On 9 May 2014 22:33, Donald Stufft <don...@stufft.io> wrote: > On the flip side option (A) allows us to make this much simpler overall. We > can simply do: > > If it's hosted on PyPI: > Trust it. > else if it's not hosted on PyPI: > Require a --allow-external-and-unverifiable [*] > > This is *much*, *much*, *much* easier to explain, and I think it may be a good > idea ala the Zen. [...] > Actually my opinion is that allowing external+safe files by default is not > going to have any meaningful impact to *any* (or at the very least, 99.9%) of > pip's users.
Thank you for the detailed explanation (most of which I trimmed). I am now 100% convinced of what you're saying. As to the option name, I think that --allow-external makes sense. It describes what we're doing, and we can explain why it is opt-in on the basis that (something like): """ There are a number of issues with off-PyPI downloads. Apart from the fact that the infrastructure team cannot provide support for such downloads, nearly all such downloads are not verifiable, and hence represent a risk to the user. There is a mechanism for verifying off-PyPI downloads, but only a tiny minority of packages (around 0.05%) use it, and as the reliability issues still exist, opt-in remains the correct default.. """ If there's a sudden growth in safe off-PyPI downloads, we could add an --allow-safe-external option that allowed *all* safe off-PyPI links (it's not worth having a per-package option, IMO). But I doubt it'll ever be needed. Paul. _______________________________________________ Distutils-SIG maillist - Distutils-SIG@python.org https://mail.python.org/mailman/listinfo/distutils-sig