Document the behavior of `--cert`
See original GitHub issueEnvironment
- pip version: 19.2dev0 (and earlier)
- Python version: n/a
- OS: n/a
Description
The documentation for the --cert
option currently just says “Path to alternate CA bundle.”
This leaves the user wondering: does the specified bundle replace the default set of trust roots, or augment it?
(Also, it would be nice if --trusted-host
had a mention of --cert
since many people use the former when they could more securely be using the latter.)
Issue Analytics
- State:
- Created 4 years ago
- Reactions:1
- Comments:34 (21 by maintainers)
Top Results From Across the Web
Documenting Fieldwork: Helpful Answers to Your FAQs - BACB
Keeping up with documentation can be hard—but it doesn't have to be! ... necessary to demonstrate competence in applied behavior analysis.
Read more >Reporting Alleged Violations Based on Publicly Available ...
This video explores the Publicly Documented Alleged Violation reporting option. ... Behavior Analyst Certification Board.
Read more >Applied Behavior Analysis Certificate | Extended Learning
Application and document deadlines: ... Coursework is approved by the Behavior Analyst Certification Board (BACB) as meeting coursework eligibility ...
Read more >Why get Behavioral Assistance (BA) Training Certified - NJ.gov
BEHAVIORAL ASSISTANCE TRAINING CERTIFICATION ... to enter the BAs they supervise in their file and support BA staff through the certification process.
Read more >PCM 208, Clinical Certificate - Michigan Courts
FILE NO. PCM 208 (12/19) CLINICAL CERTIFICATE. MCL 330.1435, MCL 330.1750 ... or mood that significantly impairs judgment, behavior, capacity to recognize.
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Some information on the current state of pip (a6b0605) with respect to SSL verification:
requests
andcertifi
(the versions specified here), and does not patch them in any way to change their default cert-handling behavior. As a result, the default behavior when--cert
is not provided is the default behavior ofrequests
.requests
is to use the path returned bycertifi.where()
ifverify
is not set to an alternate path (link)requests
itself setsverify
to the contents ofREQUESTS_CA_BUNDLE
orCURL_CA_BUNDLE
if not explicitly set (link)certifi.where()
returns the path to the CA certificate bundlecacert.pem
which is distributed in certifi itself (link)certifi.where()
returns/etc/ssl/certs/ca-certificates.crt
(link) - likewise for Ubuntucertifi.where()
returns/etc/pki/tls/certs/ca-bundle.crt
(link) - probably similar to RedHat and CentOS--cert
is provided, pip sets its session’sverify
property to the provided path. As shown in the requests sources above, this completely overrides the default CA certificate bundle. Also as shown above, this can be a file path or a directory.--cert
should be as described forssl.SSLContext.load_verify_locations
. An example of the file form is in Certificate chains and the directory form is inSSL_CTX_load_verify_locations
(in the description of the CApath argument)Which I think would translate into the following actions for this issue:
--cert
. I would leave out the possibility of using a directory and instead just say something like “PEM-encoded CA certificate bundle. If provided, overrides the default.” and optionally:I bet this loosely corresponds to the TLS verification mode (https://docs.python.org/3/library/ssl.html#ssl.SSLContext.verify_mode) allowing the user to ignore untrusted certificates. It looks like if it’s set, the check is enforced unconditionally.