2017-10-31 01:34:42 +01:00
|
|
|
---
|
|
|
|
layout: "downloads"
|
|
|
|
page_title: "Upgrading to Terraform 0.11"
|
|
|
|
sidebar_current: "upgrade-guides-0-11"
|
|
|
|
description: |-
|
|
|
|
Upgrading to Terraform v0.11
|
|
|
|
---
|
|
|
|
|
|
|
|
# Upgrading to Terraform v0.11
|
|
|
|
|
|
|
|
Terraform v0.11 is a major release and thus includes some changes that
|
|
|
|
you'll need to consider when upgrading. This guide is intended to help with
|
|
|
|
that process.
|
|
|
|
|
|
|
|
The goal of this guide is to cover the most common upgrade concerns and
|
|
|
|
issues that would benefit from more explanation and background. The exhaustive
|
|
|
|
list of changes will always be the
|
|
|
|
[Terraform Changelog](https://github.com/hashicorp/terraform/blob/master/CHANGELOG.md).
|
|
|
|
After reviewing this guide, we recommend reviewing the Changelog to check on
|
|
|
|
specific notes about the resources and providers you use.
|
|
|
|
|
|
|
|
This guide focuses on changes from v0.10 to v0.11. Each previous major release
|
|
|
|
has its own upgrade guide, so please consult the other guides (available
|
|
|
|
in the navigation) if you are upgrading directly from an earlier version.
|
|
|
|
|
|
|
|
## Interactive Approval in `terraform apply`
|
|
|
|
|
|
|
|
Terraform 0.10 introduced a new mode for `terraform apply` (when run without
|
|
|
|
an explicit plan file) where it would show a plan and prompt for approval
|
|
|
|
before proceeding, similar to `terraform destroy`.
|
|
|
|
|
|
|
|
Terraform 0.11 adopts this as the default behavior for this command, which
|
|
|
|
means that for interactive use in a terminal it is not necessary to separately
|
|
|
|
run `terraform plan -out=...` to safely review and apply a plan.
|
|
|
|
|
|
|
|
The new behavior also has the additional advantage that, when using a backend
|
|
|
|
that supports locking, the state lock will be held throughout the refresh,
|
|
|
|
plan, confirmation and apply steps, ensuring that a concurrent execution
|
|
|
|
of `terraform apply` will not invalidate the execution plan.
|
|
|
|
|
|
|
|
A consequence of this change is that `terraform apply` is now interactive by
|
|
|
|
default unless a plan file is provided on the command line. When
|
|
|
|
[running Terraform in automation](/guides/running-terraform-in-automation.html)
|
|
|
|
it is always recommended to separate plan from apply, but if existing automation
|
|
|
|
was running `terraform apply` with no arguments it may now be necessary to
|
|
|
|
update it to either generate an explicit plan using `terraform plan -out=...`
|
|
|
|
or to run `terraform apply -auto-approve` to bypass the interactive confirmation
|
|
|
|
step. The latter should be done only in unimportant environments.
|
|
|
|
|
|
|
|
**Action:** For interactive use in a terminal, prefer to use `terraform apply`
|
|
|
|
with out an explicit plan argument rather than `terraform plan -out=tfplan`
|
|
|
|
followed by `terraform apply tfplan`.
|
|
|
|
|
|
|
|
**Action:** Update any automation scripts that run Terraform non-interactively
|
|
|
|
so that they either use separated plan and apply or override the confirmation
|
|
|
|
behavior using the `-auto-approve` option.
|
|
|
|
|
|
|
|
## Relative Paths in Module `source`
|
|
|
|
|
|
|
|
Terraform 0.11 introduces full support for module installation from
|
|
|
|
[Terraform Registry](https://registry.terraform.io/) as well as other
|
|
|
|
private, in-house registries using concise module source strings like
|
|
|
|
`hashicorp/consul/aws`.
|
|
|
|
|
|
|
|
As a consequence, module source strings like `"child"` are no longer
|
|
|
|
interpreted as relative paths. Instead, relative paths must be expressed
|
|
|
|
explicitly by beginning the string with either `./` (for a module in a child
|
|
|
|
directory) or `../` (for a module in the parent directory).
|
|
|
|
|
|
|
|
**Action:** Update existing module `source` values containing relative paths
|
|
|
|
to start eith either `./` or `../` to prevent misinterpretation of the source
|
|
|
|
as a Terraform Registry module.
|
|
|
|
|
|
|
|
## Interactions Between Providers and Modules
|
|
|
|
|
|
|
|
Prior to Terraform 0.11 there were several limitations in deficiencies in
|
|
|
|
how providers interact with child modules, such as:
|
|
|
|
|
|
|
|
* Ancestor module provider configurations always overrode the associated
|
|
|
|
settings in descendent modules.
|
|
|
|
|
|
|
|
* There was no well-defined mechanism for passing "aliased" providers from
|
|
|
|
an ancestor module to a descendent, where the descendent needs access to
|
|
|
|
multiple provider instances.
|
|
|
|
|
|
|
|
Terraform 0.11 changes some of the details of how each resource block is
|
|
|
|
associated with a provider configuration, which may change how Terraform
|
|
|
|
interprets existing configurations. This is notably true in the following
|
|
|
|
situations:
|
|
|
|
|
|
|
|
* If the same provider is configured in both an ancestor and a descendent
|
|
|
|
module, the ancestor configuration no longer overrides attributes from
|
|
|
|
the descendent and the descendent no longer inherits attributes from
|
|
|
|
its ancestor. Instead, each configuration is entirely distinct.
|
|
|
|
|
|
|
|
* Only unaliased provider configurations can be automatically inherited from
|
|
|
|
ancestor modules. Aliased providers must be passed explicitly using
|
|
|
|
[the new `providers` attribute](/docs/modules/usage.html#providers-within-modules).
|
|
|
|
|
|
|
|
* When a module containing its own `provider` blocks is removed from its
|
|
|
|
parent module, Terraform will no longer attempt to associate it with
|
|
|
|
another provider of the same name in a parent module, since that would
|
|
|
|
often cause undesirable effects such as attempting to refresh resources
|
|
|
|
in the wrong region. Instead, the resources in the module resources must be
|
|
|
|
explicitly destroyed _before_ removing the module, so that the provider
|
|
|
|
configuration is still available: `terraform destroy -target=module.example`.
|
|
|
|
|
|
|
|
The recommended design pattern moving forward is to place all explicit
|
|
|
|
`provider` blocks in the root module of the configuration, and to pass
|
|
|
|
providers explicitly to child modules so that the associations are obvious
|
|
|
|
from configuration:
|
|
|
|
|
|
|
|
```hcl
|
|
|
|
provider "aws" {
|
|
|
|
region = "us-east-1"
|
|
|
|
alias = "use1"
|
|
|
|
}
|
|
|
|
|
|
|
|
provider "aws" {
|
|
|
|
region = "us-west-1"
|
|
|
|
alias = "usw1"
|
|
|
|
}
|
|
|
|
|
|
|
|
module "example-use1" {
|
|
|
|
source = "./example"
|
|
|
|
|
|
|
|
providers = {
|
2017-11-09 20:23:24 +01:00
|
|
|
"aws" = "aws.use1"
|
2017-10-31 01:34:42 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
module "example-usw1" {
|
|
|
|
source = "./example"
|
|
|
|
|
|
|
|
providers = {
|
2017-11-09 20:23:24 +01:00
|
|
|
"aws" = "aws.usw1"
|
2017-10-31 01:34:42 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
With the above configuration, any `aws` provider resources in the module
|
|
|
|
`./example` will use the us-east-1 provider configuration for
|
|
|
|
`module.example-use1` and the us-west-1 provider configuration for
|
|
|
|
`module.example-usw1`.
|
|
|
|
|
|
|
|
When only default (non-aliased) providers are in use, automatic inheritance
|
|
|
|
to child modules is still supported.
|
|
|
|
|
|
|
|
**Action**: In existing configurations where both a descendent module and
|
|
|
|
one of its ancestor modules both configure the same provider, copy any
|
|
|
|
settings from the ancestor into the descendent because provider configurations
|
|
|
|
now inherit only as a whole, rather than on a per-argument basis.
|
|
|
|
|
|
|
|
**Action**: In existing configurations where a descendent module inherits
|
|
|
|
_aliased_ providers from an ancestor module, use
|
|
|
|
[the new `providers` attribute](/docs/modules/usage.html#providers-within-modules)
|
|
|
|
to explicitly pass those aliased providers.
|
|
|
|
|
|
|
|
**Action**: Consider refactoring existing configurations so that all provider
|
|
|
|
configurations are set in the root module and passed explicitly to child
|
2017-11-09 19:52:25 +01:00
|
|
|
modules, as described in the following section.
|
|
|
|
|
|
|
|
### Moving Provider Configurations to the Root Module
|
|
|
|
|
|
|
|
With the new provider inheritance model, it is strongly recommended to refactor
|
|
|
|
any configuration where child modules define their own `provider` blocks so
|
|
|
|
that all explicit configuration is defined in the _root_ module. This approach
|
|
|
|
will ensure that removing a module from the configuration will not cause
|
|
|
|
any provider configurations to be removed along with it, and thus ensure that
|
|
|
|
all of the module's resources can be successfully refreshed and destroyed.
|
|
|
|
|
|
|
|
A common configuration is where two child modules have different configurations
|
|
|
|
for the same provider, like this:
|
|
|
|
|
2017-11-16 19:14:03 +01:00
|
|
|
```hcl
|
2017-11-09 19:52:25 +01:00
|
|
|
# root.tf
|
|
|
|
|
|
|
|
module "network-use1" {
|
|
|
|
source = "./network"
|
|
|
|
region = "us-east-1"
|
|
|
|
}
|
|
|
|
|
|
|
|
module "network-usw2" {
|
|
|
|
source = "./network"
|
|
|
|
region = "us-west-2"
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2017-11-16 19:14:03 +01:00
|
|
|
```hcl
|
2017-11-09 19:52:25 +01:00
|
|
|
# network/network.tf
|
|
|
|
|
|
|
|
variable "region" {
|
|
|
|
}
|
|
|
|
|
|
|
|
provider "aws" {
|
|
|
|
region = "${var.region}"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_vpc" "example" {
|
|
|
|
# ...
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
The above example is problematic because removing either `module.network-use1`
|
|
|
|
or `module.network-usw2` from the root module will make the corresponding
|
|
|
|
provider configuration no longer available, as described in
|
|
|
|
[issue #15762](https://github.com/hashicorp/terraform/issues/15762), which
|
|
|
|
prevents Terraform from refreshing or destroying that module's `aws_vpc.example`
|
|
|
|
resource.
|
|
|
|
|
|
|
|
This can be addressed by moving the `provider` blocks into the root module
|
|
|
|
as _additional configurations_, and then passing them down to the child
|
|
|
|
modules as _default configurations_ via the explicit `providers` map:
|
|
|
|
|
2017-11-16 19:14:03 +01:00
|
|
|
```hcl
|
2017-11-09 19:52:25 +01:00
|
|
|
# root.tf
|
|
|
|
|
|
|
|
provider "aws" {
|
|
|
|
region = "us-east-1"
|
|
|
|
alias = "use1"
|
|
|
|
}
|
|
|
|
|
|
|
|
provider "aws" {
|
|
|
|
region = "us-west-2"
|
|
|
|
alias = "usw2"
|
|
|
|
}
|
|
|
|
|
|
|
|
module "network-use1" {
|
|
|
|
source = "./network"
|
|
|
|
|
|
|
|
providers = {
|
|
|
|
"aws" = "aws.use1"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
module "network-usw2" {
|
|
|
|
source = "./network"
|
|
|
|
|
|
|
|
providers = {
|
|
|
|
"aws" = "aws.usw2"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2017-11-16 19:14:03 +01:00
|
|
|
```hcl
|
2017-11-09 19:52:25 +01:00
|
|
|
# network/network.tf
|
|
|
|
|
|
|
|
# Empty provider block signals that we expect a default (unaliased) "aws"
|
|
|
|
# provider to be passed in from the caller.
|
|
|
|
provider "aws" {
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_vpc" "example" {
|
|
|
|
# ...
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
After the above refactoring, run `terraform apply` to re-synchoronize
|
|
|
|
Terraform's record (in [the Terraform state](/docs/state/index.html)) of the
|
|
|
|
location of each resource's provider configuration. This should make no changes
|
|
|
|
to actual infrastructure, since no resource configurations were changed.
|
|
|
|
|
|
|
|
For more details on the explicit `providers` map, and discussion of more
|
|
|
|
complex possibilities such as child modules with additional (aliased) provider
|
|
|
|
configurations, see [_Providers Within Modules_](/docs/modules/usage.html#providers-within-modules).
|
2017-10-31 01:34:42 +01:00
|
|
|
|
|
|
|
## Error Checking for Output Values
|
|
|
|
|
|
|
|
Prior to Terraform 0.11, if an error occured when evaluating the `value`
|
|
|
|
expression within an `output` block then it would be silently ignored and
|
|
|
|
the empty string used as the result. This was inconvenient because it made it
|
|
|
|
very hard to debug errors within output expressions.
|
|
|
|
|
|
|
|
To give better feedback, Terraform now halts and displays an error message
|
|
|
|
when such errors occur, similar to the behavior for expressions elsewhere
|
|
|
|
in the configuration.
|
|
|
|
|
|
|
|
Unfortunately, this means that existing configurations may have erroneous
|
|
|
|
outputs lurking that will become fatal errors after upgrading to Terraform 0.11.
|
|
|
|
The prior behavior is no longer available; to apply such a configuration with
|
|
|
|
Terraform 0.11 will require adjusting the configuration to avoid the error.
|
|
|
|
|
|
|
|
**Action:** If any existing output value expressions contain errors, change these
|
|
|
|
expressions to fix the error.
|
2017-11-16 19:15:11 +01:00
|
|
|
|
|
|
|
### Referencing Attributes from Resources with `count = 0`
|
|
|
|
|
|
|
|
A common pattern for conditional resources is to conditionally set count
|
|
|
|
to either `0` or `1` depending on the result of a boolean expression:
|
|
|
|
|
|
|
|
```hcl
|
|
|
|
resource "aws_instance" "example" {
|
|
|
|
count = "${var.create_instance ? 1 : 0}"
|
|
|
|
|
|
|
|
# ...
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
When using this pattern, it's required to use a special idiom to access
|
|
|
|
attributes of this resource to account for the case where no resource is
|
|
|
|
created at all:
|
|
|
|
|
|
|
|
```hcl
|
|
|
|
output "instance_id" {
|
|
|
|
value = "${element(concat(aws_instance.example.*.id, list("")), 0)}"
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Accessing `aws_instance.example.id` directly is an error when `count = 0`.
|
|
|
|
This is true for all situations where interpolation expressions are allowed,
|
|
|
|
but previously _appeared_ to work for outputs due to the suppression of the
|
|
|
|
error. Existing outputs that access non-existent resources must be updated to
|
|
|
|
use the idiom above after upgrading to 0.11.0.
|