@@ -2414,7 +2414,7 @@ pub struct VenvArgs {
24142414 /// The strategy to use when resolving against multiple index URLs.
24152415 ///
24162416 /// By default, uv will stop at the first index on which a given package is available, and
2417- /// limit resolutions to those present on that first index (`first-match `). This prevents
2417+ /// limit resolutions to those present on that first index (`first-index `). This prevents
24182418 /// "dependency confusion" attacks, whereby an attacker can upload a malicious package under the
24192419 /// same name to an alternate index.
24202420 #[ arg( long, value_enum, env = EnvVars :: UV_INDEX_STRATEGY ) ]
@@ -3992,7 +3992,7 @@ pub struct ToolUpgradeArgs {
39923992 /// The strategy to use when resolving against multiple index URLs.
39933993 ///
39943994 /// By default, uv will stop at the first index on which a given package is available, and
3995- /// limit resolutions to those present on that first index (`first-match `). This prevents
3995+ /// limit resolutions to those present on that first index (`first-index `). This prevents
39963996 /// "dependency confusion" attacks, whereby an attacker can upload a malicious package under the
39973997 /// same name to an alternate index.
39983998 #[ arg(
@@ -4656,7 +4656,7 @@ pub struct InstallerArgs {
46564656 /// The strategy to use when resolving against multiple index URLs.
46574657 ///
46584658 /// By default, uv will stop at the first index on which a given package is available, and
4659- /// limit resolutions to those present on that first index (`first-match `). This prevents
4659+ /// limit resolutions to those present on that first index (`first-index `). This prevents
46604660 /// "dependency confusion" attacks, whereby an attacker can upload a malicious package under the
46614661 /// same name to an alternate index.
46624662 #[ arg(
@@ -4798,7 +4798,7 @@ pub struct ResolverArgs {
47984798 /// The strategy to use when resolving against multiple index URLs.
47994799 ///
48004800 /// By default, uv will stop at the first index on which a given package is available, and
4801- /// limit resolutions to those present on that first index (`first-match `). This prevents
4801+ /// limit resolutions to those present on that first index (`first-index `). This prevents
48024802 /// "dependency confusion" attacks, whereby an attacker can upload a malicious package under the
48034803 /// same name to an alternate index.
48044804 #[ arg(
@@ -4988,7 +4988,7 @@ pub struct ResolverInstallerArgs {
49884988 /// The strategy to use when resolving against multiple index URLs.
49894989 ///
49904990 /// By default, uv will stop at the first index on which a given package is available, and
4991- /// limit resolutions to those present on that first index (`first-match `). This prevents
4991+ /// limit resolutions to those present on that first index (`first-index `). This prevents
49924992 /// "dependency confusion" attacks, whereby an attacker can upload a malicious package under the
49934993 /// same name to an alternate index.
49944994 #[ arg(
@@ -5159,7 +5159,7 @@ pub struct FetchArgs {
51595159 /// The strategy to use when resolving against multiple index URLs.
51605160 ///
51615161 /// By default, uv will stop at the first index on which a given package is available, and
5162- /// limit resolutions to those present on that first index (`first-match `). This prevents
5162+ /// limit resolutions to those present on that first index (`first-index `). This prevents
51635163 /// "dependency confusion" attacks, whereby an attacker can upload a malicious package under the
51645164 /// same name to an alternate index.
51655165 #[ arg(
0 commit comments