Skip to content

Releases: terraform-ibm-modules/terraform-ibm-icd-rabbitmq

v1.15.3

09 Feb 10:14
v1.15.3
28e4c55

Choose a tag to compare

1.15.3 (2025-02-09)

Bug Fixes

v1.15.2

09 Feb 04:21
v1.15.2
d07e115

Choose a tag to compare

1.15.2 (2025-02-09)

Bug Fixes

v1.15.1

08 Feb 07:50
v1.15.1
b18bd94

Choose a tag to compare

1.15.1 (2025-02-08)

Bug Fixes

  • deps: update terraform ibm to latest for deployable architectures (#308) (b18bd94)

v1.15.0

05 Feb 11:02
v1.15.0
724a7de

Choose a tag to compare

1.15.0 (2025-02-05)

Features

  • updated the service_credential_secrets input object schema of the DA to support creating service specific roles
    * The service_credentials_source_service_role attribute has been renamed to service_credentials_source_service_role_crn and now requires a full CRN value. For example: service_credentials_source_service_role_crn = "crn:v1:bluemix:public:iam::::role:Editor" (#304) (724a7de)

v1.14.1

31 Jan 12:50
v1.14.1
033a6ce

Choose a tag to compare

1.14.1 (2025-01-31)

Bug Fixes

  • fix bug in the DA which can occur when using BYOK / KYOK for data encryption, but using the default ICD key for backups encryption (#305) (033a6ce)

v1.14.0

23 Jan 11:30
v1.14.0
0269dde

Choose a tag to compare

1.14.0 (2025-01-23)

Features

v1.13.1

20 Jan 10:14
v1.13.1
716874c

Choose a tag to compare

1.13.1 (2025-01-20)

Bug Fixes

  • fixed bug with logic that produced and error when passing a value for admin password (#301) (716874c)

v1.13.0

16 Jan 11:32
v1.13.0
55f2bf0

Choose a tag to compare

1.13.0 (2025-01-16)

(#300) (55f2bf0)

Features

  • Root module updates:
    • existing_kms_instance_guid is no longer a supported input. The code will now parse the GUID from the KMS key CRN
    • added new input use_same_kms_key_for_backups to give more control over KMS key usage
    • kms_encryption_enabled has been renamed to use_ibm_owned_encryption_key
  • fscloud submodule updates:
    • added new inputs use_default_backup_encryption_key and use_same_kms_key_for_backups

⚠️ Please note that when updating to this version, the s2s KMS auth policy that is created is now scoped to the exact KMS key, so you will see a destroy and re-create of the auth policy. The new policy will be created before the old one is deleted, so there will be no disruption to every day operations.

v1.12.2

29 Nov 12:50
v1.12.2
3884b76

Choose a tag to compare

1.12.2 (2024-11-29)

Bug Fixes

  • Add workaround to ignore groups config when provisioning instance using backup CRN (#273) (3884b76)

v1.12.1

23 Nov 04:01
v1.12.1
084a1c4

Choose a tag to compare

1.12.1 (2024-11-23)

Bug Fixes

  • deps: update terraform-module to v1.29.0 (#274) (084a1c4)