linux_arm64` respectively) 342 343 Over time we may require newer versions of these operating systems. For 344 example, subsequent Terraform releases in the v1.x series might end support 345 for earlier versions of macOS or Windows, or earlier Linux kernel releases. 346 347 We have historically produced official releases for a number of other platforms 348 as a convenience to users of those platforms, and we have no current plans to 349 stop publishing them but we cannot promise ongoing releases or bug fixes for 350 the other platforms throughout the v1.x series. We do not routinely test 351 Terraform on any platforms other than those listed above. 352 353 We might add support for new platforms in later v1.x releases. If so, earlier 354 Terraform releases prior to that support will not be available on those 355 platforms. 356 357 All Terraform plugins, including provider plugins, are separate programs that 358 have their own policies for which platforms they support. We cannot guarantee 359 that all providers currently support or will continue to support the platforms 360 listed above, even though Terraform CLI itself will support them. 361 362 ## Later Revisions to These Promises 363 364 We may extend or refine these promises throughout the v1.x series in order to 365 describe promises related to new features or to clarify existing promises if 366 we find via feedback that our earlier statements had been unclear. 367 368 Promises for new features will be additive in the sense that they will add 369 further promises without retracting any existing ones. For promises that only 370 apply to later v1.x releases we will mention the earliest version(s) those 371 promises apply to. 372 373 Even if we don't add an explicit statement to this document, we intend that 374 any non-experimental features added in later v1.x releases will remain 375 compatible at least through the remainder of the v1.x series, unless otherwise 376 stated. 377 378 ## Appendices 379 380 ### Protected Workflow Commands 381 382 The following is the list of Terraform CLI subcommands and options that are 383 subject to these compatibility promises. If you build automation around 384 these commands then it should be compatible with all later v1.x releases. 385 386 As noted above, compatibility with external software is limited to 387 explicitly-machine-readable output (`-json` and `-raw` modes) and exit codes. 388 Any natural-language output from these commands might change in later releases. 389 390 * [`init`](/cli/commands/init) 391 * `-backend=false` 392 * `-backend-config=FILE` 393 * `-backend-config="KEY=VALUE"` 394 * `-force-copy` 395 * `-get=false` 396 * `-input=false` 397 * `-migrate-state` 398 * `-no-color` 399 * `-plugin-dir=DIR` 400 * `-reconfigure` 401 * `-upgrade` 402 * [`validate`](/cli/commands/validate) 403 * `-json` 404 * `-no-color` 405 * [`plan`](/cli/commands/plan) 406 * `-compact-warnings` 407 * `-destroy` 408 * `-detailed-exitcode` 409 * `-lock=false` 410 * `-lock-timeout=DURATION` 411 * `-input=false` 412 * `-json` 413 * `-no-color` 414 * `-out=FILE` 415 * `-parallelism=N` 416 * `-refresh=false` 417 * `-refresh-only` 418 * `-replace=ADDRESS` 419 * `-target=ADDRESS` 420 * `-var 'NAME=VALUE'` 421 * `-var-file=FILE` 422 * [`apply`](/cli/commands/apply) 423 * `-auto-approve` 424 * `-compact-warnings` 425 * `-lock=false` 426 * `-lock-timeout=DURATION` 427 * `-input=false` 428 * `-json` 429 * `-no-color` 430 * `-parallelism=N` 431 * `-refresh=false` 432 * `-refresh-only` 433 * `-replace=ADDRESS` 434 * `-target=ADDRESS` 435 * `-var 'NAME=VALUE'` 436 * `-var-file=FILE` 437 * [`show`](/cli/commands/show) 438 * `-no-color` 439 * `-json` 440 * (both with and without a plan file) 441 * [`providers`](/cli/commands/providers) (with no subcommand) 442 * [`providers lock`](/cli/commands/providers/lock) 443 * `-fs-mirror=PATH` 444 * `-net-mirror=URL` 445 * `-platform=OS_ARCH` 446 * [`providers mirror`](/cli/commands/providers/mirror) 447 * `-platform=OS_ARCH` 448 * [`providers schema`](/cli/commands/providers/schema) 449 * `-json` 450 * [`fmt`](/cli/commands/fmt) 451 * `-list=false` 452 * `-write=false` 453 * `-diff` 454 * `-recursive` 455 * `-check` 456 * [`version`](/cli/commands/version) 457 * `-json` 458 * [`output`](/cli/commands/output) 459 * `-no-color` 460 * `-json` 461 * `-raw` 462 * [`taint`](/cli/commands/taint) 463 * `-allow-missing` 464 * `-lock=false` 465 * `-lock-timeout=DURATION` 466 * `-ignore-remote-version` 467 * [`untaint`](/cli/commands/untaint) 468 * `-allow-missing` 469 * `-lock=false` 470 * `-lock-timeout=DURATION` 471 * `-ignore-remote-version` 472 * [`force-unlock`](/cli/commands/force-unlock) 473 * `-force` 474 * [`state list`](/cli/commands/state/list) 475 * `-id=ID` 476 * [`state pull`](/cli/commands/state/pull) 477 * [`state push`](/cli/commands/state/push) 478 * `-force` 479 * `-lock=false` 480 * `-lock-timeout=DURATION` 481 * [`state show`](/cli/commands/state/show) 482 * `-ignore-remote-version` 483 * [`login`](/cli/commands/login) 484 485 For commands or options not in the above list, we will still avoid breaking 486 changes where possible, but can't promise full compatibility throughout the 487 v1.x series. If you are building automation around Terraform, use only the 488 commands above to avoid the need for changes when upgrading. 489 490 Please note that although Terraform's internal logs (via the `TF_LOG` 491 environment variable) are available in a JSON format, the particular syntax 492 or structure of those log lines is _not_ a supported integration interface. 493 The logs are available as JSON only to help with ad-hoc filtering and 494 processing of logs by Terraform developers. 495 496 ### Commands That Might Change 497 498 All of the following commands and their subcommands/options are _not_ subject 499 to compatibility promises, either because we have existing plans to improve 500 them during the v1.x series or because we are aware of shortcomings in their 501 design that might require breaking changes for ongoing maintenence. 502 503 While you can freely use these commands when running Terraform interactively 504 as long as they remain supported, we don't recommend using them as part of 505 any automation unless you are willing to potentially update that automation 506 when upgrading to a later v1.x release. 507 508 * `destroy` (consider `terraform apply -destroy` instead) 509 * `console` 510 * `get` (consider `terraform init` instead) 511 * `graph` 512 * `import` 513 * `push` 514 * `refresh` (consider `terraform apply -refresh-only` instead) 515 * `state mv` 516 * `state replace-provider` 517 * `state rm` 518 * all subcommands of `workspace` (and its deprecated alias `env`) 519 520 While we do intend to retain support for the main use-cases associated with 521 these commands in future releases, we cannot promise to retain the exact 522 command names or options used to meet those use-cases. 523 524 ## How We Will Keep These Promises 525 526 ### Automated Regression Testing 527 528 The Terraform codebase includes various unit and integration tests intended to 529 help us to notice accidental behavior regressions before they ship in a stable 530 version. 531 532 However, Terraform is a relatively complex system with many different features 533 that can interact in interesting ways. In the past we've seen reports of 534 behavior differences that appeared only when combining two or more features in 535 a way we hadn't previously anticipated or written automated tests for. 536 537 In each case we have both implemented a change to resolve the compatibility 538 problem _and_ added one or more integration tests representing the behavior 539 of that combination of features. We intend to continue this approach, so we can 540 improve Terraform's test coverage over time. 541 542 ### Prerelease Versions 543 544 We intend that most accidental changes in behavior covered by these promises 545 will be caught by existing tests. However, we also accept that our test suite 546 can never have perfect coverage of all possible feature interactions or other 547 edge cases, and so we aim for each significant change to be included in both 548 alpha and beta releases before eventual inclusion in a final release. 549 550 For minor releases we will typically also issue at least one release candidate 551 prior to the final release. A release candidate represents that planned 552 development is concluded and that we've fixed any regressions reported based 553 on the alpha and beta releases, and thus the final release that follows should 554 typically match exactly or almost exactly its most recent release candidate. 555 556 ### Regressions in Final Releases 557 558 For more obscure combinations of features it is possible that a regression 559 could be undetected during prerelease the prerelease periods and thus included 560 in a final release. 561 562 If someone finds and reports such a regression soon after its release then we 563 will treat it as a bug and fix it to restore the previous behavior in future 564 releases, unless there is a very significant justification such as a security 565 advisory. In these cases, we'll typically recommend anyone affected by the 566 regression remain on the previous version until the problem is fixed and then 567 skip forward directly to the new release containing that fix. 568 569 You can minimize the risk of being affected by missed regressions in final 570 releases by proactively testing modules against alpha, beta, and release 571 candidate packages. We recommend doing so only in isolated development or 572 staging environments rather than against your production infrastructure. If you 573 find a change in behavior in a prerelease build that seems contrary to the 574 promises in this document, please open an issue in Terraform's GitHub 575 repository to discuss it. 576 577 ### Late-reported Regressions 578 579 In the most extreme case, there may be a regression with a combination of 580 features that is so rare that it remains undetected for a long time. 581 582 After a change has been included in more releases it becomes increasingly 583 likely that other users will have depended on the newer behavior and thus we 584 will need to make a tradeoff to decide whether restoring the behavior would 585 have a greater negative impact than retaining the new behavior. We will always 586 make this decision with due consideration to the implications of each unique 587 situation. 588 589 You can minimize the risk of your modules being affected by late-reported 590 regressions by upgrading promptly to new minor and patch releases of Terraform 591 and reporting any compatibility problems you encounter in Terraform's GitHub 592 repository. 593 594 ### Pragmatic Exceptions 595 596 We are making the promises above in good faith, with the intent that your 597 investment in writing Terraform modules or automation will not be invalidated 598 by future changes to Terraform. However, broad promises like the above can't 599 possibly cover all nuances of practical problems that might arise as we 600 continue to develop Terraform. 601 602 For that reason, there are some situations where we may still need to make 603 changes that may impact existing modules or automation: 604 605 * Security problems: We may become aware of a design problem that has an 606 important security impact. Depending on our determination of the associated 607 risk, we may choose to break compatibility to achieve a more secure system. 608 * External Dependencies: Terraform's behavior depends on interfaces provided 609 by external codebases, including your chosen operating system and including 610 some remote network services for situations such as module and provider 611 installation. These external systems can change outside of our control, 612 including potentially removing or changing features that Terraform's own 613 features depend on. In that case, if there is no suitable replacement 614 mechanism then we may need to change Terraform's design to work within the 615 new constraints. 616 * Opt-in Compatibility Breaks: The design of a language new feature may require 617 changing the behavior or configuration representation of an existing feature. 618 If so, we will typically make the new feature opt-in only in order to avoid 619 breaking existing modules, but if you change your module to opt in to the 620 new feature then you may also then be required to change other parts of your 621 configuration to work with the new language design. 622 * Bugs in New Features: If we introduce a new feature to Terraform and the 623 initial implementation has problems that cause it to not match the documented 624 design intent at release, we may make a follow-up release that corrects 625 the implementation to match the documented design, even if that represents 626 a minor compatibility regression compared to the initial implementation. 627 However, once a feature is well-established and in common use we will usually 628 defer to the implemented behavior and instead change the documentation to 629 reflect it. 630 * Regressions in Existing Features: If we learn that a new Terraform release 631 includes a regression for an existing feature that wasn't detected during 632 the development and prerelease periods, and that learning comes promptly 633 after the new release, we will typically restore the previous behavior at 634 the expense of technically therefore breaking compatibility with the behavior 635 of the new release, under the assumption that more users will have systems 636 affected by the regression than will have systems depending on the 637 newly-introduced behavior. 638 * Late-reported regressions: As described in the previous section, if we 639 learn that there was an unintentional regression of a rarely-used feature or 640 combination of features in a much earlier release then restoring the previous 641 behavior may appear as a regression to later adopters. If we believe that 642 fixing the regression would affect more users than the regression itself 643 affects then we may choose to accept the regression as the new promised 644 behavior. 645 * Situations we cannot anticipate: Although we've made an effort to consider 646 various specific exceptional situations here, Terraform and its development 647 process are not isolated from broader context, and so we must consider that 648 there may be situations that we cannot possibly anticipate that would affect 649 the future of Terraform. In those situations, we will always do our best to 650 find a course of action that will minimize as much as possible the impact to 651 existing modules and automation. 652 653 Our intent with these pragmatic exceptions is only to acknowledge that there 654 will always be situations that general compatibility promises cannot address. 655 We will use these exceptions only with due consideration and as a last resort.