Skip to content

feat(mrap): adding mrap, use mrap for e2e tests#174

Open
haarchri wants to merge 1 commit intomainfrom
feature/mrap
Open

feat(mrap): adding mrap, use mrap for e2e tests#174
haarchri wants to merge 1 commit intomainfrom
feature/mrap

Conversation

@haarchri
Copy link
Member

@haarchri haarchri commented Feb 8, 2026

Description of your changes

  • adding mrap and package with configuration package
  • disable the default mrap * in e2e test controlplane

Fixes #

I have:

  • Read and followed Upbound's contribution process.
  • Run make reviewable to ensure this PR is ready for review.
  • Added backport release-x.y labels to auto-backport this PR, as appropriate.

How has this code been tested

  ✓   Finding test resources
Cleanup summary: 0 deleted, 0 remaining after 0 attempts
Tearing down test control plane...

Test control plane deleted

SUCCESS: 
SUCCESS: Tests Summary:
SUCCESS: ------------------
SUCCESS: Total Tests Executed: 1
SUCCESS: Passed tests:         1
SUCCESS: Failed tests:         0
kubectl get crds | grep "aws.m.upbound.io"         
clusterproviderconfigs.aws.m.upbound.io                         2026-02-08T21:06:43Z
internetgateways.ec2.aws.m.upbound.io                           2026-02-08T21:06:50Z
mainroutetableassociations.ec2.aws.m.upbound.io                 2026-02-08T21:06:50Z
providerconfigs.aws.m.upbound.io                                2026-02-08T21:06:43Z
providerconfigusages.aws.m.upbound.io                           2026-02-08T21:06:43Z
routes.ec2.aws.m.upbound.io                                     2026-02-08T21:06:52Z
routetableassociations.ec2.aws.m.upbound.io                     2026-02-08T21:06:51Z
routetables.ec2.aws.m.upbound.io                                2026-02-08T21:06:51Z
securitygrouprules.ec2.aws.m.upbound.io                         2026-02-08T21:06:51Z
securitygroups.ec2.aws.m.upbound.io                             2026-02-08T21:06:51Z
subnets.ec2.aws.m.upbound.io                                    2026-02-08T21:06:54Z
vpcs.ec2.aws.m.upbound.io                                       2026-02-08T21:06:54Z
kubectl get ManagedResourceActivationPolicy -o yaml
apiVersion: v1
items:
- apiVersion: apiextensions.crossplane.io/v1alpha1
  kind: ManagedResourceActivationPolicy
  metadata:
    creationTimestamp: "2026-02-08T21:06:43Z"
    generation: 1
    name: configuration-aws-network
    ownerReferences:
    - apiVersion: pkg.crossplane.io/v1
      blockOwnerDeletion: true
      controller: true
      kind: ConfigurationRevision
      name: configuration-aws-network-944209d843c8
      uid: 22884aea-2e0f-4482-a5c1-a780ea0b4314
    - apiVersion: pkg.crossplane.io/v1
      blockOwnerDeletion: true
      controller: false
      kind: Configuration
      name: configuration-aws-network
      uid: 14e8db91-39c8-45c7-8672-369185db0636
    resourceVersion: "1671"
    uid: 0f707ac3-ac59-4d58-a5f0-2dc2b6235bb0
  spec:
    activate:
    - internetgateways.ec2.aws.m.upbound.io
    - mainroutetableassociations.ec2.aws.m.upbound.io
    - routes.ec2.aws.m.upbound.io
    - routetableassociations.ec2.aws.m.upbound.io
    - routetables.ec2.aws.m.upbound.io
    - securitygrouprules.ec2.aws.m.upbound.io
    - securitygroups.ec2.aws.m.upbound.io
    - subnets.ec2.aws.m.upbound.io
    - vpcs.ec2.aws.m.upbound.io
  status:
    activated:
    - internetgateways.ec2.aws.m.upbound.io
    - mainroutetableassociations.ec2.aws.m.upbound.io
    - routes.ec2.aws.m.upbound.io
    - routetableassociations.ec2.aws.m.upbound.io
    - routetables.ec2.aws.m.upbound.io
    - securitygrouprules.ec2.aws.m.upbound.io
    - securitygroups.ec2.aws.m.upbound.io
    - subnets.ec2.aws.m.upbound.io
    - vpcs.ec2.aws.m.upbound.io
    conditions:
    - lastTransitionTime: "2026-02-08T21:06:44Z"
      observedGeneration: 1
      reason: Running
      status: "True"
      type: Healthy
- apiVersion: apiextensions.crossplane.io/v1alpha1
  kind: ManagedResourceActivationPolicy
  metadata:
    creationTimestamp: "2026-02-08T21:04:26Z"
    generation: 2
    name: default
    resourceVersion: "857"
    uid: f5bc5368-4c54-4f02-b7f3-5bd9a3c4fc7b
  spec:
    activate:
    - ""
  status:
    conditions:
    - lastTransitionTime: "2026-02-08T21:06:13Z"
      observedGeneration: 2
      reason: Running
      status: "True"
      type: Healthy
kind: List
metadata:
  resourceVersion: ""

Signed-off-by: Christopher Haar <christopher.haar@upbound.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants