To push artifacts to the Harbor registry, run the script from $TCSA_WORK_SPACE/tcx-deployer/clis.
For Self-signed certificates for Harbor, follow the below procedure:
- Copy the Harbor Certs file in
/etc/ssl/certs
directory. - If you do not have permission to the directory
/etc/ssl/certs
, then put the Harbor Cert in any other location where you have access, and run the below command:trust anchor <path-to-cert>
- If
trust
command is not available, then installp11-kit-trust
package which containstrust
command.
- If
Note: If you are using secure Harbor registry, ensure that you perform the steps mentioned in
Secure Harbor Registry for public or self-signed certificates.
If you do not want to specify the registry username and password in the installation script, perform Docker login. To login to Docker, run the following command:
docker login <harbor-fqdn>
Ensure that the --registry-password
does not have the comma character in it. If the comma is used, escape it using the backslash.
- Set the following variable to false so that the charts are pushed with the OCI compliant in VMware Telco Cloud Service Assurance 2.3. By default, PUSH_TO_CHART_REPO=false. If
PUSH_TO_CHART_REPO=true
, you must set it to false before deployment.PUSH_TO_CHART_REPO=false
Note: If the Harbor registry is OCI compliant, then setPUSH_TO_CHART_REPO=false
, otherwise, setPUSH_TO_CHART_REPO=true
to push the charts in the non-OCI format. - Run the following script to push artifacts to registry.
root [ ~/base/tcx-deployer/ ]# ./tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer/ --registry <harbor-registry-fqdn>/<project-name> --registry-password <your-registry-password> --registry-username <your-registry-username> --registry-cert <path-to-your-registry-ca-certificate-file>
Note: The--registry-cert
is an optional parameter. If you are using a private certification-based Harbor, you must pass a certificate path value to it.