2323# dependencies not shared by any other crates, would be ignored, as the target
2424# list here is effectively saying which targets you are building for.
2525targets = [
26- # The triple can be any string, but only the target triples built in to
27- # rustc (as of 1.40) can be checked against actual config expressions
28- # "x86_64-unknown-linux-musl",
29- # You can also specify which target_features you promise are enabled for a
30- # particular target. target_features are currently not validated against
31- # the actual valid features supported by the target architecture.
32- # { triple = "wasm32-unknown-unknown", features = ["atomics"] },
26+ # The triple can be any string, but only the target triples built in to
27+ # rustc (as of 1.40) can be checked against actual config expressions
28+ # "x86_64-unknown-linux-musl",
29+ # You can also specify which target_features you promise are enabled for a
30+ # particular target. target_features are currently not validated against
31+ # the actual valid features supported by the target architecture.
32+ # { triple = "wasm32-unknown-unknown", features = ["atomics"] },
3333]
3434# When creating the dependency graph used as the source of truth when checks are
3535# executed, this field can be used to prune crates from the graph, removing them
@@ -70,10 +70,10 @@ feature-depth = 1
7070# A list of advisory IDs to ignore. Note that ignored advisories will still
7171# output a note when they are encountered.
7272ignore = [
73- # "RUSTSEC-0000-0000",
74- # { id = "RUSTSEC-0000-0000", reason = "you can specify a reason the advisory is ignored" },
75- # "a-crate-that-is-yanked@0.1.1", # you can also ignore yanked crate versions if you wish
76- # { crate = "a-crate-that-is-yanked@0.1.1", reason = "you can specify why you are ignoring the yanked crate" },
73+ # "RUSTSEC-0000-0000",
74+ # { id = "RUSTSEC-0000-0000", reason = "you can specify a reason the advisory is ignored" },
75+ # "a-crate-that-is-yanked@0.1.1", # you can also ignore yanked crate versions if you wish
76+ # { crate = "a-crate-that-is-yanked@0.1.1", reason = "you can specify why you are ignoring the yanked crate" },
7777]
7878# If this is true, then cargo deny will use the git executable to fetch advisory database.
7979# If this is false, then it uses a built-in git library.
@@ -89,17 +89,17 @@ ignore = [
8989# See https://spdx.org/licenses/ for list of possible licenses
9090# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
9191allow = [
92- " Apache-2.0" ,
93- " Apache-2.0 WITH LLVM-exception" ,
94- " BSD-2-Clause" ,
95- " BSD-3-Clause" ,
96- " CC0-1.0" ,
97- " ISC" ,
98- " MIT" ,
99- " OpenSSL" ,
100- " Unicode-3.0" ,
101- # "Unicode-DFS-2016",
102- " Unlicense" ,
92+ " Apache-2.0" ,
93+ " Apache-2.0 WITH LLVM-exception" ,
94+ " BSD-2-Clause" ,
95+ " BSD-3-Clause" ,
96+ " CC0-1.0" ,
97+ " ISC" ,
98+ " MIT" ,
99+ " OpenSSL" ,
100+ " Unicode-3.0" ,
101+ # "Unicode-DFS-2016",
102+ " Unlicense" ,
103103]
104104# The confidence threshold for detecting a license from license text.
105105# The higher the value, the more closely the license text must be to the
@@ -109,9 +109,9 @@ confidence-threshold = 0.8
109109# Allow 1 or more licenses on a per-crate basis, so that particular licenses
110110# aren't accepted for every possible crate as with the normal allow list
111111exceptions = [
112- # Each entry is the crate and version constraint, and its specific allow
113- # list
114- # { allow = ["Zlib"], crate = "adler32" },
112+ # Each entry is the crate and version constraint, and its specific allow
113+ # list
114+ # { allow = ["Zlib"], crate = "adler32" },
115115]
116116
117117# Some crates don't have (easily) machine readable licensing information,
@@ -123,8 +123,8 @@ crate = "ring"
123123# The SPDX expression for the license requirements of the crate
124124expression = " MIT AND ISC AND OpenSSL"
125125license-files = [
126- # Each entry is a crate relative path, and the (opaque) hash of its contents
127- { path = " LICENSE" , hash = 0xbd0eed23 },
126+ # Each entry is a crate relative path, and the (opaque) hash of its contents
127+ { path = " LICENSE" , hash = 0xbd0eed23 },
128128]
129129
130130[licenses .private ]
@@ -142,7 +142,7 @@ ignore = false
142142# is only published to private registries, and ignore is true, the crate will
143143# not have its license(s) checked
144144registries = [
145- # "https://sekretz.com/registry
145+ # "https://sekretz.com/registry
146146]
147147
148148# This section is considered when running `cargo deny check bans`.
@@ -169,16 +169,16 @@ workspace-default-features = "allow"
169169external-default-features = " allow"
170170# List of crates that are allowed. Use with care!
171171allow = [
172- # "ansi_term@0.11.0",
173- # { crate = "ansi_term@0.11.0", reason = "you can specify a reason it is allowed" },
172+ # "ansi_term@0.11.0",
173+ # { crate = "ansi_term@0.11.0", reason = "you can specify a reason it is allowed" },
174174]
175175# List of crates to deny
176176deny = [
177- # "ansi_term@0.11.0",
178- # { crate = "ansi_term@0.11.0", reason = "you can specify a reason it is banned" },
179- # Wrapper crates can optionally be specified to allow the crate when it
180- # is a direct dependency of the otherwise banned crate
181- # { crate = "ansi_term@0.11.0", wrappers = ["this-crate-directly-depends-on-ansi_term"] },
177+ # "ansi_term@0.11.0",
178+ # { crate = "ansi_term@0.11.0", reason = "you can specify a reason it is banned" },
179+ # Wrapper crates can optionally be specified to allow the crate when it
180+ # is a direct dependency of the otherwise banned crate
181+ # { crate = "ansi_term@0.11.0", wrappers = ["this-crate-directly-depends-on-ansi_term"] },
182182]
183183
184184# List of features to allow/deny
@@ -206,32 +206,34 @@ deny = [
206206
207207# Certain crates/versions that will be skipped when doing duplicate detection.
208208skip = [
209- # "ansi_term@0.11.0",
210- # { crate = "ansi_term@0.11.0", reason = "you can specify a reason why it can't be updated/removed" },
211- " axum@0.7" , # tonic depend on axum 0.7
212- " axum-core@0.4" , # tonic depend on axum 0.7
213- " matchit@0.7" , # tonic depend on axum 0.7
214- " tower@0.4" , # axum 0.7 use tower 0.5, but hyper still use 0.4
215- # "sync_wrapper", # axum direct and transive dependency use multiple version
216- " regex-syntax" ,
217- " regex-automata" ,
218- " indexmap" ,
219- # "hermit-abi",
220- # "rustls-native-certs",
221- " hashbrown" ,
222- " thiserror" , # until every dependency use thiserror 2
223- " thiserror-impl" ,
209+ # "ansi_term@0.11.0",
210+ # { crate = "ansi_term@0.11.0", reason = "you can specify a reason why it can't be updated/removed" },
211+ " axum@0.7" , # tonic depend on axum 0.7
212+ " axum-core@0.4" , # tonic depend on axum 0.7
213+ " matchit@0.7" , # tonic depend on axum 0.7
214+ " tower@0.4" , # axum 0.7 use tower 0.5, but hyper still use 0.4
215+ # "sync_wrapper", # axum direct and transive dependency use multiple version
216+ " regex-syntax" ,
217+ " regex-automata" ,
218+ " indexmap" ,
219+ # "hermit-abi",
220+ # "rustls-native-certs",
221+ " hashbrown" ,
222+ " thiserror" , # until every dependency use thiserror 2
223+ " thiserror-impl" ,
224+ " getrandom" ,
225+ " wasi" ,
224226]
225227# Similarly to `skip` allows you to skip certain crates during duplicate
226228# detection. Unlike skip, it also includes the entire tree of transitive
227229# dependencies starting at the specified crate, up to a certain depth, which is
228230# by default infinite.
229231skip-tree = [
230- # "ansi_term@0.11.0", # will be skipped along with _all_ of its direct and transitive dependencies
231- # { crate = "ansi_term@0.11.0", depth = 20 },
232- " windows-targets" ,
233- " windows-sys" ,
234- " async-std" ,
232+ # "ansi_term@0.11.0", # will be skipped along with _all_ of its direct and transitive dependencies
233+ # { crate = "ansi_term@0.11.0", depth = 20 },
234+ " windows-targets" ,
235+ " windows-sys" ,
236+ " async-std" ,
235237]
236238
237239# This section is considered when running `cargo deny check sources`.
0 commit comments