9
9
# The values provided in this template are the default values that will be used
10
10
# when any section or field is not specified in your own configuration
11
11
12
- # If 1 or more target triples (and optionally, target_features) are specified,
13
- # only the specified targets will be checked when running `cargo deny check`.
14
- # This means, if a particular package is only ever used as a target specific
15
- # dependency, such as, for example, the `nix` crate only being used via the
16
- # `target_family = "unix"` configuration, that only having windows targets in
17
- # this list would mean the nix crate, as well as any of its exclusive
18
- # dependencies not shared by any other crates, would be ignored, as the target
19
- # list here is effectively saying which targets you are building for.
20
- targets = [
21
- # The triple can be any string, but only the target triples built in to
22
- # rustc (as of 1.40) can be checked against actual config expressions
23
- # { triple = "x86_64-unknown-linux-musl" },
24
- # You can also specify which target_features you promise are enabled for a
25
- # particular target. target_features are currently not validated against
26
- # the actual valid features supported by the target architecture.
27
- # { triple = "wasm32-unknown-unknown", features = ["atomics"] },
28
- ]
29
-
30
12
# This section is considered when running `cargo deny check advisories`
31
13
# More documentation for the advisories section can be found here:
32
14
# https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html
@@ -35,35 +17,16 @@ targets = [
35
17
# db-path = "~/.cargo/advisory-db"
36
18
# The url(s) of the advisory databases to use
37
19
db-urls = [" https://github.com/rustsec/advisory-db" ]
38
- # The lint level for security vulnerabilities
39
- vulnerability = " deny"
40
- # The lint level for unmaintained crates
41
- unmaintained = " deny"
42
20
# The lint level for crates that have been yanked from their source registry
43
21
yanked = " deny"
44
- # The lint level for crates with security notices. Note that as of
45
- # 2019-12-17 there are no security notice advisories in
46
- # https://github.com/rustsec/advisory-db
47
- notice = " deny"
48
22
# A list of advisory IDs to ignore. Note that ignored advisories will still
49
23
# output a note when they are encountered.
50
24
ignore = []
51
- # Threshold for security vulnerabilities, any vulnerability with a CVSS score
52
- # lower than the range specified will be ignored. Note that ignored advisories
53
- # will still output a note when they are encountered.
54
- # * None - CVSS Score 0.0
55
- # * Low - CVSS Score 0.1 - 3.9
56
- # * Medium - CVSS Score 4.0 - 6.9
57
- # * High - CVSS Score 7.0 - 8.9
58
- # * Critical - CVSS Score 9.0 - 10.0
59
- # severity-threshold =
60
25
61
26
# This section is considered when running `cargo deny check licenses`
62
27
# More documentation for the licenses section can be found here:
63
28
# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
64
29
[licenses ]
65
- # The lint level for crates which do not have a detectable license
66
- unlicensed = " deny"
67
30
# List of explicitly allowed licenses
68
31
# See https://spdx.org/licenses/ for list of possible licenses
69
32
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
@@ -79,26 +42,6 @@ allow = [
79
42
" Unicode-DFS-2016" ,
80
43
" Unicode-3.0" ,
81
44
]
82
- # List of explicitly disallowed licenses
83
- # See https://spdx.org/licenses/ for list of possible licenses
84
- # [possible values: any SPDX 3.11 short identifier (+ optional exception)].
85
- deny = [
86
- # "Nokia",
87
- ]
88
- # Lint level for licenses considered copyleft
89
- copyleft = " deny"
90
- # Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
91
- # * both - The license will be approved if it is both OSI-approved *AND* FSF
92
- # * either - The license will be approved if it is either OSI-approved *OR* FSF
93
- # * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF
94
- # * fsf-only - The license will be approved if is FSF *AND NOT* OSI-approved
95
- # * neither - This predicate is ignored and the default lint level is used
96
- allow-osi-fsf-free = " neither"
97
- # Lint level used when no other predicates are matched
98
- # 1. License isn't in the allow or deny lists
99
- # 2. License isn't copyleft
100
- # 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
101
- default = " deny"
102
45
# The confidence threshold for detecting a license from license text.
103
46
# The higher the value, the more closely the license text must be to the
104
47
# canonical license text of a valid SPDX license file.
@@ -211,3 +154,22 @@ allow-git = [
211
154
# gitlab = [""]
212
155
# 1 or more bitbucket.org organizations to allow git sources for
213
156
# bitbucket = [""]
157
+
158
+ [graph ]
159
+ # If 1 or more target triples (and optionally, target_features) are specified,
160
+ # only the specified targets will be checked when running `cargo deny check`.
161
+ # This means, if a particular package is only ever used as a target specific
162
+ # dependency, such as, for example, the `nix` crate only being used via the
163
+ # `target_family = "unix"` configuration, that only having windows targets in
164
+ # this list would mean the nix crate, as well as any of its exclusive
165
+ # dependencies not shared by any other crates, would be ignored, as the target
166
+ # list here is effectively saying which targets you are building for.
167
+ targets = [
168
+ # The triple can be any string, but only the target triples built in to
169
+ # rustc (as of 1.40) can be checked against actual config expressions
170
+ # { triple = "x86_64-unknown-linux-musl" },
171
+ # You can also specify which target_features you promise are enabled for a
172
+ # particular target. target_features are currently not validated against
173
+ # the actual valid features supported by the target architecture.
174
+ # { triple = "wasm32-unknown-unknown", features = ["atomics"] },
175
+ ]
0 commit comments