@@ -205,6 +205,26 @@ pub struct GlobalArgs {
205
205
#[ arg( global = true , long, overrides_with( "offline" ) , hide = true ) ]
206
206
pub no_offline : bool ,
207
207
208
+ /// Allow insecure connections to a host.
209
+ ///
210
+ /// Can be provided multiple times.
211
+ ///
212
+ /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
213
+ /// `localhost:8080`), or a URL (e.g., `https://localhost`).
214
+ ///
215
+ /// WARNING: Hosts included in this list will not be verified against the system's certificate
216
+ /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
217
+ /// bypasses SSL verification and could expose you to MITM attacks.
218
+ #[ arg(
219
+ global = true ,
220
+ long,
221
+ alias = "trusted-host" ,
222
+ env = EnvVars :: UV_INSECURE_HOST ,
223
+ value_delimiter = ' ' ,
224
+ value_parser = parse_insecure_host,
225
+ ) ]
226
+ pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
227
+
208
228
/// Whether to enable experimental, preview features.
209
229
///
210
230
/// Preview features may change without warning.
@@ -1768,25 +1788,6 @@ pub struct PipUninstallArgs {
1768
1788
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
1769
1789
pub keyring_provider : Option < KeyringProviderType > ,
1770
1790
1771
- /// Allow insecure connections to a host.
1772
- ///
1773
- /// Can be provided multiple times.
1774
- ///
1775
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
1776
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
1777
- ///
1778
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
1779
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
1780
- /// bypasses SSL verification and could expose you to MITM attacks.
1781
- #[ arg(
1782
- long,
1783
- alias = "trusted-host" ,
1784
- env = EnvVars :: UV_INSECURE_HOST ,
1785
- value_delimiter = ' ' ,
1786
- value_parser = parse_insecure_host,
1787
- ) ]
1788
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
1789
-
1790
1791
/// Use the system Python to uninstall packages.
1791
1792
///
1792
1793
/// By default, uv uninstalls from the virtual environment in the current working directory or
@@ -2370,25 +2371,6 @@ pub struct VenvArgs {
2370
2371
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
2371
2372
pub keyring_provider : Option < KeyringProviderType > ,
2372
2373
2373
- /// Allow insecure connections to a host.
2374
- ///
2375
- /// Can be provided multiple times.
2376
- ///
2377
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
2378
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
2379
- ///
2380
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
2381
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
2382
- /// bypasses SSL verification and could expose you to MITM attacks.
2383
- #[ arg(
2384
- long,
2385
- alias = "trusted-host" ,
2386
- env = EnvVars :: UV_INSECURE_HOST ,
2387
- value_delimiter = ' ' ,
2388
- value_parser = parse_insecure_host,
2389
- ) ]
2390
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
2391
-
2392
2374
/// Limit candidate packages to those that were uploaded prior to the given date.
2393
2375
///
2394
2376
/// Accepts both RFC 3339 timestamps (e.g., `2006-12-02T02:07:43Z`) and local dates in the same
@@ -4284,26 +4266,6 @@ pub struct InstallerArgs {
4284
4266
) ]
4285
4267
pub keyring_provider : Option < KeyringProviderType > ,
4286
4268
4287
- /// Allow insecure connections to a host.
4288
- ///
4289
- /// Can be provided multiple times.
4290
- ///
4291
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4292
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4293
- ///
4294
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4295
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4296
- /// bypasses SSL verification and could expose you to MITM attacks.
4297
- #[ arg(
4298
- long,
4299
- alias = "trusted-host" ,
4300
- env = EnvVars :: UV_INSECURE_HOST ,
4301
- value_delimiter = ' ' ,
4302
- value_parser = parse_insecure_host,
4303
- help_heading = "Index options"
4304
- ) ]
4305
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4306
-
4307
4269
/// Settings to pass to the PEP 517 build backend, specified as `KEY=VALUE` pairs.
4308
4270
#[ arg(
4309
4271
long,
@@ -4446,26 +4408,6 @@ pub struct ResolverArgs {
4446
4408
) ]
4447
4409
pub keyring_provider : Option < KeyringProviderType > ,
4448
4410
4449
- /// Allow insecure connections to a host.
4450
- ///
4451
- /// Can be provided multiple times.
4452
- ///
4453
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4454
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4455
- ///
4456
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4457
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4458
- /// bypasses SSL verification and could expose you to MITM attacks.
4459
- #[ arg(
4460
- long,
4461
- alias = "trusted-host" ,
4462
- env = EnvVars :: UV_INSECURE_HOST ,
4463
- value_delimiter = ' ' ,
4464
- value_parser = parse_insecure_host,
4465
- help_heading = "Index options"
4466
- ) ]
4467
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4468
-
4469
4411
/// The strategy to use when selecting between the different compatible versions for a given
4470
4412
/// package requirement.
4471
4413
///
@@ -4638,26 +4580,6 @@ pub struct ResolverInstallerArgs {
4638
4580
) ]
4639
4581
pub keyring_provider : Option < KeyringProviderType > ,
4640
4582
4641
- /// Allow insecure connections to a host.
4642
- ///
4643
- /// Can be provided multiple times.
4644
- ///
4645
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4646
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4647
- ///
4648
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4649
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4650
- /// bypasses SSL verification and could expose you to MITM attacks.
4651
- #[ arg(
4652
- long,
4653
- alias = "trusted-host" ,
4654
- env = EnvVars :: UV_INSECURE_HOST ,
4655
- value_delimiter = ' ' ,
4656
- value_parser = parse_insecure_host,
4657
- help_heading = "Index options"
4658
- ) ]
4659
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4660
-
4661
4583
/// The strategy to use when selecting between the different compatible versions for a given
4662
4584
/// package requirement.
4663
4585
///
@@ -4864,25 +4786,6 @@ pub struct PublishArgs {
4864
4786
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
4865
4787
pub keyring_provider : Option < KeyringProviderType > ,
4866
4788
4867
- /// Allow insecure connections to a host.
4868
- ///
4869
- /// Can be provided multiple times.
4870
- ///
4871
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4872
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4873
- ///
4874
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4875
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4876
- /// bypasses SSL verification and could expose you to MITM attacks.
4877
- #[ arg(
4878
- long,
4879
- alias = "trusted-host" ,
4880
- env = EnvVars :: UV_INSECURE_HOST ,
4881
- value_delimiter = ' ' ,
4882
- value_parser = parse_insecure_host,
4883
- ) ]
4884
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4885
-
4886
4789
/// Check an index URL for existing files to skip duplicate uploads.
4887
4790
///
4888
4791
/// This option allows retrying publishing that failed after only some, but not all files have
0 commit comments