Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

added '--store' to missing commands #93

Merged
merged 6 commits into from
Jun 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions docs/carbide-charts.md
Original file line number Diff line number Diff line change
Expand Up @@ -73,20 +73,20 @@ EOF

# fetch the content from generated hauler manifest
# verify the version and the platform/architecture
hauler store sync --files carbide-charts.yaml --store carbide-store --platform <platform/arch>
hauler store sync --store carbide-store --files carbide-charts.yaml --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename carbide-charts.tar.zst
hauler store save --store carbide-store --filename carbide-charts.tar.zst
```

#### On Airgapped Environment

```bash
# load the content from the tarball to the hauler store
hauler store load carbide-charts.tar.zst
hauler store load --store carbide-store carbide-charts.tar.zst

# server the content from the hauler store
hauler store serve fileserver
hauler store serve fileserver --store carbide-store

# example install of a helm chart
helm install <release-name> http://<FQDN or IP>:<PORT>/<chart>.tgz
Expand Down
33 changes: 17 additions & 16 deletions docs/registry-docs/copying-images.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,10 +38,11 @@ EOF

# fetch the content from generated hauler manifest
# verify the location of the key and the platform/architecture
hauler store sync --files carbide-images.yaml --store carbide-store --platform <platform/arch>
# key verification is not used here due to natsio images not being signed
hauler store sync --store carbide-store --files carbide-images.yaml --platform <platform/arch>

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store carbide-store --username <redacted> --password <redacted> registry://<registry-url>
```

## K3s
Expand All @@ -55,10 +56,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products k3s=v1.27.12-k3s1 --key carbide-key.pub --store k3s-store --platform <platform/arch>
hauler store sync --store k3s-store --products k3s=v1.27.12-k3s1 --key carbide-key.pub --platform <platform/arch>

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store k3s-store --username <redacted> --password <redacted> registry://<registry-url>
```

## RKE2
Expand All @@ -72,10 +73,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products rke2=v1.27.12+rke2r1 --key carbide-key.pub --store rke2-store --platform <platform/arch>
hauler store sync --store rke2-store --products rke2=v1.27.12+rke2r1 --key carbide-key.pub --platform <platform/arch>

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store rke2-store --username <redacted> --password <redacted> registry://<registry-url>
```

## Rancher
Expand All @@ -91,10 +92,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products cert-manager=v1.14.4 --key carbide-key.pub --store certmanager-store --platform <platform/arch>
hauler store sync --store certmanager-store --products cert-manager=v1.14.4 --key carbide-key.pub --platform <platform/arch>

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store certmanager-store --username <redacted> --password <redacted> registry://<registry-url>
```

### Rancher
Expand All @@ -108,10 +109,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products rancher=v2.8.3 --key carbide-key.pub --store rancher-store --platform <platform/arch>
hauler store sync --store rancher-store --products rancher=v2.8.3 --key carbide-key.pub --platform <platform/arch>

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store rancher-store --username <redacted> --password <redacted> registry://<registry-url>
```

## Longhorn
Expand All @@ -125,10 +126,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products longhorn=v1.6.1 --key carbide-key.pub --store longhorn-store --platform <platform/arch>
hauler store sync --store longhorn-store --products longhorn=v1.6.1 --key carbide-key.pub --platform <platform/arch>

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store longhorn-store --username <redacted> --password <redacted> registry://<registry-url>
```

## NeuVector
Expand All @@ -142,10 +143,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products neuvector=v5.3.2 --key carbide-key.pub --store neuvector-store --platform <platform/arch>
hauler store sync --store neuvector-store --products neuvector=v5.3.2 --key carbide-key.pub --platform <platform/arch>

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store neuvector-store --username <redacted> --password <redacted> registry://<registry-url>
```

## Kubewarden
Expand All @@ -159,8 +160,8 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products kubewarden=kubewarden-controller-2.0.11 --key carbide-key.pub --store kubewarden-store --platform <platform/arch>
hauler store sync --store kubewarden-store --products kubewarden=kubewarden-controller-2.0.11 --key carbide-key.pub --platform <platform/arch>

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store kubewarden-store --username <redacted> --password <redacted> registry://<registry-url>
```
33 changes: 17 additions & 16 deletions docs/registry-docs/downloading-images.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,10 +38,11 @@ EOF

# fetch the content from generated hauler manifest
# verify the location of the key and the platform/architecture
hauler store sync --files carbide-images.yaml --store carbide-store --platform <platform/arch>
# key verification is not used here due to natsio images not being signed
hauler store sync --store carbide-store --files carbide-images.yaml --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename carbide-images.tar.zst
hauler store save --store carbide-store --filename carbide-images.tar.zst
```

## K3s
Expand All @@ -55,10 +56,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products k3s=v1.27.12-k3s1 --key carbide-key.pub --store k3s-store --platform <platform/arch>
hauler store sync --store k3s-store --products k3s=v1.27.12-k3s1 --key carbide-key.pub --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename k3s-images.tar.zst
hauler store save --store k3s-store --filename k3s-images.tar.zst
```

## RKE2
Expand All @@ -72,10 +73,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products rke2=v1.27.12+rke2r1 --key carbide-key.pub --store rke2-store --platform <platform/arch>
hauler store sync --store rke2-store --products rke2=v1.27.12+rke2r1 --key carbide-key.pub --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename rke2-images.tar.zst
hauler store save --store rke2-store --filename rke2-images.tar.zst
```

## Rancher
Expand All @@ -91,10 +92,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products cert-manager=v1.14.4 --key carbide-key.pub --store certmanager-store --platform <platform/arch>
hauler store sync --store certmanager-store --products cert-manager=v1.14.4 --key carbide-key.pub --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename certmanager-images.tar.zst
hauler store save --store certmanager-store --filename certmanager-images.tar.zst
```

### Rancher
Expand All @@ -108,10 +109,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products rancher=v2.8.3 --key carbide-key.pub --store rancher-store --platform <platform/arch>
hauler store sync --store rancher-store --products rancher=v2.8.3 --key carbide-key.pub --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename rancher-images.tar.zst
hauler store save --store rancher-store --filename rancher-images.tar.zst
```

## Longhorn
Expand All @@ -125,10 +126,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products longhorn=v1.6.1 --key carbide-key.pub --store longhorn-store --platform <platform/arch>
hauler store sync --store longhorn-store --products longhorn=v1.6.1 --key carbide-key.pub --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename longhorn-images.tar.zst
hauler store save --store longhorn-store --filename longhorn-images.tar.zst
```

## NeuVector
Expand All @@ -142,10 +143,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products neuvector=v5.3.2 --key carbide-key.pub --store neuvector-store --platform <platform/arch>
hauler store sync --store neuvector-store --products neuvector=v5.3.2 --key carbide-key.pub --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename neuvector-images.tar.zst
hauler store save --store neuvector-store --filename neuvector-images.tar.zst
```

## Kubewarden
Expand All @@ -159,10 +160,10 @@ curl -sfOL https://raw.githubusercontent.com/rancherfederal/carbide-releases/mai

# fetch the content from the carbide secured registry
# verify the version, location of the key, and the platform/architecture
hauler store sync --products kubewarden=kubewarden-controller-2.0.11 --key carbide-key.pub --store kubewarden-store --platform <platform/arch>
hauler store sync --store kubewarden-store --products kubewarden=kubewarden-controller-2.0.11 --key carbide-key.pub --platform <platform/arch>

# save and output the content from the hauler store to tarball
hauler store save --filename kubewarden-images.tar.zst
hauler store save --store kubewarden-store --filename kubewarden-images.tar.zst
```

See [Loading Local Images to Registry](loading-images.md) for information on loading the images into your airgapped registry.
32 changes: 16 additions & 16 deletions docs/registry-docs/loading-images.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,30 +8,30 @@ Make sure you've checked out the section on [Downloading Images](downloading-ima

```bash
# load the content from the tarball to the hauler store
hauler store load carbide-images.tar.zst
hauler store load --store carbide-store carbide-images.tar.zst

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store carbide-store --username <redacted> --password <redacted> registry://<registry-url>
```

## K3s

```bash
# load the content from the tarball to the hauler store
hauler store load k3s-images.tar.zst
hauler store load --store k3s-store k3s-images.tar.zst

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store k3s-store --username <redacted> --password <redacted> registry://<registry-url>
```

## RKE2

```bash
# load the content from the tarball to the hauler store
hauler store load rke2-images.tar.zst
hauler store load --store rke2-store rke2-images.tar.zst

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store rke2-store --username <redacted> --password <redacted> registry://<registry-url>
```

## Rancher
Expand All @@ -40,48 +40,48 @@ hauler store copy --username <redacted> --password <redacted> registry://<regist

```bash
# load the content from the tarball to the hauler store
hauler store load certmanager-images.tar.zst
hauler store load --store certmanager-store certmanager-images.tar.zst

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store certmanager-store --username <redacted> --password <redacted> registry://<registry-url>
```

### Rancher

```bash
# load the content from the tarball to the hauler store
hauler store load rancher-images.tar.zst
hauler store load --store rancher-store rancher-images.tar.zst

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store rancher-store --username <redacted> --password <redacted> registry://<registry-url>
```

## Longhorn

```bash
# load the content from the tarball to the hauler store
hauler store load longhorn-images.tar.zst
hauler store load --store longhorn-store longhorn-images.tar.zst

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store longhorn-store --username <redacted> --password <redacted> registry://<registry-url>
```

## NeuVector

```bash
# load the content from the tarball to the hauler store
hauler store load neuvector-images.tar.zst
hauler store load --store neuvector-store neuvector-images.tar.zst

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store neuvector-store --username <redacted> --password <redacted> registry://<registry-url>
```

## Kubewarden

```bash
# load the content from the tarball to the hauler store
hauler store load kubewarden-images.tar.zst
hauler store load --store kubewarden-store kubewarden-images.tar.zst

# copy the content from the hauler store to your registry
hauler store copy --username <redacted> --password <redacted> registry://<registry-url>
hauler store copy --store kubewarden-store --username <redacted> --password <redacted> registry://<registry-url>
```