Skip to content

feat(helm)!: Update crossplane-genmachine (major)#678

Open
pipelines-github-app[bot] wants to merge 1 commit intomainfrom
renovate/major-2-crossplane-genmachine
Open

feat(helm)!: Update crossplane-genmachine (major)#678
pipelines-github-app[bot] wants to merge 1 commit intomainfrom
renovate/major-2-crossplane-genmachine

Conversation

@pipelines-github-app
Copy link
Contributor

@pipelines-github-app pipelines-github-app bot commented Aug 9, 2025

This PR contains the following updates:

Package Update Change
crossplane (source) major 1.20.5 -> 2.2.0
xpkg.upbound.io/crossplane/crossplane major v1.20.5 -> v2.2.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

crossplane/crossplane (crossplane)

v2.2.0

Compare Source

The v2.2.0 release is a regular quarterly Crossplane release that is focused on maturing a number of key areas of functionality across the project, as Crossplane continues to become more capable, more reliable, and more performant for your production workloads. This release includes many fixes and reliability improvements, a new alpha feature for debugging (the pipeline inspector), and usability improvements.

ℹ️ Extended support for v1.20

Normally, the release of v2.2 would correspond with the end-of-life for v1.20. However, because v1.20 is the last minor release of the v1 series and major version upgrades require additional planning for users, v1.20 will continue to receive critical fixes. The final EOL date for v1.20 is to be determined.

⚠️ Upgrade from v2.1

It is strongly advised to upgrade to v2.2 from the previous minor version, which is v2.1. Upon upgrade for each minor release, Crossplane performs any necessary migrations of its CRDs to ensure the latest versions are stored in the Kubernetes API server. Therefore, it is important to upgrade sequentially through one minor version at a time as described in the upgrade docs.

🚨 Notable and Breaking Changes

  • Input CRDs included in Function packages are no longer installed by the package manager, following the xpkg specification. Unknown or disallowed resources in a package are now ignored instead of causing package installation to fail. See #​6976.
  • The on-disk structure of the package cache has changed. This breaks an undocumented behavior via which packages could be side-loaded into Crossplane, which was especially useful for testing. See #​6981 for details on the change and #​7147 for discussion of the test changes necessary to accommodate it.

🎉 Highlights

  • ImageConfig can now be used to configure the DeploymentRuntimeConfig used for packages, including those installed as dependencies. Note that a matching ImageConfig takes precedence over the runtimeConfigRef in a package spec if both are present. See #​6382.
  • The MRD controller now uses server-side apply to update CRDs, improving reliability. See #​6934.
  • The pipeline inspector is now available as an alpha feature (disabled by default). When enabled, the inspector forwards function requests and responses to a user-configured gRPC endpoint for debugging or observability. See #​7025 and #​7031.
  • XRDs can now configure x-kubernetes-validations outside of the spec. This allows for validation of metadata such as names and labels. See #​7018.
  • Composition and operation functions can now request OpenAPI schemas for any resource kind in the cluster using the RequiredSchemas field in the function response. Crossplane now advertises capabilities (including required schemas) to functions in a new function request field. See #​7022.
  • The crossplane beta trace CLI command now supports tracing all resources of a given kind, and supports watching resources. See #​6552 and #​7015.
  • New documentation has been added regarding connection details for composite resources and workload identity with Crossplane.

🏅 Release MVP

@​jonasz-lasut is the v2.2 release MVP! Their work driving enhancements, fixing bugs, and maintaining quality across Crossplane and its ecosystem is much appreciated by the Crossplane maintainers. Additionally, @​jonasz-lasut is an active participant on the Crossplane Slack instance, answering questions and providing guidance to many new and experienced members of the community. Thank you for your dedication, @​jonasz-lasut! 🎉

What's Changed

New Contributors

Full Changelog: crossplane/crossplane@v2.1.0...v2.2.0

v2.1.4

Compare Source

This release backports #​7030 to the 2.1 branch to fix one of the issues reported in #​3423, where shared transitive dependencies could not be upgraded successfully. It also contains security updates to Crossplane's dependencies.

What's Changed

Full Changelog: crossplane/crossplane@v2.1.3...v2.1.4

v2.1.3

Compare Source

This release resolves #​6761 - issues when upgrading providers that manifest with errors like these:

cannot establish control of object: addresses.compute.gcp.upbound.io is already controlled by ProviderRevision provider-gcp-compute-a41e4ba551fc (UID 58db5de-38e7-40f9-9d31-669bb25a688e)

What's Changed

  • [Backport release-2.1] Use server-side apply for MRD controller by @​negz in #​6952

Full Changelog: crossplane/crossplane@v2.1.2...v2.1.3

v2.1.2

Compare Source

What's Changed

Full Changelog: crossplane/crossplane@v2.1.1...v2.1.2

v2.1.1

Compare Source

This release backports #​6911, which makes the new XR watch circuit breaker a little more lenient. We noticed sometimes simple XRs were triggering the circuit breaker during initial creation, which usually involves a burst of watch events as resources are created and update to reach a stable state.

What's Changed

Full Changelog: crossplane/crossplane@v2.1.0...v2.1.1

v2.1.0

Compare Source

The v2.1.0 release is a regular quarterly Crossplane release that is focused on maturing a number of key areas of functionality across the project, as Crossplane continues to become more capable, more reliable, and more performant for your production workloads. After the major v2.0 release, we spent time focusing on polishing and hardening the experience with the goal of enhancing core reliability.

⚠️ Upgrade from v2.0

It is strongly advised to upgrade to v2.1 from the previous minor version, which is v2.0. Upon upgrade for each minor release, Crossplane performs any necessary migrations of its CRDs to ensure the latest versions are stored in the Kubernetes API server. Therefore, it is important to upgrade sequentially through one minor version at a time as described in the upgrade docs.

🎉 Highlights

  • XR circuit breaker: A circuit breaker was added to all Composite Resource (XR) controllers in #​6777 to prevent reconciliation thrashing when controllers fight over composed resource state. This addresses a common cause of excessive resource (CPU) usage.
    • Each circuit breaker monitors reconciliation rates for their XR and opens ("breaks the circuit") when thresholds are exceeded (50 burst, 1 every 2s sustained). While open, it blocks most reconcile requests but allows one through every 30 seconds. The circuit stays open for 5 minutes, then automatically closes and returns to normal operation. If thrashing resumes, the circuit will open again.
  • Realtime compositions for namespaced XRs: #​6780 fixes an issue where namespaced XRs were not being reconciled in response to changes in their composed resources.
  • crossplane render for remote Docker daemons: #​6799 fixes an issue that prevented crossplane render from establishing a connection to the remote Docker host.
    • crossplane render now allows function annotations to be passed on the command line with -a/--function-annotations flags. Two new function annotations are now supported:
      • render.crossplane.io/runtime-docker-publish-address controls the host address Docker publishes the container port to (defaults to 127.0.0.1 for security)
      • render.crossplane.io/runtime-docker-target controls the address the CLI connects to (defaults to the publish address)
  • XRD change detection: In previous versions of Crossplane, XRD spec fields could change without the XR controller being restarted automatically. With #​6806, users no longer need to manually restart the Crossplane deployment for some XRD changes to take effect.

🚨 Warnings and breaking changes

  • Crossplane's custom rate limiting implementation as well as client-side rate limiting has been removed in #​6851 as proposed and described in detail in #​6790.
    • Crossplane's reconcilers will rely on a combination of the Kubernetes API Priority and Fairness, the circuit breaker described in the highlights below, and worker pool size configuration to appropriately manage reconciliation load and retries in the control plane.
    • --max-concurrent-reconciles can be set to influence the maximum number of concurrent reconcile operations (worker pool size) that Crossplane will perform.
      • The --max-reconcile-rate flag has been renamed to this new --max-concurrent-reconciles flag to better represent what this flag controls
      • The old --max-reconcile-rate flag is now an alias for the new flag name
    • Providers are unaffected by this change, only core Crossplane reconcilers are affected.

🏅 Release MVP

@​binarycode is the v2.1 release MVP! They discovered a critical issue preventing realtime compositions from functioning correctly for namespaced XRs. Their fix in #​6780 now properly configures an index for each namespaced XR so that events generated from changes in their composed resources correctly result in the XR being enqueued for reconciliation.

Thank you very much to @​binarycode, our latest release MVP! 🙇‍♂️

What's Changed

New Contributors


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch from bd1e931 to dc17b5f Compare August 10, 2025 03:46
@pipelines-github-app
Copy link
Contributor Author

pipelines-github-app bot commented Aug 10, 2025

--- main/crossplane_gitops_manifests_crossplane_genmachine_manifest_main.yaml	2026-03-11 04:31:17.978352612 +0000
+++ pr/crossplane_gitops_manifests_crossplane_genmachine_manifest_pr.yaml	2026-03-11 04:31:17.025352120 +0000
@@ -1,42 +1,44 @@
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: rbac-manager
   namespace: default
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
+automountServiceAccountToken: true
 ---
 # Source: crossplane/charts/crossplane/templates/serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: crossplane
   namespace: default
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
+automountServiceAccountToken: true
 ---
 # Source: crossplane/charts/komoplane/templates/serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: crossplane-komoplane
   labels:
     helm.sh/chart: komoplane-0.1.6
     app.kubernetes.io/name: komoplane
     app.kubernetes.io/instance: crossplane
@@ -76,46 +78,46 @@
   namespace: default
 type: Opaque
 ---
 # Source: crossplane/charts/crossplane/templates/clusterrole.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-crossplane: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/clusterrole.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:system:aggregate-to-crossplane
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
     crossplane.io/scope: "system"
     rbac.crossplane.io/aggregate-to-crossplane: "true"
 rules:
 - apiGroups:
   - ""
   resources:
   - events
   verbs:
   - create
   - update
@@ -142,22 +144,23 @@
   - delete
 - apiGroups:
   - ""
   resources:
   - serviceaccounts
   - services
   verbs:
   - "*"
 - apiGroups:
   - apiextensions.crossplane.io
+  - ops.crossplane.io
   - pkg.crossplane.io
-  - secrets.crossplane.io
+  - protection.crossplane.io
   resources:
   - "*"
   verbs:
   - "*"
 - apiGroups:
   - extensions
   - apps
   resources:
   - deployments
   verbs:
@@ -196,46 +199,46 @@
   - watch
   - delete
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-allowed-provider-permissions.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:allowed-provider-permissions
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-allowed-provider-permissions: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-clusterrole.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-rbac-manager
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 rules:
 - apiGroups:
   - ""
   resources:
   - events
   verbs:
   - create
   - update
   - patch
   - delete
@@ -356,104 +359,104 @@
   - watch
   - delete
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-admin
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-admin: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-edit
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-edit: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-view
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-view: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane-browse
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 aggregationRule:
   clusterRoleSelectors:
   - matchLabels:
       rbac.crossplane.io/aggregate-to-browse: "true"
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:aggregate-to-admin
   labels:
     rbac.crossplane.io/aggregate-to-admin: "true"
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 rules:
 # Crossplane administrators have access to view events.
 - apiGroups: [""]
   resources: [events]
   verbs: [get, list, watch]
 # Crossplane administrators must create provider credential secrets, and may
 # need to read or otherwise interact with connection secrets. They may also need
 # to create or annotate namespaces.
 - apiGroups: [""]
   resources: [secrets, namespaces]
@@ -478,36 +481,44 @@
   resources: ["*"]
   verbs: ["*"]
 - apiGroups:
   - secrets.crossplane.io
   resources: ["*"]
   verbs: ["*"]
 # Crossplane administrators have access to view CRDs in order to debug XRDs.
 - apiGroups: [apiextensions.k8s.io]
   resources: [customresourcedefinitions]
   verbs: [get, list, watch]
+- apiGroups:
+    - protection.crossplane.io
+  resources: ["*"]
+  verbs: ["*"]
+- apiGroups:
+    - ops.crossplane.io
+  resources: ["*"]
+  verbs: ["*"]
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:aggregate-to-edit
   labels:
     rbac.crossplane.io/aggregate-to-edit: "true"
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 rules:
 # Crossplane editors have access to view events.
 - apiGroups: [""]
   resources: [events]
   verbs: [get, list, watch]
 # Crossplane editors must create provider credential secrets, and may need to
 # read or otherwise interact with connection secrets.
 - apiGroups: [""]
   resources: [secrets]
   verbs: ["*"]
@@ -521,36 +532,44 @@
   resources: ["*"]
   verbs: ["*"]
 - apiGroups:
   - pkg.crossplane.io
   resources: ["*"]
   verbs: ["*"]
 - apiGroups:
   - secrets.crossplane.io
   resources: ["*"]
   verbs: ["*"]
+- apiGroups:
+    - protection.crossplane.io
+  resources: ["*"]
+  verbs: ["*"]
+- apiGroups:
+    - ops.crossplane.io
+  resources: ["*"]
+  verbs: ["*"]
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:aggregate-to-view
   labels:
     rbac.crossplane.io/aggregate-to-view: "true"
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 rules:
 # Crossplane viewers have access to view events.
 - apiGroups: [""]
   resources: [events]
   verbs: [get, list, watch]
 # Crossplane viewers may see which namespaces exist.
 - apiGroups: [""]
   resources: [namespaces]
   verbs: [get, list, watch]
 # Crossplane viewers have read-only access to built in Crossplane types.
@@ -559,36 +578,44 @@
   resources: ["*"]
   verbs: [get, list, watch]
 - apiGroups:
   - pkg.crossplane.io
   resources: ["*"]
   verbs: [get, list, watch]
 - apiGroups:
   - secrets.crossplane.io
   resources: ["*"]
   verbs: [get, list, watch]
+- apiGroups:
+    - protection.crossplane.io
+  resources: ["*"]
+  verbs: [get, list, watch]
+- apiGroups:
+    - ops.crossplane.io
+  resources: ["*"]
+  verbs: [get, list, watch]
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: crossplane:aggregate-to-browse
   labels:
     rbac.crossplane.io/aggregate-to-browse: "true"
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 rules:
 # Crossplane browsers have access to view events.
 - apiGroups: [""]
   resources: [events]
   verbs: [get, list, watch]
 # Crossplane browsers have read-only access to compositions and XRDs. This
 # allows them to discover and select an appropriate composition when creating a
 # resource claim.
 - apiGroups:
   - apiextensions.crossplane.io
@@ -611,73 +638,73 @@
     resources: ["*"]
     verbs: ["get", "list", "watch"]
 ---
 # Source: crossplane/charts/crossplane/templates/clusterrolebinding.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   name: crossplane
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
   name: crossplane
 subjects:
 - kind: ServiceAccount
   name: crossplane
   namespace: default
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-clusterrolebinding.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   name: crossplane-rbac-manager
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
   name: crossplane-rbac-manager
 subjects:
 - kind: ServiceAccount
   name: rbac-manager
   namespace: default
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-managed-clusterroles.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   name: crossplane-admin
   labels:
     app: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
   name: crossplane-admin
 subjects:
 - apiGroup: rbac.authorization.k8s.io
   kind: Group
   name: crossplane:masters
 ---
 # Source: crossplane/charts/komoplane/templates/serviceaccount.yaml
@@ -702,27 +729,27 @@
 ---
 # Source: crossplane/charts/crossplane/templates/service.yaml
 apiVersion: v1
 kind: Service
 metadata:
   name: crossplane-webhooks
   namespace: default
   labels:
     app: crossplane
     release: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
   annotations:
 spec:
   selector:
     app: crossplane
     release: crossplane
   ports:
   - protocol: TCP
     port: 9443
     targetPort: 9443
 ---
@@ -750,57 +777,59 @@
 ---
 # Source: crossplane/charts/crossplane/templates/deployment.yaml
 apiVersion: apps/v1
 kind: Deployment
 metadata:
   name: crossplane
   namespace: default
   labels:
     app: crossplane
     release: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 spec:
   replicas: 1
   selector:
     matchLabels:
       app: crossplane
       release: crossplane
   strategy:
     type: RollingUpdate
   template:
     metadata:
       labels:
         app: crossplane
         release: crossplane        
-        helm.sh/chart: crossplane-1.20.5
+        helm.sh/chart: crossplane-2.2.0
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: cloud-infrastructure-controller
         app.kubernetes.io/part-of: crossplane
         app.kubernetes.io/name: crossplane
         app.kubernetes.io/instance: crossplane
-        app.kubernetes.io/version: "1.20.5"
+        app.kubernetes.io/version: "2.2.0"
     spec:
       serviceAccountName: crossplane
       hostNetwork: false
       initContainers:
-        - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.5"
+        - name: crossplane-init
+          image: "xpkg.upbound.io/crossplane/crossplane:v2.2.0"
+          imagePullPolicy: IfNotPresent
           args:
           - core
           - init
-          imagePullPolicy: IfNotPresent
-          name: crossplane-init
+          - --activation
+          - "*"
           resources:
             limits:
               cpu: 500m
               memory: 1024Mi
             requests:
               cpu: 100m
               memory: 256Mi
           securityContext:
             allowPrivilegeEscalation: false
             readOnlyRootFilesystem: true
@@ -835,26 +864,26 @@
                 fieldPath: metadata.namespace
           - name: "WEBHOOK_SERVICE_PORT"
             value: "9443"
           - name: "TLS_CA_SECRET_NAME"
             value: crossplane-root-ca
           - name: "TLS_SERVER_SECRET_NAME"
             value: crossplane-tls-server
           - name: "TLS_CLIENT_SECRET_NAME"
             value: crossplane-tls-client
       containers:
-      - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.5"
+      - name: crossplane
+        image: "xpkg.upbound.io/crossplane/crossplane:v2.2.0"
         args:
         - core
         - start
         imagePullPolicy: IfNotPresent
-        name: crossplane
         resources:
             limits:
               cpu: 500m
               memory: 1024Mi
             requests:
               cpu: 100m
               memory: 256Mi
         startupProbe:
           failureThreshold: 30
           periodSeconds: 2
@@ -928,56 +957,56 @@
 ---
 # Source: crossplane/charts/crossplane/templates/rbac-manager-deployment.yaml
 apiVersion: apps/v1
 kind: Deployment
 metadata:
   name: crossplane-rbac-manager
   namespace: default
   labels:
     app: crossplane-rbac-manager
     release: crossplane    
-    helm.sh/chart: crossplane-1.20.5
+    helm.sh/chart: crossplane-2.2.0
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: cloud-infrastructure-controller
     app.kubernetes.io/part-of: crossplane
     app.kubernetes.io/name: crossplane
     app.kubernetes.io/instance: crossplane
-    app.kubernetes.io/version: "1.20.5"
+    app.kubernetes.io/version: "2.2.0"
 spec:
   replicas: 1
   selector:
     matchLabels:
       app: crossplane-rbac-manager
       release: crossplane
   strategy:
     type: RollingUpdate
   template:
     metadata:
       labels:
         app: crossplane-rbac-manager
         release: crossplane        
-        helm.sh/chart: crossplane-1.20.5
+        helm.sh/chart: crossplane-2.2.0
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: cloud-infrastructure-controller
         app.kubernetes.io/part-of: crossplane
         app.kubernetes.io/name: crossplane
         app.kubernetes.io/instance: crossplane
-        app.kubernetes.io/version: "1.20.5"
+        app.kubernetes.io/version: "2.2.0"
     spec:
       serviceAccountName: rbac-manager
       initContainers:
-      - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.5"
+      - name: crossplane-init
+        image: "xpkg.upbound.io/crossplane/crossplane:v2.2.0"
         args:
         - rbac
         - init
         imagePullPolicy: IfNotPresent
-        name: crossplane-init
         resources:
             limits:
               cpu: 100m
               memory: 512Mi
             requests:
               cpu: 100m
               memory: 256Mi
         securityContext:
             allowPrivilegeEscalation: false
             readOnlyRootFilesystem: true
@@ -990,27 +1019,27 @@
                 containerName: crossplane-init
                 resource: limits.cpu
                 divisor: "1"
           - name: GOMEMLIMIT
             valueFrom:
               resourceFieldRef:
                 containerName: crossplane-init
                 resource: limits.memory
                 divisor: "1"
       containers:
-      - image: "xpkg.upbound.io/crossplane/crossplane:v1.20.5"
+      - name: crossplane
+        image: "xpkg.upbound.io/crossplane/crossplane:v2.2.0"
         args:
         - rbac
         - start
         - --provider-clusterrole=crossplane:allowed-provider-permissions
         imagePullPolicy: IfNotPresent
-        name: crossplane
         resources:
             limits:
               cpu: 100m
               memory: 512Mi
             requests:
               cpu: 100m
               memory: 256Mi
         securityContext:
             allowPrivilegeEscalation: false
             readOnlyRootFilesystem: true
 

@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 9 times, most recently from 5d59b56 to 1854aa0 Compare August 16, 2025 03:42
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 6 times, most recently from 70ef672 to 67c5cd8 Compare August 23, 2025 03:30
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 8 times, most recently from e38b53f to e1e65aa Compare September 1, 2025 03:47
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 5 times, most recently from 75543c6 to 20ab540 Compare September 5, 2025 03:26
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 7 times, most recently from ec33eff to a714c71 Compare September 23, 2025 03:25
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 6 times, most recently from f1e4bb2 to 0c6a90c Compare September 30, 2025 03:27
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 7 times, most recently from 67283c1 to 1a80378 Compare October 8, 2025 03:26
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 6 times, most recently from f736a5e to ee4a912 Compare October 15, 2025 03:33
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-2-crossplane-genmachine branch 3 times, most recently from 56ad5a2 to a9280bc Compare October 17, 2025 03:30
| datasource | package                               | from    | to     |
| ---------- | ------------------------------------- | ------- | ------ |
| helm       | crossplane                            | 1.20.5  | 2.2.0  |
| docker     | xpkg.upbound.io/crossplane/crossplane | v1.20.5 | v2.2.0 |


Co-authored-by: renovate[bot] <renovate@whitesourcesoftware.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants