• 预建报为稳定版本


    Pre-Built Packages for Stable version

    To set up the yum repository for RHEL/CentOS, create the file named /etc/yum.repos.d/nginx.repo with the following contents:

    为了创建yum仓库为红帽子、centos,建立名称为nginx.repo文件,里面带有下边的内容

    [nginx]
    name=nginx repo
    baseurl=http://nginx.org/packages/OS/OSRELEASE/$basearch/
    gpgcheck=0
    enabled=1
    

    Replace “OS” with “rhel” or “centos”, depending on the distribution used, and “OSRELEASE” with “5”, “6”, or “7”, for 5.x, 6.x, or 7.x versions, respectively.

    For Debian/Ubuntu, in order to authenticate the nginx repository signature and to eliminate warnings about missing PGP key during installation of the nginx package, it is necessary to add the key used to sign the nginx packages and repository to the apt program keyring. Please download this key from our web site, and add it to the apt program keyring with the following command:

    sudo apt-key add nginx_signing.key
    

    For Debian replace codename with Debian distribution codename, and append the following to the end of the /etc/apt/sources.list file:

    deb http://nginx.org/packages/debian/ codename nginx
    deb-src http://nginx.org/packages/debian/ codename nginx
    

    For Ubuntu replace codename with Ubuntu distribution codename, and append the following to the end of the /etc/apt/sources.list file:

    deb http://nginx.org/packages/ubuntu/ codename nginx
    deb-src http://nginx.org/packages/ubuntu/ codename nginx
    

    For Debian/Ubuntu then run the following commands:

    apt-get update
    apt-get install nginx
    

    For SLES run the following command:

    zypper addrepo -G -t yum -c 'http://nginx.org/packages/sles/12' nginx
    

    Pre-Built Packages for Mainline version

    To set up the yum repository for RHEL/CentOS, create the file named /etc/yum.repos.d/nginx.repo with the following contents:

    [nginx]
    name=nginx repo
    baseurl=http://nginx.org/packages/mainline/OS/OSRELEASE/$basearch/
    gpgcheck=0
    enabled=1
    

    Replace “OS” with “rhel” or “centos”, depending on the distribution used, and “OSRELEASE” with “5”, “6”, or “7”, for 5.x, 6.x, or 7.x versions, respectively.

    For Debian/Ubuntu, in order to authenticate the nginx repository signature and to eliminate warnings about missing PGP key during installation of the nginx package, it is necessary to add the key used to sign the nginx packages and repository to the apt program keyring. Please download this key from our web site, and add it to the apt program keyring with the following command:

    sudo apt-key add nginx_signing.key
    

    For Debian replace codename with Debian distribution codename, and append the following to the end of the /etc/apt/sources.list file:

    deb http://nginx.org/packages/mainline/debian/ codename nginx
    deb-src http://nginx.org/packages/mainline/debian/ codename nginx
    

    For Ubuntu replace codename with Ubuntu distribution codename, and append the following to the end of the /etc/apt/sources.list file:

    deb http://nginx.org/packages/mainline/ubuntu/ codename nginx
    deb-src http://nginx.org/packages/mainline/ubuntu/ codename nginx
    

    For Debian/Ubuntu then run the following commands:

    apt-get update
    apt-get install nginx
    

    For SLES run the following command:

    zypper addrepo -G -t yum -c 'http://nginx.org/packages/mainline/sles/12' nginx
    

    Configure Arguments

    Configure arguments common for nginx binaries from pre-built packages:

    --prefix=/etc/nginx
    --sbin-path=/usr/sbin/nginx
    --conf-path=/etc/nginx/nginx.conf
    --error-log-path=/var/log/nginx/error.log
    --http-log-path=/var/log/nginx/access.log
    --pid-path=/var/run/nginx.pid
    --lock-path=/var/run/nginx.lock
    --http-client-body-temp-path=/var/cache/nginx/client_temp
    --http-proxy-temp-path=/var/cache/nginx/proxy_temp
    --http-fastcgi-temp-path=/var/cache/nginx/fastcgi_temp
    --http-uwsgi-temp-path=/var/cache/nginx/uwsgi_temp
    --http-scgi-temp-path=/var/cache/nginx/scgi_temp
    --user=nginx
    --group=nginx
    --with-http_ssl_module
    --with-http_realip_module
    --with-http_addition_module
    --with-http_sub_module
    --with-http_dav_module
    --with-http_flv_module
    --with-http_mp4_module
    --with-http_gunzip_module
    --with-http_gzip_static_module
    --with-http_random_index_module
    --with-http_secure_link_module
    --with-http_stub_status_module
    --with-http_auth_request_module
    --with-threads
    --with-stream
    --with-stream_ssl_module
    --with-http_slice_module
    --with-mail
    --with-mail_ssl_module
    --with-file-aio
    --with-http_v2_module
    --with-ipv6
    

    Main nginx package is built with all modules that do not require additional libraries to avoid extra dependencies.

    Dynamic Modules

    Since version 1.9.11, nginx supports dynamic modules. Currently, the following modules are built as dynamic and shipped as separate packages:

    nginx-module-geoip
    nginx-module-image-filter
    nginx-module-njs
    nginx-module-perl
    nginx-module-xslt
    

    Signatures

    Both RPM packages and Debian/Ubuntu repositories use digital signatures to verify the integrity and origin of the downloaded package. In order to check a signature it is necessary to download nginx signing key and import it to the rpm or apt program’s keyring:

    • On Debian/Ubuntu:
      sudo apt-key add nginx_signing.key
    • On RHEL/CentOS:
      sudo rpm --import nginx_signing.key
    • On SLES:
      sudo rpm --import nginx_signing.key

    On Debian/Ubuntu/SLES signatures are checked by default, but on RHEL/CentOS it is necessary to set

    gpgcheck=1

    in the /etc/yum.repos.d/nginx.repo file.

    Since our PGP keys and packages are located on the same server, they are equally trusted. It is highly advised to additionally verify the authenticity of the downloaded PGP key. PGP has the “Web of Trust” concept, when a key is signed by someone else’s key, that in turn is signed by another key and so on. It often makes possible to build a chain from an arbitrary key to someone’s key who you know and trust personally, thus verify the authenticity of the first key in a chain. This concept is described in details in GPG Mini Howto. Our keys have enough signatures, and their authenticity is relatively easy to check.

  • 相关阅读:
    windows系统发布Maven项目步骤
    如何取消复制文件里的svn关联
    转发:分享一个快的飞起的maven的settings.xml文件
    Maven的标准settings.xml文件
    Attempt to invoke virtual method 'boolean java.lang.String.equals(java.lang.Object)' on a null object reference xxx 的问题分析与解决方案
    SpringBoot框架(由浅入深,深度解读)
    js实现“返回到上一页”
    导出Word文档
    好看的alert样式或者弹窗样式
    如何查看Oracle中的某表被锁定,以及如何解锁
  • 原文地址:https://www.cnblogs.com/liuxiaocao/p/5868929.html
Copyright © 2020-2023  润新知