Skip to content

Commit 90474c5

Browse files
committed
ci: ignore some duplicate dependency (multi-version)
1 parent ac3f0db commit 90474c5

File tree

2 files changed

+58
-56
lines changed

2 files changed

+58
-56
lines changed

Cargo.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ assert2 = "0.3"
2626
axum = { version = "0.8", default-features = false }
2727
http = "^1"
2828
hyper = "1"
29-
insta = { version = "1.40", features = ["yaml", "redactions"] }
29+
insta = { version = "1", features = ["yaml", "redactions"] }
3030
opentelemetry = { version = "0.28", features = [
3131
"trace",
3232
], default-features = false }

deny.toml

+57-55
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,13 @@
2323
# dependencies not shared by any other crates, would be ignored, as the target
2424
# list here is effectively saying which targets you are building for.
2525
targets = [
26-
# The triple can be any string, but only the target triples built in to
27-
# rustc (as of 1.40) can be checked against actual config expressions
28-
#"x86_64-unknown-linux-musl",
29-
# You can also specify which target_features you promise are enabled for a
30-
# particular target. target_features are currently not validated against
31-
# the actual valid features supported by the target architecture.
32-
#{ triple = "wasm32-unknown-unknown", features = ["atomics"] },
26+
# The triple can be any string, but only the target triples built in to
27+
# rustc (as of 1.40) can be checked against actual config expressions
28+
#"x86_64-unknown-linux-musl",
29+
# You can also specify which target_features you promise are enabled for a
30+
# particular target. target_features are currently not validated against
31+
# the actual valid features supported by the target architecture.
32+
#{ triple = "wasm32-unknown-unknown", features = ["atomics"] },
3333
]
3434
# When creating the dependency graph used as the source of truth when checks are
3535
# executed, this field can be used to prune crates from the graph, removing them
@@ -70,10 +70,10 @@ feature-depth = 1
7070
# A list of advisory IDs to ignore. Note that ignored advisories will still
7171
# output a note when they are encountered.
7272
ignore = [
73-
#"RUSTSEC-0000-0000",
74-
#{ id = "RUSTSEC-0000-0000", reason = "you can specify a reason the advisory is ignored" },
75-
#"a-crate-that-is-yanked@0.1.1", # you can also ignore yanked crate versions if you wish
76-
#{ crate = "a-crate-that-is-yanked@0.1.1", reason = "you can specify why you are ignoring the yanked crate" },
73+
#"RUSTSEC-0000-0000",
74+
#{ id = "RUSTSEC-0000-0000", reason = "you can specify a reason the advisory is ignored" },
75+
#"a-crate-that-is-yanked@0.1.1", # you can also ignore yanked crate versions if you wish
76+
#{ crate = "a-crate-that-is-yanked@0.1.1", reason = "you can specify why you are ignoring the yanked crate" },
7777
]
7878
# If this is true, then cargo deny will use the git executable to fetch advisory database.
7979
# If this is false, then it uses a built-in git library.
@@ -89,17 +89,17 @@ ignore = [
8989
# See https://spdx.org/licenses/ for list of possible licenses
9090
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
9191
allow = [
92-
"Apache-2.0",
93-
"Apache-2.0 WITH LLVM-exception",
94-
"BSD-2-Clause",
95-
"BSD-3-Clause",
96-
"CC0-1.0",
97-
"ISC",
98-
"MIT",
99-
"OpenSSL",
100-
"Unicode-3.0",
101-
# "Unicode-DFS-2016",
102-
"Unlicense",
92+
"Apache-2.0",
93+
"Apache-2.0 WITH LLVM-exception",
94+
"BSD-2-Clause",
95+
"BSD-3-Clause",
96+
"CC0-1.0",
97+
"ISC",
98+
"MIT",
99+
"OpenSSL",
100+
"Unicode-3.0",
101+
# "Unicode-DFS-2016",
102+
"Unlicense",
103103
]
104104
# The confidence threshold for detecting a license from license text.
105105
# The higher the value, the more closely the license text must be to the
@@ -109,9 +109,9 @@ confidence-threshold = 0.8
109109
# Allow 1 or more licenses on a per-crate basis, so that particular licenses
110110
# aren't accepted for every possible crate as with the normal allow list
111111
exceptions = [
112-
# Each entry is the crate and version constraint, and its specific allow
113-
# list
114-
#{ allow = ["Zlib"], crate = "adler32" },
112+
# Each entry is the crate and version constraint, and its specific allow
113+
# list
114+
#{ allow = ["Zlib"], crate = "adler32" },
115115
]
116116

117117
# Some crates don't have (easily) machine readable licensing information,
@@ -123,8 +123,8 @@ crate = "ring"
123123
# The SPDX expression for the license requirements of the crate
124124
expression = "MIT AND ISC AND OpenSSL"
125125
license-files = [
126-
# Each entry is a crate relative path, and the (opaque) hash of its contents
127-
{ path = "LICENSE", hash = 0xbd0eed23 },
126+
# Each entry is a crate relative path, and the (opaque) hash of its contents
127+
{ path = "LICENSE", hash = 0xbd0eed23 },
128128
]
129129

130130
[licenses.private]
@@ -142,7 +142,7 @@ ignore = false
142142
# is only published to private registries, and ignore is true, the crate will
143143
# not have its license(s) checked
144144
registries = [
145-
#"https://sekretz.com/registry
145+
#"https://sekretz.com/registry
146146
]
147147

148148
# This section is considered when running `cargo deny check bans`.
@@ -169,16 +169,16 @@ workspace-default-features = "allow"
169169
external-default-features = "allow"
170170
# List of crates that are allowed. Use with care!
171171
allow = [
172-
#"ansi_term@0.11.0",
173-
#{ crate = "ansi_term@0.11.0", reason = "you can specify a reason it is allowed" },
172+
#"ansi_term@0.11.0",
173+
#{ crate = "ansi_term@0.11.0", reason = "you can specify a reason it is allowed" },
174174
]
175175
# List of crates to deny
176176
deny = [
177-
#"ansi_term@0.11.0",
178-
#{ crate = "ansi_term@0.11.0", reason = "you can specify a reason it is banned" },
179-
# Wrapper crates can optionally be specified to allow the crate when it
180-
# is a direct dependency of the otherwise banned crate
181-
#{ crate = "ansi_term@0.11.0", wrappers = ["this-crate-directly-depends-on-ansi_term"] },
177+
#"ansi_term@0.11.0",
178+
#{ crate = "ansi_term@0.11.0", reason = "you can specify a reason it is banned" },
179+
# Wrapper crates can optionally be specified to allow the crate when it
180+
# is a direct dependency of the otherwise banned crate
181+
#{ crate = "ansi_term@0.11.0", wrappers = ["this-crate-directly-depends-on-ansi_term"] },
182182
]
183183

184184
# List of features to allow/deny
@@ -206,32 +206,34 @@ deny = [
206206

207207
# Certain crates/versions that will be skipped when doing duplicate detection.
208208
skip = [
209-
#"ansi_term@0.11.0",
210-
#{ crate = "ansi_term@0.11.0", reason = "you can specify a reason why it can't be updated/removed" },
211-
"axum@0.7", # tonic depend on axum 0.7
212-
"axum-core@0.4", # tonic depend on axum 0.7
213-
"matchit@0.7", # tonic depend on axum 0.7
214-
"tower@0.4", # axum 0.7 use tower 0.5, but hyper still use 0.4
215-
# "sync_wrapper", # axum direct and transive dependency use multiple version
216-
"regex-syntax",
217-
"regex-automata",
218-
"indexmap",
219-
# "hermit-abi",
220-
# "rustls-native-certs",
221-
"hashbrown",
222-
"thiserror", # until every dependency use thiserror 2
223-
"thiserror-impl",
209+
#"ansi_term@0.11.0",
210+
#{ crate = "ansi_term@0.11.0", reason = "you can specify a reason why it can't be updated/removed" },
211+
"axum@0.7", # tonic depend on axum 0.7
212+
"axum-core@0.4", # tonic depend on axum 0.7
213+
"matchit@0.7", # tonic depend on axum 0.7
214+
"tower@0.4", # axum 0.7 use tower 0.5, but hyper still use 0.4
215+
# "sync_wrapper", # axum direct and transive dependency use multiple version
216+
"regex-syntax",
217+
"regex-automata",
218+
"indexmap",
219+
# "hermit-abi",
220+
# "rustls-native-certs",
221+
"hashbrown",
222+
"thiserror", # until every dependency use thiserror 2
223+
"thiserror-impl",
224+
"getrandom",
225+
"wasi",
224226
]
225227
# Similarly to `skip` allows you to skip certain crates during duplicate
226228
# detection. Unlike skip, it also includes the entire tree of transitive
227229
# dependencies starting at the specified crate, up to a certain depth, which is
228230
# by default infinite.
229231
skip-tree = [
230-
#"ansi_term@0.11.0", # will be skipped along with _all_ of its direct and transitive dependencies
231-
#{ crate = "ansi_term@0.11.0", depth = 20 },
232-
"windows-targets",
233-
"windows-sys",
234-
"async-std",
232+
#"ansi_term@0.11.0", # will be skipped along with _all_ of its direct and transitive dependencies
233+
#{ crate = "ansi_term@0.11.0", depth = 20 },
234+
"windows-targets",
235+
"windows-sys",
236+
"async-std",
235237
]
236238

237239
# This section is considered when running `cargo deny check sources`.

0 commit comments

Comments
 (0)