This command pushes imgpkg bundles, plain Docker images, or Helm charts (for VMware Telco Cloud Automation based product deployments) to the associated registry.

Some important prerequisites:
  • It is not recommended to provide registry credentials at the command line. Alternatively, docker login can be executed prior to invoking tcxctl for better security.

tcxctl push

The following are the examples for pushing the artifacts to the harbor registry.
  • Push artifacts to Harbor:
    tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer --registry <harbor-registry-fqdn>/<project-name> --registry-password <your-registry-password> --registry-username <your-registry-username> --registry-cert <path-to-your-registry-ca-certificate-file>
    • Certificate signed by known authority:
      tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer/ --registry <HarborIP>/tcx --registry-password <password> --registry-username <username>
    • Self-signed certificate:
      • Copy the cert file in /etc/ssl/certs directory.
      • If you do not have permission to directory /etc/ssl/certs, then put the cert in any other location where you have access and then follow the procedure:
        • Check if trust command is available by running trust list. If not, then install package p11-kit-trust.
        • Run trust anchor <path-to-cert>:
          tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer/ --registry <HarborIP>/tcx --registry-password <password> --registry-username <username> --registry-cert <cert_location>
    • Push chart to chartrepo in Harbor:
      export PUSH_TO_CHART_REPO=true
      tcxctl push --artifacts-path $TCSA_WORK_SPACE/tcx-deployer/ --registry <registry_url> --registry-password <password> --registry-username <username> --registry-cert <cert_location>
  • Push artifacts to ACR
    tcxctl push --artifacts-path <artifacts_path> --registry <acr_url> --registry-password <password> --registry-username <username>