python-peps/peps/pep-0759.rst

474 lines
26 KiB
ReStructuredText
Raw Normal View History

PEP: 759
Title: External Wheel Hosting
Author: Barry Warsaw <barry@python.org>,
Ethan Smith <ethan@ethanhs.me>
PEP-Delegate: Donald Stufft <donald@python.org>
Discussions-To: https://discuss.python.org/t/pep-759-external-wheel-hosting/66458
Status: Draft
Type: Standards Track
Topic: Packaging
Created: 01-Oct-2024
Post-History:
Abstract
========
This PEP proposes a mechanism by which projects hosted on `pypi.org
<https://pypi.org>`__ can safely host wheel artifacts on external sites other
than PyPI. This PEP explicitly does *not* propose external hosting of
projects, packages, or their metadata. That functionality is already available
by externally hosting independent package indexes. Because this PEP only
provides a mechanism for projects to customize the download URL for specific
released wheel artifacts, dependency resolution as already implemented by
common installer tools such as `pip <https://pip.pypa.io/en/stable/>`__ and
`uv <https://docs.astral.sh/uv/>`__ does not need to change.
This PEP defines what it means to be "safe" in this context, along with a new
package upload file format called a ``.rim`` file. It defines how ``.rim``
files affect the metadata returned for a package's :ref:`Simple Repository API
<packaging:simple-repository-api>`
in both HTML and JSON formats, and how traditional wheels can easily be turned
into ``.rim`` files.
Rationale
=========
The Python Package Index, hosted at https://pypi.org, imposes `default limits
<https://pypi.org/help/>`__ on upload artifact file size (100 MiB) and total project size
(10 GiB). Most projects can comfortably fit within these limits during the lifetime of the
project, through years of uploads. A few projects have encountered these limits, and have
been granted both file size and project size exceptions, allowing them to continue
uploading new releases without having to take more drastic measures, such as removing
files which may potentially still be in use by consumers (e.g. through version pins).
A related workaround is the `"wheel stub" <https://github.com/wheel-next/wheel-stub>`__
approach, which provides an indirect link between PyPI and an external third party package
index, where such limitations can be avoided. Wheel stubs are :ref:`source distributions
<packaging:source-distribution-format>` (a.k.a. "sdists") which utilize a :pep:`517` build
backend that, instead of turning source code into a binary wheel, performs some logic to
calculate the URL for an existing, externally hosted wheel to download and install. This
approach works, but it obscures the connection between PyPI, the sdist, and the externally
hosted wheel, since there is no way to present this information to ``pip`` or other such
tools.
Historical context
------------------
In 2013, :pep:`438` proposed a "backward-compatible two-phase transition
process" to modify several aspects of release file hosting on PyPI. As this
PEP describes, PyPI originally supported only project and release
*registration* without also allowing for artifact file hosting. As such, most
projects hosted release file artifacts elsewhere. Artifact hosting was later
added, but the mix of externally and PyPI-hosted files led to a wide range of
usability and potential security-related problems. PEP 438 was an attempt to
provide several facilities to allow external hosting while promoting a
PyPI-first hosting preference.
PEP 438 was complex, with three different "hosting modes", ``rel`` metadata in
the simple HTML index pages to signify hosting locations, and a two-phase
transition plan affecting PyPI and installer tools. PEP 438 was ultimately
retracted in 2015 by :pep:`470`, which acknowledges that PEP 438 did succeed
in...
bringing about more people to utilize PyPI's repository features, an
altogether good thing given the global CDN powering PyPI providing speed
ups for a lot of people[...]
Instead of external hosting, PEP 470 promoted the use of explicit multiple
repositories, providing full package indexing and artifact hosting, and
enabled through installer tool support, such as ``pip install
--extra-index-url`` allowing ``pip`` to essentially treat multiple
repositories as `one single global repository
<https://pip.pypa.io/en/stable/cli/pip_install/#cmdoption-extra-index-url>`__
for package installation resolution. Because this has been the blessed norm
for so many years, all Python package installation tools support querying
multiple indexes for dependency resolution.
The problem with multiple indexes
---------------------------------
Why then does this PEP propose to allow a more limited form of external
hosting, and how does this proposal avoid the problems documented in PEP 470?
One well-known problem that consolidating multiple indexes enables is
`dependency confusion attacks
<https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610>`__, to
which Python *can* be particularly vulnerable, due to the algorithm that ``pip
install`` uses for resolving package dependencies and preferred versions. The
``uv`` tool addresses this by supporting an additional `index strategy
<https://docs.astral.sh/uv/reference/settings/#index-strategy>`__ option,
whereby users can select between, e.g. a ``pip``-compatible strategy, and a
more limited strategy that prevents such dependency confusion attacks.
:pep:`708` provides additional background about dependency confusion attacks,
and takes a different approach to preventing them. At its core, PEP 708 allows
repository owners to indicate that projects track across different
repositories, which allows installers to determine how to treat the global
package namespace when combined across multiple repositories. PEP 708 has been
provisionally accepted, pending several required conditions as outlined in PEP
708, some of which may have an indeterminate future. As PEP 708 itself says,
this won't by itself solve dependency confusion attacks, but is one way to
provide enough information to installers to help minimize these attacks.
While there can still be valid use cases for standing up a totally independent
package index (such as providing richer platform support for GPUs until a
fully formed `variant proposal
<https://discuss.python.org/t/selecting-variant-wheels-according-to-a-semi-static-specification/53446>`__
is accepted), this PEP takes a different, simpler approach and doesn't replace
any of the existing, proposed, or approved package index cooperation
specifications.
This PEP also preserves the core purpose of PyPI, and allows it to
remain the traditional, canonical, centralized index of all Python
packages.
Addressing PyPI limits
----------------------
This proposal also addresses the problem of size limits imposed by PyPI, where there is a
`default artifact size limit <https://pypi.org/help/#file-size-limit>`__ of 100 MiB and a
default overall `project size limit <https://pypi.org/help/#project-size-limit>`__ of 10
GiB. Most packages and artifacts can easily fit in these limits, even for packages
containing binary extension modules for a variety of platforms. A small, but important
class of packages routinely exceed these limits, requiring them to submit PyPI `exception
request support tickets`_. It's not necessarily difficult to get resolution on such
exceptions, but it is a special process that can take some time to resolve, and the
criteria for granting such exceptions aren't well documented.
Reducing operational complexity
-------------------------------
Setting up and maintaining an entire package index can be a complex
operational solution, both time and resource intensive. This is especially
true if the main purpose of such an index is just to avoid file size
limitations. The external index approach also imposes a tricky UX on consumers
of projects on the external index, requiring them to understand how CLI
options such as ``--external-index-url`` work, along with the security
implications of such flags. It would be much easier for both producers and
consumers of large wheel packages to just set up and maintain a simple web
server, capable of serving individual files with no more complex API than
``HTTP GET``. Such an interface is also easily cacheable or placed behind a
`CDN <https://en.wikipedia.org/wiki/Content_delivery_network>`__. Simple HTTP
servers are also much easier to audit for security purposes, easier to proxy,
and usually take much less resources to run, support, and maintain. Even
something like `Amazon S3 <https://aws.amazon.com/s3/>`__ could be used to
host external wheels.
This PEP proposes an approach that favors such operational simplicity.
Specification
=============
A new type of uploadable file is defined, called a "RIM" (i.e. ``.rim``), or "Remote
Installable Metadata" file. The name evokes the image of a wheel with the tire removed,
and emphasizes that ``.rim`` files are easily derived from ``.whl`` files. The process of
turning a ``.whl`` into a ``.rim`` is :ref:`outlined below <dismounting>`. The file name
format exactly matches the :ref:`wheel file naming format
<packaging:wheel-file-name-spec>` specification, except that RIM files use the suffix
``.rim``. This means that all the tags used to discriminate ``.whl`` files also
distinguish between different ``.rim`` files, and thus can be used during dependency
resolution steps, exactly as ``.whl`` files are today. In this respect, ``.whl`` and
``.rim`` files are interchangeable.
The content of a ``.rim`` file is *nearly* identical to ``.whl`` files, however ``.rim``
files **MUST** contain only the ``.dist-info`` directory from a wheel. No other top-level
file or directory is allowed in the ``.rim`` zip file. The ``.dist-info`` directory
**MUST** contain a single additional file in addition to those `allowed`_ in a ``.whl``
file's ``.dist-info`` directory: a file called ``EXTERNAL-HOSTING.json``.
.. _file-format:
This is a JSON file contains containing the following keys:
``version``
This is the file format version, which for this PEP **MUST** be ``1.0``.
``owner``
This **MUST** name the PyPI organization owner of this externally hosted file, for
reasons which will be described in :ref:`detail below <resiliency>`.
``uri``
This is a single URL naming the location of the physical ``.whl`` file hosted on an
external site. This URL **MUST** use the ``https`` scheme.
``size``
This is an integer value describing the size in bytes of the physical ``.whl`` file on
the remote host.
``hashes``
This is a dictionary of the format described in :pep:`694`, used to capture both the
:pep:`694#upload-each-file` of the physical ``.whl`` file, with the same
constraints as proposed in that PEP. Since these hashes are immutable once uploaded
to PyPI, they serve as a critical validation that the externally hosted wheel hasn't
been corrupted or compromised.
Effects of the RIM file
-----------------------
The only effect of a ``.rim`` file is to change the download URL for the wheel artifact in
both the HTML and JSON interfaces in the `simple repository API`_. In the HTML page for a
package release, the ``href`` attribute **MUST** be the value of the ``uri`` key,
including a ``#<hashname>=<hashvalue>`` fragment. this hash fragment **MUST** be in
exactly the same format as described the :pep:`376` originated `signed wheel file format`_
in the ``.dist-info/RECORD`` file. The exact same rules for selection of hash algorithm
and encoding is used here.
Similarly in the `JSON response`_ the ``url`` key pointing to the download file must be
the value of the :ref:`uri <file-format>` key, and the ``hashes`` dictionary **MUST** be
included with values populated from the ``hashes`` dictionary provided above.
In all other respects, a compliant package index should treat ``.rim`` files the same as
``.whl`` files, with some other minor exceptions as outlined below. For example, ``.rim``
files can be `deleted <https://pypi.org/help/#deletion>`__ and yanked (:pep:`592`) just
like any ``.whl`` file, with the exact same semantics (i.e. deletions are permanent). When
a ``.rim`` is deleted, an index **MUST NOT** allow a matching ``.whl`` or ``.rim`` file to
be (re-)uploaded.
Availability order
------------------
Externally hosted wheels **MUST** be available before the corresponding ``.rim`` file is
uploaded to PyPI, otherwise a publishing race condition is introduced, although this
requirement **MAY** be relaxed for ``.rim`` files uploaded to a :pep:`694` staged release.
Wheels can override RIMs
------------------------
Indexes **MUST** reject ``.rim`` files if a matching ``.whl`` file already exists with the
exact same file name tags. However, indexes **MAY** accept a ``.whl`` file if a matching
``.rim`` file exists, as long as that ``.rim`` file hasn't been deleted or yanked. This
allows uploaders to replace an externally hosted wheel file with an index hosted wheel
file, but the converse is prohibited. Since the default is to host wheels on the same
package index that contains the package metadata, it is not allowed to "downgrade" an
existing wheel file once uploaded. When a ``.whl`` replaces a ``.rim``, the index **MUST**
provide download URLs for the package using its own hosted file service. When uploading
the overriding ``.whl`` file, the package index **MUST** validate the hash from the
existing ``.rim`` file, and these hashes must match or the overriding upload **MUST** be
rejected.
PyPI API bump unnecessary
-------------------------
It's likely that the changes are backward compatible enough that a bump in the `PyPI
repository version`_ is not necessary. Since ``.rim`` files are essentially changes only
to the upload API, package resolvers and package installers can continue to function with
the APIs they've always supported.
.. _resiliency:
External hosting resiliency
===========================
One of the key concerns leading to PEP 438's revocation in PEP 470 was
potential user confusion when an external index disappeared. From PEP 470:
This confusion comes down to end users of projects not realizing if a
project is hosted on PyPI or if it relies on an external service. This
often manifests itself when the external service is down but PyPI is
not. People will see that PyPI works, and other projects works, but this
one specific one does not. They oftentimes do not realize who they need to
contact in order to get this fixed or what their remediation steps are.
While the problem of external wheel hosting service going down is not directly
solved by this PEP, several safeguards are in place to greatly reduce the
potential burden on PyPI administrators.
This PEP thus proposes that:
- External wheel hosting is only allowed for packages which are owned by
`organization accounts <https://docs.pypi.org/organization-accounts/>`__.
External hosting is an organization-wide setting.
- Organization accounts do not automatically gain the ability to externally
host wheels; this feature MUST be explicitly enabled by PyPI admins at their discretion. Since
this will not be a common request, we don't expect the overhead to be nearly
as burdensome as :pep:`541` resolutions, account recovery requests, or even
file/project size increase requests. External hosting requests would be
handled in the same manner as those requests, i.e. via the `PyPI GitHub
support tracker <https://github.com/pypi/support>`__.
- Organization accounts requesting external wheel hosting **MUST** register their own
support contact URI, be it a ``mailto`` URI for a contact email address, or the URL to
the organization's support tracker. Such a contact URI is optional for organizations
which do not avail themselves of external wheel file hosting.
Combined with the ``EXTERNAL-HOSTING.json`` file's ``owner`` key, this allows for
installer tools to unambiguously redirect any download errors away from the PyPI support
admins and squarely to the organization's support admins.
While the exact mechanics of storing and retrieving this organization support
URL will be defined separately, for the sake of example, let's say a package
``foo`` externally hosts wheel files on ```https://foo.example.com``
<https://foo.example.com>`__ and that host becomes unreachable. When an
installer tool tries to download and install the package ``foo`` wheel, the
download step will fail. The installer would then be able to query PyPI to
provide a useful error message to the end user:
- The installer downloads the ``.rim`` file and reads the ``owner`` key from the
``EXTERNAL-HOSTING.json`` file inside the ``.rim`` zip file.
- The installer queries PyPI for the support URI for the organization
owner of the externally hosted wheel.
- An informative error message would then be displayed, e.g.:
The externally hosted wheel file ``foo-....whl`` could not be
downloaded. Please contact support@foo.example.com for help. Do not report
this to the PyPI administrators.
.. _dismounting:
Dismounting wheels
==================
It is generally very easy to produce a ``.rim`` file from an existing ``.whl``
file. This could be done efficiently by a :pep:`518` build backend with an
additional command line option, or a separate tool which takes a ``.whl`` file
as input and creates the associated ``.rim`` file. To complete the analogy,
the act of turning a ``.whl`` into a ``.rim`` is called "dismounting". The
steps such a tool would take are:
- Accept as input the source ``.whl`` file, the organization owner of the
package, and URL at which the ``.whl`` will be hosted, and the support URI
to report download problems from. These could in fact be captured in the
``pyproject.toml`` file, but that specification is out of scope for this
PEP.
- Unzip the ``.whl`` and create the ``.rim`` zip archive.
- Omit from the ``.rim`` file any path in the ``.whl`` that **isn't** rooted
at the ``.dist-info`` directory.
- Calculate the hash of the source ``.whl`` file.
- Add the ``EXTERNAL-HOSTING.json`` file containing the JSON keys and values as described
above, to the ``.rim`` archive.
Changes to tools
================
Theoretically, installer tools shouldn't need any changes, since when they
have identified the wheel to download and install, they simply consult the
download URLs returned by PyPI's Simple API. In practice though, tools such as
``pip`` and ``uv`` may have constrained lists of hosts they will allow
downloads from, such as PyPI's own ``pythonhosted.org`` domain.
In this case, such tools will need to relax those constraints, but the exact policy for
this is left to the installer tools themselves. Any number of approaches could be
implemented, such as downloading the ``.rim`` file and verifying the
``EXTERNAL-HOSTING.json`` metadata, or simply trusting the external downloads for any
wheel with a matching checksum. They could also query PyPI for the project's organization
owner and support URI before trusting the download. They could warn the user when
externally hosted wheel files are encountered, and/or require the use of a command line
option to enable additional download hosts. Any of these verification policies could be
chosen in configuration files.
Installer tools should also probably provide better error messages when
externally hosted wheels cannot be downloaded, e.g. because a host is
unreachable. As described above, such tools could query enough metadata from
PyPI to provide clear and distinct error messages pointing users to the
package's external hosting support email or issue tracker.
Constraints for external hosting services
=========================================
The following constraints lead to reliable and compatible external wheel hosting services:
- External wheels **MUST** be served over HTTPS, with a certificate signed by
`Mozilla's root certificate store <https://wiki.mozilla.org/CA>`__. This ensures
compatibility with `pip <https://pip.pypa.io/en/stable/topics/https-certificates/>`__
and `uv
<https://docs.astral.sh/uv/configuration/authentication/#custom-ca-certificates>`__. At
the time of this writing, ``pip`` 24.2 on Python 3.10 or newer uses the system
certificate store in addition to the Mozilla store provided by the third party `certifi
<https://pypi.org/project/certifi/>`__ Python package. ``uv`` uses the Mozilla store
provided by the `webpki-roots <https://github.com/rustls/webpki-roots>`__ crate, but not
the system store unless the ``--native-tls`` flag is given [#fn1]_. *The PyPI
administrators may modify this requirement in the future, but compatibility with popular
installers will not be compromised.*
- External wheel hosts **SHOULD** use a content delivery network (`CDN
<https://en.wikipedia.org/wiki/Content_delivery_network>`__), just as PyPI does.
- External wheel hosts **MUST** commit to a stable URL for all wheels they host.
- Externally hosted wheels **MUST NOT** be removed from an external wheel host unless the
corresponding ``.rim`` file is deleted from PyPI first, and **MUST NOT** remove external
wheels for yanked releases.
- External wheel hosts **MUST** support `HTTP range requests`_.
- External wheel hosts **SHOULD** support the `HTTP/2`_ protocol.
Security
========
Several factors as described in this proposal should mitigate security
concerns with externally hosted wheels, such as:
- Wheel file checksums **MUST** be included in ``.rim`` files, and once uploaded cannot be
changed. Since the checksum stored on PyPI is immutable and required, it is not possible
to spoof an external wheel file, even if the owning organization lost control of their
hosting domain.
- Externally hosted wheels **MUST** be served over HTTPS.
- In order to serve externally hosted wheels, organizations **MUST** be approved by the
PyPI admins.
When users identify malware or vulnerabilities in PyPI-hosted projects, they can now
report this using the `malware reporting facilities <https://pypi.org/security/>`__ on
PyPI, as also described in this `blog post`_. The same process can be used to report
security issues in externally hosted wheels, and the same remediation process should be
used. In addition, since organizations with external hosting enabled MUST provide a
support contact URI, that URI can be used in some cases to report the security issue to
the hosting organization. Such organization reporting won't make sense for malware, but
could indeed be a very useful way to report security vulnerabilities in externally hosted
wheels.
Rejected ideas
==============
Several ideas were considered and rejected.
- Requiring digital signatures on externally hosted wheel files, either in
addition to or other than hashes. We deem this unnecessary since the
checksum requirement should be enough to validate that the metadata on PyPI
for a wheel exactly matches the downloaded wheel. The added complexity of
key management outweighs any additional benefit such digital signatures
might convey.
- Hash verification on ``.rim`` file uploads. PyPI *could* verify that the hash in the
uploaded ``.rim`` file matches the externally hosted wheel before it accepts the upload,
but this requires downloading the external wheel and performing the checksum, which also
implies that the upload of the ``.rim`` file cannot be accepted until this external
``.whl`` file is downloaded and verified. This increases PyPI bandwidth and slows down
the upload query, although :pep:`694` draft uploads could potentially mitigate these
concerns. Still, the benefit is not likely worth the additional complexity.
- Periodic verification of the download URLs by the index. PyPI could try to periodically
ensure that the external wheel host or the external ``.whl`` file itself is still
available, e.g. via an :rfc:`HTTP HEAD <9110#section-9.3.2>` request. This is likely overkill and without also
providing the file's checksum in the response [#fn2]_, may not provide much additional
benefit.
- This PEP could allow for an organization to provide fallback download hosts,
such that a secondary is available if the primary goes down. We believe
that DNS-based replication is a much better, well-known technique, and
probably much more resilient anyway.
- ``.rim`` file replacement. While it is allowed for ``.whl`` files to replace
existing ``.rim`` files, as long as a) the ``.rim`` file hasn't been deleted
or yanked, b) the checksums match, we do not allow replacing ``.whl`` files
with ``.rim`` files, nor do we allow a ``.rim`` file to overwrite an
existing ``.rim`` file. This latter could be a technique to change the
hosting URL for an externally hosted ``.whl``; however, we do not think this
is a good idea. There are other ways to "fix" an external host URL as
described above, and we do not want to encourage mass re-uploads of existing
``.rim`` files.
Footnotes
=========
.. [#fn1] The ``uv --native-tls`` flag `replaces
<https://github.com/astral-sh/uv/blob/3ce34035c84804fdfb8b78cf11b9ba1b168d0f35/crates/uv-client/src/base_client.rs#L248>`__
the ``webpki-roots`` store.
.. [#fn2] There being no standard way to return the file's checksum in response to an
:rfc:`HTTP HEAD <9110#section-9.3.2>` request.
Copyright
=========
This document is placed in the public domain or under the
CC0-1.0-Universal license, whichever is more permissive.
.. _`exception request support tickets`: https://github.com/pypi/support/issues?q=is%3Aissue+is%3Aclosed+file+limit+request
.. _`allowed`: https://packaging.python.org/en/latest/specifications/binary-distribution-format/#the-dist-info-directory
.. _`signed wheel file format`: https://packaging.python.org/en/latest/specifications/binary-distribution-format/#signed-wheel-files
.. _`simple repository API`: https://packaging.python.org/en/latest/specifications/simple-repository-api/#
.. _`JSON response`: https://packaging.python.org/en/latest/specifications/simple-repository-api/#json-based-simple-api-for-python-package-indexes
.. _`PyPI repository version`: https://packaging.python.org/en/latest/specifications/simple-repository-api/#versioning-pypi-s-simple-api
.. _`blog post`: https://blog.pypi.org/posts/2024-03-06-malware-reporting-evolved/
.. _`HTTP range requests`: https://http.dev/range-request
.. _`HTTP/2`: https://http.dev/2