docker-devpi ============ This repository contains a Dockerfile for [devpi pypi server](http://doc.devpi.net/latest/). # Installation `docker pull muccg/docker-devpi` # Quickstart Start using ```bash docker run -d --name devpi \ --publish 3141:3141 \ --volume /srv/docker/devpi:/data \ --env=DEVPI_PASSWORD=changemetoyoulongsecret \ --restart always \ muccg/docker-devpi ``` Please set DEVPI_PASSWORD to a secret otherwise an attacker can *execute arbitrary code* in your application by uploading modified packages. # Persistence For devpi to preserve its state across container shutdown and startup you should mount a volume at `/data`. The quickstart command already includes this. # Client side usage To use this devpi cache to speed up your dockerfile builds, add use this snippit in your dockerfiles. This will add the devpi container an optional cache for pip: ```Dockerfile # Install netcat for ip route RUN apt-get update \ && apt-get install -y netcat \ && rm -rf /var/lib/apt/lists/* # Use an optional pip cache to speed development RUN export HOST_IP=$(ip route| awk '/^default/ {print $3}') \ && mkdir -p ~/.pip \ && echo [global] >> ~/.pip/pip.conf \ && echo extra-index-url = http://$HOST_IP:3141/app/dev/+simple >> ~/.pip/pip.conf \ && echo [install] >> ~/.pip/pip.conf \ && echo trusted-host = $HOST_IP >> ~/.pip/pip.conf \ && cat ~/.pip/pip.conf ``` # Uploading files ```bash pip wheel --download=packages --wheel-dir=wheelhouse -r requirements.txt pip install "devpi-client>=2.3.0" \ && export HOST_IP=$(ip route| awk '/^default/ {print $3}') \ && if devpi use http://$HOST_IP:3141>/dev/null; then \ devpi use http://$HOST_IP:3141/${DEVPI_USER:-app}/${DEVPI_INDEX:-dev} --set-cfg \ && devpi login ${DEVPI_USER:-app} --password=$DEVPI_PASSWORD \ && devpi upload --from-dir --formats=* ./wheelhouse ./packages; \ else \ echo No started devpi container found at http://$HOST_IP:3141; \ fi ``` # Security Devpi creates a user named root by default, its password can be set with DEVPI_PASSWORD environment variable. Please set it, otherwise attacker can *execute arbitrary code* in your application by uploading modified packages. For additonal security the argument `--restrict-modify root` has been added so only the root may create users and indexes.