
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
.. image:: https://github.com/jackton1/gcspypi/workflows/Python%20package/badge.svg :target: https://github.com/jackton1/gcspypi/workflows/Python%20package/badge.svg :alt: Python package
gcs_pypi is a CLI for creating a Python Package Repository in an GCS bucket.
Installation ^^^^^^^^^^^^
Install gcs_pypi using pip:
.. code-block:: bash
pip install gcs_pypi
GCS Bucket ^^^^^^^^^^
IAM (Role & Service Account)
Setup service account with the following permissions
.. code-block:: text
storage.buckets.get
storage.buckets.getIamPolicy
storage.buckets.update
storage.objects.create
storage.objects.delete
storage.objects.get
storage.objects.getIamPolicy
storage.objects.list
storage.objects.setIamPolicy
Recommended that you create a custom Role which can be inherited by the service account
Example
*
Create Role "PYPI"
*
Assign Permissions
.. code-block:: text
storage.buckets.get
storage.buckets.getIamPolicy
storage.buckets.update
storage.objects.create
storage.objects.delete
storage.objects.get
storage.objects.getIamPolicy
storage.objects.list
storage.objects.setIamPolicy
*
Create a Service Account e.g pypi
*
Select the "PYPI" Role created above
*
Add a condition to limit access to only that GCS bucket
.. code-block:: yaml
resource.name == "mybucket"
Visit `Cloud IAM Conditions <https://cloud.google.com/iam/docs/conditions-overview?_gac=1.79817061.1587676512.CjwKCAjw-YT1BRAFEiwAd2WRtsely2bRUq6KF3rxDzHVoCLbdZoy-AqW0raFx96lJeQ6O2Ie8q6IMhoCrskQAvD_BwE&_ga=2.40552928.-350153010.1574411744>`_ for more information
Distributing packages
^^^^^^^^^^^^^^^^^^^^^
You can now use ``gcspypi`` to create Python packages and upload them to your GCS bucket.
To hide packages from the public, you can use the ``--private`` option to prevent the packages from
being accessible directly via the GCS bucket (they will only be accessible via your Domain or
alternatively you can specify a secret subdirectory using the ``--secret`` option:
.. code-block:: bash
cd /path/to/your-project/
gcspypi --bucket mybucket [--private] [--secret SECRET]
Cache Header
^^^^^^^^^^^^
Set cache-control header for index.html
.. code-block:: bash
$ gsutil setmeta -h "cache-control:public, must-revalidate, proxy-revalidate, max-age=0" gs://[BUCKET]/index.html
Installing packages
^^^^^^^^^^^^^^^^^^^
Install your packages using ``pip`` by pointing the ``--extra-index-url`` to your Custom domain (optionally followed by a secret subdirectory):
.. code-block:: bash
pip install your-project --extra-index-url https://pypi.example.com/SECRET/
Alternatively, you can configure the index URL in ``~/.pip/pip.conf``\ :
.. code-block::
[global]
extra-index-url = https://pypi.example.com/SECRET/
Credits
~~~~~~~
* `s3pypi <https://github.com/novemberfiveco/s3pypi>`_
FAQs
CLI for creating a Python Package Repository in a GCS bucket
We found that gcs-pypi demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.