@@ -36,19 +36,25 @@ db-path = "~/.cargo/advisory-db"
3636# The url(s) of the advisory databases to use
3737db-urls = [" https://github.com/rustsec/advisory-db" ]
3838# The lint level for security vulnerabilities
39- vulnerability = " deny"
39+ # vulnerability = "deny"
4040# The lint level for unmaintained crates
41- unmaintained = " warn"
41+ # unmaintained = "warn"
4242# The lint level for crates that have been yanked from their source registry
43- yanked = " deny"
43+ # yanked = "deny"
4444# The lint level for crates with security notices. Note that as of
4545# 2019-12-17 there are no security notice advisories in
4646# https://github.com/rustsec/advisory-db
47- notice = " warn"
47+ # notice = "warn"
4848# A list of advisory IDs to ignore. Note that ignored advisories will still
4949# output a note when they are encountered.
5050ignore = [
51- " RUSTSEC-2020-0071" # time 0.1 w/ chrono
51+ " RUSTSEC-2021-0145" , # atty on windows only
52+ " RUSTSEC-2023-0071" , # Impacts rsa crate, which is only used in dev, see
53+ # https://github.com/RustCrypto/RSA/pull/394 for remediation
54+ " RUSTSEC-2024-0336" , # Ignore a DOS issue w/ rustls-0.20.9. This will go
55+ # away when we update opentelemetry-otlp soon.
56+ { id = " RUSTSEC-2020-0168" , reason = " Not planning to force upgrade to mach2 yet" },
57+ { id = " RUSTSEC-2024-0320" , reason = " Not planning to force upgrade to rust-yaml2 yet" },
5258]
5359# Threshold for security vulnerabilities, any vulnerability with a CVSS score
5460# lower than the range specified will be ignored. Note that ignored advisories
@@ -65,7 +71,7 @@ ignore = [
6571# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
6672[licenses ]
6773# The lint level for crates which do not have a detectable license
68- unlicensed = " warn"
74+ # unlicensed = "warn"
6975# List of explicitly allowed licenses
7076# See https://spdx.org/licenses/ for list of possible licenses
7177# [possible values: any SPDX 3.7 short identifier (+ optional exception)].
@@ -81,23 +87,23 @@ allow = [
8187# List of explicitly disallowed licenses
8288# See https://spdx.org/licenses/ for list of possible licenses
8389# [possible values: any SPDX 3.7 short identifier (+ optional exception)].
84- deny = [
90+ # deny = [
8591 # "Nokia",
86- ]
92+ # ]
8793# Lint level for licenses considered copyleft
88- copyleft = " deny"
94+ # copyleft = "deny"
8995# Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
9096# * both - The license will be approved if it is both OSI-approved *AND* FSF
9197# * either - The license will be approved if it is either OSI-approved *OR* FSF
9298# * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF
9399# * fsf-only - The license will be approved if is FSF *AND NOT* OSI-approved
94100# * neither - This predicate is ignored and the default lint level is used
95- allow-osi-fsf-free = " neither"
101+ # allow-osi-fsf-free = "neither"
96102# Lint level used when no other predicates are matched
97103# 1. License isn't in the allow or deny lists
98104# 2. License isn't copyleft
99105# 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
100- default = " deny"
106+ # default = "deny"
101107# The confidence threshold for detecting a license from license text.
102108# The higher the value, the more closely the license text must be to the
103109# canonical license text of a valid SPDX license file.
@@ -111,27 +117,18 @@ exceptions = [
111117 # included in the application. We do not distribute those data files so
112118 # this is not a problem for us. See https://github.com/dtolnay/unicode-ident/pull/9/files
113119 { allow = [" Unicode-DFS-2016" ], name = " unicode-ident" , version = " *" },
120+ { allow = [" OpenSSL" ], name = " ring" , version = " *" },
114121]
115122
116123# Some crates don't have (easily) machine readable licensing information,
117124# adding a clarification entry for it allows you to manually specify the
118125# licensing information
119- # [[licenses.clarify]]
120- # The name of the crate the clarification applies to
121- # name = "ring"
122- # The optional version constraint for the crate
123- # version = "*"
124- # The SPDX expression for the license requirements of the crate
125- # expression = "MIT AND ISC AND OpenSSL"
126- # One or more files in the crate's source used as the "source of truth" for
127- # the license expression. If the contents match, the clarification will be used
128- # when running the license check, otherwise the clarification will be ignored
129- # and the crate will be checked normally, which may produce warnings or errors
130- # depending on the rest of your configuration
131- # license-files = [
132- # Each entry is a crate relative path, and the (opaque) hash of its contents
133- # { path = "LICENSE", hash = 0xbd0eed23 }
134- # ]
126+ [[licenses .clarify ]]
127+ name = " ring"
128+ expression = " MIT AND ISC AND OpenSSL"
129+ license-files = [
130+ { path = " LICENSE" , hash = 0xbd0eed23 }
131+ ]
135132
136133[licenses .private ]
137134# If true, ignores workspace crates that aren't published, or are only
0 commit comments