@@ -205,6 +205,26 @@ pub struct GlobalArgs {
205205 #[ arg( global = true , long, overrides_with( "offline" ) , hide = true ) ]
206206 pub no_offline : bool ,
207207
208+ /// Allow insecure connections to a host.
209+ ///
210+ /// Can be provided multiple times.
211+ ///
212+ /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
213+ /// `localhost:8080`), or a URL (e.g., `https://localhost`).
214+ ///
215+ /// WARNING: Hosts included in this list will not be verified against the system's certificate
216+ /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
217+ /// bypasses SSL verification and could expose you to MITM attacks.
218+ #[ arg(
219+ global = true ,
220+ long,
221+ alias = "trusted-host" ,
222+ env = EnvVars :: UV_INSECURE_HOST ,
223+ value_delimiter = ' ' ,
224+ value_parser = parse_insecure_host,
225+ ) ]
226+ pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
227+
208228 /// Whether to enable experimental, preview features.
209229 ///
210230 /// Preview features may change without warning.
@@ -1768,25 +1788,6 @@ pub struct PipUninstallArgs {
17681788 #[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
17691789 pub keyring_provider : Option < KeyringProviderType > ,
17701790
1771- /// Allow insecure connections to a host.
1772- ///
1773- /// Can be provided multiple times.
1774- ///
1775- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
1776- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
1777- ///
1778- /// WARNING: Hosts included in this list will not be verified against the system's certificate
1779- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
1780- /// bypasses SSL verification and could expose you to MITM attacks.
1781- #[ arg(
1782- long,
1783- alias = "trusted-host" ,
1784- env = EnvVars :: UV_INSECURE_HOST ,
1785- value_delimiter = ' ' ,
1786- value_parser = parse_insecure_host,
1787- ) ]
1788- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
1789-
17901791 /// Use the system Python to uninstall packages.
17911792 ///
17921793 /// By default, uv uninstalls from the virtual environment in the current working directory or
@@ -2360,25 +2361,6 @@ pub struct VenvArgs {
23602361 #[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
23612362 pub keyring_provider : Option < KeyringProviderType > ,
23622363
2363- /// Allow insecure connections to a host.
2364- ///
2365- /// Can be provided multiple times.
2366- ///
2367- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
2368- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
2369- ///
2370- /// WARNING: Hosts included in this list will not be verified against the system's certificate
2371- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
2372- /// bypasses SSL verification and could expose you to MITM attacks.
2373- #[ arg(
2374- long,
2375- alias = "trusted-host" ,
2376- env = EnvVars :: UV_INSECURE_HOST ,
2377- value_delimiter = ' ' ,
2378- value_parser = parse_insecure_host,
2379- ) ]
2380- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
2381-
23822364 /// Limit candidate packages to those that were uploaded prior to the given date.
23832365 ///
23842366 /// Accepts both RFC 3339 timestamps (e.g., `2006-12-02T02:07:43Z`) and local dates in the same
@@ -4266,26 +4248,6 @@ pub struct InstallerArgs {
42664248 ) ]
42674249 pub keyring_provider : Option < KeyringProviderType > ,
42684250
4269- /// Allow insecure connections to a host.
4270- ///
4271- /// Can be provided multiple times.
4272- ///
4273- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4274- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4275- ///
4276- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4277- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4278- /// bypasses SSL verification and could expose you to MITM attacks.
4279- #[ arg(
4280- long,
4281- alias = "trusted-host" ,
4282- env = EnvVars :: UV_INSECURE_HOST ,
4283- value_delimiter = ' ' ,
4284- value_parser = parse_insecure_host,
4285- help_heading = "Index options"
4286- ) ]
4287- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4288-
42894251 /// Settings to pass to the PEP 517 build backend, specified as `KEY=VALUE` pairs.
42904252 #[ arg(
42914253 long,
@@ -4428,26 +4390,6 @@ pub struct ResolverArgs {
44284390 ) ]
44294391 pub keyring_provider : Option < KeyringProviderType > ,
44304392
4431- /// Allow insecure connections to a host.
4432- ///
4433- /// Can be provided multiple times.
4434- ///
4435- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4436- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4437- ///
4438- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4439- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4440- /// bypasses SSL verification and could expose you to MITM attacks.
4441- #[ arg(
4442- long,
4443- alias = "trusted-host" ,
4444- env = EnvVars :: UV_INSECURE_HOST ,
4445- value_delimiter = ' ' ,
4446- value_parser = parse_insecure_host,
4447- help_heading = "Index options"
4448- ) ]
4449- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4450-
44514393 /// The strategy to use when selecting between the different compatible versions for a given
44524394 /// package requirement.
44534395 ///
@@ -4620,26 +4562,6 @@ pub struct ResolverInstallerArgs {
46204562 ) ]
46214563 pub keyring_provider : Option < KeyringProviderType > ,
46224564
4623- /// Allow insecure connections to a host.
4624- ///
4625- /// Can be provided multiple times.
4626- ///
4627- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4628- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4629- ///
4630- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4631- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4632- /// bypasses SSL verification and could expose you to MITM attacks.
4633- #[ arg(
4634- long,
4635- alias = "trusted-host" ,
4636- env = EnvVars :: UV_INSECURE_HOST ,
4637- value_delimiter = ' ' ,
4638- value_parser = parse_insecure_host,
4639- help_heading = "Index options"
4640- ) ]
4641- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4642-
46434565 /// The strategy to use when selecting between the different compatible versions for a given
46444566 /// package requirement.
46454567 ///
@@ -4842,25 +4764,6 @@ pub struct PublishArgs {
48424764 #[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
48434765 pub keyring_provider : Option < KeyringProviderType > ,
48444766
4845- /// Allow insecure connections to a host.
4846- ///
4847- /// Can be provided multiple times.
4848- ///
4849- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4850- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4851- ///
4852- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4853- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4854- /// bypasses SSL verification and could expose you to MITM attacks.
4855- #[ arg(
4856- long,
4857- alias = "trusted-host" ,
4858- env = EnvVars :: UV_INSECURE_HOST ,
4859- value_delimiter = ' ' ,
4860- value_parser = parse_insecure_host,
4861- ) ]
4862- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4863-
48644767 /// Check an index URL for existing files to skip duplicate uploads.
48654768 ///
48664769 /// This option allows retrying publishing that failed after only some, but not all files have
0 commit comments