qubes-installer-qubes-os/conf/qubes-x86_64.conf
Joanna Rutkowska 163c72df64 Set gpgcheck=0 for locally-built repos
This is needed for make iso to succeed with NO_SIGN=1 setting.

This doesn't compromise security, because:
1) These are local reports anyway,
2) They are additioanlly verified by update_repo when NO_SIGN is not set.
2011-11-10 18:03:17 +01:00

52 lines
1.2 KiB
Plaintext

[main]
exclude=*.i?86
cachedir=-yumcache
reposdir=
keepcache=1
debuglevel=1
logfile=-yum.log
pkgpolicy=newest
distroverpkg=qubes-release
tolerant=1
exactarch=1
obsoletes=1
gpgcheck=1
plugins=1
metadata_expire=1800
installroot=/tmp/qubes-installer/build/work/revisor
failovermethod=priority
[fedora]
name=Fedora 13 - x86_64
baseurl=http://download.fedoraproject.org/pub/fedora/linux/releases/13/Everything/x86_64/os/
#mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=fedora-13&arch=x86_64
enabled=1
gpgcheck=1
gpgkey=file:///tmp/qubes-installer/keys/fedora-13.asc
cost=10
[installer]
name=Qubes Local Repository
baseurl=file:///tmp/qubes-installer/yum/installer/
enabled=1
gpgcheck=0
gpgkey=file:///tmp/qubes-installer/keys/qubes-release-1-signing-key.asc
cost=1
[qubes-dom0]
name=Qubes Local Repository
baseurl=file:///tmp/qubes-installer/yum/qubes-dom0/
enabled=0
gpgcheck=1
gpgkey=file:///tmp/qubes-installer/keys/qubes-release-1-signing-key.asc
cost=1
[dom0-updates]
name=Qubes Dom0 Updates Local Repository
baseurl=file:///tmp/qubes-installer/yum/dom0-updates/
enabled=0
gpgcheck=1
gpgkey=file:///tmp/qubes-installer/keys/qubes-release-1-signing-key.asc
cost=1