Configuration¶
Yum Importer Configuration¶
The yum importer is configured by editing
/etc/pulp/server/plugins.conf.d/yum_importer.json
. This file must be valid JSON.
The importer supports the settings documented in Pulp’s importer config docs.
ISO Importer Configuration¶
The ISO importer is configured by editing
/etc/pulp/server/plugins.conf.d/iso_importer.json
. This file must be valid JSON.
The importer supports the settings documented in Pulp’s importer config docs.
Protected Repositories¶
Repository authentication allows the creation of protected repositories in the Pulp server. Consumers attempting to access protected repositories with yum operations require some form of authentication in order to be granted access.
Two configuration file changes are necessary to enable repository authentication.
Edit
/etc/pulp/server.conf
and set thessl_ca_certificate
option to the full path of the CA certificate that signed the Pulp server’s httpd SSL certificate. If this option is not set, it will default to/etc/pki/pulp/ssl_ca.crt
. This file must be readable by the apache user.
Note
If the default self signed certificate that is generated when mod_ssl
is installed is being used as the Pulp server’s certificate, copying that certificate
to /etc/pki/pulp/ssl_ca.crt
and making it apache readable will suffice.
The default location for that certificate is /etc/pki/tls/certs/localhost.crt
or /etc/pki/tls/certs/<hostname>.crt
.
Edit
/etc/pulp/repo_auth.conf
and set theenabled
option totrue
. Save the file and restart Apache.
Validation With Your Web Server¶
If you are using the repository protection feature and if you do not require different certificate
authorities on each repository, it is recommended that you configure your web server to validate
client certificates against trusted certificate authorities instead of having Pulp do it. For
Apache, please see their documentation if
you wish to learn how to do this. You can set the new verify_ssl
setting to false
in
the [main]]
section of /etc/pulp/repo_auth.conf
if you wish to configure Pulp not to check
the certificate signatures. There is a performance advantage to configuring this setting this way if
you are able to use your web server to validate client certificates instead of Pulp.
Global Repo Authentication¶
Repository authentication may be configured globally for all repositories in the Pulp server or individually on a per repo basis. In the event that both are specified, only the individual repository authentication check will take place.
Global repository authentication is enabled by placing the authentication
credentials under /etc/pki/pulp/content/
. The following files are relevant:
pulp-global-repo.ca
CA certificate used to validate inbound consumer certificates. If the consumer’s certificate cannot be validated by this CA, the consumer is automatically rejected as being unauthorized.
pulp-global-repo.cert
Certificate to provide to consumers when they bind to repositories. If a repository overrides global repository authentication at the repository level, the certificate provided for the repository itself is used in place of this file. This file is optional; if unspecified, bound consumers will need to acquire a valid certificate for accessing the repository through other means.
pulp-global-repo.key
If the private key for the consumer certificate above is not included in the certificate itself, it may be located in this file and will be sent to bound consumers at the same time as the certificate.
Individual Repository Authentication¶
Individual repositories can be setup to do SSL authentication. This allows you to use authentication on only specific repositories while leaving others unprotected, or to have different credentials for some repositories than others.
The three certificates listed above can be passed to the repository create
or update
command using the following options respectively:
--feed-ca-cert
--feed-cert
--feed-key