With OpenTofu exclusive features making such an early debut, is the intention to remain a superset of upstream Terraform functionality and spec, or allow OpenTofu to diverge and move in its own direction? Will you aim to stick to compatibility with Terraform providers/modules?
Is the potential impact of community fragmentation on your mind as many commercial users who don’t care about open source ideology stick to the tried-and-true Hashicorp Terraform?
Is there any intention to try and supplement the tooling around the core product to provide an answer to features like Terraform Cloud dashboard, sentinel policies and other things companies may want out of the product outside of the command line tool itself?
I admit I haven't tried it yet, but based on the description, provider-defined functions makes me nervous. It's easy to picture it as yet another tool for people with bad taste to create a horrible, impure monstrosity (people love to do this with terraform already by wrapping it).
I'm very excited for state encryption though! Wondering how safe it is to check an encrypted state file into a public GitHub repo.
OpenTofu is a fork of the code past 1.5.0, so for anything below that, it's basically a drop-in replacement. For versions past 1.6.0 it's still easy[0].
There was also a cool blog post by Masterpoint about migrating over a pretty large setup, with a high degree of complexity, successfully[1].
The technical lead has an answer here [0] about this concern. It may not answer all your worries, but it's definitely something they're aware of and planning for.
Yes, but these are two features that have been widely requested and the PR's languishing for years because they competed with Hashicorp's cloud offering.
[+] [-] cube2222|1 year ago|reply
OpenTofu 1.7.0 is now officially out, with a couple of great features, including the first tofu-exclusives, which I know many have been asking for.
Happy to answer any questions you may have!
[+] [-] aeadio|1 year ago|reply
Is the potential impact of community fragmentation on your mind as many commercial users who don’t care about open source ideology stick to the tried-and-true Hashicorp Terraform?
Is there any intention to try and supplement the tooling around the core product to provide an answer to features like Terraform Cloud dashboard, sentinel policies and other things companies may want out of the product outside of the command line tool itself?
[+] [-] maxloh|1 year ago|reply
[+] [-] levidos|1 year ago|reply
[+] [-] hamandcheese|1 year ago|reply
I'm very excited for state encryption though! Wondering how safe it is to check an encrypted state file into a public GitHub repo.
[+] [-] janosdebugs|1 year ago|reply
[+] [-] master_crab|1 year ago|reply
[+] [-] cube2222|1 year ago|reply
There was also a cool blog post by Masterpoint about migrating over a pretty large setup, with a high degree of complexity, successfully[1].
[0]: https://opentofu.org/docs/intro/migration/
[1]: https://masterpoint.io/updates/opentofu-early-adopters/
[+] [-] liveoneggs|1 year ago|reply
[+] [-] lolinder|1 year ago|reply
[0] https://news.ycombinator.com/item?id=40213336
[+] [-] cube2222|1 year ago|reply
[+] [-] Spivak|1 year ago|reply
[+] [-] unknown|1 year ago|reply
[deleted]