- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
09-18-2017 03:11 AM - edited 09-18-2017 03:19 AM
I work in a small team of Python developers and our aim is to create a private package manager to store our packages. I came cross pypicloud and following its tutorial I've successfully been able to upload and install packages stored in AWS-S3. That's fantastic.
However, the private package manager is launched and hosted locally typing pserve server.iniin the terminal. The package manager is then accessible at http:/ /0.0.0.0:6543/#/. Ideally, I want this server to be:
How to get a secure and private server (python package manager) always up and running in the cloud?
02-02-2022 03:57 AM
This is roughly just a simple way to deploy a container without the burden of Kubernetes. ACS might be best if you really want a dedicated container solution (there is several orchestrators).
For the authentication part, htaccess file with basic authentication is supported by pip. This allow to do something like extra-index-url = https://login:password@pypi.myserver.com/simple/. I don't have a prefered tutorial, but google/bing something like "pip private repository" you will have no issue to find answers.
(full disclosure, I work at MS in the Azure Python SDK team)
07-15-2023 04:38 AM
It is not working for me.
07-19-2023 01:03 AM
Hello
you can follow below steps-
Choose a cloud provider: Select a cloud provider such as Azure or AWS, based on your preference and requirements.
Set up a virtual machine or container: Create a virtual machine or container instance in the cloud environment. You can use Azure Virtual Machines or AWS EC2 for this purpose.
Install and configure the necessary dependencies: Install Python, pypicloud, and any other dependencies required for your package manager on the virtual machine or container.
Secure the server: Configure firewall rules and network security groups to restrict access to the server. Ensure that only authorized users can connect to the server.
Set up HTTPS: Obtain an SSL certificate and configure HTTPS for secure communication with the server. This will ensure that data transferred between clients and the package manager is encrypted.
Implement authentication: Configure authentication mechanisms, such as username/password or API keys, to restrict access to the package manager. This can be done using frameworks like Flask or Django.
Containerize the application (optional): If you prefer a containerized solution, you can create a Docker image containing your package manager and deploy it to a container service like Azure Container Instances or AWS Elastic Container Service.
Deploy and monitor: Deploy your package manager to the cloud server and set up monitoring to ensure it is always up and running. Configure auto-scaling and load balancing if needed.
Hope it helps you.
Thank you .
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!