@@ -205,6 +205,26 @@ pub struct GlobalArgs {
205
205
#[ arg( global = true , long, overrides_with( "offline" ) , hide = true ) ]
206
206
pub no_offline : bool ,
207
207
208
+ /// Allow insecure connections to a host.
209
+ ///
210
+ /// Can be provided multiple times.
211
+ ///
212
+ /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
213
+ /// `localhost:8080`), or a URL (e.g., `https://localhost`).
214
+ ///
215
+ /// WARNING: Hosts included in this list will not be verified against the system's certificate
216
+ /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
217
+ /// bypasses SSL verification and could expose you to MITM attacks.
218
+ #[ arg(
219
+ global = true ,
220
+ long,
221
+ alias = "trusted-host" ,
222
+ env = EnvVars :: UV_INSECURE_HOST ,
223
+ value_delimiter = ' ' ,
224
+ value_parser = parse_insecure_host,
225
+ ) ]
226
+ pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
227
+
208
228
/// Whether to enable experimental, preview features.
209
229
///
210
230
/// Preview features may change without warning.
@@ -1771,25 +1791,6 @@ pub struct PipUninstallArgs {
1771
1791
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
1772
1792
pub keyring_provider : Option < KeyringProviderType > ,
1773
1793
1774
- /// Allow insecure connections to a host.
1775
- ///
1776
- /// Can be provided multiple times.
1777
- ///
1778
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
1779
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
1780
- ///
1781
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
1782
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
1783
- /// bypasses SSL verification and could expose you to MITM attacks.
1784
- #[ arg(
1785
- long,
1786
- alias = "trusted-host" ,
1787
- env = EnvVars :: UV_INSECURE_HOST ,
1788
- value_delimiter = ' ' ,
1789
- value_parser = parse_insecure_host,
1790
- ) ]
1791
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
1792
-
1793
1794
/// Use the system Python to uninstall packages.
1794
1795
///
1795
1796
/// By default, uv uninstalls from the virtual environment in the current working directory or
@@ -2363,25 +2364,6 @@ pub struct VenvArgs {
2363
2364
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
2364
2365
pub keyring_provider : Option < KeyringProviderType > ,
2365
2366
2366
- /// Allow insecure connections to a host.
2367
- ///
2368
- /// Can be provided multiple times.
2369
- ///
2370
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
2371
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
2372
- ///
2373
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
2374
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
2375
- /// bypasses SSL verification and could expose you to MITM attacks.
2376
- #[ arg(
2377
- long,
2378
- alias = "trusted-host" ,
2379
- env = EnvVars :: UV_INSECURE_HOST ,
2380
- value_delimiter = ' ' ,
2381
- value_parser = parse_insecure_host,
2382
- ) ]
2383
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
2384
-
2385
2367
/// Limit candidate packages to those that were uploaded prior to the given date.
2386
2368
///
2387
2369
/// Accepts both RFC 3339 timestamps (e.g., `2006-12-02T02:07:43Z`) and local dates in the same
@@ -4219,26 +4201,6 @@ pub struct InstallerArgs {
4219
4201
) ]
4220
4202
pub keyring_provider : Option < KeyringProviderType > ,
4221
4203
4222
- /// Allow insecure connections to a host.
4223
- ///
4224
- /// Can be provided multiple times.
4225
- ///
4226
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4227
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4228
- ///
4229
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4230
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4231
- /// bypasses SSL verification and could expose you to MITM attacks.
4232
- #[ arg(
4233
- long,
4234
- alias = "trusted-host" ,
4235
- env = EnvVars :: UV_INSECURE_HOST ,
4236
- value_delimiter = ' ' ,
4237
- value_parser = parse_insecure_host,
4238
- help_heading = "Index options"
4239
- ) ]
4240
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4241
-
4242
4204
/// Settings to pass to the PEP 517 build backend, specified as `KEY=VALUE` pairs.
4243
4205
#[ arg(
4244
4206
long,
@@ -4381,26 +4343,6 @@ pub struct ResolverArgs {
4381
4343
) ]
4382
4344
pub keyring_provider : Option < KeyringProviderType > ,
4383
4345
4384
- /// Allow insecure connections to a host.
4385
- ///
4386
- /// Can be provided multiple times.
4387
- ///
4388
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4389
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4390
- ///
4391
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4392
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4393
- /// bypasses SSL verification and could expose you to MITM attacks.
4394
- #[ arg(
4395
- long,
4396
- alias = "trusted-host" ,
4397
- env = EnvVars :: UV_INSECURE_HOST ,
4398
- value_delimiter = ' ' ,
4399
- value_parser = parse_insecure_host,
4400
- help_heading = "Index options"
4401
- ) ]
4402
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4403
-
4404
4346
/// The strategy to use when selecting between the different compatible versions for a given
4405
4347
/// package requirement.
4406
4348
///
@@ -4573,26 +4515,6 @@ pub struct ResolverInstallerArgs {
4573
4515
) ]
4574
4516
pub keyring_provider : Option < KeyringProviderType > ,
4575
4517
4576
- /// Allow insecure connections to a host.
4577
- ///
4578
- /// Can be provided multiple times.
4579
- ///
4580
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4581
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4582
- ///
4583
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4584
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4585
- /// bypasses SSL verification and could expose you to MITM attacks.
4586
- #[ arg(
4587
- long,
4588
- alias = "trusted-host" ,
4589
- env = EnvVars :: UV_INSECURE_HOST ,
4590
- value_delimiter = ' ' ,
4591
- value_parser = parse_insecure_host,
4592
- help_heading = "Index options"
4593
- ) ]
4594
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4595
-
4596
4518
/// The strategy to use when selecting between the different compatible versions for a given
4597
4519
/// package requirement.
4598
4520
///
@@ -4794,25 +4716,6 @@ pub struct PublishArgs {
4794
4716
/// Defaults to `disabled`.
4795
4717
#[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
4796
4718
pub keyring_provider : Option < KeyringProviderType > ,
4797
-
4798
- /// Allow insecure connections to a host.
4799
- ///
4800
- /// Can be provided multiple times.
4801
- ///
4802
- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4803
- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4804
- ///
4805
- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4806
- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4807
- /// bypasses SSL verification and could expose you to MITM attacks.
4808
- #[ arg(
4809
- long,
4810
- alias = "trusted-host" ,
4811
- env = EnvVars :: UV_INSECURE_HOST ,
4812
- value_delimiter = ' ' ,
4813
- value_parser = parse_insecure_host,
4814
- ) ]
4815
- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4816
4719
}
4817
4720
4818
4721
/// See [PEP 517](https://peps.python.org/pep-0517/) and
0 commit comments