poetry-core
Poetry PEP 517 Build Backend
This package has a good security score with no known vulnerabilities.
Community Reviews
Works reliably but you'll rarely interact with it directly
The challenge comes when things go wrong. Error messages can be cryptic, especially around dependency resolution or malformed pyproject.toml configurations. Documentation is sparse because it's primarily designed as an implementation detail of Poetry rather than a standalone tool. You'll find yourself digging through Poetry's main documentation or GitHub issues to understand build failures. Stack Overflow coverage is thin for poetry-core specifically.
For standard Python package building, it's perfectly adequate and reliable. The issues arise when you need to customize build behavior or debug complex scenarios - the lack of dedicated examples and troubleshooting guides becomes frustrating.
Best for: Python package maintainers already using Poetry who need a PEP 517-compliant build backend with minimal setup.
Avoid if: You need extensive customization of the build process or prefer well-documented standalone tools with active community support.
Functional build backend, but you'll rarely interact with it directly
The challenge comes when things go wrong. Error messages can be cryptic, especially around dependency resolution during builds or when your package structure doesn't match expectations. The documentation is sparse because it assumes you're using Poetry proper. I've spent hours debugging "Backend subprocess exited when trying to invoke build_wheel" errors that gave me no actionable information about what actually failed.
For straightforward packages with standard layouts, it's fine and you'll never think about it. But when you have complex build requirements, custom package data, or non-standard layouts, you'll find yourself reading source code on GitHub because there aren't many examples or tutorials specifically for poetry-core issues. Community support exists but is fragmented between Poetry and poetry-core discussions.
Best for: Standard Python packages using Poetry where the default build behavior meets your needs.
Avoid if: You need extensive build customization or detailed control over the build process beyond what pyproject.toml offers.
Solid PEP 517 backend with minimal attack surface, some edge case issues
Day-to-day usage is mostly transparent since it runs during package builds rather than runtime. Error messages are generally clear when pyproject.toml validation fails, though they don't leak filesystem paths inappropriately. The main friction comes from edge cases: complex build scripts or packages with C extensions sometimes need workarounds, and the TOML parsing can be strict about version specifiers in ways that catch you off guard.
The project maintains good CVE response practices—issues get patched promptly. No crypto or TLS concerns since it's purely local file operations. Authentication/authorization isn't applicable here, but file permission handling during builds is appropriate. Overall, it's a secure-by-default tool that does one job well.
Best for: Pure Python packages and projects where minimal dependencies and build-time security are priorities.
Avoid if: You need complex build customization, C extensions with unusual requirements, or dynamic build-time code generation.
Sign in to write a review
Sign In