On Sat, Jun 22, 2013 at 07:14:26AM +0200, Tomas Forsman wrote: > On 06/21/2013 10:46 PM, Michael K. Johnson wrote: > I can't see anything and thunderbird is saying: > > This attachment appears to be empty. > Please check with the person who sent this. > Often company firewalls or antivirus programs will destroy attachments > > Possible to re-attach it again?
It was the list settings. I have changed them slightly and will try again...Title: Conary:Repository - rPathWiki
Conary:RepositoryFrom rPathWiki
Installing and Running a Local Conary RepositoryIf you would like to test Conary packaging in a private environment, or have another requirement for access to a repository that is not publicly available, you can install and run a local networked Conary repository. This guide describes the installation of software components and configuration necessary to enable a private repository, and how to access the repository once it is running. These instructions apply to Conary 1.0.14 or later.
SoftwareBefore you start, you should make sure all the necessary software is installed. The required software depends on the following factors:
The SQLite, MySQL and PostgreSQL databases are supported by Conary. All Conary-based distributions will already include the necessary SQLite software, as SQLite is used by Conary for the system's Conary database. Using PostgreSQL requires the Using MySQL requires the The Conary repository can run in single-threaded standalone mode
for debugging and lightly-used repositories, but for production use
should be run behind an nginx proxy using gunicorn, or as part of apache
through To use the Configurationnginx/gunicorn wsgiConfiguration files are provided in the Conary source code in the mod_pythonTo use the Alias /conary/ "/<path-to-repository-prefix>/config/repository.cnr/"
<Directory /<path-to-repository-prefix>/config>
AddHandler python-program .cnr
PythonHandler conary.server.apachehooks
</Directory>
# You may also find it useful to redirect /conary to /conary/, but if you
# do, make sure you have trailing slashes in your repository Map entries.
RedirectMatch /conary$ /conary/
repository configuration filesNext, create your
Here's a useful example to copy to repositoryDB <database-type> <database-specific-info> contentsDir /<path-to-repository-prefix>/contents tmpDir /<path-to-repository-prefix>/tmp # this is the hostname part of the label, not the hostname of the machine # so on both conary.rpath.com and on conary-commits.rpath.com, this # is "serverName conary.rpath.com". This can also be a list if your repository # serves more than one label. serverName foo.example.com # The following commit Action sends mails on commits commitAction /usr/lib/python2.4/site-packages/conary/commitaction --module "/usr/lib/python2.4/site-packages/conary/changemail --user %(user)s --email [email protected]" Make sure that the web server user (normally Creating the DatabasesqliteDue to SQLite's design, it is not necessary to explicitly create the
database, as the first database access performed (when creating an
administrative user in the next step) will cause the database to be
created. You need to make sure that the user you are using for running
the standalone server has write permissions to the database path you are
using in the repositoryDB sqlite /path/to/repository/sqldb This will use the postgresqlPostgresql 9.1 or later is recommended. Beyond usual Postgresql tuning, allowing for large transactions, make sure to set # createdb -U postgres --owner repositoryOwner -T template0 name_of_database Especially if you host many databases, it is strongly recommended to use pgbouncer. A typical pgbouncer.ini configuration will look like: [pgbouncer] user = pgbouncer pidfile = /var/run/pgbouncer/pgbouncer.pid listen_addr = SOME_INTERNAL_IP_NOT_THE_INTERNET listen_port = 6432 auth_type = md5 auth_file = /etc/pgbouncer.users admin_users = pgbouncer pool_mode = session default_pool_size = 20 server_reset_query = RESET ALL; SET SESSION AUTHORIZATION DEFAULT; server_idle_timeout = 45 [databases] name_of_database = ... Then the /etc/pgbouncer.users file will need to define the users and passwords used to access the database in the format: "repositoryOwner" "repositoryOwnerPassword" (The quotation marks are literal and are included in the file.) Assuming you have your postgresql database repositoryDB pgpool repositoryOwner@dbhost/name_of_database You can supply a passsword for repositoryDB pgpool repositoryOwner:repositoryOwnerPassword@dbhost/name_of_database For reference, the database connection string has the following specification: mysqlIt is not generally recommended to use mysql for the database. For large transactions, it has in practice not performed as well as postgresql. In the case of MySQL, you must create the database using the CREATE DATABASE <dbname> CHARACTER SET latin1 COLLATE latin1_bin; Also, we recommend you use InnoDB as the storage engine for the mysql database. The following configuration options are required by the repository schema (add these to the [mysqld] section of your # server mode configuration sql_mode = TRADITIONAL,NO_AUTO_VALUE_ON_ZERO,ONLY_FULL_GROUP_BY lower_case_table_names = 1 default-table-type = INNODB character_set_server = latin1 collation_server = latin1_bin Assuming you have your mysql database repositoryDB mysql dbuser@dbhost/dbname You can supply a passsword for repositoryDB mysql dbuser:password@dbhost/dbname For reference, the database connection string has the following specification: Converting between databasesThe Creating UsersTo run a repository, you'll need to define authorized users. Use /usr/lib/python2.4/site-packages/conary/server/server.py --add-user admin --admin --config-file <path to your .cnr file> It will prompt you for the password, and create that user as an administrative user (which lets the user create new users on the system). Once the repository is up, you can point a web browser at the repository and use the web interface to add other users (including other administrative users). For anonymous access to the repository, create a user with name /usr/lib/python2.4/site-packages/conary/server/server.py --add-user anonymous --config-file <path to your .cnr file>
Each user will need to submit at least one valid OpenPGP (GPG) public key. This can be done from the web interface. Starting and Accessing the ServiceConary requires that its web server support SSL. To enable SSL in apache, install conary update mod_ssl --resolve After installing /sbin/service httpd restart You can now use the repository's web interface by pointing a browser to
|
_______________________________________________ Foresight-devel mailing list [email protected] https://lists.foresightlinux.org/mailman/listinfo/foresight-devel
