-
Notifications
You must be signed in to change notification settings - Fork 0
/
deny.toml
50 lines (47 loc) · 1.75 KB
/
deny.toml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
[advisories]
vulnerability = "deny"
unmaintained = "warn"
notice = "warn"
ignore = [
# chrono calls localtime_r, which can result in memory unsafety if another
# thread is simultaneously calling setenv. The likelihood of this happening
# here is pretty low, and in any case it's something I can't help at the moment. /:
"RUSTSEC-2020-0159",
# Same for all these other time and chrono bugs - they have a new
# maintainer, so these rustsec advisories should go away soon
"RUSTSEC-2020-0071", # segfault in time crate
"RUSTSEC-2021-0041", # parse_duration DoS with too-large exponent
"RUSTSEC-2020-0056", # stdweb crate is unmaintained (transitive thru time 0.2)
]
[licenses]
unlicensed = "deny"
confidence-threshold = 0.65 # ring's license can't be recognized well
allow = [
"MPL-2.0",
]
exceptions = [
{name="ring", allow=["OpenSSL"]}
]
deny = []
copyleft = "warn"
# Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
# * both - The license will only be approved if it is both OSI-approved *AND* FSF/Free
# * either - The license will be approved if it is either OSI-approved *OR* FSF/Free
# * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF/Free
# * fsf-only - The license will be approved if is FSF/Free *AND NOT* OSI-approved
# * neither - The license will be denied if is FSF/Free *OR* OSI-approved
allow-osi-fsf-free = "either"
[bans]
# Lint level for when multiple versions of the same crate are detected
multiple-versions = "warn"
highlight = "lowest-version"
allow = [
]
deny = [
]
# Certain crates/versions that will be skipped when doing duplicate detection.
skip = [
]
skip-tree = [
# This is useful for dev-dependencies like criterion which often pin their own versions of rand
]