upload to untrusted hosts with --trusted option
See original GitHub issueHi,
Twine denies uploading to untrusted https PyPI clones. This triggers an SSL error caused by an unknown CA certificate. I need the ability to upload packages to untrusted private PyPI servers since
Backgroung : I’m in process to add PyPI and NPM support to a Nexus server that’s published in production with regular CA signed certificates. But can’t obtain such certificates for the Nexus test site.
I made a small quick’n’dirty patch setting verify=False
option when posting a tarball or wheel file here.
https://github.com/pypa/twine/blob/master/twine/repository.py#L152
I know that the requests
lib issues a warning in such situations but I don’t care.
Thanks
Issue Analytics
- State:
- Created 5 years ago
- Reactions:6
- Comments:13 (7 by maintainers)
Top Results From Across the Web
pip install fails with "connection error: [SSL
I tried all the --trusted-host and --cert options and pip will not work. I tried to upgrade pip and got the SSL error....
Read more >Upload SSL certificates for a Classic Load Balancer to ...
How do I upload SSL certificates for my Classic Load Balancer to prevent clients from receiving “untrusted certificate” errors?
Read more >Server Certificates | IntelliJ IDEA Documentation
IntelliJ IDEA provides its own storage for trusted certificates. ... Select this option if you want non-trusted certificates (that is the certificates that ......
Read more >Securing ESXi Hosts with Trusted Platform Module
ESXi hosts can use Trusted Platform Modules (TPM) chips, ... a vCenter Server identifies the platform on a previously untrusted host.
Read more >Untrusted Hosts and Confidentiality: Secure Program ...
requiring a single universally trusted host. We are primarily inter- ested in enforcing confidentiality policies; in this setting, however,.
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
The solution to this problem is threefold:
--cert
parameter should be used to pass the trusted certificateThis last option is intentionally ugly and inconvenient to limit the proliferation of that discouraged approach.
If none of these approaches are suitable, please feel free to elaborate on why.
It’s not always possible to work the “right” way, that’s why pip, conda install and npm gives the option to add trusted-host\verify-ssl flags. Not as the recommended way, but as a possiblity for users. The default should obviously be to verify whenever its a possibility.
In my case, I just can’t demand from the Artifactory repository providers to add a real CA approved certificate and I have no choise but use verify=False when uploading and downloading packages from there. and there are no alternatives in the lan…