OpenCSW pkgutil config solaris

por | 9 abril, 2014

Getting started

OpenCSW uses a tool named pkgutil on top of the Solaris packaging utilities to automatically download, install and update packages. It needs to be installed manually once, after that all maintenance is done via pkgutil.

Solaris 10

On a Solaris 10 system, you can use the capacity of pkgadd to download and install it via http in one step:

pkgadd -d

You may need to specify a proxy with -x <proxy>:<port>, be aware that there are known issues with Squid and possibly other proxies.

Solaris 8 and 9

On Solaris 8 and 9 (or 10 if you have issues with the above pkgadd) you need to download the package manually (e.g. using wget) and then install it:

pkgadd -d pkgutil.pkg all

You can now start installing packages. For a list of available packages use:

/opt/csw/bin/pkgutil -a

For easy access to OpenCSW programs, put /opt/csw/bin in front of PATH, and /opt/csw/share/man in front of MANPATH. On Solaris 10, you can do that by editing the /etc/default/login file, uncomment the PATH and SUPATH variables definition, adjust the values as required and log out and back in.

As the list is quite long and you probably have an idea what you are looking for the list can be fuzzy-matched with:

root# pkgutil -a vim
common               package              catalog                        size
gvim                 CSWgvim              7.3.055,REV=2010.11.25       1.1 MB
vim                  CSWvim               7.3.055,REV=2010.11.25    1002.2 KB
vimrt                CSWvimrt             7.3.055,REV=2010.11.25       7.3 MB

Lets just go ahead and try one:

root# pkgutil -y -i vim
root# vim

Voila! You have installed your first package!

Selecting your mirror and the catalog release

Now that you are about to install lots of stuff it may be a good time to select one of the mirrors from close to you. The official mirrors are listed at:

Please uncomment the line with mirror in /etc/opt/csw/pkgutil.conf so it looks similar to this with the URL replaced by the mirror you picked:


By default, pkgutil is configured to use the testing catalog. You might change it to unstable on your development hosts to catch any issues before they hit the testing catalog.

You can verify the setting with pkgutil -V

maxpkglist              10000 (default: 10000)
noncsw                  false (default: false)

On the next catalog update with pkgutil -U the catalogs are pulled from the new mirror.

Setting up cryptographic verification

The catalog is signed with PGP and it is a good idea to set up your system to verify the integrity of the catalog. As the catalog itself contains hashes for all packages in the catalog this ensures you actually install the packages which were officially released. First you need to install cswpki (of course with pkgutil!):

pkgutil -y -i cswpki

Then you need to import the public key:

root# cswpki --import

The current fingerprint looks like this:

# gpg --homedir=/var/opt/csw/pki/ --fingerprint [email protected]
pub   1024D/9306CC77 2011-08-31
      Key fingerprint = 4DCE 3C80 AAB2 CAB1 E60C  9A3C 05F4 2D66 9306 CC77
uid                  OpenCSW catalog signing <[email protected]>
sub   2048g/971EDE93 2011-08-31

You may also trust the key once you verified the fingerprint:

root# gpg --homedir=/var/opt/csw/pki --edit-key [email protected] trust

Now everything is in place for enabling security in pkgutil. Edit the /etc/opt/csw/pkgutil.conf and uncomment the two lines with use_gpg and use_md5 so they look like this:


You can verify that it worked with pkgutil -V:

root@login [login]:/etc/opt/csw > pkgutil -V
show_current            true (default: true)
stop_on_hook_soft_error not set (default: false)
use_gpg                 true (default: false)
use_md5                 true (default: false)
wgetopts                not set (default: none)

On the next pkgutil -U you should see a catalog integrity verification wit gpg:

Checking integrity of /var/opt/csw/pkgutil/catalog.mirror_opencsw_current_sparc_5.10 with gpg.
gpg: Signature made Thu Oct 03 00:32:57 2013 CEST using DSA key ID 9306CC77
gpg: Good signature from "OpenCSW catalog signing <[email protected]>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 4DCE 3C80 AAB2 CAB1 E60C  9A3C 05F4 2D66 9306 CC77
Looking for packages that can be upgraded ...
Solving needed dependencies ...
Solving dependency order ...

Nothing to do.

Installing other basic packages

Installing the following packages is optional but recommended to have a coherent stack:

  • gzip
  • coreutils
  • wget

Finally, installing the gnulinks package and putting the /opt/csw/gnu value in the front of the list contained by the PATH variable, gives priority to basic utilities supplied by us.