Terraform Enterprise v202402-1 (759)
Last required release: v202304-1 (692)
Flexible Deployment Options terraform-enterprise
container digest: amd64/linux sha256:295dbf7b87e6fefde292ba752df1d3b4870eeca17f38d149277d1676a2d2d9ab
Known Issue
- [Updated April 16, 2024] If you set the maximum run time on the site admin page to be longer than 24 hours, Terraform Enterprise will not trigger runs on this release version. Configure your maximum run time to 24 hours or less.
- [Updated April 15, 2024] The backup and restore API may create incomplete backups for Terraform Enterprise installations using the mounted disk operational mode. We recommend backing up your data directories using alternative means until we fix this issue. We plan to resolve this issue in the v202404-1 release.
- [Updated March 15, 2024] Customers that use special characters in their database password may be unable to start Terraform Enterprise. Updating the password to remove special characters will allow the application to start. The issue is being investigated, and this known issue will be updated with more information once a fix is identified.
- [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to our support article.
Deprecations
Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026.
To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by November 2024. For more information, check out Flexible Deployment Options or contact your HashiCorp account representative.
Features
- Added a new post-apply stage to the run task workflow. This stage lets you seamlessly incorporate post-provisioning tasks, which automates configuration management, compliance checks, and other post-deployment activities.
- Terraform Enterprise now reports product usage data insights to HashiCorp (resources under management). For more information, including how to opt out, see [product usage data reporting[(/terraform/enterprise/flexible-deployments/admin/license#enable-product-usage-reporting.
Improvements
- Added a timeout to an internal job, preventing a situation where a job could get stuck and have to be force canceled. If this time out is reached, an
ActiveRecord::QueryCanceled
exception will be raised causing the job to fail and be subject to the job's retry policy (if any). - Update Sentinel to 0.24.1, bringing some lower level runtime improvements.
- The
tfrun
import will now correctly decodenull
values from the provided configuration asnull
values within policy code. - Improved performance of the admin users list UI.
- Improved performance of the list workspace variables API endpoint.
- Updated and improved the agent pool settings page UI.
- Warnings starting with the line "Initialization autoloaded the constants" have been addressed and will no longer appear in log output
- Flexible patch versions of Terraform can now be selected in the workspace settings, allowing you to easily select the latest patch version of a terraform minor release.
Bug Fixes
- We fixed a bug where Terraform attempted to render soft-deleted state versions in the state version viewer, resulting in false errors. The state version viewer now renders an informative error message instead of attempting to render the diff for a soft-deleted state version.
- We fixed an issue in the web app where the footer was consistently overflowing the page content.
- We fixed an issue where Terraform was unable to list commits for branch-based registry modules from Azure DevOps.
- Fixes a bug where changing steps in the Reauthorization of an OAuth Client flow results in the deletion of the connection.
- Warnings starting with the line "Initialization autoloaded the constants" have been addressed and will no longer appear in log output
- Module filters will now remain selected and results will show based on an
OR
filter.
Security
- Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies.