1.5.0
Added
- Added AWS RDS PostgreSQL support with full CRUD operations for database instances
- Added AWS RDS read replica support, including automatic backup retention management
- Added RDS PostgreSQL service binding claims to enable seamless application connectivity
- Added support for external AWS KMS keys for customer-managed encryption
- Added replica count information to RDS PostgreSQL instance status output
- Added comprehensive AWS RDS documentation, including:
- Developer how-to guide
- Managed databases overview with PostgreSQL-specific behavior
- RDS troubleshooting guide
- Core concepts and workflows
- Platform operator setup instructions
- Added a glossary to improve documentation clarity
- Added automatic KMS key detection and dynamic permission grants for target buckets in the Object Storage (S3) integration
- Added richer and more informative status output for Object Storage (S3) resources
- Added automatic IAM resource tagging for auditing and cost tracking in the Object Storage (S3) integration
Changed
- Updated S3 bucket provisioning to automatically enable KMS encryption, including dependency handling for managed key creation
- Improved connection secret handling in the Object Storage (S3) integration for greater reliability and completeness
- Improved behavior when Object Storage Instances are missing — bindings now remain READY=False with a clear status message in the XR object
- Set the default IAM user access level in the Object Storage (S3) integration to readWrite to enforce least-privilege security
- Bumped the Object Storage integration version to 1.0.0 following updates to the ObjectStorageInstance resource
Chores
- Upgraded Crossplane to version v1.20.1
- Updated crossplane aws providers
provider-aws-s3upgraded to v1.23.2provider-aws-rdsupgraded to v1.23.2provider-aws-iamupgraded to v1.23.2provider-aws-kmsupgraded to v1.23.2
- Updated crossplane functions
function-patch-and-transformupgraded to v0.9.1function-go-templatingupgraded to v0.11.0
- Bumped dependencies to remove security vulnerabilities