Package Security Manager CLI
The conda-repo-cli
package is the command-line interface (CLI) tool used to interact with Package Security Manager. You can use it to perform most of the actions that are available through the graphical user interface (GUI). The most common uses include:
- Listing channel and mirror details
- Creating channels and mirrors
- Setting/updating filtering criteria for channels and mirrors
- Configuring your channel alias and default channels
- Uploading and managing assets
The actions you can perform in the CLI are determined by your group/role permissions. If you’re unsure of your permissions or need additional permissions, speak with your Package Security Manager administrator.
Installing the conda repo CLI
-
Install the
conda-repo-cli
package by opening Anaconda Prompt (Terminal on macOS/Linux) and running the following command: -
Verify your installation was successful and view which version you’ve installed by running the following command:
As an administrator, you can mirror or upload this package into a channel within your Package Security Manager, allowing your users to access it if they would otherwise be unable to acquire it themselves.
As a user, contact your administrator if you are unable to install conda-repo-cli
.
Configuring conda-repo-cli
You must configure your repository site before you can log in via the CLI.
Configuring your conda repository site tells conda-repo-cli
which URL to reach out to and interact with. This information is recorded in your .conda/repo-cli-config.yaml
file. Populate the file by running one of the following configuration commands.
Choose the commands that apply to your setup:
Simplified CLI configuration
If you are using conda-repo-cli
version 1.0.35+, run the following command to add your Anaconda URL to your .conda/repo-cli-config.yaml
file and set it as the default site for conda to interact with:
When using this command, only include the domain name of your website. conda-repo-cli
automatically detects whether or not you are utilizing SSL certificates and includes this along with the /api
suffix when setting your domain name as the default site.
For example, if your Package Security Manager URL is “https://server.example.com
” your command would be:
This adds “https://server.example.com/api
” to your .conda/repo-cli-config.yaml
file with the name server.example.com.
Extended CLI configuration
Run the following command to add your Package Security Manager website to the .conda/repo-cli-config.yaml
file:
Then, instruct conda-repo-cli
to use the URL you just configured as the default site to interact with by running the command:
For example, if your Package Security Manager URL is https://server.example.com
, and you want to name your site anaconda-server, the commands to configure your conda-repo-cli
are:
OAuth and SAML configuration
If your Package Security Manager is using OAuth or SAML for authentication, you must first complete the conda repository site configuration steps, then run this additional command to enable the standard authorization flow:
Viewing your current configurations
To view your current configurations, run the following command:
This will return the path to your ./conda/repo-cli-config.yaml
file, as well as its contents.
Logging in to Package Security Manager via the CLI
To log in to Package Security Manager using the CLI, run the following command:
You will be prompted to enter your user credentials after running the command. For example:
If you are using OAuth or SAML, running conda repo login
opens a browser window to log you in to Package Security Manager CLI using your SSO service. After completing your login, the window displays Token Received. You can now close your browser window, return to your terminal, and use the CLI.
Using the CLI
You must log in before you can perform tasks using CLI commands. The commands you are able to successfully run are based on your assigned roles and permissions. For example, if you are not allowed to create mirrors using Package Security Manager UI, you will not be allowed to run commands that create, update, or otherwise manage mirrors using the CLI. For more information, see roles and permissions.
Using the .condarc configuration wizard
Use Package Security Manager CLI conda repo wizard command to configure channels:
and default_channels:
while setting a channel_alias
for them. You can also use the command to backup and restore your .condarc
file.
The channel_alias
prepends (is placed in front of) your provided channel name when running conda commands that involve channels. Logging in to the CLI provides the Wizard with the information it needs to set your channel_alias
for you. For more information about channel aliases, see Set a channel alias in the official conda docs.
To use the Wizard to configure your .condarc file, run the following command:
The Wizard shows you channels from your Package Security Manager that are available for you to add to your .condarc
file. Enter the channels you wish to set to your default_channels:
list, separated by a space. You must set at least one default channel for the Wizard to continue.
Once complete, enter the channels you want to add to the channels:
list, separated by a space. Leave this blank if you do not need to add any additional channels.
Channel names must be exact. Misspelled channel names will not be accepted, for both the default_channels:
and channels:
lists. If you enter a channel name that does not match an existing channel in your instance, a warning appears and no channel is added to the list.
Your output will look something like this:
To restore your .condarc
file to its previous state (what it was before you ran the Wizard), run the following command:
Channels
Viewing channels
To view a list of channels you have access to in Package Security Manager, run the following command:
Viewing a channel’s packages
To view a list of packages available on a specific channel, run the following command:
Viewing a channel’s files
To view a list of files available on a specific channel, run the following command:
To view a list of files of a specific artifact family (e.g. general artifacts) within a channel, you can specify that in the command using the --family
or -f
tag:
Viewing a channel’s details
To view the details of a channel, run the following command:
The return from this command will display the following information about a channel:
- The channel’s name
- The channel’s description
- Privacy permissions
- Number of artifacts contained in the channel
- Number of downloads from the channel
- Number of mirrors the channel contains
- Number of subchannels the channel contains
- When the channel was created
- The last date the channel was updated
- Channel owners
Channel privacy permissions
Package Security Manager CLI allows you to set the privacy permissions of your channels at any time.
To change permissions of your channel to private, allowing only yourself to view the channel, run the following command:
To change permissions of your channel to authenticated, allowing only authenticated users to view your channel, run the following command:
If you have a private or authenticated channel that you want to make public, run the following command:
Creating a channel
Create a public channel by running the following command:
Creating a subchannel
You can create a subchannel within an already existing channel by running the following command:
Deleting a channel
To delete a channel from your Package Security Manager, run the following command:
Policies
Policy filters only work for conda repositories. If your channel contains Std Python or R packages, use the mirror filters.
A policy is a security control you can apply to a channel or mirror to restrict the packages users can source from them.
Creating a policy
To create a policy, use the --create
argument along with the appropriate configuration options. These options allow you to define filtering criteria, such as platforms, licenses, CVEs, and package names. Here is an example policy creation command:
This command is formatted for readability. If your shell supports line continuation (e.g. bash, zsh), you can run it as shown. Otherwise, remove the backslashes (\
) and combine it into a single line.
Basic policy configuration options
--name
: Set the name of the policy.--channel-name
: (Optional) Specify the channel the policy applies to.--description
: (Optional) Provide a description for the policy.
Platform filtering options
--platform
: Include platforms, separated by commas.--platform-not
: Exclude platforms, separated by commas.
Available platforms
linux-32
linux-64
linux-aarch64
linux-armv6l
linux-armv7l
linux-ppc64
linux-ppc64le
linux-s390x
osx-64
osx-arm64
win-32
win-64
zos-znoarch
License filtering options
--license
: Include licenses, separated by commas.--license-not
: Exclude licenses, separated by commas.
Supported licenses
AGPL
GPL
GPL2
GPL3
LGPL
BSD
MIT
APACHE
PSF
Public-Domain
Proprietary
MOZILLA
OTHER
None
CC
Package filtering options
--package-name
: Include package names, separated by commas.--exclude-package-name
: Exclude package names, separated by commas.--exclude-package-name-exception
: Remove exclusions for specified packages, separated by commas.--include-dependencies
: Include dependencies.--exclude-dependencies
: Exclude dependencies.--only-signed-packages
: Restrict to signed packages only.--keep-legacy-packages
: Includes both.conda
and.tar.bz2
files for packages that contain them.
Date-based filtering options
Date formatting
-
YYYY-MM-DD
-
--package-created-from
: Filter packages created on or after the specified date. -
--package-created-to
: Filter packages created on or before the specified date.
CVE filtering options
--cve-score
: Set a CVE score threshold for filtering.--cve-score-comparator
: Comparator for CVE score.- Options:
==
,<=
,>=
,<
,>
- Default:
<=
- Options:
--cve-status
: Include CVE statuses, separated by commas.--exclude-cve-status
: Exclude CVE statuses, separated by commas.
Supported statuses
-
active
-
reported
-
mitigated
-
cleared
-
disputed
-
--cve-link-status-and-score
: Define the relationship between CVE status and score.- Options:
and
,or
- Default:
and
- Options:
-
--cve-allowlist
: Add specific CVE IDs to an allowlist, separated by commas.- CVE ID Format:
CVE-YYYY-#####
- CVE ID Format:
-
--exclude-uncurated-cve-packages
: Exclude uncurated CVE packages.
Viewing policies
To view all policies, run the following command:
To view a specific policy, include the policy ID in the command:
Assigning a policy
To assign a policy to a channel, run the following command:
Policies can also be applied directly to mirrors. For more information, see Creating a mirror with a policy.
Unassigning a policy
Editing a policy
To edit an existing policy, use the --edit
argument with the same configuration options available for creating a policy and include the ID of the policy you want to modify.
Editing a filtering option for a policy clears the previous filter value.
For example, if you create a policy and specify the win-32
platform filter, running conda repo policy --edit <POLICY_ID> --platform "win-64"
replaces the win-32
filter with the win-64
filter; it does not add both filters.
To clear filters in a policy, provide an empty string for the filtering options using the --edit
command.
For example, to remove the platform filter, use --platform ""
. This method works for Platform and License filtering arguments.
Deleting a policy
To delete a policy, run the following commdand:
Mirrors
Mirroring via the CLI can accomplish things that would be cumbersome via the GUI.
Mirrors exist within channels in Package Security Manager. When working in the CLI, you need to create a channel to populate with a mirror or know which channels are already available for mirror hosting. Anaconda recommends that channels contain only one mirror each to prevent conflicts between package sources and mirror filters. It is possible for a channel to contain multiple mirrors; however, you will need to proceed with caution and ensure that your mirror filters do not overlap in a conflicting manner.
Creating a mirror
The basic command for creating a mirror using the CLI is:
This will create an exact copy of the mirrored repository with no restrictions on what gets copied to your mirror and made available to your users.
Your <TYPE>
must match the <SOURCE>
mirror. For example, if your source mirror contains conda packages, you must use conda
as your mirror type.
You can add arguments to this basic mirror command to further specify configurations for the mirror. This can mean restricting the available packages due to an applied filter, or downloading only specific versions of specific packages to be available on your channel.
To create a mirror and populate it with a specific set of packages, run the following command:
For example, if you want to create a mirror called “snakes” in a channel you’ve created and named “lua”, and you want to populate the channel with packages for Mac users only, the command would be:
Populating your channel with packages in this manner will not automatically populate the channel with their dependencies. If you do not have all the necessary packages, conda won’t be able to successfully create an environment from the channel.
Creating a mirror with a policy
When you create or edit a mirror on a channel that has a policy associated with it, the channel’s policy is automatically applied to the mirror. To assign a specific policy to the mirror instead, include the --use-channel-policy False
and --policy-id <POLICY_ID>
arguments in your command.
Here is an example command that creates a mirror and applies a policy to it. For more information, see Policies.
Filtering mirrored packages
Policies were introduced to Package Security Manager in version 6.7.0. If your version of Package Security Manager supports policies, use those filtering options for any channels that will contain conda packages. For all other mirror types (Std Python, R) use the mirroring filters.
Adding filters to your mirrors ensures that you only mirror the packages that you need in your channel. This ensures that everyone on your team is not only using the same packages, but the same version of those packages for the same operating system. You can also filter by license and common vulnerability and exposure (CVE) score to ensure you are meeting your organization’s software security requirements. For more information about CVEs, see Common Vulnerabilities and Exposures (CVEs).
Filters can also be applied at the channel level. Both the channel filter and the mirror filter are applied to packages contained in the channel. The mirror filter restricts packages that are pulled from the source mirror, and the channel filter restricts which packages are allowed into the channel. Filters should not contain configurations that will conflict with one another.
Mirror filtering arguments
--subdirs
- For mirror sources that contain conda packages.
Instruct Package Security Manager to only mirror packages for the provided subdirectories. Anaconda recommends you always include the noarch platform as well as the specific platform architecture necessary for your organization, as many platform-specific packages will require a noarch dependency to run. Use a comma-separated string contained within double quotes when supplying the argument.
Here is an example of what this portion of a mirror command looks like:
You can filter for the following platforms:
- noarch
- linux-32
- linux-64
- linux-aarch64
- linux-armv6I
- linux-armv7I
- linux-ppc64
- linux-ppc64le
- osx-64
- osx-arm64
- win-32
- win-64
- zos-z
If your source mirror does not contain conda packages, this command argument is not necessary.
--type
- Denotes the mirror type. Possible types are: “conda”, “python_simple”, and “CRAN”.
Here is an example of what this portion of a mirror command looks like:
--projects
- List of pypi projects to mirror.
If your source mirror is populated with PyPI projects, you can list which projects to include from the source mirror here. Use a comma-separated string contained within double quotes when supplying the argument.
Here is an example of what this portion of a mirror command looks like:
--licenses
- The --licenses
argument can be used to both exclude and include licenses. Use a comma-separated string contained within double quotes when supplying the argument.
To exclude a license, prepend the license name entry with a hyphen (-). To include a license, just provide the license name.
Here is an example of what this portion of a mirror command looks like:
You can filter for the following licenses:
- agpl
- gpl2
- gpl3
- lgpl
- bsd
- mit
- apache
- psf
- public_domain
- proprietary
- other
- none
--only_spec
- Include a specific package from the source mirror. Uses MatchSpec (non-exact value search queries) to specify the package. Supply this argument multiple times for multiple entries.
For more information about using non-exact value search queries, see Package match specifications.
--exclude_spec
- Excludes a package from the source mirror. Uses MatchSpec (non-exact value search queries) to specify the package. Supply this argument multiple times for multiple entries.
Here is an example of what this portion of a mirror command looks like:
--include_spec
- Include a package, or a specific version of a package, that would otherwise be excluded by the --exclude_spec
argument. Supply this argument multiple times for multiple entries.
Here is an example of what this portion of a mirror command looks like:
--cve_score
- Removes all files that are associated with a CVE that has a score equal to or higher than the threshold value set here. CVE scores range from 0-10 and can contain up to one decimal point value.
Here is an example of what this portion of a mirror command looks like:
--exclude_uncurated_cve_packages
- Removes all files that are associated with uncurated CVEs in the repository. Supply this argument with either a True
or False
tag.
Here is an example of what this portion of a mirror command looks like:
--date_from
- Specifies the start of a date range denoting when a conda package was published. Works in tandem with the --date_to
filter. The date range format is YYYY-MM-DD
. The --date_from
value must be earlier in the timeline than the --date_to
value.
--date_to
- Specifies the end of a date range denoting when a conda package was published. Works in tandem with the --date_from
filter. The date range format is YYYY-MM-DD
.
Here is an example of what this portion of a mirror command looks like:
A maximum span of one year is allowed between the start and end of the date range.
Viewing mirror status
To view the status of a mirror on a channel, run the following command:
Here is an example of what the return for your command will look like:
Stopping a mirror
To stop an in-progress mirror, run the following command:
Restarting a mirror
To restart a stopped mirror, run the following command:
Updating mirrors
Specifications for existing mirrors can be updated at any time by supplying the --update
argument, along with the names of the mirror being updated and the channel that contains the mirror. Use the same mirror arguments as when creating a mirror to alter its configurations.
To update an existing mirror, run the following command:
Here is an example of what an update command looks like:
If you do not include the --run_now
argument, your mirror will update on its next scheduled run. You can always run --conda repo mirror --update <MIRROR_NAME> --channel <CHANNEL_NAME> --run_now
to update your mirror without changing any parameters.
Updating a mirror replaces its current contents with what you specify in the update command.
Deleting mirrors
To delete a mirror, run the following command:
Packages
Viewing channel packages
To view a list of packages contained within a channel, run the following command:
Viewing channel package details
To view the details of a channel’s packages, run the following command:
This will return a JSON formatted list of all the files in a given channel and their metadata, to include:
- CKEY
- CVE score
- CVE status
- File name
- Package name
- Platform
- Version
Copying a package to a channel
To copy a package to a channel, run the following command:
This retains the package on the origin channel and adds it to the destination channel.
Copying a package to a subchannel
To copy a package to a subchannel, run the following command:
This retains the package on the origin channel and adds it to the destination subchannel.
Moving a package to a channel
To move a package to a channel, run the following command:
This removes the package from the origin channel and adds it to the destination channel.
Moving a package to a subchannel
To move a package to a subchannel, run the following command:
This removes the package from the origin channel and adds it to the destination channel.
Deleting a package from a channel
To delete a package from a channel, run the following command:
Deleting a package from a subchannel
To delete a package from a channel, run the following command:
Tokens
Authorization tokens can be created by users and admins to provide others with access to private/authenticated channels or with a specific set of permissions within Package Security Manager. For more information, see Authorization Tokens.
Scopes
Scopes are fine-grained permissions that you can embed within a token to limit the potential actions that can be performed while using said token. Scope tokens are especially useful for interacting with software programmatically.
Viewing scopes
To view a list of scopes, run the following command:
Creating a scope token
To generate a new user authorization token, run the following command:
Supply the --scopes
or -s
argument multiple times to include multiple scopes for your token.
Removing a user authorization token
To remove an authorization token from your user, run the following command:
Channel service accounts
Channel service accounts are only available in Package Security Manager version 6.6.5 and later.
Listing all channel service accounts
Creating a service account token
Creating tokens for a service account provides the account with specified permissions to act on the specified channels. Here are a few ways you might want to implement a channel service account token:
Listing all channel tokens
Listing all tokens for a service account
To list all the token IDs associated with a channel’s associated service account, run the following command:
To list all the token IDs that a service account has to a specified channel, run the following command:
Editing an existing token
You can edit an existing token to change its permission level.
Deleting a Token
CVEs
Listing CVEs associated with files in your repository
To list the critical vulnerabilities and exposures (CVEs) associated with packages in your repository, run the following command:
This will return the ID of the CVE, the CVE score, CVE type, curation status, the number of packages that are affected by the CVE, and a brief description of the vulnerability.
Showing files associated with a CVE
To view the specific files associated with a CVE, run the following command:
This provides you with a list of files that are associated with the <CVE_ID>
you’ve provided.
Viewing CVE details
To view the details of a specific CVE, run the following command:
This will provide the CVE’s CVSS2 and CVSS3 score metrics in addition to the ID of the CVE, the CVE score, CVE type, curation status, publish date, and a brief description of the vulnerability.
Software Bill of Materials (SBOMS)
Download a SBOM for artifact files on your Package Security Manager by running the following command:
An artifact’s CKEY string can be found by viewing package details.
Search
Use the search command to locate packages in your repository:
The return provides you with a list of channels containing the package, as well as the package’s version, family, build, license, and platform information. For example, if you need to install pytorch
, but don’t know where to locate the package, run the following command:
Viewing your user information
To view your user information at any time, run the following command:
The return contains a list of your permissions, your default channel, your username, and your user ID.
Uploading to a channel
The conda repo upload
command is used to upload assets to your Package Security Manager repository. You can upload environments, notebooks, packages, projects, and general resource artifacts to a channel for storage and distribution.
To upload an asset (package, project, notebook, environment) to the first channel listed under default_channels:
in your .condarc
file, run the following command:
You can upload multiple assets at the same time with the same command, adding each package location separated with a space:
To specify a destination channel for your upload, run the following command:
General resource artifact (GRA) uploads require additional information to be included in the upload command:
Make sure to perform manual security checks on artifacts before uploading them. Automatic security scanning is not provided.
Downloading a notebook from a channel
The conda repo download
command allows you to download notebooks from a specified channel.
To download a notebook and save it to the current working directory, run the following command:
To specify a target directory to download the notebook to and rename the file, use the --filename
option:
If you do not include a filename with the directory path, the notebook’s original filename is used.
Downloading artifact report
If you need to know which users are downloading which packages from a given channel, you can use the following command:
Here is an example of what a download history report command looks like:
You can specify a location for your <REPORT>
with a file path, such as /User/tmp/SBOM_report.json
. If no location is specified, the report will be placed in your current working directory.
A maximum span of one year is allowed between the start and end of the date range.
Further assistance
To view the conda repo commands in the terminal, run the command:
Similarly, appending --help
or the shorthand -h
to a command will provide you with further actions you can take, such as the following:
Was this page helpful?