centos 에서 yum nginx 설치
Pre-Built Packages for Stable version
To set up the yum repository for RHEL/CentOS, choose the corresponding
nginx-release
package from the list: RHEL 5
RHEL 6
CentOS 5
CentOS 6
This package contains yum configuration file and a public PGP key necessary to authenticate signed RPMs. Download and install it, then run the following:
yum install nginx
Alternatively, a repository configuration can be added manually without installing the
nginx-release
package. Create the file named /etc/yum.repos.d/nginx.repo
with the following contents: [nginx]
name=nginx repo
baseurl=http://nginx.org/packages/OS/OSRELEASE/$basearch/
gpgcheck=0
enabled=1
Replace “
OS
” with “ rhel
” or “ centos
”, depending on the distribution used, and “ OSRELEASE
” with “ 5
” or “ 6
”, for 5.x or 6.x versions, respectively. For Debian/Ubuntu, in order to authenticate the nginx repository signature and to eliminate warnings about missing PGP key during installation of the nginx package, it is necessary to add the key used to sign the nginx packages and repository to the
apt
program keyring. Please download this key from our web site, and add it to the apt
program keyring with the following command: sudo apt-key add nginx_signing.key
For Debian replace codename with Debian distribution codename , and append the following to the end of the
/etc/apt/sources.list
file: deb http://nginx.org/packages/debian/ codename nginx
deb-src http://nginx.org/packages/debian/ codename nginx
For Ubuntu replace codename with Ubuntu distribution codename , and append the following to the end of the
/etc/apt/sources.list
file: deb http://nginx.org/packages/ubuntu/ codename nginx
deb-src http://nginx.org/packages/ubuntu/ codename nginx
For Debian/Ubuntu then run the following commands:
apt-get update
apt-get install nginx
Pre-Built Packages for Mainline version
To set up the yum repository for RHEL/CentOS, create the file named
/etc/yum.repos.d/nginx.repo
with the following contents: [nginx]
name=nginx repo
baseurl=http://nginx.org/packages/mainline/OS/OSRELEASE/$basearch/
gpgcheck=0
enabled=1
Replace “
OS
” with “ rhel
” or “ centos
”, depending on the distribution used, and “ OSRELEASE
” with “ 5
” or “ 6
”, for 5.x or 6.x versions, respectively. For Debian/Ubuntu, in order to authenticate the nginx repository signature and to eliminate warnings about missing PGP key during installation of the nginx package, it is necessary to add the key used to sign the nginx packages and repository to the
apt
program keyring. Please download this key from our web site, and add it to the apt
program keyring with the following command: sudo apt-key add nginx_signing.key
For Debian replace codename with Debian distribution codename , and append the following to the end of the
/etc/apt/sources.list
file: deb http://nginx.org/packages/mainline/debian/ codename nginx
deb-src http://nginx.org/packages/mainline/debian/ codename nginx
For Ubuntu replace codename with Ubuntu distribution codename , and append the following to the end of the
/etc/apt/sources.list
file: deb http://nginx.org/packages/mainline/ubuntu/ codename nginx
deb-src http://nginx.org/packages/mainline/ubuntu/ codename nginx
For Debian/Ubuntu then run the following commands:
apt-get update
apt-get install nginx
Signatures
Both RPM packages and Debian/Ubuntu repositories use digital signatures to verify the integrity and origin of the downloaded package. In order to check a signature it is necessary to download nginx signing key and import it to the
rpm
or apt
program’s keyring: On Debian/Ubuntu:
sudo apt-key add nginx_signing.key
On RHEL/CentOS:
sudo rpm --import nginx_signing.key
On Debian/Ubuntu signatures are checked by default, but on RHEL/CentOS it is necessary to set
gpgcheck=1
in the
/etc/yum.repos.d/nginx.repo
file. Since our PGP keys and packages are located on the same server, they are equally trusted. It is highly advised to additionally verify the authenticity of the downloaded PGP key. PGP has the “Web of Trust” concept, when a key is signed by someone else’s key, that in turn is signed by another key and so on. It often makes possible to build a chain from an arbitrary key to someone’s key who you know and trust personally, thus verify the authenticity of the first key in a chain. This concept is described in details in GPG Mini Howto . Our keys have enough signatures, and their authenticity is relatively easy to check.
이 내용에 흥미가 있습니까?
현재 기사가 여러분의 문제를 해결하지 못하는 경우 AI 엔진은 머신러닝 분석(스마트 모델이 방금 만들어져 부정확한 경우가 있을 수 있음)을 통해 가장 유사한 기사를 추천합니다:
용감한 바로 가기 및 우분투 응용 프로그램안녕하세요 여러분, 이 기사에서는 모든 사이트에서 pwa를 생성하고 실행기 응용 프로그램으로 추가하는 방법을 설명하고 싶습니다. 일부 웹사이트는 PWA로 설치를 허용하지 않지만 유사한 애플리케이션을 원합니다. 1. ...
텍스트를 자유롭게 공유하거나 복사할 수 있습니다.하지만 이 문서의 URL은 참조 URL로 남겨 두십시오.
CC BY-SA 2.5, CC BY-SA 3.0 및 CC BY-SA 4.0에 따라 라이센스가 부여됩니다.