centos 에서 yum nginx 설치

6999 단어 linuxnginx

Pre-Built Packages for Stable version
To set up the yum repository for RHEL/CentOS, choose the corresponding  nginx-release  package from the list:
RHEL 5
RHEL 6
CentOS 5
CentOS 6
This package contains yum configuration file and a public PGP key necessary to authenticate signed RPMs. Download and install it, then run the following:
yum install nginx

Alternatively, a repository configuration can be added manually without installing the  nginx-release  package. Create the file named /etc/yum.repos.d/nginx.repo  with the following contents:
[nginx]
name=nginx repo
baseurl=http://nginx.org/packages/OS/OSRELEASE/$basearch/
gpgcheck=0
enabled=1

Replace “ OS ” with “ rhel ” or “ centos ”, depending on the distribution used, and “ OSRELEASE ” with “ 5 ” or “ 6 ”, for 5.x or 6.x versions, respectively.
For Debian/Ubuntu, in order to authenticate the nginx repository signature and to eliminate warnings about missing PGP key during installation of the nginx package, it is necessary to add the key used to sign the nginx packages and repository to the  apt program keyring. Please download  this key  from our web site, and add it to the  apt  program keyring with the following command:
sudo apt-key add nginx_signing.key

 
For Debian replace codename with Debian distribution  codename , and append the following to the end of the  /etc/apt/sources.list file:
deb http://nginx.org/packages/debian/ codename nginx
deb-src http://nginx.org/packages/debian/ codename nginx

 
For Ubuntu replace codename with Ubuntu distribution  codename , and append the following to the end of the  /etc/apt/sources.list file:
deb http://nginx.org/packages/ubuntu/ codename nginx
deb-src http://nginx.org/packages/ubuntu/ codename nginx

 
For Debian/Ubuntu then run the following commands:
apt-get update
apt-get install nginx

 
Pre-Built Packages for Mainline version
To set up the yum repository for RHEL/CentOS, create the file named  /etc/yum.repos.d/nginx.repo  with the following contents:
[nginx]
name=nginx repo
baseurl=http://nginx.org/packages/mainline/OS/OSRELEASE/$basearch/
gpgcheck=0
enabled=1

Replace “ OS ” with “ rhel ” or “ centos ”, depending on the distribution used, and “ OSRELEASE ” with “ 5 ” or “ 6 ”, for 5.x or 6.x versions, respectively.
For Debian/Ubuntu, in order to authenticate the nginx repository signature and to eliminate warnings about missing PGP key during installation of the nginx package, it is necessary to add the key used to sign the nginx packages and repository to the  apt program keyring. Please download  this key  from our web site, and add it to the  apt  program keyring with the following command:
sudo apt-key add nginx_signing.key

 
For Debian replace codename with Debian distribution  codename , and append the following to the end of the  /etc/apt/sources.list file:
deb http://nginx.org/packages/mainline/debian/ codename nginx
deb-src http://nginx.org/packages/mainline/debian/ codename nginx

 
For Ubuntu replace codename with Ubuntu distribution  codename , and append the following to the end of the  /etc/apt/sources.list file:
deb http://nginx.org/packages/mainline/ubuntu/ codename nginx
deb-src http://nginx.org/packages/mainline/ubuntu/ codename nginx

 
For Debian/Ubuntu then run the following commands:
apt-get update
apt-get install nginx

 
Signatures
Both RPM packages and Debian/Ubuntu repositories use digital signatures to verify the integrity and origin of the downloaded package. In order to check a signature it is necessary to download  nginx signing key  and import it to the  rpm  or  apt  program’s keyring:
On Debian/Ubuntu:
sudo apt-key add nginx_signing.key


On RHEL/CentOS:
sudo rpm --import nginx_signing.key


 
On Debian/Ubuntu signatures are checked by default, but on RHEL/CentOS it is necessary to set
gpgcheck=1

in the  /etc/yum.repos.d/nginx.repo  file.
Since our  PGP keys  and packages are located on the same server, they are equally trusted. It is highly advised to additionally verify the authenticity of the downloaded PGP key. PGP has the “Web of Trust” concept, when a key is signed by someone else’s key, that in turn is signed by another key and so on. It often makes possible to build a chain from an arbitrary key to someone’s key who you know and trust personally, thus verify the authenticity of the first key in a chain. This concept is described in details in  GPG Mini Howto . Our keys have enough signatures, and their authenticity is relatively easy to check.

좋은 웹페이지 즐겨찾기