On 17 November 2016 at 12:42, Stephen J. Turnbull
<turnbull.stephen...@u.tsukuba.ac.jp> wrote:
> Cory Benfield writes:
>
>  > I think the core question you need to answer for this proposal is:
>  > why is “pip install oic” not easy-enough reach?
>
> My first guess would be "some enterprises use OAuth internally for the
> same reason they have draconian approval policies".  More
> straightforwardly, this is the kind of battery that enterprises which
> make it hard to use pip seem likely to value.  Nick's response is
> formally correct, but if requests is so important, it's likely to
> already be on the approved list.  I would assume that pyoic also
> implements the client side, so it is useful even if requests is
> absent.

In that context, the problem is the old "batteries that leak acid
everywhere can be worse than no batteries at all" one: we know from
painful experience with the SSL module that the standard library's
typical release and adoption cycle can be seriously problematic when
it comes to network security related modules.

However, when it comes to draconian security policies, *transitive
recommendations have power*: if CPython is approved, and python-dev
collectively says "we recommend pip, virtualenv, and requests", then
folks in locked down environments can use that as evidence to suggest
that those other modules are also trustworthy (particularly when there
are commercial software vendors shipping them).

In the case of something like OIDC, if the requests, Flask, Django and
Pyramid developers were all inclined to recommend the same library for
server and client implementations, then that would similarly be
sufficient justification in many environments to bring the component
in as a new dependency.

Cheers,
Nick.

-- 
Nick Coghlan   |   ncogh...@gmail.com   |   Brisbane, Australia
_______________________________________________
Python-ideas mailing list
Python-ideas@python.org
https://mail.python.org/mailman/listinfo/python-ideas
Code of Conduct: http://python.org/psf/codeofconduct/

Reply via email to