feat(helm)!: Update crossplane-genmachine (major)#678
Open
pipelines-github-app[bot] wants to merge 1 commit intomainfrom
Open
feat(helm)!: Update crossplane-genmachine (major)#678pipelines-github-app[bot] wants to merge 1 commit intomainfrom
pipelines-github-app[bot] wants to merge 1 commit intomainfrom
Conversation
bd1e931 to
dc17b5f
Compare
Contributor
Author
--- main/crossplane_gitops_manifests_crossplane_genmachine_manifest_main.yaml 2026-03-11 04:31:17.978352612 +0000
+++ pr/crossplane_gitops_manifests_crossplane_genmachine_manifest_pr.yaml 2026-03-11 04:31:17.025352120 +0000
@@ -1,42 +1,44 @@
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: rbac-manager
namespace: default
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
+automountServiceAccountToken: true
---
# Source: crossplane/charts/crossplane/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: crossplane
namespace: default
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
+automountServiceAccountToken: true
---
# Source: crossplane/charts/komoplane/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: crossplane-komoplane
labels:
helm.sh/chart: komoplane-0.1.6
app.kubernetes.io/name: komoplane
app.kubernetes.io/instance: crossplane
@@ -76,46 +78,46 @@
namespace: default
type: Opaque
---
# Source: crossplane/charts/crossplane/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-crossplane: "true"
---
# Source: crossplane/charts/crossplane/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:system:aggregate-to-crossplane
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
crossplane.io/scope: "system"
rbac.crossplane.io/aggregate-to-crossplane: "true"
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- create
- update
@@ -142,22 +144,23 @@
- delete
- apiGroups:
- ""
resources:
- serviceaccounts
- services
verbs:
- "*"
- apiGroups:
- apiextensions.crossplane.io
+ - ops.crossplane.io
- pkg.crossplane.io
- - secrets.crossplane.io
+ - protection.crossplane.io
resources:
- "*"
verbs:
- "*"
- apiGroups:
- extensions
- apps
resources:
- deployments
verbs:
@@ -196,46 +199,46 @@
- watch
- delete
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-allowed-provider-permissions.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:allowed-provider-permissions
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-allowed-provider-permissions: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-rbac-manager
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- create
- update
- patch
- delete
@@ -356,104 +359,104 @@
- watch
- delete
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-admin
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-admin: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-edit
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-edit: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-view
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-view: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane-browse
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
aggregationRule:
clusterRoleSelectors:
- matchLabels:
rbac.crossplane.io/aggregate-to-browse: "true"
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:aggregate-to-admin
labels:
rbac.crossplane.io/aggregate-to-admin: "true"
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
rules:
# Crossplane administrators have access to view events.
- apiGroups: [""]
resources: [events]
verbs: [get, list, watch]
# Crossplane administrators must create provider credential secrets, and may
# need to read or otherwise interact with connection secrets. They may also need
# to create or annotate namespaces.
- apiGroups: [""]
resources: [secrets, namespaces]
@@ -478,36 +481,44 @@
resources: ["*"]
verbs: ["*"]
- apiGroups:
- secrets.crossplane.io
resources: ["*"]
verbs: ["*"]
# Crossplane administrators have access to view CRDs in order to debug XRDs.
- apiGroups: [apiextensions.k8s.io]
resources: [customresourcedefinitions]
verbs: [get, list, watch]
+- apiGroups:
+ - protection.crossplane.io
+ resources: ["*"]
+ verbs: ["*"]
+- apiGroups:
+ - ops.crossplane.io
+ resources: ["*"]
+ verbs: ["*"]
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:aggregate-to-edit
labels:
rbac.crossplane.io/aggregate-to-edit: "true"
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
rules:
# Crossplane editors have access to view events.
- apiGroups: [""]
resources: [events]
verbs: [get, list, watch]
# Crossplane editors must create provider credential secrets, and may need to
# read or otherwise interact with connection secrets.
- apiGroups: [""]
resources: [secrets]
verbs: ["*"]
@@ -521,36 +532,44 @@
resources: ["*"]
verbs: ["*"]
- apiGroups:
- pkg.crossplane.io
resources: ["*"]
verbs: ["*"]
- apiGroups:
- secrets.crossplane.io
resources: ["*"]
verbs: ["*"]
+- apiGroups:
+ - protection.crossplane.io
+ resources: ["*"]
+ verbs: ["*"]
+- apiGroups:
+ - ops.crossplane.io
+ resources: ["*"]
+ verbs: ["*"]
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:aggregate-to-view
labels:
rbac.crossplane.io/aggregate-to-view: "true"
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
rules:
# Crossplane viewers have access to view events.
- apiGroups: [""]
resources: [events]
verbs: [get, list, watch]
# Crossplane viewers may see which namespaces exist.
- apiGroups: [""]
resources: [namespaces]
verbs: [get, list, watch]
# Crossplane viewers have read-only access to built in Crossplane types.
@@ -559,36 +578,44 @@
resources: ["*"]
verbs: [get, list, watch]
- apiGroups:
- pkg.crossplane.io
resources: ["*"]
verbs: [get, list, watch]
- apiGroups:
- secrets.crossplane.io
resources: ["*"]
verbs: [get, list, watch]
+- apiGroups:
+ - protection.crossplane.io
+ resources: ["*"]
+ verbs: [get, list, watch]
+- apiGroups:
+ - ops.crossplane.io
+ resources: ["*"]
+ verbs: [get, list, watch]
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: crossplane:aggregate-to-browse
labels:
rbac.crossplane.io/aggregate-to-browse: "true"
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
rules:
# Crossplane browsers have access to view events.
- apiGroups: [""]
resources: [events]
verbs: [get, list, watch]
# Crossplane browsers have read-only access to compositions and XRDs. This
# allows them to discover and select an appropriate composition when creating a
# resource claim.
- apiGroups:
- apiextensions.crossplane.io
@@ -611,73 +638,73 @@
resources: ["*"]
verbs: ["get", "list", "watch"]
---
# Source: crossplane/charts/crossplane/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: crossplane
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: crossplane
subjects:
- kind: ServiceAccount
name: crossplane
namespace: default
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: crossplane-rbac-manager
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: crossplane-rbac-manager
subjects:
- kind: ServiceAccount
name: rbac-manager
namespace: default
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: crossplane-admin
labels:
app: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: crossplane-admin
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: crossplane:masters
---
# Source: crossplane/charts/komoplane/templates/serviceaccount.yaml
@@ -702,27 +729,27 @@
---
# Source: crossplane/charts/crossplane/templates/service.yaml
apiVersion: v1
kind: Service
metadata:
name: crossplane-webhooks
namespace: default
labels:
app: crossplane
release: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
annotations:
spec:
selector:
app: crossplane
release: crossplane
ports:
- protocol: TCP
port: 9443
targetPort: 9443
---
@@ -750,57 +777,59 @@
---
# Source: crossplane/charts/crossplane/templates/deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: crossplane
namespace: default
labels:
app: crossplane
release: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
spec:
replicas: 1
selector:
matchLabels:
app: crossplane
release: crossplane
strategy:
type: RollingUpdate
template:
metadata:
labels:
app: crossplane
release: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
spec:
serviceAccountName: crossplane
hostNetwork: false
initContainers:
- - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.5"
+ - name: crossplane-init
+ image: "xpkg.upbound.io/crossplane/crossplane:v2.2.0"
+ imagePullPolicy: IfNotPresent
args:
- core
- init
- imagePullPolicy: IfNotPresent
- name: crossplane-init
+ - --activation
+ - "*"
resources:
limits:
cpu: 500m
memory: 1024Mi
requests:
cpu: 100m
memory: 256Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
@@ -835,26 +864,26 @@
fieldPath: metadata.namespace
- name: "WEBHOOK_SERVICE_PORT"
value: "9443"
- name: "TLS_CA_SECRET_NAME"
value: crossplane-root-ca
- name: "TLS_SERVER_SECRET_NAME"
value: crossplane-tls-server
- name: "TLS_CLIENT_SECRET_NAME"
value: crossplane-tls-client
containers:
- - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.5"
+ - name: crossplane
+ image: "xpkg.upbound.io/crossplane/crossplane:v2.2.0"
args:
- core
- start
imagePullPolicy: IfNotPresent
- name: crossplane
resources:
limits:
cpu: 500m
memory: 1024Mi
requests:
cpu: 100m
memory: 256Mi
startupProbe:
failureThreshold: 30
periodSeconds: 2
@@ -928,56 +957,56 @@
---
# Source: crossplane/charts/crossplane/templates/rbac-manager-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: crossplane-rbac-manager
namespace: default
labels:
app: crossplane-rbac-manager
release: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
spec:
replicas: 1
selector:
matchLabels:
app: crossplane-rbac-manager
release: crossplane
strategy:
type: RollingUpdate
template:
metadata:
labels:
app: crossplane-rbac-manager
release: crossplane
- helm.sh/chart: crossplane-1.20.5
+ helm.sh/chart: crossplane-2.2.0
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: cloud-infrastructure-controller
app.kubernetes.io/part-of: crossplane
app.kubernetes.io/name: crossplane
app.kubernetes.io/instance: crossplane
- app.kubernetes.io/version: "1.20.5"
+ app.kubernetes.io/version: "2.2.0"
spec:
serviceAccountName: rbac-manager
initContainers:
- - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.5"
+ - name: crossplane-init
+ image: "xpkg.upbound.io/crossplane/crossplane:v2.2.0"
args:
- rbac
- init
imagePullPolicy: IfNotPresent
- name: crossplane-init
resources:
limits:
cpu: 100m
memory: 512Mi
requests:
cpu: 100m
memory: 256Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
@@ -990,27 +1019,27 @@
containerName: crossplane-init
resource: limits.cpu
divisor: "1"
- name: GOMEMLIMIT
valueFrom:
resourceFieldRef:
containerName: crossplane-init
resource: limits.memory
divisor: "1"
containers:
- - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.5"
+ - name: crossplane
+ image: "xpkg.upbound.io/crossplane/crossplane:v2.2.0"
args:
- rbac
- start
- --provider-clusterrole=crossplane:allowed-provider-permissions
imagePullPolicy: IfNotPresent
- name: crossplane
resources:
limits:
cpu: 100m
memory: 512Mi
requests:
cpu: 100m
memory: 256Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
|
5d59b56 to
1854aa0
Compare
70ef672 to
67c5cd8
Compare
e38b53f to
e1e65aa
Compare
75543c6 to
20ab540
Compare
ec33eff to
a714c71
Compare
f1e4bb2 to
0c6a90c
Compare
67283c1 to
1a80378
Compare
f736a5e to
ee4a912
Compare
56ad5a2 to
a9280bc
Compare
| datasource | package | from | to | | ---------- | ------------------------------------- | ------- | ------ | | helm | crossplane | 1.20.5 | 2.2.0 | | docker | xpkg.upbound.io/crossplane/crossplane | v1.20.5 | v2.2.0 | Co-authored-by: renovate[bot] <renovate@whitesourcesoftware.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.20.5->2.2.0v1.20.5->v2.2.0Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
crossplane/crossplane (crossplane)
v2.2.0Compare Source
The
v2.2.0release is a regular quarterly Crossplane release that is focused on maturing a number of key areas of functionality across the project, as Crossplane continues to become more capable, more reliable, and more performant for your production workloads. This release includes many fixes and reliability improvements, a new alpha feature for debugging (the pipeline inspector), and usability improvements.ℹ️ Extended support for
v1.20Normally, the release of
v2.2would correspond with the end-of-life forv1.20. However, becausev1.20is the last minor release of thev1series and major version upgrades require additional planning for users,v1.20will continue to receive critical fixes. The final EOL date forv1.20is to be determined.v2.1It is strongly advised to upgrade to
v2.2from the previous minor version, which isv2.1. Upon upgrade for each minor release, Crossplane performs any necessary migrations of its CRDs to ensure the latest versions are stored in the Kubernetes API server. Therefore, it is important to upgrade sequentially through one minor version at a time as described in the upgrade docs.🚨 Notable and Breaking Changes
Functionpackages are no longer installed by the package manager, following the xpkg specification. Unknown or disallowed resources in a package are now ignored instead of causing package installation to fail. See #6976.🎉 Highlights
ImageConfigcan now be used to configure theDeploymentRuntimeConfigused for packages, including those installed as dependencies. Note that a matchingImageConfigtakes precedence over theruntimeConfigRefin a package spec if both are present. See #6382.x-kubernetes-validationsoutside of the spec. This allows for validation of metadata such as names and labels. See #7018.RequiredSchemasfield in the function response. Crossplane now advertises capabilities (including required schemas) to functions in a new function request field. See #7022.crossplane beta traceCLI command now supports tracing all resources of a given kind, and supports watching resources. See #6552 and #7015.🏅 Release MVP
@jonasz-lasut is the
v2.2release MVP! Their work driving enhancements, fixing bugs, and maintaining quality across Crossplane and its ecosystem is much appreciated by the Crossplane maintainers. Additionally, @jonasz-lasut is an active participant on the Crossplane Slack instance, answering questions and providing guidance to many new and experienced members of the community. Thank you for your dedication, @jonasz-lasut! 🎉What's Changed
5e57cd1(main) by @crossplane-renovate[bot] in #6890d3ced5c(main) by @crossplane-renovate[bot] in #689134e1148(main) by @crossplane-renovate[bot] in #6954497990d(main) by @crossplane-renovate[bot] in #6955crossplane beta traceby @twobiers in #6552xpkg.Clientto consolidate package fetching by @negz in #6981c94ce9f(main) by @crossplane-renovate[bot] in #7070439137e(main) by @crossplane-renovate[bot] in #7071tools/dir by @negz in #70852588666(main) by @crossplane-renovate[bot] in #7092--watched-resourceflag for WatchOperations by @negz in #71130629af8(main) by @crossplane-renovate[bot] in #711575c2866(main) by @crossplane-renovate[bot] in #712045cbd0c(main) by @crossplane-renovate[bot] in #7119New Contributors
Full Changelog: crossplane/crossplane@v2.1.0...v2.2.0
v2.1.4Compare Source
This release backports #7030 to the 2.1 branch to fix one of the issues reported in #3423, where shared transitive dependencies could not be upgraded successfully. It also contains security updates to Crossplane's dependencies.
What's Changed
Full Changelog: crossplane/crossplane@v2.1.3...v2.1.4
v2.1.3Compare Source
This release resolves #6761 - issues when upgrading providers that manifest with errors like these:
What's Changed
Full Changelog: crossplane/crossplane@v2.1.2...v2.1.3
v2.1.2Compare Source
What's Changed
Full Changelog: crossplane/crossplane@v2.1.1...v2.1.2
v2.1.1Compare Source
This release backports #6911, which makes the new XR watch circuit breaker a little more lenient. We noticed sometimes simple XRs were triggering the circuit breaker during initial creation, which usually involves a burst of watch events as resources are created and update to reach a stable state.
What's Changed
Full Changelog: crossplane/crossplane@v2.1.0...v2.1.1
v2.1.0Compare Source
The
v2.1.0release is a regular quarterly Crossplane release that is focused on maturing a number of key areas of functionality across the project, as Crossplane continues to become more capable, more reliable, and more performant for your production workloads. After the majorv2.0release, we spent time focusing on polishing and hardening the experience with the goal of enhancing core reliability.v2.0It is strongly advised to upgrade to
v2.1from the previous minor version, which isv2.0. Upon upgrade for each minor release, Crossplane performs any necessary migrations of its CRDs to ensure the latest versions are stored in the Kubernetes API server. Therefore, it is important to upgrade sequentially through one minor version at a time as described in the upgrade docs.🎉 Highlights
crossplane renderfor remote Docker daemons: #6799 fixes an issue that preventedcrossplane renderfrom establishing a connection to the remote Docker host.crossplane rendernow allows function annotations to be passed on the command line with-a/--function-annotationsflags. Two new function annotations are now supported:render.crossplane.io/runtime-docker-publish-addresscontrols the host address Docker publishes the container port to (defaults to127.0.0.1for security)render.crossplane.io/runtime-docker-targetcontrols the address the CLI connects to (defaults to the publish address)🚨 Warnings and breaking changes
--max-concurrent-reconcilescan be set to influence the maximum number of concurrent reconcile operations (worker pool size) that Crossplane will perform.--max-reconcile-rateflag has been renamed to this new--max-concurrent-reconcilesflag to better represent what this flag controls--max-reconcile-rateflag is now an alias for the new flag name🏅 Release MVP
@binarycode is the
v2.1release MVP! They discovered a critical issue preventing realtime compositions from functioning correctly for namespaced XRs. Their fix in #6780 now properly configures an index for each namespaced XR so that events generated from changes in their composed resources correctly result in the XR being enqueued for reconciliation.Thank you very much to @binarycode, our latest release MVP! 🙇♂️
What's Changed
184bdaa(main) by @crossplane-renovate[bot] in #670608eba0b(main) by @crossplane-renovate[bot] in #6715New Contributors
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.