Terraform
Terraform Enterprise v202502-1 (808)
Last required release: v202406-1 (776)
Flexible Deployment Options terraform-enterprise
container digest: amd64/linux sha256:c0b547bcbc29a561936dc6b088253eeb728329da0f3e4b6db5a374b59710c24f
Breaking Changes
- Terraform Enterprise no longer supports Postgres 12.
Deprecations
- Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but bug and security fixes backports will not be available after March.
- As part of improving support for HA Postgres installations, the following configuration options are deprecated and will be removed in the May 2025 release:
TFE_DATABASE_RECONNECT_ENABLED
,TFE_DATABASE_RECONNECT_MAX_RETRIES
,TFE_DATABASE_RECONNECT_INTERVAL
, andTFE_DATABASE_RECONNECT_TIMEOUT
.
Highlights
- This release introduces project-owned variable sets. Users with project Write, Maintain, Admin, or custom variable set permissions can create and manage variable sets within a project without requiring organization-level permissions.
- You can now set auto-destroy settings at a project level, letting you automatically destroy workspace infrastructure in a project after a period of inactivity.
Features
- You can add a secondary hostname in Terraform Enterprise and specify whether to use the
primary
orsecondary
hostname for OIDC integration. - Module authors can now deprecate module versions in the private registry. Deprecating a module version in your organization’s private registry adds warnings to the module's registry page.
- You can now select Enable Debugging mode when enqueuing a run for quick access to trace level Terraform logging.
Improvements
- User input is now obfuscated while typing sensitive variables and notification tokens, enhancing security, particularly during screen sharing.
- Terraform Enterprise will now automatically attempt to unseal the internal Vault server if it unexpectedly enters a sealed state. This change has no impact on Terraform Enterprise running with an external Vault server.
- No-code workspaces now inform users of a pending user action, such as a policy override, and direct users to the run page for further action.
Bug Fixes
- Fixes an issue with cost estimation where unexpected AWS RDS instance types could cause the cost estimate to fail.
- Fixes a permissions bug where teams with organization permission View all workspaces could not view workspace outputs.
- Fixes variable set limitation issue and significantly improves performance for the workspaces-variable page.