Skip to content

Add AllowInsecureConnections to push command #3456

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

Nigusu-Allehu
Copy link
Contributor

@Copilot Copilot AI review requested due to automatic review settings August 6, 2025 23:11
@Nigusu-Allehu Nigusu-Allehu requested review from a team as code owners August 6, 2025 23:11
Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds documentation for the -AllowInsecureConnections option to the NuGet CLI push command reference, allowing users to push packages to HTTP sources when necessary.

  • Added documentation for the -AllowInsecureConnections parameter in the CLI push command reference

@@ -28,6 +28,9 @@ where `<packagePath>` identifies the package to push to the server.

## Options

- **`-AllowInsecureConnections`**
Copy link
Preview

Copilot AI Aug 6, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The option name should be consistent with typical CLI parameter formatting. Consider using --allow-insecure-connections (kebab-case with double dashes) or -AllowInsecureConnections if following PowerShell-style conventions, but verify this matches the actual implementation.

Copilot uses AI. Check for mistakes.

@@ -28,6 +28,9 @@ where `<packagePath>` identifies the package to push to the server.

## Options

- **`-AllowInsecureConnections`**
Allows pushing to HTTP sources (insecure).

Copy link
Preview

Copilot AI Aug 6, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The documentation should include a security warning about the risks of using insecure connections, such as potential exposure of API keys and package contents to network interception.

Suggested change
> [!Warning]
> Using insecure (HTTP) connections can expose your API keys and package contents to interception by malicious actors. Avoid using this option unless absolutely necessary and only in trusted environments. Always prefer secure (HTTPS) connections to protect sensitive information.

Copilot uses AI. Check for mistakes.

Copy link

Learn Build status updates of commit 8d51573:

✅ Validation status: passed

File Status Preview URL Details
docs/reference/cli-reference/cli-ref-push.md ✅Succeeded View

For more details, please refer to the build report.

@Nigusu-Allehu Nigusu-Allehu self-assigned this Aug 6, 2025
Copy link

Learn Build status updates of commit b8bc6bf:

✅ Validation status: passed

File Status Preview URL Details
docs/reference/cli-reference/cli-ref-push.md ✅Succeeded View

For more details, please refer to the build report.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

document allowInsecureConnections option in nuget.exe and dotnet.exe
1 participant