Proxy a Conda Repository Using Nexus Repo

We’ve supported Python developers for a number of years now. With the most recent Nexus Repository release, we are extending our reach with the official coverage of Conda in Nexus Repository Manager. Our teams have been listening to the Python community, customers, and all developers using Nexus. We are excited to continue supporting Python developers!

Originally written to fill in the gaps of pip, Conda is a package management tool that allows both Python and non-Python libraries to be packaged and managed within the same environment.

Data scientists flocked to Conda as it allowed them to take advantage of Python’s ease of adoption and flexibility while still being able to use their existing C and Fortran models and libraries.

Open source Conda repository Anaconda has a large community of 15 million users and contains over 1,500 data dependencies written in Python, R, C, and C++. While this may seem small in comparison to the 100,000 packages hosted by Python repository PyPi, it is not uncommon to see developers use Conda in conjunction with pip.

Proxy a Conda Repository via NXRM

All you need to do is:

1. Create your Conda proxy repository in NXRM. This can point to any public Conda repository (e.g. https://repo.continuum.io/pkgs/ or https://repo.anaconda.com/pkgs)

2. Add this NXRM repo channel to your Conda client. Note: channels specified in your .condarc file are prioritized based on order. If you want Conda to default to pulling packages from NXRM, make sure to have this listed as your first channel.

3. Install your Conda packages!

For more information on how to use Conda with NXRM, please refer to our technical documentation.

*** This is a Security Bloggers Network syndicated blog from Sonatype Blog authored by Sable Yemane. Read the original post at: https://blog.sonatype.com/proxy-a-conda-repository-using-nexus-repo

Recent Posts

USENIX Security ’23 – Inductive Graph Unlearning

Authors/Presenters: *Cheng-Long Wang, Mengdi Huai, Di Wang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content,…

3 hours ago

From DAST to dawn: why fuzzing is better solution | Code Intelligence

Security testing allows you to evaluate the robustness of applications and systems and identify potential weaknesses that attackers may exploit.…

3 hours ago

Scaling Application Security With Application Security Posture Management (ASPM)

Did you know that the total number of data breaches more than tripled between 2013 and 2022?  These breaches exposed…

6 hours ago

Crunching Some Numbers on PHP Support

PHP Extended Lifecycle Support (ELS) allows you to continue using older versions of PHP while still receiving security updates for…

10 hours ago

Google Chrome DBSC Protection Tested Against Cookie Attacks

In light of cookie stealing attacks and to ensure Chrome browser protection, Google has recently piloted its new Chrome DBSC.…

11 hours ago

What is SOC 2 Compliance Audit?

Our digital world is based on connectivity, but with that comes great responsibility. Businesses manage vast amounts of client information.…

12 hours ago