[00:28:46] <torham> I am installing a package using `pip install -e <url>`, but if one of its requirements changes I need to resolve the new requirement manually, is it possible to have pip do this?
[12:32:37] <apollo13> dstufft: around? getting unable to execute 'x86_64-linux-gnu-gcc': No such file or directory -- but apparently only via ansible, not when I try build psycopg2 in the venv directly, ever seen that?
[12:33:01] <apollo13> which makes no sense since it is in /usr/bin *sigh*
[12:46:22] <apollo13> mhm, can I disable the creation of wheels? ie disable bdist_wheel?
[12:48:24] <apollo13> ok, also errors out with --no-binary :all:
[12:48:48] <ronny> apollo13: why not push prebuilt wheels fot your target?
[13:23:25] <ronny> gsnedders: if you want to overdo it, teach it to patch imports to vendored packages in other vendored packages, then pip/pytest and others can automate
[13:23:54] <gsnedders> ronny: that was absolutely something I was intending on
[13:24:04] <gsnedders> ronny: per the discussion in here with you before :)
[13:24:27] <ronny> gsnedders: i need that for pytest, it would also be an alternate slution to my vendoring problem
[13:24:50] <ronny> gsnedders: please use pyproject.toml for the configfile ^^
[13:26:15] <gsnedders> ronny: my first version will probably be terrible :)
[13:26:36] <ronny> gsnedders: thats fine, i jsu dont want to start, im happy to help later on
[13:26:44] <ronny> gsnedders: release rarly, releae often
[13:41:47] <ronny> b, you are not handlign requirement there, you are handleing a set of packages that is to be vendored and may need code editing as specified
[13:48:04] <gp> I am having an issue with get-pip.py and vagrant using a proxy on Ubuntu 14.04. In my provision script I create a virtualenv and use get-pip.py to update the virtualenv pip. Then I install requests[security] with pip to fix ssl issues. However, when the provisioner script runs again the get-pip.py script seems to ignore the installed requests[security] packages and uses the insecure version bundled with it. Is this expected or am I doing
[13:49:11] <gp> The warning observed indicates it is not using the virtualenv security updates: /tmp/tmpEN33qJ/pip.zip/pip/_vendor/requests/packages/urllib3/util/ssl_.py:122: InsecurePlatformWarning
[13:59:07] <ronny> for morbid effect, print it with a rubber duck as background
[14:49:38] <gp> Is there a simple/quick bash test I can use to determine if https requests can be secure or not? I'd like to omit '--index-url=http://pypi.python.org/simple/ --trusted-host pypi.python.org' in my provision script if ssl packages are installed on ubuntu 14.04
[14:49:57] <gp> but before they are installed i need that to work through my proxy
[15:12:41] <nanonyme> Why do you think proxy would matter at all?
[15:13:28] <nanonyme> Oh, never mind, maybe I misunderstood
[17:47:10] <gp> nanonyme: perhaps the proxy is irrelevent. it isn't really important for the fix. but when I try to let pip get downloads from pypi over https before installing the requests[security] package it fails to download and warns about insecure and lack of sni support. i figured something was getting munged by the proxy but maybe it is irrelevant. I am just wondering if there is any way i can "test" for the security packages being applied
[17:47:11] <gp> for pip's https requests so I can omit the index override that forces http downloads
[17:48:56] <gp> Looking for the test that gives me SSL_IS_NOT_SECURE
[17:49:57] <gp> figured since pip throws warnings there might be an easy way to test for it
[18:48:54] <nanonyme> gp, yeah, sure, HEAD to https://pypi.python.org would probably be enough
[18:50:13] <gp> nanonyme: ah... like manually make a request in python and check for warning text? that would work I guess. I was thinking there might be a simple way to do it with pip
[18:50:41] <nanonyme> I find it really unfortunate the SSL improvements were backported to 2.x in a way that broke backwards-compatibility
[18:53:37] <nanonyme> It probably hits the backend so it should fail if connections can't be done
[18:55:06] <gp> nanonyme: that would work. I will go that route if it ends up taking too much effort to determine without making a request. was hoping there was a way to inspect the installation quickly to determine if request[security