@@ -205,6 +205,26 @@ pub struct GlobalArgs {
205
205
#[ arg( global = true , long, overrides_with( "offline" ) , hide = true ) ]
206
206
pub no_offline : bool ,
207
207
208
+ /// Allow insecure connections to a host.
209
+ ///
210
+ /// Can be provided multiple times.
211
+ ///
212
+ /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
213
+ /// `localhost:8080`), or a URL (e.g., `https://localhost`).
214
+ ///
215
+ /// WARNING: Hosts included in this list will not be verified against the system's certificate
216
+ /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
217
+ /// bypasses SSL verification and could expose you to MITM attacks.
218
+ #[ arg(
219
+ global = true ,
220
+ long,
221
+ alias = "trusted-host" ,
222
+ env = EnvVars :: UV_INSECURE_HOST ,
223
+ value_delimiter = ' ' ,
224
+ value_parser = parse_insecure_host,
225
+ ) ]
226
+ pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
227
+
208
228
/// Whether to enable experimental, preview features.
209
229
///
210
230
/// Preview features may change without warning.
@@ -1768,25 +1788,6 @@ pub struct PipUninstallArgs {
1768
1788
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
1769
1789
pub keyring_provider : Option < KeyringProviderType > ,
1770
1790
1771
- /// Allow insecure connections to a host.
1772
- ///
1773
- /// Can be provided multiple times.
1774
- ///
1775
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
1776
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
1777
- ///
1778
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
1779
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
1780
- /// bypasses SSL verification and could expose you to MITM attacks.
1781
- #[ arg(
1782
- long,
1783
- alias = "trusted-host" ,
1784
- env = EnvVars :: UV_INSECURE_HOST ,
1785
- value_delimiter = ' ' ,
1786
- value_parser = parse_insecure_host,
1787
- ) ]
1788
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
1789
-
1790
1791
/// Use the system Python to uninstall packages.
1791
1792
///
1792
1793
/// By default, uv uninstalls from the virtual environment in the current working directory or
@@ -2360,25 +2361,6 @@ pub struct VenvArgs {
2360
2361
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
2361
2362
pub keyring_provider : Option < KeyringProviderType > ,
2362
2363
2363
- /// Allow insecure connections to a host.
2364
- ///
2365
- /// Can be provided multiple times.
2366
- ///
2367
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
2368
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
2369
- ///
2370
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
2371
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
2372
- /// bypasses SSL verification and could expose you to MITM attacks.
2373
- #[ arg(
2374
- long,
2375
- alias = "trusted-host" ,
2376
- env = EnvVars :: UV_INSECURE_HOST ,
2377
- value_delimiter = ' ' ,
2378
- value_parser = parse_insecure_host,
2379
- ) ]
2380
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
2381
-
2382
2364
/// Limit candidate packages to those that were uploaded prior to the given date.
2383
2365
///
2384
2366
/// Accepts both RFC 3339 timestamps (e.g., `2006-12-02T02:07:43Z`) and local dates in the same
@@ -4274,26 +4256,6 @@ pub struct InstallerArgs {
4274
4256
) ]
4275
4257
pub keyring_provider : Option < KeyringProviderType > ,
4276
4258
4277
- /// Allow insecure connections to a host.
4278
- ///
4279
- /// Can be provided multiple times.
4280
- ///
4281
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4282
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4283
- ///
4284
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4285
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4286
- /// bypasses SSL verification and could expose you to MITM attacks.
4287
- #[ arg(
4288
- long,
4289
- alias = "trusted-host" ,
4290
- env = EnvVars :: UV_INSECURE_HOST ,
4291
- value_delimiter = ' ' ,
4292
- value_parser = parse_insecure_host,
4293
- help_heading = "Index options"
4294
- ) ]
4295
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4296
-
4297
4259
/// Settings to pass to the PEP 517 build backend, specified as `KEY=VALUE` pairs.
4298
4260
#[ arg(
4299
4261
long,
@@ -4436,26 +4398,6 @@ pub struct ResolverArgs {
4436
4398
) ]
4437
4399
pub keyring_provider : Option < KeyringProviderType > ,
4438
4400
4439
- /// Allow insecure connections to a host.
4440
- ///
4441
- /// Can be provided multiple times.
4442
- ///
4443
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4444
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4445
- ///
4446
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4447
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4448
- /// bypasses SSL verification and could expose you to MITM attacks.
4449
- #[ arg(
4450
- long,
4451
- alias = "trusted-host" ,
4452
- env = EnvVars :: UV_INSECURE_HOST ,
4453
- value_delimiter = ' ' ,
4454
- value_parser = parse_insecure_host,
4455
- help_heading = "Index options"
4456
- ) ]
4457
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4458
-
4459
4401
/// The strategy to use when selecting between the different compatible versions for a given
4460
4402
/// package requirement.
4461
4403
///
@@ -4628,26 +4570,6 @@ pub struct ResolverInstallerArgs {
4628
4570
) ]
4629
4571
pub keyring_provider : Option < KeyringProviderType > ,
4630
4572
4631
- /// Allow insecure connections to a host.
4632
- ///
4633
- /// Can be provided multiple times.
4634
- ///
4635
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4636
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4637
- ///
4638
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4639
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4640
- /// bypasses SSL verification and could expose you to MITM attacks.
4641
- #[ arg(
4642
- long,
4643
- alias = "trusted-host" ,
4644
- env = EnvVars :: UV_INSECURE_HOST ,
4645
- value_delimiter = ' ' ,
4646
- value_parser = parse_insecure_host,
4647
- help_heading = "Index options"
4648
- ) ]
4649
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4650
-
4651
4573
/// The strategy to use when selecting between the different compatible versions for a given
4652
4574
/// package requirement.
4653
4575
///
@@ -4850,25 +4772,6 @@ pub struct PublishArgs {
4850
4772
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
4851
4773
pub keyring_provider : Option < KeyringProviderType > ,
4852
4774
4853
- /// Allow insecure connections to a host.
4854
- ///
4855
- /// Can be provided multiple times.
4856
- ///
4857
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4858
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4859
- ///
4860
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4861
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4862
- /// bypasses SSL verification and could expose you to MITM attacks.
4863
- #[ arg(
4864
- long,
4865
- alias = "trusted-host" ,
4866
- env = EnvVars :: UV_INSECURE_HOST ,
4867
- value_delimiter = ' ' ,
4868
- value_parser = parse_insecure_host,
4869
- ) ]
4870
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4871
-
4872
4775
/// Check an index URL for existing files to skip duplicate uploads.
4873
4776
///
4874
4777
/// This option allows retrying publishing that failed after only some, but not all files have
0 commit comments