163c72df64
This is needed for make iso to succeed with NO_SIGN=1 setting. This doesn't compromise security, because: 1) These are local reports anyway, 2) They are additioanlly verified by update_repo when NO_SIGN is not set.
52 lines
1.2 KiB
Plaintext
52 lines
1.2 KiB
Plaintext
[main]
|
|
exclude=*.i?86
|
|
cachedir=-yumcache
|
|
reposdir=
|
|
keepcache=1
|
|
debuglevel=1
|
|
logfile=-yum.log
|
|
pkgpolicy=newest
|
|
distroverpkg=qubes-release
|
|
tolerant=1
|
|
exactarch=1
|
|
obsoletes=1
|
|
gpgcheck=1
|
|
plugins=1
|
|
metadata_expire=1800
|
|
installroot=/tmp/qubes-installer/build/work/revisor
|
|
failovermethod=priority
|
|
|
|
[fedora]
|
|
name=Fedora 13 - x86_64
|
|
baseurl=http://download.fedoraproject.org/pub/fedora/linux/releases/13/Everything/x86_64/os/
|
|
#mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=fedora-13&arch=x86_64
|
|
enabled=1
|
|
gpgcheck=1
|
|
gpgkey=file:///tmp/qubes-installer/keys/fedora-13.asc
|
|
cost=10
|
|
|
|
|
|
[installer]
|
|
name=Qubes Local Repository
|
|
baseurl=file:///tmp/qubes-installer/yum/installer/
|
|
enabled=1
|
|
gpgcheck=0
|
|
gpgkey=file:///tmp/qubes-installer/keys/qubes-release-1-signing-key.asc
|
|
cost=1
|
|
|
|
[qubes-dom0]
|
|
name=Qubes Local Repository
|
|
baseurl=file:///tmp/qubes-installer/yum/qubes-dom0/
|
|
enabled=0
|
|
gpgcheck=1
|
|
gpgkey=file:///tmp/qubes-installer/keys/qubes-release-1-signing-key.asc
|
|
cost=1
|
|
|
|
[dom0-updates]
|
|
name=Qubes Dom0 Updates Local Repository
|
|
baseurl=file:///tmp/qubes-installer/yum/dom0-updates/
|
|
enabled=0
|
|
gpgcheck=1
|
|
gpgkey=file:///tmp/qubes-installer/keys/qubes-release-1-signing-key.asc
|
|
cost=1
|