23
23
# dependencies not shared by any other crates, would be ignored, as the target
24
24
# list here is effectively saying which targets you are building for.
25
25
targets = [
26
- # The triple can be any string, but only the target triples built in to
27
- # rustc (as of 1.40) can be checked against actual config expressions
28
- # "x86_64-unknown-linux-musl",
29
- # You can also specify which target_features you promise are enabled for a
30
- # particular target. target_features are currently not validated against
31
- # the actual valid features supported by the target architecture.
32
- # { triple = "wasm32-unknown-unknown", features = ["atomics"] },
26
+ # The triple can be any string, but only the target triples built in to
27
+ # rustc (as of 1.40) can be checked against actual config expressions
28
+ # "x86_64-unknown-linux-musl",
29
+ # You can also specify which target_features you promise are enabled for a
30
+ # particular target. target_features are currently not validated against
31
+ # the actual valid features supported by the target architecture.
32
+ # { triple = "wasm32-unknown-unknown", features = ["atomics"] },
33
33
]
34
34
# When creating the dependency graph used as the source of truth when checks are
35
35
# executed, this field can be used to prune crates from the graph, removing them
@@ -70,10 +70,10 @@ feature-depth = 1
70
70
# A list of advisory IDs to ignore. Note that ignored advisories will still
71
71
# output a note when they are encountered.
72
72
ignore = [
73
- # "RUSTSEC-0000-0000",
74
- # { id = "RUSTSEC-0000-0000", reason = "you can specify a reason the advisory is ignored" },
75
- # "a-crate-that-is-yanked@0.1.1", # you can also ignore yanked crate versions if you wish
76
- # { crate = "a-crate-that-is-yanked@0.1.1", reason = "you can specify why you are ignoring the yanked crate" },
73
+ # "RUSTSEC-0000-0000",
74
+ # { id = "RUSTSEC-0000-0000", reason = "you can specify a reason the advisory is ignored" },
75
+ # "a-crate-that-is-yanked@0.1.1", # you can also ignore yanked crate versions if you wish
76
+ # { crate = "a-crate-that-is-yanked@0.1.1", reason = "you can specify why you are ignoring the yanked crate" },
77
77
]
78
78
# If this is true, then cargo deny will use the git executable to fetch advisory database.
79
79
# If this is false, then it uses a built-in git library.
@@ -89,17 +89,17 @@ ignore = [
89
89
# See https://spdx.org/licenses/ for list of possible licenses
90
90
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
91
91
allow = [
92
- " Apache-2.0" ,
93
- " Apache-2.0 WITH LLVM-exception" ,
94
- " BSD-2-Clause" ,
95
- " BSD-3-Clause" ,
96
- " CC0-1.0" ,
97
- " ISC" ,
98
- " MIT" ,
99
- " OpenSSL" ,
100
- " Unicode-3.0" ,
101
- # "Unicode-DFS-2016",
102
- " Unlicense" ,
92
+ " Apache-2.0" ,
93
+ " Apache-2.0 WITH LLVM-exception" ,
94
+ " BSD-2-Clause" ,
95
+ " BSD-3-Clause" ,
96
+ " CC0-1.0" ,
97
+ " ISC" ,
98
+ " MIT" ,
99
+ " OpenSSL" ,
100
+ " Unicode-3.0" ,
101
+ # "Unicode-DFS-2016",
102
+ " Unlicense" ,
103
103
]
104
104
# The confidence threshold for detecting a license from license text.
105
105
# The higher the value, the more closely the license text must be to the
@@ -109,9 +109,9 @@ confidence-threshold = 0.8
109
109
# Allow 1 or more licenses on a per-crate basis, so that particular licenses
110
110
# aren't accepted for every possible crate as with the normal allow list
111
111
exceptions = [
112
- # Each entry is the crate and version constraint, and its specific allow
113
- # list
114
- # { allow = ["Zlib"], crate = "adler32" },
112
+ # Each entry is the crate and version constraint, and its specific allow
113
+ # list
114
+ # { allow = ["Zlib"], crate = "adler32" },
115
115
]
116
116
117
117
# Some crates don't have (easily) machine readable licensing information,
@@ -123,8 +123,8 @@ crate = "ring"
123
123
# The SPDX expression for the license requirements of the crate
124
124
expression = " MIT AND ISC AND OpenSSL"
125
125
license-files = [
126
- # Each entry is a crate relative path, and the (opaque) hash of its contents
127
- { path = " LICENSE" , hash = 0xbd0eed23 },
126
+ # Each entry is a crate relative path, and the (opaque) hash of its contents
127
+ { path = " LICENSE" , hash = 0xbd0eed23 },
128
128
]
129
129
130
130
[licenses .private ]
@@ -142,7 +142,7 @@ ignore = false
142
142
# is only published to private registries, and ignore is true, the crate will
143
143
# not have its license(s) checked
144
144
registries = [
145
- # "https://sekretz.com/registry
145
+ # "https://sekretz.com/registry
146
146
]
147
147
148
148
# This section is considered when running `cargo deny check bans`.
@@ -169,16 +169,16 @@ workspace-default-features = "allow"
169
169
external-default-features = " allow"
170
170
# List of crates that are allowed. Use with care!
171
171
allow = [
172
- # "ansi_term@0.11.0",
173
- # { crate = "ansi_term@0.11.0", reason = "you can specify a reason it is allowed" },
172
+ # "ansi_term@0.11.0",
173
+ # { crate = "ansi_term@0.11.0", reason = "you can specify a reason it is allowed" },
174
174
]
175
175
# List of crates to deny
176
176
deny = [
177
- # "ansi_term@0.11.0",
178
- # { crate = "ansi_term@0.11.0", reason = "you can specify a reason it is banned" },
179
- # Wrapper crates can optionally be specified to allow the crate when it
180
- # is a direct dependency of the otherwise banned crate
181
- # { crate = "ansi_term@0.11.0", wrappers = ["this-crate-directly-depends-on-ansi_term"] },
177
+ # "ansi_term@0.11.0",
178
+ # { crate = "ansi_term@0.11.0", reason = "you can specify a reason it is banned" },
179
+ # Wrapper crates can optionally be specified to allow the crate when it
180
+ # is a direct dependency of the otherwise banned crate
181
+ # { crate = "ansi_term@0.11.0", wrappers = ["this-crate-directly-depends-on-ansi_term"] },
182
182
]
183
183
184
184
# List of features to allow/deny
@@ -206,32 +206,34 @@ deny = [
206
206
207
207
# Certain crates/versions that will be skipped when doing duplicate detection.
208
208
skip = [
209
- # "ansi_term@0.11.0",
210
- # { crate = "ansi_term@0.11.0", reason = "you can specify a reason why it can't be updated/removed" },
211
- " axum@0.7" , # tonic depend on axum 0.7
212
- " axum-core@0.4" , # tonic depend on axum 0.7
213
- " matchit@0.7" , # tonic depend on axum 0.7
214
- " tower@0.4" , # axum 0.7 use tower 0.5, but hyper still use 0.4
215
- # "sync_wrapper", # axum direct and transive dependency use multiple version
216
- " regex-syntax" ,
217
- " regex-automata" ,
218
- " indexmap" ,
219
- # "hermit-abi",
220
- # "rustls-native-certs",
221
- " hashbrown" ,
222
- " thiserror" , # until every dependency use thiserror 2
223
- " thiserror-impl" ,
209
+ # "ansi_term@0.11.0",
210
+ # { crate = "ansi_term@0.11.0", reason = "you can specify a reason why it can't be updated/removed" },
211
+ " axum@0.7" , # tonic depend on axum 0.7
212
+ " axum-core@0.4" , # tonic depend on axum 0.7
213
+ " matchit@0.7" , # tonic depend on axum 0.7
214
+ " tower@0.4" , # axum 0.7 use tower 0.5, but hyper still use 0.4
215
+ # "sync_wrapper", # axum direct and transive dependency use multiple version
216
+ " regex-syntax" ,
217
+ " regex-automata" ,
218
+ " indexmap" ,
219
+ # "hermit-abi",
220
+ # "rustls-native-certs",
221
+ " hashbrown" ,
222
+ " thiserror" , # until every dependency use thiserror 2
223
+ " thiserror-impl" ,
224
+ " getrandom" ,
225
+ " wasi" ,
224
226
]
225
227
# Similarly to `skip` allows you to skip certain crates during duplicate
226
228
# detection. Unlike skip, it also includes the entire tree of transitive
227
229
# dependencies starting at the specified crate, up to a certain depth, which is
228
230
# by default infinite.
229
231
skip-tree = [
230
- # "ansi_term@0.11.0", # will be skipped along with _all_ of its direct and transitive dependencies
231
- # { crate = "ansi_term@0.11.0", depth = 20 },
232
- " windows-targets" ,
233
- " windows-sys" ,
234
- " async-std" ,
232
+ # "ansi_term@0.11.0", # will be skipped along with _all_ of its direct and transitive dependencies
233
+ # { crate = "ansi_term@0.11.0", depth = 20 },
234
+ " windows-targets" ,
235
+ " windows-sys" ,
236
+ " async-std" ,
235
237
]
236
238
237
239
# This section is considered when running `cargo deny check sources`.
0 commit comments