1- # When creating the dependency graph used as the source of truth when checks are
2- # executed, this field can be used to prune crates from the graph, removing them
3- # from the view of cargo-deny. This is an extremely heavy hammer, as if a crate
4- # is pruned from the graph, all of its dependencies will also be pruned unless
5- # they are connected to another crate in the graph that hasn't been pruned,
6- # so it should be used with care. The identifiers are [Package ID Specifications]
7- # (https://doc.rust-lang.org/cargo/reference/pkgid-spec.html)
8- # exclude = []
9-
10- # If true, metadata will be collected with `--all-features`. Note that this can't
11- # be toggled off if true, if you want to conditionally enable `--all-features` it
12- # is recommended to pass `--all-features` on the cmd line instead
13- all-features = false
14-
15- # If true, metadata will be collected with `--no-default-features`. The same
16- # caveat with `all-features` applies
17- no-default-features = false
18-
19- # If set, these feature will be enabled when collecting metadata. If `--features`
20- # is specified on the cmd line they will take precedence over this option.
21- # features = []
22-
23- # When outputting inclusion graphs in diagnostics that include features, this
24- # option can be used to specify the depth at which feature edges will be added.
25- # This option is included since the graphs can be quite large and the addition
26- # of features from the crate(s) to all of the graph roots can be far too verbose.
27- # This option can be overridden via `--feature-depth` on the cmd line
28- feature-depth = 1
29-
30- # This section is considered when running `cargo deny check advisories`
31- # More documentation for the advisories section can be found here:
32- # https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html
331[advisories ]
34-
35- # The path where the advisory database is cloned/fetched into
2+ version = 2
363db-path = " ~/.cargo/advisory-db"
37-
38- # The url(s) of the advisory databases to use
394db-urls = [" https://github.com/rustsec/advisory-db" ]
40-
41- # The lint level for security vulnerabilities
42- vulnerability = " deny"
43-
44- # The lint level for unmaintained crates
45- unmaintained = " warn"
46-
47- # The lint level for crates that have been yanked from their source registry
48- yanked = " warn"
49-
50- # The lint level for crates with security notices. Note that as of
51- # 2019-12-17 there are no security notice advisories in
52- # https://github.com/rustsec/advisory-db
53- notice = " warn"
54-
55- # A list of advisory IDs to ignore. Note that ignored advisories will still
56- # output a note when they are encountered.
575ignore = [
586 # "RUSTSEC-0000-0000",
597]
608
61- # This section is considered when running `cargo deny check licenses`
62- # More documentation for the licenses section can be found here:
63- # https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
649[licenses ]
65-
66- # The lint level for crates which do not have a detectable license
67- unlicensed = " deny"
68-
69- # List of explicitly allowed licenses
70- # See https://spdx.org/licenses/ for list of possible licenses
71- # [possible values: any SPDX 3.11 short identifier (+ optional exception)].
10+ version = 2
7211allow = [
7312 " MIT" ,
13+ " BSD-3-Clause" ,
7414 " Apache-2.0" ,
7515 " Unicode-DFS-2016" , # used by unicode-ident
7616]
7717
78- # List of explicitly disallowed licenses
79- # See https://spdx.org/licenses/ for list of possible licenses
80- # [possible values: any SPDX 3.11 short identifier (+ optional exception)].
81- deny = [
82- # "Nokia",
83- ]
84-
85- # Lint level for licenses considered copyleft
86- copyleft = " deny"
87-
88- # Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
89- # * both - The license will be approved if it is both OSI-approved *AND* FSF
90- # * either - The license will be approved if it is either OSI-approved *OR* FSF
91- # * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF
92- # * fsf-only - The license will be approved if is FSF *AND NOT* OSI-approved
93- # * neither - This predicate is ignored and the default lint level is used
94- allow-osi-fsf-free = " neither"
95-
96- # Lint level used when no other predicates are matched
97- # 1. License isn't in the allow or deny lists
98- # 2. License isn't copyleft
99- # 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
100- default = " deny"
101-
102- # This section is considered when running `cargo deny check bans`.
103- # More documentation about the 'bans' section can be found here:
104- # https://embarkstudios.github.io/cargo-deny/checks/bans/cfg.html
10518[bans ]
106-
107- # Certain crates/versions that will be skipped when doing duplicate detection.
10819skip = [
109- { name = " syn" , version = " 1.0.0" },
11020 { name = " syn" , version = " 2.0.0" },
11121 { name = " windows_x86_64_msvc" , version = " *" },
11222 { name = " windows_x86_64_gnu" , version = " *" },
@@ -120,22 +30,11 @@ skip = [
12030 # { name = "ansi_term", version = "=0.11.0" },
12131]
12232
123- # This section is considered when running `cargo deny check sources`.
124- # More documentation about the 'sources' section can be found here:
125- # https://embarkstudios.github.io/cargo-deny/checks/sources/cfg.html
12633[sources ]
127-
128- # Lint level for what to happen when a crate from a crate registry that is not
129- # in the allow list is encountered
130- unknown-registry = " warn"
131-
132- # Lint level for what to happen when a crate from a git repository that is not
133- # in the allow list is encountered
134- unknown-git = " warn"
135-
136- # List of URLs for allowed crate registries. Defaults to the crates.io index
137- # if not specified. If it is specified but empty, no registries are allowed.
34+ unknown-registry = " deny"
35+ unknown-git = " deny"
13836allow-registry = [" https://github.com/rust-lang/crates.io-index" ]
139-
140- # List of URLs for allowed Git repositories
14137allow-git = []
38+
39+ [output ]
40+ feature-depth = 1
0 commit comments