336x280(권장), 300x250(권장), 250x250, 200x200 크기의 광고 코드만 넣을 수 있습니다.

1. 배포판 설치

 

우선 centOS7 배포판을 다운받은후 VM등에 설치를 한다.

 

CentOS 배포판 다운로드 : https://www.centos.org/download/

 

 

2. 기본 디렉토리 생성

 

2.1 work 디렉토리 생성

 

iso 빌드를 위한 디렉토리를 생성한다.

 

ex) mkdir ~/work/kickstart_build/isolinux/

 

2.2 하위 디렏토리 생성

해당 디렉토리에 다음과 같이 하위 디렉토리를 생성한다.

 

images : CentOS 배포판의 images 디렉

ks : 커스컴 빌드를 위한 kickstart파일 생성

LiveOS : CentOS 배포판의 LiveOS 디렉토리

Packages : 설치할 패키지(rpm) 디렉토리

postinstall : 설치후 작업 설정

 

 

2.3 필요파일 복사

 

다음의 작업을 수행한다.

 

1) 배포판 mount

mkdir -p /mnt/iso
mount -o loop /tmp/CentOS-7-x86_64-DVD-1503-01.iso /mnt/iso

 

2) 복사

cp /mnt/iso/.discinfo ~/work/kickstart_build/isolinux/
cp /mnt/iso/isolinux/* ~/work/kickstart_build/isolinux/
rsync -av /mnt/iso/images/ ~/work/kickstart_build/isolinux/images/
cp /mnt/iso/LiveOS/* ~/work/kickstart_build/isolinux/LiveOS/
ll /mnt/iso/repodata/ | grep -i comps
-rw-r--r--. 1 root root 157580 1. Apr 01:43 0e6e90965f55146ba5025ea450f822d1bb0267d0299ef64dd4365825e6bad995-c7-x86_64-comps.xml.gz

 

cp /mnt/iso/repodata/0e6e90965f55146ba5025ea450f822d1bb0267d0299ef64dd4365825e6bad995-c7-x86_64-comps.xml.gz ~/kickstart_build/

 

cd ~/work/kickstart_build/
gunzip 0e6e90965f55146ba5025ea450f822d1bb0267d0299ef64dd4365825e6bad995-c7-x86_64-comps.xml
mv 0e6e90965f55146ba5025ea450f822d1bb0267d0299ef64dd4365825e6bad995-c7-x86_64-comps.xml comps.xml

 

 

3. 필요 패키지 등록

 

3.1 임시 packages 디렉토리 생성

 

ex) mkdir ~/work/packages

 

 

3.2 임시 packages 디렉토리에 패키지(rpm) 파일 복사

 

글쓴이의 경우 mysql등을 추가 하였음

 

rpm 패키지 다운로드는 아래를 참조

 

http://materer.co.kr/129

 

3.3 packages 복사

 

글쓴이의 경우 minimal 버전의 배포판을 이용해서 배포판의 패키지를 그대로 가져왔고

rsync를 이용하여 2.에서 생성한 Packages 디렉토리에 복사 하였음.

 

ex) rsync -av /mnt/iso/Packages/ ~/work/kickstart_build/isolinux/Packages/
      rsync -av /tmp/packages/ ~/work/kickstart_build/isolinux/Packages/

 

 

 

4. repodata 디렉토리 생성


4.1 createrepo 설치


yum install -y createrepo

 

4.2 createrepo를 이용하여 repodata 디렉토리 생성


ex)cd ~/work/kickstart_build/isolinux
     createrepo -g ~/work/kickstart_build/comps.xml .

'Programming > Linux' 카테고리의 다른 글

[raspberry pi] WIFI static IP 설정  (0) 2016.05.13
Centos7 custom build (2)  (0) 2016.03.25
yum을 이용한 rpm 다운로드 방법  (0) 2016.03.25
gcc 컴파일 옵션.  (0) 2008.08.22
V4L??  (0) 2008.06.26
336x280(권장), 300x250(권장), 250x250, 200x200 크기의 광고 코드만 넣을 수 있습니다.

Downloadonly plugin 설치

 

(RHEL5)
# yum install yum-downloadonly

(RHEL6)
# yum install yum-plugin-downloadonly

 

 

사용방법

 

# yum install --downloadonly --downloaddir=<directory> <package>

 

tip!

이미 install되어 패키지가 다운로드 되지 않을경우 install 커맨드 대신 reinstall 을 사용하면 다운로드 할 수 있다.

(실제 재설치는 되지 않음)

 

참고 : https://access.redhat.com/solutions/10154

'Programming > Linux' 카테고리의 다른 글

Centos7 custom build (2)  (0) 2016.03.25
Centos7 custom build (1)  (0) 2016.03.25
gcc 컴파일 옵션.  (0) 2008.08.22
V4L??  (0) 2008.06.26
Linux find grep 명령사용하기  (0) 2008.06.24
336x280(권장), 300x250(권장), 250x250, 200x200 크기의 광고 코드만 넣을 수 있습니다.

apt-get update시 다음과 같이 Hash Sum mismatch 에러가 발생하는 경우

 root@raspberrypi:~# sudo apt-get update
Ign file:  Release.gpg
Ign file:  Release                                                                    
Ign file:  Translation-en_GB                                                                                                             
Ign file:  Translation-en                                                                                                                
Hit http://packages.omv-extras.org kralizec Release.gpg                                                                                  
Hit http://mirrordirector.raspbian.org wheezy Release.gpg                                                                   
Hit http://packages.openmediavault.org kralizec Release.gpg                                                                 
Hit http://packages.omv-extras.org kralizec-testing Release.gpg                           
Hit http://archive.raspberrypi.org wheezy Release.gpg                                     
Hit http://mirrordirector.raspbian.org wheezy Release               
Hit http://packages.omv-extras.org kralizec Release                 
Hit http://packages.openmediavault.org kralizec-proposed Release.gpg
Hit http://packages.omv-extras.org kralizec-testing Release                                                      
Hit http://archive.raspberrypi.org wheezy Release                                                                
Hit http://packages.openmediavault.org kralizec Release                                                          
Hit http://packages.omv-extras.org kralizec/main armhf Packages                                                  
Hit http://archive.raspberrypi.org wheezy/main armhf Packages                                                
Hit http://packages.openmediavault.org kralizec-proposed Release                                             
Hit http://packages.openmediavault.org kralizec/main armhf Packages                                           
Hit http://packages.omv-extras.org kralizec-testing/main armhf Packages                                       
Hit http://packages.openmediavault.org kralizec-proposed/main armhf Packages                                  
Ign http://archive.raspberrypi.org wheezy/main Translation-en_GB                           
Get:1 http://mirrordirector.raspbian.org wheezy/main armhf Packages [6,903 kB]             
Ign http://archive.raspberrypi.org wheezy/main Translation-en                                                  
Hit http://mirrordirector.raspbian.org wheezy/contrib armhf Packages                                           
Hit http://mirrordirector.raspbian.org wheezy/non-free armhf Packages                                       
Ign http://packages.omv-extras.org kralizec/main Translation-en_GB                                         
Hit http://mirrordirector.raspbian.org wheezy/rpi armhf Packages                         
Ign http://packages.omv-extras.org kralizec/main Translation-en                                           
Ign http://packages.omv-extras.org kralizec-testing/main Translation-en_GB               
Ign http://packages.omv-extras.org kralizec-testing/main Translation-en                  
Ign http://packages.openmediavault.org kralizec/main Translation-en_GB                                                                   
Ign http://packages.openmediavault.org kralizec/main Translation-en                                                                      
Ign http://packages.openmediavault.org kralizec-proposed/main Translation-en_GB                                                          
Ign http://packages.openmediavault.org kralizec-proposed/main Translation-en                                                             
Ign http://mirrordirector.raspbian.org wheezy/contrib Translation-en_GB                                                                  
Ign http://mirrordirector.raspbian.org wheezy/contrib Translation-en
Ign http://mirrordirector.raspbian.org wheezy/main Translation-en_GB
Ign http://mirrordirector.raspbian.org wheezy/main Translation-en
Ign http://mirrordirector.raspbian.org wheezy/non-free Translation-en_GB
Ign http://mirrordirector.raspbian.org wheezy/non-free Translation-en
Ign http://mirrordirector.raspbian.org wheezy/rpi Translation-en_GB
Ign http://mirrordirector.raspbian.org wheezy/rpi Translation-en
Fetched 1 B in 20s (0 B/s)
W: Failed to fetch http://mirrordirector.raspbian.org/raspbian/dists/wheezy/main/binary-armhf/Packages  Hash Sum mismatch

E: Some index files failed to download. They have been ignored, or old ones used instead.


아래 주소를 참고하여 /etc/apt/sources.list를 수정해주면 해결된다

 

http://www.raspbian.org/RaspbianMirrors

 

많히 발생하는 문제는 아닌지 검색해봐도 엄한 해답만 있어

 

홀로삽질하다 알아냄....

336x280(권장), 300x250(권장), 250x250, 200x200 크기의 광고 코드만 넣을 수 있습니다.

ipsec

ipsec is actually an umbrella command comprising a collection of individual sub commands of the form

ipsec <command> [ <argument> ] [ <options> ]

that can be used to control and monitor IPsec connections as well as the IKE daemons.

Control Commands

ipsec start [ <starter options> ]

calls ipsec starter [ <starter options> ] which in turn parses ipsec.conf and starts the IKE daemon charon.

ipsec stop

terminates all IPsec connection and stops the IKE daemon charon by sending a TERM signal to ipsec starter.

ipsec restart [ <starter options> ]

is equivalent to ipsec stop followed by ipsec start [ <starter options> ] after a guard period of 2 seconds.

ipsec update

sends a HUP signal to ipsec starter which in turn determines any changes in ipsec.conf and updates the configuration on the running IKE daemon charon. Currently established connections are not affected by configuration changes.

ipsec reload

sends a USR1 signal to ipsec starter which in turn reloads the whole configuration on the running IKE daemon charon based on the actual ipsec.conf. Currently established connections are not affected by configuration changes.

ipsec up <name>

tells the IKE daemon to start up connection <name>. Implemented by calling the ipsec stroke up <name> command.

ipsec down <name>

tells the IKE daemon to terminate connection <name>. Implemented by calling the ipsec stroke down <name> command.

ipsec down <name>{n}

terminates CHILD_SA instance n of connection <name>. Since {n} uniquely identifis a CHILD_SA the name is optional.

ipsec down <name>{*}

terminates all CHILD_SA instances of connection <name>.

ipsec down <name>[n]

terminates IKE_SA instance n of connection <name> plus dependent CHILD_SAs. Since [n] uniquely identifis an IKE_SA the name is optional.

ipsec down <name>[*]

terminates all IKE_SA instances of connection <name>.

ipsec route <name>

tells the IKE daemon to insert IPsec policies in the kernel for connection <name>. The first payload packet matching the IPsec policies will automatically trigger an IKE connection setup. Implemented by calling the ipsec stroke route <name> command.

ipsec unroute <name>

remove the IPsec policies in the kernel for connection <name>. Implemented by calling the ipsec stroke unroute <name>command.

ipsec status [ <name> ]

returns concise status information either on connection <name> or if the argument is lacking, on all connections. Implemented by calling the ipsec stroke status [ <name> ] command.

ipsec statusall [ <name> ]

returns detailed status information either on connection <name> or if the argument is lacking, on all connections. Implemented by calling the ipsec stroke statusall [ <name> ] command.

Info Commands

ipsec version

returns the ipsec version in the form of Linux strongSwan U<strongSwan userland version>/K<Linux kernel version> if strongSwan uses the native NETKEY IPsec stack of the Linux kernel it is running on.

ipsec copyright

returns the copyright information.

ipsec --confdir

returns the SYSCONFDIR directory as defined by the configure options.

ipsec --directory

returns the LIBEXECDIR directory as defined by the configure options.

ipsec --help

returns the usage information for the ipsec command.

ipsec --versioncode

returns the ipsec version number in the form of U<strongSwan userland version>/K<Linux kernel version> if strongSwan uses the native NETKEY IPsec stack of the Linux kernel it is running on.

List Commands

ipsec listaacerts [ --utc ]

returns a list of X.509 Authorization Authority (AA) certificates that were loaded locally by the IKE daemon from the/etc/ipsec.d/aacerts directory. Implemented by calling the ipsec stroke listaacerts command.

ipsec listacerts [ --utc ]

returns a list of X.509 Attribute certificates that were loaded locally by the IKE daemon from the /etc/ipsec.d/acerts directory. Implemented by calling the ipsec stroke listacerts command.

ipsec listcounters [ <name> ]

returns a list of global or connection specific counter values about received and sent IKE messages and rekeyings. Connection specific ounters are available since 5.0.3. Implemented by calling the ipsec stroke listcounters command.

ipsec listalgs

returns a list of all supported IKE encryption and hash algorithms, and the available Diffie-Hellman groups. Implemented by calling theipsec stroke listalgs command.

ipsec listcacerts [ --utc ]

returns a list of X.509 Certification Authority (CA) certificates that were loaded locally by the IKE daemon from the/etc/ipsec.d/cacerts directory or received via the IKE protocol. Implemented by calling the ipsec stroke listcacerts command.

ipsec listcainfos [ --utc ]

returns Certification Authority information (CRL distribution points, OCSP URIs, LDAP servers) that were defined by ca sections inipsec.conf. Implemented by calling the ipsec stroke listcainfos command.

ipsec listcrls [ --utc ]

returns a list of Certificate Revocation Lists (CRLs) that were either loaded by the IKE daemon from the /etc/ipsec.d/crls directory or fetched from an HTTP- or LDAP-based CRL distribution point. Implemented by calling the ipsec stroke listcrls command.

ipsec listcerts [ --utc ]

returns a list of X.509 and/or OpenPGP certificates that were either loaded locally by the IKE daemon or received via the IKE protocol. Implemented by calling the ipsec stroke listcerts command.

ipsec listgroups [ --utc ]

returns a list of all groups that are used to define user authorization profiles. Currently not supported.

ipsec listocsp [ --utc ]

returns cached revocation information fetched from OCSP servers. Implemented by calling the ipsec stroke listocsp command.

ipsec listocspcerts [ --utc ]

returns a list of X.509 OCSP Signer certificates that were either loaded locally by the IKE daemon from the /etc/ipsec.d/ocspcertsdirectory or were sent by an OCSP server. Implemented by calling the ipsec stroke listocspcerts command.

ipsec listplugins

returns a list of all loaded plugin features. Implemented by calling the ipsec stroke listplugins command.

ipsec listpubkeys [ --utc ]

returns a list of RSA public keys that were loaded in raw key format. Implemented by calling the ipsec stroke listpubkeys command.

ipsec listall [ --utc ]

returns all information generated by the list commands above. Each list command can be called with the --utc option which displays all dates in UTC instead of local time. Implemented by calling the ipsec stroke listall command.

Reread Commands

ipsec rereadaacerts

reads all certificate files contained in the /etc/ipsec.d/aacerts directory and adds them to the list of Authorization Authority (AA) certificates. Implemented by calling the ipsec stroke rereadaacerts command.

ipsec rereadacerts

reads all certificate files contained in the /etc/ipsec.d/acerts directory and adds them to the list of attribute certificates. Implemented by calling the ipsec stroke rereadacerts command.

ipsec rereadcacerts

reads all certificate files contained in the /etc/ipsec.d/cacerts directory and adds them to the list of Certification Authority (CA) certificates. Implemented by calling the ipsec stroke rereadcacerts command.

ipsec rereadcrls

reads all Certificate Revocation Lists (CRLs) contained in the /etc/ipsec.d/crls directory and adds them to the list of CRLs. Older CRLs are replaced by newer ones. Implemented by calling the ipsec stroke rereadcrls command.

ipsec rereadocspcerts

reads all certificate files contained in the /etc/ipsec.d/ocspcerts directory and adds them to the list of OCSP signer certificates. Implemented by calling the ipsec stroke rereadocspcerts command.

ipsec rereadsecrets

flushes and rereads all secrets defined in ipsec.secrets. Implemented by calling the ipsec stroke rereadsecrets command.

ipsec secrets

is equivalent to ipsec rereadsecrets.

ipsec rereadall

executes all reread commands listed above. Implemented by calling the ipsec stroke rereadall command.

Reset Commands

ipsec resetcounters [ <name> ]

resets global or connection specific counters. Since 5.0.3. Implemented by calling the ipsec stroke resetcounters command.

Purge Commands

ipsec purgecerts

purges all cached certificates. Implemented by calling the ipsec stroke purgecerts command.

ipsec purgecrl

purges all cached CRLs. Implemented by calling the ipsec stroke purgecrl command.

ipsec purgeike

purges IKE_SAs that don't have a CHILD_SA. Implemented by calling the ipsec stroke purgeike command.

ipsec purgeocsp

purges all cached OCSP information records. Implemented by calling the ipsec stroke purgeocsp command.

Before 5.0.0

In releases before 5.0.0 IKEv1 connections were handled by the separate pluto keying daemon. The ipsec command then used theipsec whack in addition to the ipsec stroke command to communicate with pluto.

List Commands

ipsec listcards [ --utc ]

lists all certificates found on attached smart cards. Supported by the IKEv1 pluto daemon only. Implemented by calling the ipsec whack --listcards command.

PKCS11 Proxy Commands

ipsec scencrypt <value> [ --inbase <base> ] [ --outbase <base> ] [ --keyid <id> ]

Supported by the IKEv1 pluto daemon only. Implemented by calling the ipsec whack --scencrypt command.

ipsec scdecrypt <value> [ --inbase <base> ] [ --outbase <base> ] [ --keyid <id> ]

Supported by the IKEv1 pluto daemon only. Implemented by calling the ipsec whack --scdecrypt command.

336x280(권장), 300x250(권장), 250x250, 200x200 크기의 광고 코드만 넣을 수 있습니다.

##flex cross-compile

1. ./configure --host=arm-linux --prefix=[prefix 경로] CC=arm-linux-gcc

 

2. config.h 파일에서 다음부분 주석처리

186 : #define malloc rpl_malloc

192 : #define realloc rpl_realloc

 

3. make && make install

 

##dhcpv6

1. echo "ac_cv_func_setpgrp_void=yes" > config.cache

 

2. ./configure --host=arm-linux CC=arm-linux-gcc --prefix=[prefix 경로] LDFLAGS="-L[libfl가 존재하는 경로]" --config-cache

 

3. Makefile에서 LIBS -lfl추가

 

4. LINE_MAX 수정

 

5. make

336x280(권장), 300x250(권장), 250x250, 200x200 크기의 광고 코드만 넣을 수 있습니다.


갑자기 플래시를 테스트해야할 일이 생겨

설치해본 adobe flash player~!!

아직 베타버전이라 그런지 사운드에 문제가 있긴하지만

휴대기기상에서 플래시를 보니

왠지모를 어색함

조금있음 진져브래드가 나오는 마당에 이제서야 이러고있는 나...
336x280(권장), 300x250(권장), 250x250, 200x200 크기의 광고 코드만 넣을 수 있습니다.

+ Recent posts