Frost's Blog
1160 字
6 分钟
Pip trusted_host问题记录


一日我在 Pipenv 上收到一个issue: 用户说 Pipenv 执行的 pip 命令中--trusted-host缺少了 port 部分。然后我去扒源码,结果发现有两处同样的函数:[1][2]逻辑不一致。顿时感觉事情没那么简单。于是我本地搞了一个pypi server, 并用自签名支持了 https,然后用 pip 测试1

$ pip install -i urllib3 --trusted-host

$ pip install -i urllib3 --trusted-host
Looking in indexes:
Collecting urllib3
  Retrying (Retry(total=4, connect=None, read=None, redirect=None, status=None)) after connection broken by 'SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c:1076)'))': /urllib3/

$ pip install -i urllib3 --trusted-host
Looking in indexes:
Collecting urllib3
  The repository located at is not a trusted or secure host and is being ignored. If this repository is available via HTTPS we recommend you use HTTPS instead, otherwise you may silence this warning and allow it anyway with '--trusted-host'.
  Could not find a version that satisfies the requirement urllib3 (from versions: )
No matching distribution found for urllib3

$ pip install -i urllib3 --trusted-host

惊呆,HTTPS 和 HTTP 针对trusted-host带不带 port 的处理方式不一样:HTTPS 希望你带 port,而 HTTP 不需要带 port。这显然是不合理的,于是我去看 pip 的源码关于这块的处理逻辑。以下基于 pip 19.2.3 的源码。 src/pip/_internal/

    insecure_adapter = InsecureHTTPAdapter(max_retries=retries)
    # Save this for later use in add_insecure_host().
    self._insecure_adapter = insecure_adapter

    self.mount("https://", secure_adapter)
    self.mount("http://", insecure_adapter)

    # Enable file:// urls
    self.mount("file://", LocalFSAdapter())

    # We want to use a non-validating adapter for any requests which are
    # deemed insecure.
    for host in insecure_hosts:

def add_insecure_host(self, host):
    # type: (str) -> None
    self.mount('https://{}/'.format(host), self._insecure_adapter)

insecure_adapter是不检查证书的,secure_adapter是检查证书的,可以看到在add_insecure_host()这个函数中,是把传进来的 host 加上末尾的/拼成一个 URL 来新增一个 adapter 端点的,而在 requests 中,多个 adapter 端点是依靠startswith来识别是否匹配的。所以如果,则只有会被识别为信任的站点而不会。

以上是仅针对 HTTPS 而言,HTTP 是无需证书检查的,它相关的逻辑在


def _validate_secure_origin(self, logger, location):
    # type: (Logger, Link) -> bool
    # Determine if this url used a secure transport mechanism
    parsed = urllib_parse.urlparse(str(location))
    origin = (parsed.scheme, parsed.hostname, parsed.port)

    # The protocol to use to see if the protocol matches.
    # Don't count the repository type as part of the protocol: in
    # cases such as "git+ssh", only use "ssh". (I.e., Only verify against
    # the last scheme.)
    protocol = origin[0].rsplit('+', 1)[-1]

    # Determine if our origin is a secure origin by looking through our
    # hardcoded list of secure origins, as well as any additional ones
    # configured on this PackageFinder instance.
    for secure_origin in self.iter_secure_origins():
        if protocol != secure_origin[0] and secure_origin[0] != "*":

            # We need to do this decode dance to ensure that we have a
            # unicode object, even on Python 2.x.
            addr = ipaddress.ip_address(
                if (
                    isinstance(origin[1], six.text_type) or
                    origin[1] is None
                else origin[1].decode("utf8")
            network = ipaddress.ip_network(
                if isinstance(secure_origin[1], six.text_type)
                # setting secure_origin[1] to proper Union[bytes, str]
                # creates problems in other places
                else secure_origin[1].decode("utf8")  # type: ignore
        except ValueError:
            # We don't have both a valid address or a valid network, so
            # we'll check this origin against hostnames.
            if (origin[1] and
                    origin[1].lower() != secure_origin[1].lower() and
                    secure_origin[1] != "*"):
            # We have a valid address and network, so see if the address
            # is contained within the network.
            if addr not in network:

        # Check to see if the port patches
        if (origin[2] != secure_origin[2] and
                secure_origin[2] != "*" and
                secure_origin[2] is not None):

        # If we've gotten here, then this origin matches the current
        # secure origin and we should return True
        return True

    # If we've gotten to this point, then the origin isn't secure and we
    # will not accept it as a valid location to search. We will however
    # log a warning that we are ignoring it.
        "The repository located at %s is not a trusted or secure host and "
        "is being ignored. If this repository is available via HTTPS we "
        "recommend you use HTTPS instead, otherwise you may silence "
        "this warning and allow it anyway with '--trusted-host %s'.",

    return False

看上去是分别匹配 scheme, hostname 和 port,没什么问题。问题在于self.iter_secure_origins()这里产生的值,在同一个文件中:

def iter_secure_origins(self):
    # type: () -> Iterator[SecureOrigin]
    for secure_origin in SECURE_ORIGINS:
        yield secure_origin
    for host in self.trusted_hosts:
        yield ('*', host, '*')

这里没做任何处理,就把trusted-host当做 hostname 丢出来了,看来这里压根没考虑过trusted-host带 port 的需求。



  • HTTPS 需要带 port 是因为requests.Sessionmount是依靠前缀匹配来获取对应的适配器(adapter)的,并且末尾会加上一个/
  • HTTP 需要不带 port 是因为检查是否安全 URL 的时候,是拿目标 URL 的 hostname(不带 port)去匹配trusted-host的值。


  • 添加信任的端点时,如果trusted-host不带 port,则需要把https://hostname:也添加为无需安全检查的端点(利用前缀匹配的特性)。
  • 生成secure_origin时解析传入的trusted-host值,分成 hostname 与 port 部分分别匹配。

具体代码可以看我提交的 PR,这个 PR 已经被 merge,预计可以在下个版本中发布。


  1. 这里我用了一个 trick,使用了localtest.me转发 localhost 的请求,因为 localhost 是永远被信任的地址,trusted-host 不起作用。

Pip trusted_host问题记录
Frost Ming