@@ -205,6 +205,26 @@ pub struct GlobalArgs {
205
205
#[ arg( global = true , long, overrides_with( "offline" ) , hide = true ) ]
206
206
pub no_offline : bool ,
207
207
208
+ /// Allow insecure connections to a host.
209
+ ///
210
+ /// Can be provided multiple times.
211
+ ///
212
+ /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
213
+ /// `localhost:8080`), or a URL (e.g., `https://localhost`).
214
+ ///
215
+ /// WARNING: Hosts included in this list will not be verified against the system's certificate
216
+ /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
217
+ /// bypasses SSL verification and could expose you to MITM attacks.
218
+ #[ arg(
219
+ global = true ,
220
+ long,
221
+ alias = "trusted-host" ,
222
+ env = EnvVars :: UV_INSECURE_HOST ,
223
+ value_delimiter = ' ' ,
224
+ value_parser = parse_insecure_host,
225
+ ) ]
226
+ pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
227
+
208
228
/// Whether to enable experimental, preview features.
209
229
///
210
230
/// Preview features may change without warning.
@@ -1771,25 +1791,6 @@ pub struct PipUninstallArgs {
1771
1791
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
1772
1792
pub keyring_provider : Option < KeyringProviderType > ,
1773
1793
1774
- /// Allow insecure connections to a host.
1775
- ///
1776
- /// Can be provided multiple times.
1777
- ///
1778
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
1779
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
1780
- ///
1781
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
1782
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
1783
- /// bypasses SSL verification and could expose you to MITM attacks.
1784
- #[ arg(
1785
- long,
1786
- alias = "trusted-host" ,
1787
- env = EnvVars :: UV_INSECURE_HOST ,
1788
- value_delimiter = ' ' ,
1789
- value_parser = parse_insecure_host,
1790
- ) ]
1791
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
1792
-
1793
1794
/// Use the system Python to uninstall packages.
1794
1795
///
1795
1796
/// By default, uv uninstalls from the virtual environment in the current working directory or
@@ -2363,25 +2364,6 @@ pub struct VenvArgs {
2363
2364
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
2364
2365
pub keyring_provider : Option < KeyringProviderType > ,
2365
2366
2366
- /// Allow insecure connections to a host.
2367
- ///
2368
- /// Can be provided multiple times.
2369
- ///
2370
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
2371
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
2372
- ///
2373
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
2374
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
2375
- /// bypasses SSL verification and could expose you to MITM attacks.
2376
- #[ arg(
2377
- long,
2378
- alias = "trusted-host" ,
2379
- env = EnvVars :: UV_INSECURE_HOST ,
2380
- value_delimiter = ' ' ,
2381
- value_parser = parse_insecure_host,
2382
- ) ]
2383
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
2384
-
2385
2367
/// Limit candidate packages to those that were uploaded prior to the given date.
2386
2368
///
2387
2369
/// Accepts both RFC 3339 timestamps (e.g., `2006-12-02T02:07:43Z`) and local dates in the same
@@ -4271,26 +4253,6 @@ pub struct InstallerArgs {
4271
4253
) ]
4272
4254
pub keyring_provider : Option < KeyringProviderType > ,
4273
4255
4274
- /// Allow insecure connections to a host.
4275
- ///
4276
- /// Can be provided multiple times.
4277
- ///
4278
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4279
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4280
- ///
4281
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4282
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4283
- /// bypasses SSL verification and could expose you to MITM attacks.
4284
- #[ arg(
4285
- long,
4286
- alias = "trusted-host" ,
4287
- env = EnvVars :: UV_INSECURE_HOST ,
4288
- value_delimiter = ' ' ,
4289
- value_parser = parse_insecure_host,
4290
- help_heading = "Index options"
4291
- ) ]
4292
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4293
-
4294
4256
/// Settings to pass to the PEP 517 build backend, specified as `KEY=VALUE` pairs.
4295
4257
#[ arg(
4296
4258
long,
@@ -4433,26 +4395,6 @@ pub struct ResolverArgs {
4433
4395
) ]
4434
4396
pub keyring_provider : Option < KeyringProviderType > ,
4435
4397
4436
- /// Allow insecure connections to a host.
4437
- ///
4438
- /// Can be provided multiple times.
4439
- ///
4440
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4441
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4442
- ///
4443
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4444
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4445
- /// bypasses SSL verification and could expose you to MITM attacks.
4446
- #[ arg(
4447
- long,
4448
- alias = "trusted-host" ,
4449
- env = EnvVars :: UV_INSECURE_HOST ,
4450
- value_delimiter = ' ' ,
4451
- value_parser = parse_insecure_host,
4452
- help_heading = "Index options"
4453
- ) ]
4454
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4455
-
4456
4398
/// The strategy to use when selecting between the different compatible versions for a given
4457
4399
/// package requirement.
4458
4400
///
@@ -4625,26 +4567,6 @@ pub struct ResolverInstallerArgs {
4625
4567
) ]
4626
4568
pub keyring_provider : Option < KeyringProviderType > ,
4627
4569
4628
- /// Allow insecure connections to a host.
4629
- ///
4630
- /// Can be provided multiple times.
4631
- ///
4632
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4633
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4634
- ///
4635
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4636
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4637
- /// bypasses SSL verification and could expose you to MITM attacks.
4638
- #[ arg(
4639
- long,
4640
- alias = "trusted-host" ,
4641
- env = EnvVars :: UV_INSECURE_HOST ,
4642
- value_delimiter = ' ' ,
4643
- value_parser = parse_insecure_host,
4644
- help_heading = "Index options"
4645
- ) ]
4646
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4647
-
4648
4570
/// The strategy to use when selecting between the different compatible versions for a given
4649
4571
/// package requirement.
4650
4572
///
@@ -4847,25 +4769,6 @@ pub struct PublishArgs {
4847
4769
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
4848
4770
pub keyring_provider : Option < KeyringProviderType > ,
4849
4771
4850
- /// Allow insecure connections to a host.
4851
- ///
4852
- /// Can be provided multiple times.
4853
- ///
4854
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4855
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4856
- ///
4857
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4858
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4859
- /// bypasses SSL verification and could expose you to MITM attacks.
4860
- #[ arg(
4861
- long,
4862
- alias = "trusted-host" ,
4863
- env = EnvVars :: UV_INSECURE_HOST ,
4864
- value_delimiter = ' ' ,
4865
- value_parser = parse_insecure_host,
4866
- ) ]
4867
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4868
-
4869
4772
/// Check an index URL for existing files to skip duplicate uploads.
4870
4773
///
4871
4774
/// This option allows retrying publishing that failed after only some, but not all files have
0 commit comments