You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I searched open requests and couldn't find a duplicate
What is the idea?
#323 added support for stripping credentials from PyPi packages in --kind explicit lockfiles.
I propose adding support for --kind lock lockfiles too, since these are the default.
Why is this needed?
Currently running conda-lock lock --strip-auth when private PyPi repositories are configured results in credentials being written directly to the lockfile, meaning it cannot be committed to source control.
Currently this blocks users who have the following constraints
Building for multiple platforms (unified lockfile)
Depend on packages in private PyPi repositories (auth)
What should happen?
A biasic solution would be to allow stripping auth in --kind lock lockfiles. E.g. conda-lock lock --strip-auth --kind lock should strip credentials from private PyPi repositories urls.
HoweverI think a more flexible solution would be to support transparent environment variable references in configured private PyPi repositories. In this solution the workflow would be something like:
conda-lock install supports dereferencing these environment variables at install time.
I'm not certain about the complexities involved in doing this, but if there was support for the general idea I would happily attempt an implementation.
Additional Context
Note also #460 which proposes improvements to how auth is configured for private PyPi repositories.
The text was updated successfully, but these errors were encountered:
Checklist
What is the idea?
#323 added support for stripping credentials from PyPi packages in
--kind explicit
lockfiles.I propose adding support for
--kind lock
lockfiles too, since these are the default.Why is this needed?
Currently running
conda-lock lock --strip-auth
when private PyPi repositories are configured results in credentials being written directly to the lockfile, meaning it cannot be committed to source control.Currently this blocks users who have the following constraints
What should happen?
A biasic solution would be to allow stripping auth in
--kind lock
lockfiles. E.g.conda-lock lock --strip-auth --kind lock
should strip credentials from private PyPi repositories urls.HoweverI think a more flexible solution would be to support transparent environment variable references in configured private PyPi repositories. In this solution the workflow would be something like:
conda-lock
, see Improve auth configuration for private PyPi repositories #460)conda-lock lock
step for the resolverconda-lock install
supports dereferencing these environment variables at install time.I'm not certain about the complexities involved in doing this, but if there was support for the general idea I would happily attempt an implementation.
Additional Context
Note also #460 which proposes improvements to how auth is configured for private PyPi repositories.
The text was updated successfully, but these errors were encountered: