Skip to content

Conversation

pipelines-github-app[bot]
Copy link
Contributor

@pipelines-github-app pipelines-github-app bot commented Aug 9, 2025

This PR contains the following updates:

Package Update Change
crossplane (source) major 1.20.1 -> 2.0.2
xpkg.upbound.io/crossplane/crossplane major v1.20.1 -> v2.0.2

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

crossplane/crossplane (crossplane)

v2.0.2

Compare Source

This is a patch release scoped to fixing issues reported by users of Crossplane v2.0.

What's Changed

Full Changelog: crossplane/crossplane@v2.0.1...v2.0.2

v2.0.1

Compare Source

This is a patch release scoped to fixing issues reported by users of Crossplane v2.0.

⚠️ Install latest v2.0 patch release

v2.0.1 has some blocking issues that were discovered after extended post-release testing and feedback. It is not the most recent v2 patch release. We strongly advise installing the latest patch (v2.0.2 as of this writing) to have the highest quality experience in your control plane.

The most recent patch has been promoted to the stable channel, so if you simply install or upgrade using the stable channel, you don't need to take any further action.

What's Changed

Full Changelog: crossplane/crossplane@v2.0.0...v2.0.1

v2.0.0

Compare Source

The v2.0.0 release is the first major version update in years for the Crossplane project. It takes all the feedback and lessons from our amazing community of adopters of v1.x releases over the last 5 years and incorporates them into an improved, more capable, and streamlined experience. There are so many exciting enhancements that we are happy to share with the community today, as well as important changes to understand and consider when upgrading from v1.20.

⚠️ Install latest v2.0 patch release

v2.0.0 has some blocking issues that were discovered after extended post-release testing and feedback. It is not the most recent v2 patch release. We strongly advise installing the latest patch (v2.0.2 as of this writing) to have the highest quality experience in your control plane.

The most recent patch has been promoted to the stable channel, so if you simply install or upgrade using the stable channel, you don't need to take any further action.

Upgrade from v1

It is strongly advised to upgrade to v2.0 from the most recent v1 minor version, which is v1.20. Upon upgrade for each minor release, Crossplane performs any necessary migrations of its CRDs to ensure the latest versions are stored in the Kubernetes API server. Therefore, it is important to upgrade sequentially through one minor version at a time.

For example, if you are currently on v1.18, then you should first upgrade to v1.19, then v1.20, before finally upgrading to v2.0. The upgrade path in this example looks like v1.18 --> v1.19 --> v1.20 --> v2.0. To reiterate, you should be running a v1.20 version before you upgrade to v2.0.

🎉 Highlights

The v2 release is chock full of awesome new features that focus on making Crossplane easier to use, operate, and understand as well as be a better fit for application level resources in addition to infrastructure.

  • Broader composition capabilities - Compositions can now include any Kubernetes resource, e.g. Deployment, Configmap, Secret, custom resources - anything from the Kubernetes API, not just Crossplane-defined resources. This enables full-stack abstractions of both applications and infrastructure and makes Crossplane a great fit for your entire tech stack.
  • Namespaced by default - Composite Resources (XRs) and Managed Resources (MRs) are now namespaced by default, providing better isolation boundaries for your end users and aligning better with Kubernetes conventions and practices.
  • Declarative day two operations - The new Operation type supports one-off, scheduled, and event-driven workflows for operational tasks like backups, rolling upgrades, configuration validation, and scheduled maintenance.
  • Managed resource filtering - When installing a provider, you can now install only the specific managed resources you need instead of getting everything from a provider. No more 100's of CRDs that slow down your control plane!
  • Reconciliation observability - The reconciliation process of Crossplane objects is now easier to get insight into its progress as status conditions will now have the observedGeneration, i.e. the version of the resource, for which they were reconciled. You no longer need to wonder if Crossplane has seen and reconciled your latest changes.

🚨 Warnings and breaking changes

Backwards Compatibility with v1

The Crossplane maintainers have taken thoughtful consideration to make major improvements and changes in v2 while maintaining backwards compatibility for the vast majority of v1 workloads. We expect most users to be able to upgrade to v2 without any changes to their control plane. However, there is a set of 4 breaking changes that we have made, mostly to long deprecated features and features that have remained stuck in alpha for a long time.

If you are not using any of these 4 features, you can upgrade to v2 without any issues and your existing workload should continue operating as usual.

The following features have been removed:

  • Native patch and transform within composition (mode: Resources)
    • You can migrate your compositions to use function pipelines with the crossplane beta convert pipeline-composition command available in the v1 crossplane CLI. See the Crossplane docs for details.
  • ControllerConfig
    • These have been replaced by DeploymentRuntimeConfig. You can migrate your existing ControllerConfig to DeploymentRuntimeConfig with the crossplane beta convert deployment-runtime command available in the v1 crossplane CLI. See the Crossplane docs for details.
  • External secret store support
    • Crossplane no longer directly supports writing connection details to external destinations outside of the control plane. We recommend using an alternative such as External Secrets Operator. Note that It is still fully supported to write connection details to a Secret within the control plane using spec.writeConnectionSecretToRef available on managed resources.
  • Default registry
    • When specifying a package for Crossplane to install, you must now fully qualify the package with the registry that hosts it, both directly via spec.package and indirectly as dependencies. For example, it is no longer valid to simply use crossplane-contrib/provider-family-azure:v1.13.0 which does not specify the host registry. You must supply the fully qualified package, including the host registry, like xpkg.crossplane.io/crossplane-contrib/provider-family-azure:v1.13.0. If a registry is not specified, then an error will be returned for the package.

Go module path is now github.com/crossplane/crossplane/v2

As this release is a major version bump that has breaking changes, the rules for Go modules required the Crossplane module path to be updated to include the v2 version suffix.

If you import crossplane and crossplane-runtime into your go.mod, when you update to v2+ you will also need to update the module path. All import statements in your code base need to be updated to also include this v2 module path, as it is effectively a module change.

See this commit as an example of this type of update: d6c489c

The module paths for v2 versions of crossplane and crossplane-runtime are:

  • github.com/crossplane/crossplane/v2
  • github.com/crossplane/crossplane-runtime/v2

Metrics name changes

The Prometheus metrics that Crossplane exposes for the controller engine and function response caches have been updated with the addition of Operations that expands the functionality of function pipelines. The names of these metrics have been updated as follows:

  • crossplane_composition_controllers_* --> crossplane_engine_controllers_*
  • crossplane_composition_watches_* --> crossplane_engine_watches_*
  • crossplane_composition_run_function_* --> crossplane_function_run_function_*

login/logout removed from Crossplane CLI

The crossplane xpkg login and crossplane xpkg logout commands have been removed from the Crossplane CLI. To login to a registry before pushing a package, consider using docker login locally, or the docker/login-action from CI.

An example of this pattern can be seen in many Community Extension Projects, for example function-auto-ready.

deletionPolicy removed for namespaced managed resources

Namespaced managed resources, that are net new in v2, no longer have the deletionPolicy field. This behavior can be recreated using a ManagementPolicy without the "Delete" option. For example:

managementPolicies: ["Create", "Observe", "Update"]

Existing cluster scoped managed resources are not affected.

🏅 Release MVP

Since v2.0 is such a massive release with many months of effort across many contributors in the community, it was impossible to pick a single release MVP this time - so we're going big with 3 MVPs! 📈

  • @​joebowbeer did lots of bleeding edge testing and finding issues in the daily builds of Crossplane v2 in the main branch. He was often the quickest to spot any new regressions creeping in that e2e tests did not catch, so he contributed significantly to the overall quality of the release.
  • @​jcogilvie is driving major improvements in the Crossplane CLI that will enable broader extensions to its functionality from the community. He's also driving SIG-cli to organize folks interested in more collaboration in this area.
  • @​gotwarlost generously donated function-hcl as a Community Extension Project, which provides function users with a familiar HCL syntax and functionality.

Thank you very much release MVPs! 🙇‍♂️

What's Changed

New Contributors

Full Changelog: crossplane/crossplane@v1.20.1...v2.0.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch from bd1e931 to dc17b5f Compare August 10, 2025 03:46
@pipelines-github-app
Copy link
Contributor Author

pipelines-github-app bot commented Aug 10, 2025

--- main/crossplane_gitops_manifests_crossplane_genmachine_manifest_main.yaml	2025-10-16 03:33:49.230860411 +0000
+++ pr/crossplane_gitops_manifests_crossplane_genmachine_manifest_pr.yaml	2025-10-16 03:33:48.551856494 +0000
@@ -1,42 +1,42 @@
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: rbac-manager
   namespace: default
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 ---
 # Source: crossplane/charts/crossplane/templates/serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: crossplane
   namespace: default
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 ---
 # Source: crossplane/charts/komoplane/templates/serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: crossplane-komoplane
   labels:
     helm.sh/chart: komoplane-0.1.6
     app.kubernetes.io/name: komoplane
     app.kubernetes.io/instance: crossplane
@@ -76,46 +76,46 @@
   namespace: default
 type: Opaque
 ---
 # Source: crossplane/charts/crossplane/templates/clusterrole.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-crossplane: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/clusterrole.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:system:aggregate-to-crossplane
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
     crossplane.io/scope: "system"
     rbac.crossplane.io/aggregate-to-crossplane: "true"
 rules:
 - apiGroups:
   - ""
   resources:
   - events
   verbs:
   - create
   - update
@@ -142,22 +142,23 @@
   - delete
 - apiGroups:
   - ""
   resources:
   - serviceaccounts
   - services
   verbs:
   - "*"
 - apiGroups:
   - apiextensions.crossplane.io
+  - ops.crossplane.io
   - pkg.crossplane.io
-  - secrets.crossplane.io
+  - protection.crossplane.io
   resources:
   - "*"
   verbs:
   - "*"
 - apiGroups:
   - extensions
   - apps
   resources:
   - deployments
   verbs:
@@ -196,46 +197,46 @@
   - watch
   - delete
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-allowed-provider-permissions.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:allowed-provider-permissions
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-allowed-provider-permissions: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-clusterrole.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-rbac-manager
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 rules:
 - apiGroups:
   - ""
   resources:
   - events
   verbs:
   - create
   - update
   - patch
   - delete
@@ -356,104 +357,104 @@
   - watch
   - delete
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-admin
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-admin: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-edit
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-edit: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-view
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-view: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-browse
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-browse: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:aggregate-to-admin
   labels:
     rbac.crossplane.io/aggregate-to-admin: "true"
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 rules:
 # Crossplane administrators have access to view events.
 - apiGroups: [""]
   resources: [events]
   verbs: [get, list, watch]
 # Crossplane administrators must create provider credential secrets, and may
 # need to read or otherwise interact with connection secrets. They may also need
 # to create or annotate namespaces.
 - apiGroups: [""]
   resources: [secrets, namespaces]
@@ -487,27 +488,27 @@
   verbs: [get, list, watch]
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:aggregate-to-edit
   labels:
     rbac.crossplane.io/aggregate-to-edit: "true"
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 rules:
 # Crossplane editors have access to view events.
 - apiGroups: [""]
   resources: [events]
   verbs: [get, list, watch]
 # Crossplane editors must create provider credential secrets, and may need to
 # read or otherwise interact with connection secrets.
 - apiGroups: [""]
   resources: [secrets]
   verbs: ["*"]
@@ -530,27 +531,27 @@
   verbs: ["*"]
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:aggregate-to-view
   labels:
     rbac.crossplane.io/aggregate-to-view: "true"
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 rules:
 # Crossplane viewers have access to view events.
 - apiGroups: [""]
   resources: [events]
   verbs: [get, list, watch]
 # Crossplane viewers may see which namespaces exist.
 - apiGroups: [""]
   resources: [namespaces]
   verbs: [get, list, watch]
 # Crossplane viewers have read-only access to built in Crossplane types.
@@ -568,27 +569,27 @@
   verbs: [get, list, watch]
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:aggregate-to-browse
   labels:
     rbac.crossplane.io/aggregate-to-browse: "true"
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 rules:
 # Crossplane browsers have access to view events.
 - apiGroups: [""]
   resources: [events]
   verbs: [get, list, watch]
 # Crossplane browsers have read-only access to compositions and XRDs. This
 # allows them to discover and select an appropriate composition when creating a
 # resource claim.
 - apiGroups:
   - apiextensions.crossplane.io
@@ -611,73 +612,73 @@
     resources: ["*"]
     verbs: ["get", "list", "watch"]
 ---
 # Source: crossplane/charts/crossplane/templates/clusterrolebinding.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   name: crossplane
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
   name: crossplane
 subjects:
 - kind: ServiceAccount
   name: crossplane
   namespace: default
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-clusterrolebinding.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   name: crossplane-rbac-manager
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
   name: crossplane-rbac-manager
 subjects:
 - kind: ServiceAccount
   name: rbac-manager
   namespace: default
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   name: crossplane-admin
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
   name: crossplane-admin
 subjects:
 - apiGroup: rbac.authorization.k8s.io
   kind: Group
   name: crossplane:masters
 ---
 # Source: crossplane/charts/komoplane/templates/serviceaccount.yaml
@@ -702,27 +703,27 @@
 ---
 # Source: crossplane/charts/crossplane/templates/service.yaml
 apiVersion: v1
 kind: Service
 metadata:
   name: crossplane-webhooks
   namespace: default
   labels:
     app: crossplane
     release: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
   annotations:
 spec:
   selector:
     app: crossplane
     release: crossplane
   ports:
   - protocol: TCP
     port: 9443
     targetPort: 9443
 ---
@@ -750,57 +751,59 @@
 ---
 # Source: crossplane/charts/crossplane/templates/deployment.yaml
 apiVersion: apps/v1
 kind: Deployment
 metadata:
   name: crossplane
   namespace: default
   labels:
     app: crossplane
     release: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 spec:
   replicas: 1
   selector:
     matchLabels:
       app: crossplane
       release: crossplane
   strategy:
     type: RollingUpdate
   template:
     metadata:
       labels:
         app: crossplane
         release: crossplane        
-        helm.sh/chart: crossplane-1.20.1
+        helm.sh/chart: crossplane-2.0.2
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: cloud-infrastructure-controller
         app.kubernetes.io/part-of: crossplane
         app.kubernetes.io/name: crossplane
         app.kubernetes.io/instance: crossplane
-        app.kubernetes.io/version: "1.20.1"
+        app.kubernetes.io/version: "2.0.2"
     spec:
       serviceAccountName: crossplane
       hostNetwork: false
       initContainers:
-        - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.1"
+        - name: crossplane-init
+          image: "xpkg.upbound.io/crossplane/crossplane:v2.0.2"
+          imagePullPolicy: IfNotPresent
           args:
           - core
           - init
-          imagePullPolicy: IfNotPresent
-          name: crossplane-init
+          - --activation
+          - "*"
           resources:
             limits:
               cpu: 500m
               memory: 1024Mi
             requests:
               cpu: 100m
               memory: 256Mi
           securityContext:
             allowPrivilegeEscalation: false
             readOnlyRootFilesystem: true
@@ -835,26 +838,26 @@
                 fieldPath: metadata.namespace
           - name: "WEBHOOK_SERVICE_PORT"
             value: "9443"
           - name: "TLS_CA_SECRET_NAME"
             value: crossplane-root-ca
           - name: "TLS_SERVER_SECRET_NAME"
             value: crossplane-tls-server
           - name: "TLS_CLIENT_SECRET_NAME"
             value: crossplane-tls-client
       containers:
-      - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.1"
+      - name: crossplane
+        image: "xpkg.upbound.io/crossplane/crossplane:v2.0.2"
         args:
         - core
         - start
         imagePullPolicy: IfNotPresent
-        name: crossplane
         resources:
             limits:
               cpu: 500m
               memory: 1024Mi
             requests:
               cpu: 100m
               memory: 256Mi
         startupProbe:
           failureThreshold: 30
           periodSeconds: 2
@@ -928,56 +931,56 @@
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-deployment.yaml
 apiVersion: apps/v1
 kind: Deployment
 metadata:
   name: crossplane-rbac-manager
   namespace: default
   labels:
     app: crossplane-rbac-manager
     release: crossplane    
-    helm.sh/chart: crossplane-1.20.1
+    helm.sh/chart: crossplane-2.0.2
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.1"
+    app.kubernetes.io/version: "2.0.2"
 spec:
   replicas: 1
   selector:
     matchLabels:
       app: crossplane-rbac-manager
       release: crossplane
   strategy:
     type: RollingUpdate
   template:
     metadata:
       labels:
         app: crossplane-rbac-manager
         release: crossplane        
-        helm.sh/chart: crossplane-1.20.1
+        helm.sh/chart: crossplane-2.0.2
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: cloud-infrastructure-controller
         app.kubernetes.io/part-of: crossplane
         app.kubernetes.io/name: crossplane
         app.kubernetes.io/instance: crossplane
-        app.kubernetes.io/version: "1.20.1"
+        app.kubernetes.io/version: "2.0.2"
     spec:
       serviceAccountName: rbac-manager
       initContainers:
-      - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.1"
+      - name: crossplane-init
+        image: "xpkg.upbound.io/crossplane/crossplane:v2.0.2"
         args:
         - rbac
         - init
         imagePullPolicy: IfNotPresent
-        name: crossplane-init
         resources:
             limits:
               cpu: 100m
               memory: 512Mi
             requests:
               cpu: 100m
               memory: 256Mi
         securityContext:
             allowPrivilegeEscalation: false
             readOnlyRootFilesystem: true
@@ -990,27 +993,27 @@
                 containerName: crossplane-init
                 resource: limits.cpu
                 divisor: "1"
           - name: GOMEMLIMIT
             valueFrom:
               resourceFieldRef:
                 containerName: crossplane-init
                 resource: limits.memory
                 divisor: "1"
       containers:
-      - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.1"
+      - name: crossplane
+        image: "xpkg.upbound.io/crossplane/crossplane:v2.0.2"
         args:
         - rbac
         - start
         - --provider-clusterrole=crossplane:allowed-provider-permissions
         imagePullPolicy: IfNotPresent
-        name: crossplane
         resources:
             limits:
               cpu: 100m
               memory: 512Mi
             requests:
               cpu: 100m
               memory: 256Mi
         securityContext:
             allowPrivilegeEscalation: false
             readOnlyRootFilesystem: true
 

@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 9 times, most recently from 5d59b56 to 1854aa0 Compare August 16, 2025 03:42
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 6 times, most recently from 70ef672 to 67c5cd8 Compare August 23, 2025 03:30
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 8 times, most recently from e38b53f to e1e65aa Compare September 1, 2025 03:47
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 5 times, most recently from 75543c6 to 20ab540 Compare September 5, 2025 03:26
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 8 times, most recently from 3c3449b to ec33eff Compare September 22, 2025 03:35
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 6 times, most recently from 84f414b to f1e4bb2 Compare September 29, 2025 03:33
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 7 times, most recently from f358bc2 to 67283c1 Compare October 7, 2025 03:26
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 6 times, most recently from c7c12b9 to f736a5e Compare October 14, 2025 03:29
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch from f736a5e to ee4a912 Compare October 15, 2025 03:33
| datasource | package                               | from    | to     |
| ---------- | ------------------------------------- | ------- | ------ |
| helm       | crossplane                            | 1.20.1  | 2.0.2  |
| docker     | xpkg.upbound.io/crossplane/crossplane | v1.20.1 | v2.0.2 |


Co-authored-by: renovate[bot] <[email protected]>
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch from ee4a912 to 118d5b4 Compare October 16, 2025 03:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants