Skip to content

Releases: terraform-ibm-modules/terraform-ibm-icd-postgresql

v3.20.7

11 Jan 10:35
v3.20.7
67ae755
Compare
Choose a tag to compare

3.20.7 (2025-01-11)

Bug Fixes

  • deps: update terraform terraform-ibm-modules/kms-all-inclusive/ibm to v4.19.2 (#563) (67ae755)

v3.20.6

11 Jan 04:48
v3.20.6
2f0ac14
Compare
Choose a tag to compare

3.20.6 (2025-01-11)

Bug Fixes

  • deps: update terraform ibm to latest for deployable architectures (#561) (2f0ac14)

v3.20.5

09 Jan 18:46
v3.20.5
1739da7
Compare
Choose a tag to compare

3.20.5 (2025-01-09)

Bug Fixes

  • update supported versions for postgres (#560)
    - Added new available version 17, removed deprecated version 12 (1739da7)

v3.20.4

08 Jan 13:43
v3.20.4
86a95ea
Compare
Choose a tag to compare

3.20.4 (2025-01-08)

Bug Fixes

v3.20.3

22 Dec 03:08
v3.20.3
3788ae3
Compare
Choose a tag to compare

3.20.3 (2024-12-22)

Bug Fixes

  • deps: update terraform ibm to latest for deployable architectures (#550) (3788ae3)

v3.20.2

21 Dec 19:46
v3.20.2
0563478
Compare
Choose a tag to compare

3.20.2 (2024-12-21)

Bug Fixes

  • deps: update terraform terraform-ibm-modules/kms-all-inclusive/ibm to v4.19.1 (#554) (0563478)

v3.20.1

21 Dec 02:14
v3.20.1
2b07706
Compare
Choose a tag to compare

3.20.1 (2024-12-21)

Bug Fixes

  • deps: update terraform terraform-ibm-modules/kms-all-inclusive/ibm to v4.19.0 (#552) (2b07706)

v3.20.0

18 Dec 15:55
v3.20.0
e2efdc4
Compare
Choose a tag to compare

3.20.0 (2024-12-18)

Features

  • Root module updates:
    • existing_kms_instance_guid is no longer a supported input. The code will now parse the GUID from the KMS key CRN
    • added new input use_same_kms_key_for_backups to give more control over KMS key usage
    • kms_encryption_enabled has been renamed to use_ibm_owned_encryption_key
  • fscloud submodule updates:
    • added new inputs use_default_backup_encryption_key and use_same_kms_key_for_backups
  • DA updates
    • Removed the input existing_backup_kms_instance_crn. If you want to use a different KMS key for backups, you can use the existing_backup_kms_key_crn input to use an existing key. The DA only supports creating an new key that will be used for both data and backups encryption.
    • If passing a value for ibmcloud_kms_api_key, and creating a KMS auth policy, that policy will now be scoped to the exact KMS key.

(#544) (e2efdc4)

v3.19.16

14 Dec 16:13
v3.19.16
4bbc6be
Compare
Choose a tag to compare

3.19.16 (2024-12-14)

Bug Fixes

  • deps: update terraform ibm to latest for deployable architectures (#545) (4bbc6be)

v3.19.15

14 Dec 12:12
v3.19.15
0f0eb23
Compare
Choose a tag to compare

3.19.15 (2024-12-14)

Bug Fixes

  • deps: update terraform terraform-ibm-modules/kms-all-inclusive/ibm to v4.18.1 (#549) (0f0eb23)