In order for third-party customers to create their own RPM repositories, they must create digest files and GnuPG (GPG) signatures as well as the necessary RPM files.
Most of cPanel's software dependencies ship as RPM archives. These RPMs download from the cPanel, Inc. RPM repository during installations and updates. The RPM repository is a collection of RPMs that exist on an accessible HTTP server. The
url_templates field in the
rpm.versions file determines the location of the RPMs on this server.
Each RPM directory contains an
rpm.sha512 digest file, which contains the appropriate digest values for each of the directory's RPMs. The cPanel, Inc. update system uses the digest file to ensure the integrity of downloaded files. In addition, a GPG signature, which the system creates with cPanel, Inc.'s private keys, accompanies each of these digest files to ensure the legitimacy of the files and to prevent the compromise of download mirrors.
Set up a third-party RPM repository with GPG signatures
rpm.sha512 digest files
In each directory in the repository that contains RPM files, you must create an
rpm.sha512 digest file.
For example, consider the following directory, which contains two RPM files:
To create the digest file for this directory, run the following command:
This file will contain a list of the RPM file digests:
Generate a GPG key pair
After you create the digest file, create a GPG key pair in order to sign it. We recommend that you use the GPG command line utilities to generate the GPG key pair.
- We strongly recommend that you generate this key on a non-public system to protect the private key's security.
- For more information, read the GnuPG documentation.
For example, to create a GPG key pair, you might run the following commands:
rpm.sha512 digest files
In order to prevent rollback, old version, or file-copy attacks, cPanel, Inc. uses a specific GPG signature notation that specifies the filename on the remote server.
- You must set this notation to use the public HTTP path for the file.
- For example, for an
rpm.sha512file that exists at
To sign the file in the previous examples, you would run the following command:
Add your key to the vendor keystore
In order to set up your cPanel & WHM servers to use the RPM repository, you must add a copy of the public key that signed the RPMs to each cPanel & WHM server. This allows each cPanel & WHM server to verify the signed RPM digests.
To export the public key, run the following command:
For the examples in this document, you could store this key as the
- You must store this key in a publicly web-accessible location.
- We strongly recommend that you store the key in a location that uses HTTPS/SSL verification and encryption.
To add this key to the local system, run the following command, where
thirdparty represents the vendor name and
release represents the category:
Add the repository to the
To configure the system to use the RPM repository's public key, update the
- For more information about this file, read our How to Set Up a Third-Party RPM Repository with GPG Signatures documentation.
- For more information about the
/scripts/update_local_rpm_versionsscript, which we strongly recommend for updates to the
local.versionsfile, read our How to Set Up a Third-Party RPM Repository with GPG Signatures documentation.
Each RPM entry in the
local.versions file includes a corresponding
rpm_location entry. Each
rpm_location entry includes entries for
url_templatesentry contains the location of each RPM, which includes the operating system version, architecture, package name, package version, and package revision.
location_keysentry contains the vendor and category that you specified when you ran the
For the examples in this document, the
local.versions file might appear similar to the following example:
RPM repositories without GPG signatures
We strongly discourage the creation of RPM repositories without GPG signatures. You cannot ensure the legitimacy of downloaded files without a signature.
If you do not need or want to verify the signature on your RPMs, you can disable signature verification. To do this, add a
disabled entry for the desired RPM to the
location_keys section, as in the following example: