-
Notifications
You must be signed in to change notification settings - Fork 1
feat(helm)!: Update crossplane-genmachine (major) #678
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
pipelines-github-app
wants to merge
1
commit into
main
Choose a base branch
from
renovate/major-2-crossplane-genmachine
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
bd1e931
to
dc17b5f
Compare
--- main/crossplane_gitops_manifests_crossplane_genmachine_manifest_main.yaml 2025-10-16 03:33:49.230860411 +0000
+++ pr/crossplane_gitops_manifests_crossplane_genmachine_manifest_pr.yaml 2025-10-16 03:33:48.551856494 +0000
@@ -1,42 +1,42 @@
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: rbac-manager
namespace: default
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
---
# Source: crossplane/charts/crossplane/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: crossplane
namespace: default
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
---
# Source: crossplane/charts/komoplane/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: crossplane-komoplane
labels:
helm.sh/chart: komoplane-0.1.6
app.kubernetes.io/name: komoplane
app.kubernetes.io/instance: crossplane
@@ -76,46 +76,46 @@
namespace: default
type: Opaque
---
# Source: crossplane/charts/crossplane/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-crossplane: "true"
---
# Source: crossplane/charts/crossplane/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:system:aggregate-to-crossplane
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
crossplane.io/scope: "system"
rbac.crossplane.io/aggregate-to-crossplane: "true"
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- create
- update
@@ -142,22 +142,23 @@
- delete
- apiGroups:
- ""
resources:
- serviceaccounts
- services
verbs:
- "*"
- apiGroups:
- apiextensions.crossplane.io
+ - ops.crossplane.io
- pkg.crossplane.io
- - secrets.crossplane.io
+ - protection.crossplane.io
resources:
- "*"
verbs:
- "*"
- apiGroups:
- extensions
- apps
resources:
- deployments
verbs:
@@ -196,46 +197,46 @@
- watch
- delete
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-allowed-provider-permissions.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:allowed-provider-permissions
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-allowed-provider-permissions: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-rbac-manager
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- create
- update
- patch
- delete
@@ -356,104 +357,104 @@
- watch
- delete
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-admin
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-admin: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-edit
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-edit: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-view
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-view: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-browse
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-browse: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:aggregate-to-admin
labels:
rbac.crossplane.io/aggregate-to-admin: "true"
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
rules:
# Crossplane administrators have access to view events.
- apiGroups: [""]
resources: [events]
verbs: [get, list, watch]
# Crossplane administrators must create provider credential secrets, and may
# need to read or otherwise interact with connection secrets. They may also need
# to create or annotate namespaces.
- apiGroups: [""]
resources: [secrets, namespaces]
@@ -487,27 +488,27 @@
verbs: [get, list, watch]
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:aggregate-to-edit
labels:
rbac.crossplane.io/aggregate-to-edit: "true"
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
rules:
# Crossplane editors have access to view events.
- apiGroups: [""]
resources: [events]
verbs: [get, list, watch]
# Crossplane editors must create provider credential secrets, and may need to
# read or otherwise interact with connection secrets.
- apiGroups: [""]
resources: [secrets]
verbs: ["*"]
@@ -530,27 +531,27 @@
verbs: ["*"]
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:aggregate-to-view
labels:
rbac.crossplane.io/aggregate-to-view: "true"
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
rules:
# Crossplane viewers have access to view events.
- apiGroups: [""]
resources: [events]
verbs: [get, list, watch]
# Crossplane viewers may see which namespaces exist.
- apiGroups: [""]
resources: [namespaces]
verbs: [get, list, watch]
# Crossplane viewers have read-only access to built in Crossplane types.
@@ -568,27 +569,27 @@
verbs: [get, list, watch]
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:aggregate-to-browse
labels:
rbac.crossplane.io/aggregate-to-browse: "true"
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
rules:
# Crossplane browsers have access to view events.
- apiGroups: [""]
resources: [events]
verbs: [get, list, watch]
# Crossplane browsers have read-only access to compositions and XRDs. This
# allows them to discover and select an appropriate composition when creating a
# resource claim.
- apiGroups:
- apiextensions.crossplane.io
@@ -611,73 +612,73 @@
resources: ["*"]
verbs: ["get", "list", "watch"]
---
# Source: crossplane/charts/crossplane/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: crossplane
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: crossplane
subjects:
- kind: ServiceAccount
name: crossplane
namespace: default
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: crossplane-rbac-manager
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: crossplane-rbac-manager
subjects:
- kind: ServiceAccount
name: rbac-manager
namespace: default
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: crossplane-admin
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: crossplane-admin
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: crossplane:masters
---
# Source: crossplane/charts/komoplane/templates/serviceaccount.yaml
@@ -702,27 +703,27 @@
---
# Source: crossplane/charts/crossplane/templates/service.yaml
apiVersion: v1
kind: Service
metadata:
name: crossplane-webhooks
namespace: default
labels:
app: crossplane
release: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
annotations:
spec:
selector:
app: crossplane
release: crossplane
ports:
- protocol: TCP
port: 9443
targetPort: 9443
---
@@ -750,57 +751,59 @@
---
# Source: crossplane/charts/crossplane/templates/deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: crossplane
namespace: default
labels:
app: crossplane
release: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
spec:
replicas: 1
selector:
matchLabels:
app: crossplane
release: crossplane
strategy:
type: RollingUpdate
template:
metadata:
labels:
app: crossplane
release: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
spec:
serviceAccountName: crossplane
hostNetwork: false
initContainers:
- - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.1"
+ - name: crossplane-init
+ image: "xpkg.upbound.io/crossplane/crossplane:v2.0.2"
+ imagePullPolicy: IfNotPresent
args:
- core
- init
- imagePullPolicy: IfNotPresent
- name: crossplane-init
+ - --activation
+ - "*"
resources:
limits:
cpu: 500m
memory: 1024Mi
requests:
cpu: 100m
memory: 256Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
@@ -835,26 +838,26 @@
fieldPath: metadata.namespace
- name: "WEBHOOK_SERVICE_PORT"
value: "9443"
- name: "TLS_CA_SECRET_NAME"
value: crossplane-root-ca
- name: "TLS_SERVER_SECRET_NAME"
value: crossplane-tls-server
- name: "TLS_CLIENT_SECRET_NAME"
value: crossplane-tls-client
containers:
- - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.1"
+ - name: crossplane
+ image: "xpkg.upbound.io/crossplane/crossplane:v2.0.2"
args:
- core
- start
imagePullPolicy: IfNotPresent
- name: crossplane
resources:
limits:
cpu: 500m
memory: 1024Mi
requests:
cpu: 100m
memory: 256Mi
startupProbe:
failureThreshold: 30
periodSeconds: 2
@@ -928,56 +931,56 @@
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: crossplane-rbac-manager
namespace: default
labels:
app: crossplane-rbac-manager
release: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
spec:
replicas: 1
selector:
matchLabels:
app: crossplane-rbac-manager
release: crossplane
strategy:
type: RollingUpdate
template:
metadata:
labels:
app: crossplane-rbac-manager
release: crossplane
- helm.sh/chart: crossplane-1.20.1
+ helm.sh/chart: crossplane-2.0.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.1"
+ app.kubernetes.io/version: "2.0.2"
spec:
serviceAccountName: rbac-manager
initContainers:
- - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.1"
+ - name: crossplane-init
+ image: "xpkg.upbound.io/crossplane/crossplane:v2.0.2"
args:
- rbac
- init
imagePullPolicy: IfNotPresent
- name: crossplane-init
resources:
limits:
cpu: 100m
memory: 512Mi
requests:
cpu: 100m
memory: 256Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
@@ -990,27 +993,27 @@
containerName: crossplane-init
resource: limits.cpu
divisor: "1"
- name: GOMEMLIMIT
valueFrom:
resourceFieldRef:
containerName: crossplane-init
resource: limits.memory
divisor: "1"
containers:
- - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.1"
+ - name: crossplane
+ image: "xpkg.upbound.io/crossplane/crossplane:v2.0.2"
args:
- rbac
- start
- --provider-clusterrole=crossplane:allowed-provider-permissions
imagePullPolicy: IfNotPresent
- name: crossplane
resources:
limits:
cpu: 100m
memory: 512Mi
requests:
cpu: 100m
memory: 256Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
|
5d59b56
to
1854aa0
Compare
70ef672
to
67c5cd8
Compare
e38b53f
to
e1e65aa
Compare
75543c6
to
20ab540
Compare
3c3449b
to
ec33eff
Compare
84f414b
to
f1e4bb2
Compare
f358bc2
to
67283c1
Compare
c7c12b9
to
f736a5e
Compare
f736a5e
to
ee4a912
Compare
| datasource | package | from | to | | ---------- | ------------------------------------- | ------- | ------ | | helm | crossplane | 1.20.1 | 2.0.2 | | docker | xpkg.upbound.io/crossplane/crossplane | v1.20.1 | v2.0.2 | Co-authored-by: renovate[bot] <[email protected]>
ee4a912
to
118d5b4
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
None yet
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.20.1
->2.0.2
v1.20.1
->v2.0.2
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
crossplane/crossplane (crossplane)
v2.0.2
Compare Source
This is a patch release scoped to fixing issues reported by users of Crossplane v2.0.
What's Changed
Full Changelog: crossplane/crossplane@v2.0.1...v2.0.2
v2.0.1
Compare Source
This is a patch release scoped to fixing issues reported by users of Crossplane v2.0.
v2.0
patch releasev2.0.1
has some blocking issues that were discovered after extended post-release testing and feedback. It is not the most recentv2
patch release. We strongly advise installing the latest patch (v2.0.2
as of this writing) to have the highest quality experience in your control plane.The most recent patch has been promoted to the
stable
channel, so if you simply install or upgrade using thestable
channel, you don't need to take any further action.What's Changed
Full Changelog: crossplane/crossplane@v2.0.0...v2.0.1
v2.0.0
Compare Source
The
v2.0.0
release is the first major version update in years for the Crossplane project. It takes all the feedback and lessons from our amazing community of adopters ofv1.x
releases over the last 5 years and incorporates them into an improved, more capable, and streamlined experience. There are so many exciting enhancements that we are happy to share with the community today, as well as important changes to understand and consider when upgrading fromv1.20
.v2.0
patch releasev2.0.0
has some blocking issues that were discovered after extended post-release testing and feedback. It is not the most recentv2
patch release. We strongly advise installing the latest patch (v2.0.2
as of this writing) to have the highest quality experience in your control plane.The most recent patch has been promoted to the
stable
channel, so if you simply install or upgrade using thestable
channel, you don't need to take any further action.Upgrade from
v1
It is strongly advised to upgrade to
v2.0
from the most recentv1
minor version, which isv1.20
. Upon upgrade for each minor release, Crossplane performs any necessary migrations of its CRDs to ensure the latest versions are stored in the Kubernetes API server. Therefore, it is important to upgrade sequentially through one minor version at a time.For example, if you are currently on
v1.18
, then you should first upgrade tov1.19
, thenv1.20
, before finally upgrading tov2.0
. The upgrade path in this example looks likev1.18
-->v1.19
-->v1.20
-->v2.0
. To reiterate, you should be running av1.20
version before you upgrade tov2.0
.🎉 Highlights
The v2 release is chock full of awesome new features that focus on making Crossplane easier to use, operate, and understand as well as be a better fit for application level resources in addition to infrastructure.
Deployment
,Configmap
,Secret
, custom resources - anything from the Kubernetes API, not just Crossplane-defined resources. This enables full-stack abstractions of both applications and infrastructure and makes Crossplane a great fit for your entire tech stack.Operation
type supports one-off, scheduled, and event-driven workflows for operational tasks like backups, rolling upgrades, configuration validation, and scheduled maintenance.observedGeneration
, i.e. the version of the resource, for which they were reconciled. You no longer need to wonder if Crossplane has seen and reconciled your latest changes.🚨 Warnings and breaking changes
Backwards Compatibility with
v1
The Crossplane maintainers have taken thoughtful consideration to make major improvements and changes in
v2
while maintaining backwards compatibility for the vast majority ofv1
workloads. We expect most users to be able to upgrade tov2
without any changes to their control plane. However, there is a set of 4 breaking changes that we have made, mostly to long deprecated features and features that have remained stuck in alpha for a long time.If you are not using any of these 4 features, you can upgrade to
v2
without any issues and your existing workload should continue operating as usual.The following features have been removed:
mode: Resources
)crossplane beta convert pipeline-composition
command available in thev1
crossplane
CLI. See the Crossplane docs for details.ControllerConfig
DeploymentRuntimeConfig
. You can migrate your existingControllerConfig
toDeploymentRuntimeConfig
with thecrossplane beta convert deployment-runtime
command available in thev1
crossplane
CLI. See the Crossplane docs for details.Secret
within the control plane usingspec.writeConnectionSecretToRef
available on managed resources.spec.package
and indirectly as dependencies. For example, it is no longer valid to simply usecrossplane-contrib/provider-family-azure:v1.13.0
which does not specify the host registry. You must supply the fully qualified package, including the host registry, likexpkg.crossplane.io/crossplane-contrib/provider-family-azure:v1.13.0
. If a registry is not specified, then an error will be returned for the package.Go module path is now
github.com/crossplane/crossplane/v2
As this release is a major version bump that has breaking changes, the rules for Go modules required the Crossplane module path to be updated to include the
v2
version suffix.If you import
crossplane
andcrossplane-runtime
into yourgo.mod
, when you update tov2+
you will also need to update the module path. All import statements in your code base need to be updated to also include this v2 module path, as it is effectively a module change.See this commit as an example of this type of update:
d6c489c
The module paths for v2 versions of
crossplane
andcrossplane-runtime
are:github.com/crossplane/crossplane/v2
github.com/crossplane/crossplane-runtime/v2
Metrics name changes
The Prometheus metrics that Crossplane exposes for the controller engine and function response caches have been updated with the addition of Operations that expands the functionality of function pipelines. The names of these metrics have been updated as follows:
crossplane_composition_controllers_*
-->crossplane_engine_controllers_*
crossplane_composition_watches_*
-->crossplane_engine_watches_*
crossplane_composition_run_function_*
-->crossplane_function_run_function_*
login
/logout
removed from Crossplane CLIThe
crossplane xpkg login
andcrossplane xpkg logout
commands have been removed from the Crossplane CLI. To login to a registry before pushing a package, consider usingdocker login
locally, or thedocker/login-action
from CI.An example of this pattern can be seen in many Community Extension Projects, for example
function-auto-ready
.deletionPolicy
removed for namespaced managed resourcesNamespaced managed resources, that are net new in v2, no longer have the
deletionPolicy
field. This behavior can be recreated using a ManagementPolicy without the"Delete"
option. For example:Existing cluster scoped managed resources are not affected.
🏅 Release MVP
Since
v2.0
is such a massive release with many months of effort across many contributors in the community, it was impossible to pick a single release MVP this time - so we're going big with 3 MVPs! 📈main
branch. He was often the quickest to spot any new regressions creeping in that e2e tests did not catch, so he contributed significantly to the overall quality of the release.function-hcl
as a Community Extension Project, which provides function users with a familiar HCL syntax and functionality.Thank you very much release MVPs! 🙇♂️
What's Changed
TestDowngrade
E2E failures by @negz in #6415main
by @negz in #6489fca7ace
(main) by @crossplane-renovate[bot] in #62045bef64f
(main) by @crossplane-renovate[bot] in #6518d72941d
(main) by @crossplane-renovate[bot] in #6517c231a1a
(main) by @crossplane-renovate[bot] in #652474a5d14
(main) by @crossplane-renovate[bot] in #6532ce28f5b
(main) by @crossplane-renovate[bot] in #6536spec.controllerConfigRef
from package types by @negz in #6520writeConnectionSecretToRef
from v2 XRs by @negz in #647346d2ca1
(main) by @crossplane-renovate[bot] in #6540b7b9a69
(main) by @crossplane-renovate[bot] in #6542ea165f8
(main) by @crossplane-renovate[bot] in #6523internal/xresource
- move back topkg/resource
from crossplane-runtime by @negz in #6553TestCrossplaneLifecycle
E2E pass (sometimes?) by @negz in #6604181d5ee
(main) by @crossplane-renovate[bot] in #6608ce71cc2
(main) by @crossplane-renovate[bot] in #6616CronOperation
andWatchOperation
by @negz in #6632WatchOperation
(and add more E2Es) by @negz in #6641.status.crossplane.connectionDetails
from modern XR schema by @jbw976 in #6655earthly +reviewable
by @ulucinar in #6688New Contributors
Full Changelog: crossplane/crossplane@v1.20.1...v2.0.0
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.