@@ -205,6 +205,26 @@ pub struct GlobalArgs {
205205 #[ arg( global = true , long, overrides_with( "offline" ) , hide = true ) ]
206206 pub no_offline : bool ,
207207
208+ /// Allow insecure connections to a host.
209+ ///
210+ /// Can be provided multiple times.
211+ ///
212+ /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
213+ /// `localhost:8080`), or a URL (e.g., `https://localhost`).
214+ ///
215+ /// WARNING: Hosts included in this list will not be verified against the system's certificate
216+ /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
217+ /// bypasses SSL verification and could expose you to MITM attacks.
218+ #[ arg(
219+ global = true ,
220+ long,
221+ alias = "trusted-host" ,
222+ env = EnvVars :: UV_INSECURE_HOST ,
223+ value_delimiter = ' ' ,
224+ value_parser = parse_insecure_host,
225+ ) ]
226+ pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
227+
208228 /// Whether to enable experimental, preview features.
209229 ///
210230 /// Preview features may change without warning.
@@ -1768,25 +1788,6 @@ pub struct PipUninstallArgs {
17681788 #[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
17691789 pub keyring_provider : Option < KeyringProviderType > ,
17701790
1771- /// Allow insecure connections to a host.
1772- ///
1773- /// Can be provided multiple times.
1774- ///
1775- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
1776- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
1777- ///
1778- /// WARNING: Hosts included in this list will not be verified against the system's certificate
1779- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
1780- /// bypasses SSL verification and could expose you to MITM attacks.
1781- #[ arg(
1782- long,
1783- alias = "trusted-host" ,
1784- env = EnvVars :: UV_INSECURE_HOST ,
1785- value_delimiter = ' ' ,
1786- value_parser = parse_insecure_host,
1787- ) ]
1788- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
1789-
17901791 /// Use the system Python to uninstall packages.
17911792 ///
17921793 /// By default, uv uninstalls from the virtual environment in the current working directory or
@@ -2360,25 +2361,6 @@ pub struct VenvArgs {
23602361 #[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
23612362 pub keyring_provider : Option < KeyringProviderType > ,
23622363
2363- /// Allow insecure connections to a host.
2364- ///
2365- /// Can be provided multiple times.
2366- ///
2367- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
2368- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
2369- ///
2370- /// WARNING: Hosts included in this list will not be verified against the system's certificate
2371- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
2372- /// bypasses SSL verification and could expose you to MITM attacks.
2373- #[ arg(
2374- long,
2375- alias = "trusted-host" ,
2376- env = EnvVars :: UV_INSECURE_HOST ,
2377- value_delimiter = ' ' ,
2378- value_parser = parse_insecure_host,
2379- ) ]
2380- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
2381-
23822364 /// Limit candidate packages to those that were uploaded prior to the given date.
23832365 ///
23842366 /// Accepts both RFC 3339 timestamps (e.g., `2006-12-02T02:07:43Z`) and local dates in the same
@@ -4274,26 +4256,6 @@ pub struct InstallerArgs {
42744256 ) ]
42754257 pub keyring_provider : Option < KeyringProviderType > ,
42764258
4277- /// Allow insecure connections to a host.
4278- ///
4279- /// Can be provided multiple times.
4280- ///
4281- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4282- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4283- ///
4284- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4285- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4286- /// bypasses SSL verification and could expose you to MITM attacks.
4287- #[ arg(
4288- long,
4289- alias = "trusted-host" ,
4290- env = EnvVars :: UV_INSECURE_HOST ,
4291- value_delimiter = ' ' ,
4292- value_parser = parse_insecure_host,
4293- help_heading = "Index options"
4294- ) ]
4295- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4296-
42974259 /// Settings to pass to the PEP 517 build backend, specified as `KEY=VALUE` pairs.
42984260 #[ arg(
42994261 long,
@@ -4436,26 +4398,6 @@ pub struct ResolverArgs {
44364398 ) ]
44374399 pub keyring_provider : Option < KeyringProviderType > ,
44384400
4439- /// Allow insecure connections to a host.
4440- ///
4441- /// Can be provided multiple times.
4442- ///
4443- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4444- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4445- ///
4446- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4447- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4448- /// bypasses SSL verification and could expose you to MITM attacks.
4449- #[ arg(
4450- long,
4451- alias = "trusted-host" ,
4452- env = EnvVars :: UV_INSECURE_HOST ,
4453- value_delimiter = ' ' ,
4454- value_parser = parse_insecure_host,
4455- help_heading = "Index options"
4456- ) ]
4457- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4458-
44594401 /// The strategy to use when selecting between the different compatible versions for a given
44604402 /// package requirement.
44614403 ///
@@ -4628,26 +4570,6 @@ pub struct ResolverInstallerArgs {
46284570 ) ]
46294571 pub keyring_provider : Option < KeyringProviderType > ,
46304572
4631- /// Allow insecure connections to a host.
4632- ///
4633- /// Can be provided multiple times.
4634- ///
4635- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4636- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4637- ///
4638- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4639- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4640- /// bypasses SSL verification and could expose you to MITM attacks.
4641- #[ arg(
4642- long,
4643- alias = "trusted-host" ,
4644- env = EnvVars :: UV_INSECURE_HOST ,
4645- value_delimiter = ' ' ,
4646- value_parser = parse_insecure_host,
4647- help_heading = "Index options"
4648- ) ]
4649- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4650-
46514573 /// The strategy to use when selecting between the different compatible versions for a given
46524574 /// package requirement.
46534575 ///
@@ -4850,25 +4772,6 @@ pub struct PublishArgs {
48504772 #[ arg( long, value_enum, env = EnvVars :: UV_KEYRING_PROVIDER ) ]
48514773 pub keyring_provider : Option < KeyringProviderType > ,
48524774
4853- /// Allow insecure connections to a host.
4854- ///
4855- /// Can be provided multiple times.
4856- ///
4857- /// Expects to receive either a hostname (e.g., `localhost`), a host-port pair (e.g.,
4858- /// `localhost:8080`), or a URL (e.g., `https://localhost`).
4859- ///
4860- /// WARNING: Hosts included in this list will not be verified against the system's certificate
4861- /// store. Only use `--allow-insecure-host` in a secure network with verified sources, as it
4862- /// bypasses SSL verification and could expose you to MITM attacks.
4863- #[ arg(
4864- long,
4865- alias = "trusted-host" ,
4866- env = EnvVars :: UV_INSECURE_HOST ,
4867- value_delimiter = ' ' ,
4868- value_parser = parse_insecure_host,
4869- ) ]
4870- pub allow_insecure_host : Option < Vec < Maybe < TrustedHost > > > ,
4871-
48724775 /// Check an index URL for existing files to skip duplicate uploads.
48734776 ///
48744777 /// This option allows retrying publishing that failed after only some, but not all files have
0 commit comments