This command pushes imgpkg bundles, plain Docker images, or Helm charts (for VMware Telco Cloud Automation based product deployments) to the associated registry.
Some important prerequisites:
- It is not recommended to provide registry credentials at the command line. Alternatively,
docker login
can be executed prior to invokingtcxctl
for better security.
tcxctl push
The following are the examples for pushing the artifacts to the harbor registry.
- Push artifacts to Harbor:
tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer --registry <harbor-registry-fqdn>/<project-name> --registry-password <your-registry-password> --registry-username <your-registry-username> --registry-cert <path-to-your-registry-ca-certificate-file>
- Certificate signed by known authority:
tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer/ --registry <HarborIP>/tcx --registry-password <password> --registry-username <username>
- Self-signed certificate:
- Copy the cert file in /etc/ssl/certs directory.
- If you do not have permission to directory /etc/ssl/certs, then put the cert in any other location where you have access and then follow the procedure:
- Check if trust command is available by running
trust list
. If not, then install packagep11-kit-trust
. - Run
trust anchor <path-to-cert>
:tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer/ --registry <HarborIP>/tcx --registry-password <password> --registry-username <username> --registry-cert <cert_location>
- Check if trust command is available by running
- Push chart to chartrepo in Harbor:
export PUSH_TO_CHART_REPO=true tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer/ --registry <registry_url> --registry-password <password> --registry-username <username> --registry-cert <cert_location>
- Certificate signed by known authority:
- Push artifacts to ACR
tcxctl push --artifacts-path <artifacts_path> --registry <acr_url> --registry-password <password> --registry-username <username>