Still using Artifactory 3.x ?
Click here for the Artifactory 3.x User Guide

Have a question? Want to report an issue? Contact JFrog support

Skip to end of metadata
Go to start of metadata


Artifactory is a fully-fledged YUM local repository. As such, it enables:

  1. RPM metadata calculation for RPMs hosted in Artifactory local repositories.
  2. Provisioning RPMs directly from Artifactory to YUM clients.
  3. Detailed RPM metadata views from Artifactory's web UI.

RPM Metadata for Hosted RPMs

The RPM metadata generated by Artifactory is identical to the basic-mode output of the Red Hat-based Linux command createrepo.

A folder named repodata is created in the configured location within a local repository with the following files in it:



Contains an XML file describing the primary metadata of each RPM archive.


Contains an XML file describing all the files contained within each RPM archive.


Contains an XML file describing miscellaneous information regarding each RPM archive.


Contains information regarding all the other metadata files.

YUM Support is Platform Independent!

Artifactory's RPM metadata calculation is based on pure Java.

It does not rely on the existence of the createrepo binary or on running external processes on the host on which Artifactory is running.

Page Contents

Triggering RPM Metadata Updates

When enabled, the metadata calculation is triggered automatically by some actions, and can also be invoked manually by others. Either way, the metadata produced is served to YUM clients.


RPM metadata is automatically calculated:

  1. When deploying/removing/copying/moving an RPM file.
  2. When performing content import (both system and repository imports).


You can manually invoke RPM metadata calculation:

  1. By selecting the local repository in the Tree Browser and clicking Recalculate Index in the Actions menu.
  2. Via Artifactory's REST-API.

Metadata calculation cleans up YUM metadata that already existed as a result of manual deployment or import. This includes RPM metadata stored as SQLite database files.


To create a YUM local repository, select YUM as the Package Type when you create the repository.

Creating a YUM Repository

Local Repositories

To enable automatic RPM metadata calculation on a local YUM repository, in the YUM Settings section of the Basic settings screen, set Auto-calculate YUM Metadata.

YUM Settings


YUM Metadata Folder Depth

Informs Artifactory under which level of directory to search for RPMs and save the repodata directory.

By default this value is 0 and refers to the repository's root folder. In this case, Artiafctory searches the entire repository for RPMs and saves the repodata directory at $REPO-KEY/repodata.

Using a different depth is useful in cases where generating metadata for a repository separates its artifacts by name, version and architecture.

For example:
If the repository layout is similar to that shown below and you want to generate RPM metadata for every artifact divided by name, set the Depth to 1 and the repodata directory is saved at REPO_ROOT/ARTIFACT_NAME/repodata :

YUM Group File Names

A comma-separated list of YUM group files associated with your YUM packages.

Note that at each level (depth), the repodata directory in your repository may contain a different group file name, however each repodata directory may contain only 1 group metadata file (multiple groups should be listed as different tags inside the XML file. For more details, please refer to the YUM Documentation).

Auto-calculate YUM Metadata

 When set, YUM metadata calculation is automatically triggered by the actions described above.

Metadata calculation is asynchronous and does not happen immediately when triggered, whether automatically or manually.

Artifactory invokes the actual calculation only after a certain "quiet period", so the creation of metadata normally occurs only 1-2 minutes after the calculation was triggered.

Remote Repositories

Artifactory remote repositories support YUM out-of-the-box, and there no need for any special configuration needed in order to work with RPMs in a remote repository.

All you need to do is point your YUM client at the remote repository, and you are ready to use YUM with Artifactory.

To define a remote repository to proxy a YUM remote repository, follow the steps below:

  1. In the Admin module under Repositories | Remote, click "New" to create a new remote repository.
  2. Set the Repository Key value, and specify the URL to the remote repository in the URL field as displayed below.
  3. Click "Save & Finish"
  4. Back in the Artifacts module, in theTree Browser, select the repository. Note that in the Tree Browser, the repository name is appended with "-cache".
  5. Click Set Me Up and copy the value of the baseurl tag.

  6. Next, create the /etc/yum.repos.d/targetCentos.repo file and paste the following configuration into it

Using Yum to install RPM packages from Artifactory

After configuring the yum-local repository in Artifactory, you need to configure your local machine to install software packages from it by executing the following steps:

  1. Edit the artifactory.repo file with root privileges

  2. Paste the following configuration into the artifactory.repo file:

Now, every RPM file deployed to the root of the yum-local repository can be installed using:

YUM Groups

A YUM group is a set of RPM packages collected together for a specific purpose. For example, you might collect a set of "Development Tools” together as a YUM group. 

A group is specified by adding a group XML file to same directory as the RPM packages included in it. The group file contains the metadata of the group including pointers to all the RPM files that make up the group.

Artifactory supports attaching a YUM Group file to the YUM calculation essentially mimicking the createrepo -g command.

A group file can also be created by running the following command:

Attaching a YUM Group

The process of attaching YUM group metadata to a local repository is simple:

  1. Create an XML file in the groups format used by YUM. You can either just type it out manually using any text editor, or run the yum-groups-manager command from yum-utils.
  2. Deploy the created group file to the repodata folder. 
    Artifactory will automatically perform the following steps:
    • Create the corresponding .gz file and deploy it next to the deployed group XML file.
    • Invoke a YUM calculation on the local repository. 
    • Attach the group information (both the XML and the .gz file) to the repomd.xml file.
  3. Make sure the group file names are listed in the YUM Group File Names field of the Packages tab. This tells Artifactory which files should be attached as repository group information.

YUM Group Commands

The following table lists some useful YUM group commands:


yum groupinstall <Group ID> 

Install the YUM group. The group must be deployed to the root of the YUM local repository.

yum groupremove <Group ID>

Remove the RPM group

yum groupupdate <Group ID>

Update the RPM group. The group must be deployed to the root of the YUM local repository.

yum groupinfo <Group ID>

List the RPM packages within the group.

yum grouplist | more

List the YUM groups

Setting Group Properties

YUM group properties can be set  in the /etc/yum.config file as follows:

SettingAllowed valuesDescription
overwrite_groups0 or 1

Determines YUM's behavior if two or more repositories offer package groups with the same name.

If set to 1 then the group packages of the last matching repository will be used.

If set to 0 then the groups from all matching repositories will be merged together as one large group.

groupremove_leaf_only0 or 1

Determines YUM's behavior when the groupremove command is run.

If set to 0 (default) then all packages in the group will be removed.

If set to 1 then only those packages in the group that aren't required by another package will be removed.

enable_group_conditionals0 or 1

Determines whether YUM will allow the use of conditionals packages.

If set to 0 then conditionals are not allowed

If set to 1 (default) package conditionals are allowed.

group_package_typesoptional, default, mandatoryTells YUM which type of packages in groups will be installed when groupinstall is called. Default is: default, mandatory


Yum Authentication

Proxy Server Settings

If your organization uses a proxy server as an intermediary for Internet access, specify the proxy settings in /etc/yum.conf. If the proxy server also requires authentication, you also need to specify the proxy_username, and proxy_password settings.

If you use the yum plugin (yum-rhn-plugin) to access the ULN, specify the enableProxy and httpProxy settings in /etc/sysconfig/rhn/up2date. In addition, If the proxy server requires authentication, you also need to specify the enableProxyAuthproxyUser, and proxyPassword settings as shown below.

SSL Setting

YUM supports SSL from version 3.2.27. 

To secure a repository with SSL, execute the following steps:

  • Generate a private key and certificate using  OpenSSL.
  • Define your protected repository in a .repo file as follows:

    gpgkey is a URL pointing to the ASCII-armored GPG key file for the repository . This option is used if YUM needs a public key to verify a package and the required key has not been imported into the RPM database. 
    f this option is set, YUM will automatically import the key from the specific URL. You will be prompted before the key is installed unless the assumeyes option is set.

Using Yum Variables

You can use and reference the following built-in variables in yum commands and in all YUM configuration files (i.e. /etc/yum.conf and all .repo files in the /etc/yum.repos.d/ directory):



This is replaced with the package's version, as listed in distroverpkg. This defaults to the version of the redhat-release package.


This is replaced with your system's architecture, as listed by os.uname() in Python.


This is replaced with your base architecture. For example, if $arch=i686 then $basearch=i386

The following code block is an example of how your /etc/yum.conf file might look:

Creating A GPG Key and Signing RPMs

In order  to create a GPG Key for signing RPMs ,use the gnupg package and gpg utilities (notice that gnupg2 will not work with these steps).

Creating a Public/Private GPG Key Pair

The following commands create a Private/Public GPG Key Pair (Note you should actually login to console/ssh with this user, not sudo to it):

You will be asked a series of questions, answer as follows (answers in italic):

  • Please select what kind of key you want: (1) DSA and ElGamal (default)
  • What keysize do you want? 2048
  • Key is valid for? 0 (key does not expire)
  • Real name: John Doe
  • Email Address:
  • Comment: RPM Development

Generating GPG keys

It is not recommended to generate private/public key pair on your production systems because they are exposed to the public internet and are therefore more vulnerable to being exposed.

Generating the GPG key may take some time, and once complete will display the following output:

The ID of your public key is displayed after the first line after the slash ('/') character. In the above example, the ID of the public key is 454CBFAB. 

Exporting Private/Public Keys for Safe Keeping

You must export the keys so that you can save them in a secure location (and also, so that they can be imported in the future). To list the keys you have installed execute the following command:

Exporting the Public GPG Key

In order to use the GPG Key with RedHat Network (RHN), you will need to make the Public portion available in a Public GPG Key by executing the following commands:


The Public Key is the only portion that should ever be made public. The Private Key must be kept secure, preferably on a system that does not allow outside access from the public internet. It is also recommended to make a hard copy (burned on a CD/USB key) of the Public/Private key pair and keep that somewhere secure like a Safe Deposit Box. Anyone who obtains your Private/Public key pair can sign RPMs as if they were signed by you and potentially perform malicious acts in your name.

You will need to make the public key available, and a common way to do this is to upload it to your web server (usually in the /pub folder or root of your repository).

For this document we will assume that the MYORG-GPG-KEY is available at the following URL: http://<Domain>/<root folder>/MYORG-GPG-KEY

Viewing Individual RPM Information

You can view all the metadata that annotates an RPM by choosing it in Artifactory's tree browser and selecting the RPM Info tab:

RPM Info

Metadata Fields as Properties

The corresponding RPM metadata fields are automatically added as properties of an RPM artifact in YUM repositories accessed through Artifactory:


  • rpm.metadata.arch

  • rpm.metadata.version

  • rpm.metadata.release

  • rpm.metadata.epoch


  • rpm.metadata.vendor

  • rpm.metadata.summary

Properties can be used for searching and other functions. For more details please refer to Properties.

Watch the Screencast

Watch this short screencast to learn how easy it is to host RPMs in Artifactory.





  • No labels