This operator sets up a new ingresscontroller with custom certificate as a day-2 operation. The public DNS record of this new ingresscontroller can then be used by external DNS to create a wildcard CNAME record to for a custom domain.
On cluster, a CustomDomain
custom resource creates an IngressController
, which creates a set of router pods.
graph LR
A[customdomains] --> B[ingresscontrollers]
subgraph openshift-ingress-controller
B
end
B --> C[Router pods]
subgraph openshift-ingress
C
end
On versions of Managed Openshift (OSD/ROSA) greater than version 4.14 (or version 4.13 if the =ext-managed.openshift.io/legacy-ingress-support= flag is switched on for the cluster) the Custom Domains Operator will no longer reconcile new CustomDomain
objects. Existing CustomDomain
objects will be converted to native Openshift IngressController
resources, and their HAProxy
workloads allowed to be scheduled onto customer worker nodes. Consult https://access.redhat.com/articles/7028653 for further information.
- Go 1.19+
- Operator-SDK v1.25+
Also see Deploying the operator from a development branch for testing
Create Custom Resource Definition (CRD)
oc apply -f deploy/crds/managed.openshift.io_customdomains_crd.yaml
operator-sdk run --local --namespace ''
Choose public container registry e.g. 'quay.io/acme'. Build and push the image, then update the operator deployment manifest.
Example:
# deploy manifests
oc apply -f deploy/crds/managed.openshift.io_customdomains.yaml
oc apply -f deploy/
# build
make docker-build docker-push
# update image with image in build output
oc set image -n openshift-custom-domains-operator deployment/custom-domains-operator custom-domains-operator=quay.io/dustman9000/custom-domains-operator:v0.1.29-a48b301e
See TESTING