9
9
# The values provided in this template are the default values that will be used
10
10
# when any section or field is not specified in your own configuration
11
11
12
- # Root options
12
+ [ graph ]
13
13
14
14
# If 1 or more target triples (and optionally, target_features) are specified,
15
15
# only the specified targets will be checked when running `cargo deny check`.
@@ -50,6 +50,8 @@ no-default-features = false
50
50
# If set, these feature will be enabled when collecting metadata. If `--features`
51
51
# is specified on the cmd line they will take precedence over this option.
52
52
# features = []
53
+
54
+ [output ]
53
55
# When outputting inclusion graphs in diagnostics that include features, this
54
56
# option can be used to specify the depth at which feature edges will be added.
55
57
# This option is included since the graphs can be quite large and the addition
@@ -61,24 +63,18 @@ feature-depth = 1
61
63
# More documentation for the advisories section can be found here:
62
64
# https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html
63
65
[advisories ]
66
+ version = 2
64
67
# The path where the advisory database is cloned/fetched into
65
68
db-path = " ~/.cargo/advisory-db"
66
69
# The url(s) of the advisory databases to use
67
70
db-urls = [" https://github.com/rustsec/advisory-db" ]
68
71
# The lint level for security vulnerabilities
69
- vulnerability = " deny"
70
- # The lint level for unmaintained crates
71
- unmaintained = " warn"
72
- # The lint level for crates that have been yanked from their source registry
73
72
yanked = " warn"
74
- # The lint level for crates with security notices. Note that as of
75
- # 2019-12-17 there are no security notice advisories in
76
- # https://github.com/rustsec/advisory-db
77
- notice = " warn"
78
73
# A list of advisory IDs to ignore. Note that ignored advisories will still
79
74
# output a note when they are encountered.
80
75
ignore = [
81
76
# "RUSTSEC-0000-0000",
77
+ " RUSTSEC-2021-0145" , # atty... potential unaligner when using custom allocators.
82
78
]
83
79
# Threshold for security vulnerabilities, any vulnerability with a CVSS score
84
80
# lower than the range specified will be ignored. Note that ignored advisories
@@ -100,60 +96,28 @@ ignore = [
100
96
# More documentation for the licenses section can be found here:
101
97
# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
102
98
[licenses ]
103
- # The lint level for crates which do not have a detectable license
104
- unlicensed = " deny"
99
+ version = 2
105
100
# List of explicitly allowed licenses
106
101
# See https://spdx.org/licenses/ for list of possible licenses
107
102
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
108
103
allow = [
109
104
" MIT" ,
110
105
" Apache-2.0" ,
111
106
" Apache-2.0 WITH LLVM-exception" ,
112
- " CC0-1.0" ,
113
107
" BSD-3-Clause" ,
114
- " ISC" ,
115
108
" Unicode-DFS-2016" ,
116
109
" Zlib" ,
117
110
# Thank Jesus for rerun that compiled the following for me...
118
- " OFL-1.1" , # https://spdx.org/licenses/OFL-1.1.html
119
- " MPL-2.0" , # https://www.mozilla.org/en-US/MPL/2.0/FAQ/ - see Q11. Used by webpki-roots on Linux.
120
- " OpenSSL" , # https://www.openssl.org/source/license.html - used on Linux
121
- " LicenseRef-UFL-1.0" , # See https://github.com/emilk/egui/issues/2321
122
- ]
123
- # List of explicitly disallowed licenses
124
- # See https://spdx.org/licenses/ for list of possible licenses
125
- # [possible values: any SPDX 3.11 short identifier (+ optional exception)].
126
- deny = [
127
- # "Nokia",
128
111
]
129
- # Lint level for licenses considered copyleft
130
- copyleft = " deny"
131
- # Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
132
- # * both - The license will be approved if it is both OSI-approved *AND* FSF
133
- # * either - The license will be approved if it is either OSI-approved *OR* FSF
134
- # * osi - The license will be approved if it is OSI approved
135
- # * fsf - The license will be approved if it is FSF Free
136
- # * osi-only - The license will be approved if it is OSI-approved *AND NOT* FSF
137
- # * fsf-only - The license will be approved if it is FSF *AND NOT* OSI-approved
138
- # * neither - This predicate is ignored and the default lint level is used
139
- allow-osi-fsf-free = " neither"
140
- # Lint level used when no other predicates are matched
141
- # 1. License isn't in the allow or deny lists
142
- # 2. License isn't copyleft
143
- # 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
144
- default = " deny"
112
+
145
113
# The confidence threshold for detecting a license from license text.
146
114
# The higher the value, the more closely the license text must be to the
147
115
# canonical license text of a valid SPDX license file.
148
116
# [possible values: any between 0.0 and 1.0].
149
117
confidence-threshold = 0.95
150
118
# Allow 1 or more licenses on a per-crate basis, so that particular licenses
151
119
# aren't accepted for every possible crate as with the normal allow list
152
- exceptions = [
153
- # Each entry is the crate and version constraint, and its specific allow
154
- # list
155
- { allow = [" Zlib" ], name = " adler32" , version = " *" },
156
- ]
120
+ exceptions = []
157
121
158
122
# Some crates don't have (easily) machine readable licensing information,
159
123
# adding a clarification entry for it allows you to manually specify the
@@ -260,19 +224,12 @@ deny = [
260
224
# exact = true
261
225
262
226
# Certain crates/versions that will be skipped when doing duplicate detection.
263
- skip = [
264
- # Following line comes from the rerun repo ...https://github.com/rerun-io/rerun/blob/main/deny.toml
265
- { name = " webpki-roots" }, # ureq and tungstenite are on different version 😭
266
-
267
- # { name = "ansi_term", version = "=0.11.0" },
268
- ]
227
+ skip = []
269
228
# Similarly to `skip` allows you to skip certain crates during duplicate
270
229
# detection. Unlike skip, it also includes the entire tree of transitive
271
230
# dependencies starting at the specified crate, up to a certain depth, which is
272
231
# by default infinite.
273
- skip-tree = [
274
- # { name = "ansi_term", version = "=0.11.0", depth = 20 },
275
- ]
232
+ skip-tree = []
276
233
277
234
# This section is considered when running `cargo deny check sources`.
278
235
# More documentation about the 'sources' section can be found here:
@@ -288,12 +245,8 @@ unknown-git = "warn"
288
245
# if not specified. If it is specified but empty, no registries are allowed.
289
246
allow-registry = [" https://github.com/rust-lang/crates.io-index" ]
290
247
# List of URLs for allowed Git repositories
291
- allow-git = []
248
+ allow-git = [" https://github.com/lazear/sage " ]
292
249
293
250
[sources .allow-org ]
294
251
# 1 or more github.com organizations to allow git sources for
295
- github = [" " ]
296
- # 1 or more gitlab.com organizations to allow git sources for
297
- gitlab = [" " ]
298
- # 1 or more bitbucket.org organizations to allow git sources for
299
- bitbucket = [" " ]
252
+ # github = [""]
0 commit comments