20
20
# dependencies not shared by any other crates, would be ignored, as the target
21
21
# list here is effectively saying which targets you are building for.
22
22
targets = [
23
- { triple = " aarch64-apple-darwin" },
24
- { triple = " x86_64-apple-darwin" },
25
- { triple = " i686-pc-windows-gnu" },
26
- { triple = " i686-pc-windows-msvc" },
27
- { triple = " x86_64-pc-windows-gnu" },
28
- { triple = " x86_64-pc-windows-msvc" },
29
- { triple = " i686-unknown-linux-gnu" },
30
- { triple = " x86_64-unknown-linux-gnu" },
31
- { triple = " x86_64-unknown-linux-musl" },
32
- # { triple = "wasm32-unknown-unknown" },
33
- # { triple = "x86_64-unknown-redox" },
23
+ { triple = " aarch64-apple-darwin" },
24
+ { triple = " x86_64-apple-darwin" },
25
+ { triple = " i686-pc-windows-gnu" },
26
+ { triple = " i686-pc-windows-msvc" },
27
+ { triple = " x86_64-pc-windows-gnu" },
28
+ { triple = " x86_64-pc-windows-msvc" },
29
+ { triple = " i686-unknown-linux-gnu" },
30
+ { triple = " x86_64-unknown-linux-gnu" },
31
+ { triple = " x86_64-unknown-linux-musl" },
32
+ # { triple = "wasm32-unknown-unknown" },
33
+ # { triple = "x86_64-unknown-redox" },
34
34
]
35
35
# When creating the dependency graph used as the source of truth when checks are
36
36
# executed, this field can be used to prune crates from the graph, removing them
@@ -73,8 +73,8 @@ yanked = "warn"
73
73
# A list of advisory IDs to ignore. Note that ignored advisories will still
74
74
# output a note when they are encountered.
75
75
ignore = [
76
- # "RUSTSEC-0000-0000",
77
- " RUSTSEC-2021-0145 " , # atty... potential unaligner when using custom allocators .
76
+ # "RUSTSEC-0000-0000",
77
+ " RUSTSEC-2023-0086 " , # Lexical-core -> arrow issue, updated in main in Sept-2024, unreleased .
78
78
]
79
79
# Threshold for security vulnerabilities, any vulnerability with a CVSS score
80
80
# lower than the range specified will be ignored. Note that ignored advisories
@@ -101,13 +101,13 @@ version = 2
101
101
# See https://spdx.org/licenses/ for list of possible licenses
102
102
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
103
103
allow = [
104
- " MIT" ,
105
- " Apache-2.0" ,
106
- " Apache-2.0 WITH LLVM-exception" ,
107
- " BSD-3-Clause" ,
108
- " Unicode-DFS-2016" ,
109
- " Zlib" ,
110
- # Thank Jesus for rerun that compiled the following for me...
104
+ " MIT" ,
105
+ " Apache-2.0" ,
106
+ " Apache-2.0 WITH LLVM-exception" ,
107
+ " BSD-3-Clause" ,
108
+ " Unicode-DFS-2016" ,
109
+ " Zlib" ,
110
+ # Thank Jesus for rerun that compiled the following for me...
111
111
]
112
112
113
113
# The confidence threshold for detecting a license from license text.
@@ -146,8 +146,8 @@ license-files = [{ path = "LICENSE", hash = 0xbd0eed23 }]
146
146
# and the crate will be checked normally, which may produce warnings or errors
147
147
# depending on the rest of your configuration
148
148
# license-files = [
149
- # Each entry is a crate relative path, and the (opaque) hash of its contents
150
- # { path = "LICENSE", hash = 0xbd0eed23 }
149
+ # Each entry is a crate relative path, and the (opaque) hash of its contents
150
+ # { path = "LICENSE", hash = 0xbd0eed23 }
151
151
# ]
152
152
153
153
[licenses .private ]
@@ -160,7 +160,7 @@ ignore = false
160
160
# is only published to private registries, and ignore is true, the crate will
161
161
# not have its license(s) checked
162
162
registries = [
163
- # "https://sekretz.com/registry
163
+ # "https://sekretz.com/registry
164
164
]
165
165
166
166
# This section is considered when running `cargo deny check bans`.
@@ -187,17 +187,17 @@ workspace-default-features = "allow"
187
187
external-default-features = " allow"
188
188
# List of crates that are allowed. Use with care!
189
189
allow = [
190
- # { name = "ansi_term", version = "=0.11.0" },
190
+ # { name = "ansi_term", version = "=0.11.0" },
191
191
]
192
192
# List of crates to deny
193
193
deny = [
194
- # Each entry the name of a crate and a version range. If version is
195
- # not specified, all versions will be matched.
196
- # { name = "ansi_term", version = "=0.11.0" },
197
- #
198
- # Wrapper crates can optionally be specified to allow the crate when it
199
- # is a direct dependency of the otherwise banned crate
200
- # { name = "ansi_term", version = "=0.11.0", wrappers = [] },
194
+ # Each entry the name of a crate and a version range. If version is
195
+ # not specified, all versions will be matched.
196
+ # { name = "ansi_term", version = "=0.11.0" },
197
+ #
198
+ # Wrapper crates can optionally be specified to allow the crate when it
199
+ # is a direct dependency of the otherwise banned crate
200
+ # { name = "ansi_term", version = "=0.11.0", wrappers = [] },
201
201
]
202
202
203
203
# List of features to allow/deny
0 commit comments