| 
 | 1 | +# This template contains all of the possible sections and their default values  | 
 | 2 | + | 
 | 3 | +# Note that all fields that take a lint level have these possible values:  | 
 | 4 | +# * deny - An error will be produced and the check will fail  | 
 | 5 | +# * warn - A warning will be produced, but the check will not fail  | 
 | 6 | +# * allow - No warning or error will be produced, though in some cases a note  | 
 | 7 | +# will be  | 
 | 8 | + | 
 | 9 | +# The values provided in this template are the default values that will be used  | 
 | 10 | +# when any section or field is not specified in your own configuration  | 
 | 11 | + | 
 | 12 | +# Root options  | 
 | 13 | + | 
 | 14 | +# The graph table configures how the dependency graph is constructed and thus  | 
 | 15 | +# which crates the checks are performed against  | 
 | 16 | +[graph]  | 
 | 17 | +# If 1 or more target triples (and optionally, target_features) are specified,  | 
 | 18 | +# only the specified targets will be checked when running `cargo deny check`.  | 
 | 19 | +# This means, if a particular package is only ever used as a target specific  | 
 | 20 | +# dependency, such as, for example, the `nix` crate only being used via the  | 
 | 21 | +# `target_family = "unix"` configuration, that only having windows targets in  | 
 | 22 | +# this list would mean the nix crate, as well as any of its exclusive  | 
 | 23 | +# dependencies not shared by any other crates, would be ignored, as the target  | 
 | 24 | +# list here is effectively saying which targets you are building for.  | 
 | 25 | +targets = [  | 
 | 26 | +    # The triple can be any string, but only the target triples built in to  | 
 | 27 | +    # rustc (as of 1.40) can be checked against actual config expressions  | 
 | 28 | +    #"x86_64-unknown-linux-musl",  | 
 | 29 | +    # You can also specify which target_features you promise are enabled for a  | 
 | 30 | +    # particular target. target_features are currently not validated against  | 
 | 31 | +    # the actual valid features supported by the target architecture.  | 
 | 32 | +    #{ triple = "wasm32-unknown-unknown", features = ["atomics"] },  | 
 | 33 | +]  | 
 | 34 | +# When creating the dependency graph used as the source of truth when checks are  | 
 | 35 | +# executed, this field can be used to prune crates from the graph, removing them  | 
 | 36 | +# from the view of cargo-deny. This is an extremely heavy hammer, as if a crate  | 
 | 37 | +# is pruned from the graph, all of its dependencies will also be pruned unless  | 
 | 38 | +# they are connected to another crate in the graph that hasn't been pruned,  | 
 | 39 | +# so it should be used with care. The identifiers are [Package ID Specifications]  | 
 | 40 | +# (https://doc.rust-lang.org/cargo/reference/pkgid-spec.html)  | 
 | 41 | +#exclude = []  | 
 | 42 | +# If true, metadata will be collected with `--all-features`. Note that this can't  | 
 | 43 | +# be toggled off if true, if you want to conditionally enable `--all-features` it  | 
 | 44 | +# is recommended to pass `--all-features` on the cmd line instead  | 
 | 45 | +all-features = false  | 
 | 46 | +# If true, metadata will be collected with `--no-default-features`. The same  | 
 | 47 | +# caveat with `all-features` applies  | 
 | 48 | +no-default-features = false  | 
 | 49 | +# If set, these feature will be enabled when collecting metadata. If `--features`  | 
 | 50 | +# is specified on the cmd line they will take precedence over this option.  | 
 | 51 | +#features = []  | 
 | 52 | + | 
 | 53 | +# The output table provides options for how/if diagnostics are outputted  | 
 | 54 | +[output]  | 
 | 55 | +# When outputting inclusion graphs in diagnostics that include features, this  | 
 | 56 | +# option can be used to specify the depth at which feature edges will be added.  | 
 | 57 | +# This option is included since the graphs can be quite large and the addition  | 
 | 58 | +# of features from the crate(s) to all of the graph roots can be far too verbose.  | 
 | 59 | +# This option can be overridden via `--feature-depth` on the cmd line  | 
 | 60 | +feature-depth = 1  | 
 | 61 | + | 
 | 62 | +# This section is considered when running `cargo deny check advisories`  | 
 | 63 | +# More documentation for the advisories section can be found here:  | 
 | 64 | +# https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html  | 
 | 65 | +[advisories]  | 
 | 66 | +# The path where the advisory databases are cloned/fetched into  | 
 | 67 | +#db-path = "$CARGO_HOME/advisory-dbs"  | 
 | 68 | +# The url(s) of the advisory databases to use  | 
 | 69 | +#db-urls = ["https://github.com/rustsec/advisory-db"]  | 
 | 70 | +# A list of advisory IDs to ignore. Note that ignored advisories will still  | 
 | 71 | +# output a note when they are encountered.  | 
 | 72 | +ignore = [  | 
 | 73 | +    #"RUSTSEC-0000-0000",  | 
 | 74 | +    #{ id = "RUSTSEC-0000-0000", reason = "you can specify a reason the advisory is ignored" },  | 
 | 75 | +    #"[email protected]", # you can also ignore yanked crate versions if you wish  | 
 | 76 | +    #{ crate = "[email protected]", reason = "you can specify why you are ignoring the yanked crate" },  | 
 | 77 | +]  | 
 | 78 | +# If this is true, then cargo deny will use the git executable to fetch advisory database.  | 
 | 79 | +# If this is false, then it uses a built-in git library.  | 
 | 80 | +# Setting this to true can be helpful if you have special authentication requirements that cargo-deny does not support.  | 
 | 81 | +# See Git Authentication for more information about setting up git authentication.  | 
 | 82 | +#git-fetch-with-cli = true  | 
 | 83 | + | 
 | 84 | +# This section is considered when running `cargo deny check licenses`  | 
 | 85 | +# More documentation for the licenses section can be found here:  | 
 | 86 | +# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html  | 
 | 87 | +[licenses]  | 
 | 88 | +# List of explicitly allowed licenses  | 
 | 89 | +# See https://spdx.org/licenses/ for list of possible licenses  | 
 | 90 | +# [possible values: any SPDX 3.11 short identifier (+ optional exception)].  | 
 | 91 | +allow = [  | 
 | 92 | +    "MIT",  | 
 | 93 | +    "Apache-2.0",  | 
 | 94 | +    "MPL-2.0",  | 
 | 95 | +    "ISC",  | 
 | 96 | +    "Unicode-DFS-2016",  | 
 | 97 | +    "BSD-3-Clause",  | 
 | 98 | +    "LicenseRef-ring",  | 
 | 99 | +    #"Apache-2.0 WITH LLVM-exception",  | 
 | 100 | +]  | 
 | 101 | +# The confidence threshold for detecting a license from license text.  | 
 | 102 | +# The higher the value, the more closely the license text must be to the  | 
 | 103 | +# canonical license text of a valid SPDX license file.  | 
 | 104 | +# [possible values: any between 0.0 and 1.0].  | 
 | 105 | +confidence-threshold = 0.8  | 
 | 106 | +# Allow 1 or more licenses on a per-crate basis, so that particular licenses  | 
 | 107 | +# aren't accepted for every possible crate as with the normal allow list  | 
 | 108 | +exceptions = [  | 
 | 109 | +    # Each entry is the crate and version constraint, and its specific allow  | 
 | 110 | +    # list  | 
 | 111 | +    #{ allow = ["Zlib"], crate = "adler32" },  | 
 | 112 | +]  | 
 | 113 | + | 
 | 114 | +# Some crates don't have (easily) machine readable licensing information,  | 
 | 115 | +# adding a clarification entry for it allows you to manually specify the  | 
 | 116 | +# licensing information  | 
 | 117 | +[[licenses.clarify]]  | 
 | 118 | +# The package spec the clarification applies to  | 
 | 119 | +crate = "ring"  | 
 | 120 | +# The SPDX expression for the license requirements of the crate  | 
 | 121 | +expression = "LicenseRef-ring"  | 
 | 122 | +# One or more files in the crate's source used as the "source of truth" for  | 
 | 123 | +# the license expression. If the contents match, the clarification will be used  | 
 | 124 | +# when running the license check, otherwise the clarification will be ignored  | 
 | 125 | +# and the crate will be checked normally, which may produce warnings or errors  | 
 | 126 | +# depending on the rest of your configuration  | 
 | 127 | +license-files = [  | 
 | 128 | +# Each entry is a crate relative path, and the (opaque) hash of its contents  | 
 | 129 | +{ path = "LICENSE", hash = 0xbd0eed23 }  | 
 | 130 | +]  | 
 | 131 | + | 
 | 132 | +[licenses.private]  | 
 | 133 | +# If true, ignores workspace crates that aren't published, or are only  | 
 | 134 | +# published to private registries.  | 
 | 135 | +# To see how to mark a crate as unpublished (to the official registry),  | 
 | 136 | +# visit https://doc.rust-lang.org/cargo/reference/manifest.html#the-publish-field.  | 
 | 137 | +ignore = false  | 
 | 138 | +# One or more private registries that you might publish crates to, if a crate  | 
 | 139 | +# is only published to private registries, and ignore is true, the crate will  | 
 | 140 | +# not have its license(s) checked  | 
 | 141 | +registries = [  | 
 | 142 | +    #"https://sekretz.com/registry  | 
 | 143 | +]  | 
 | 144 | + | 
 | 145 | +# This section is considered when running `cargo deny check bans`.  | 
 | 146 | +# More documentation about the 'bans' section can be found here:  | 
 | 147 | +# https://embarkstudios.github.io/cargo-deny/checks/bans/cfg.html  | 
 | 148 | +[bans]  | 
 | 149 | +# Lint level for when multiple versions of the same crate are detected  | 
 | 150 | +multiple-versions = "warn"  | 
 | 151 | +# Lint level for when a crate version requirement is `*`  | 
 | 152 | +wildcards = "allow"  | 
 | 153 | +# The graph highlighting used when creating dotgraphs for crates  | 
 | 154 | +# with multiple versions  | 
 | 155 | +# * lowest-version - The path to the lowest versioned duplicate is highlighted  | 
 | 156 | +# * simplest-path - The path to the version with the fewest edges is highlighted  | 
 | 157 | +# * all - Both lowest-version and simplest-path are used  | 
 | 158 | +highlight = "all"  | 
 | 159 | +# The default lint level for `default` features for crates that are members of  | 
 | 160 | +# the workspace that is being checked. This can be overridden by allowing/denying  | 
 | 161 | +# `default` on a crate-by-crate basis if desired.  | 
 | 162 | +workspace-default-features = "allow"  | 
 | 163 | +# The default lint level for `default` features for external crates that are not  | 
 | 164 | +# members of the workspace. This can be overridden by allowing/denying `default`  | 
 | 165 | +# on a crate-by-crate basis if desired.  | 
 | 166 | +external-default-features = "allow"  | 
 | 167 | +# List of crates that are allowed. Use with care!  | 
 | 168 | +allow = [  | 
 | 169 | + | 
 | 170 | +    #{ crate = "[email protected]", reason = "you can specify a reason it is allowed" },  | 
 | 171 | +]  | 
 | 172 | +# List of crates to deny  | 
 | 173 | +deny = [  | 
 | 174 | + | 
 | 175 | +    #{ crate = "[email protected]", reason = "you can specify a reason it is banned" },  | 
 | 176 | +    # Wrapper crates can optionally be specified to allow the crate when it  | 
 | 177 | +    # is a direct dependency of the otherwise banned crate  | 
 | 178 | +    #{ crate = "[email protected]", wrappers = ["this-crate-directly-depends-on-ansi_term"] },  | 
 | 179 | +]  | 
 | 180 | + | 
 | 181 | +# List of features to allow/deny  | 
 | 182 | +# Each entry the name of a crate and a version range. If version is  | 
 | 183 | +# not specified, all versions will be matched.  | 
 | 184 | +#[[bans.features]]  | 
 | 185 | +#crate = "reqwest"  | 
 | 186 | +# Features to not allow  | 
 | 187 | +#deny = ["json"]  | 
 | 188 | +# Features to allow  | 
 | 189 | +#allow = [  | 
 | 190 | +#    "rustls",  | 
 | 191 | +#    "__rustls",  | 
 | 192 | +#    "__tls",  | 
 | 193 | +#    "hyper-rustls",  | 
 | 194 | +#    "rustls",  | 
 | 195 | +#    "rustls-pemfile",  | 
 | 196 | +#    "rustls-tls-webpki-roots",  | 
 | 197 | +#    "tokio-rustls",  | 
 | 198 | +#    "webpki-roots",  | 
 | 199 | +#]  | 
 | 200 | +# If true, the allowed features must exactly match the enabled feature set. If  | 
 | 201 | +# this is set there is no point setting `deny`  | 
 | 202 | +#exact = true  | 
 | 203 | + | 
 | 204 | +# Certain crates/versions that will be skipped when doing duplicate detection.  | 
 | 205 | +skip = [  | 
 | 206 | + | 
 | 207 | +    #{ crate = "[email protected]", reason = "you can specify a reason why it can't be updated/removed" },  | 
 | 208 | +]  | 
 | 209 | +# Similarly to `skip` allows you to skip certain crates during duplicate  | 
 | 210 | +# detection. Unlike skip, it also includes the entire tree of transitive  | 
 | 211 | +# dependencies starting at the specified crate, up to a certain depth, which is  | 
 | 212 | +# by default infinite.  | 
 | 213 | +skip-tree = [  | 
 | 214 | +    #"[email protected]", # will be skipped along with _all_ of its direct and transitive dependencies  | 
 | 215 | +    #{ crate = "[email protected]", depth = 20 },  | 
 | 216 | +]  | 
 | 217 | + | 
 | 218 | +# This section is considered when running `cargo deny check sources`.  | 
 | 219 | +# More documentation about the 'sources' section can be found here:  | 
 | 220 | +# https://embarkstudios.github.io/cargo-deny/checks/sources/cfg.html  | 
 | 221 | +[sources]  | 
 | 222 | +# Lint level for what to happen when a crate from a crate registry that is not  | 
 | 223 | +# in the allow list is encountered  | 
 | 224 | +unknown-registry = "warn"  | 
 | 225 | +# Lint level for what to happen when a crate from a git repository that is not  | 
 | 226 | +# in the allow list is encountered  | 
 | 227 | +unknown-git = "warn"  | 
 | 228 | +# List of URLs for allowed crate registries. Defaults to the crates.io index  | 
 | 229 | +# if not specified. If it is specified but empty, no registries are allowed.  | 
 | 230 | +allow-registry = ["https://github.com/rust-lang/crates.io-index"]  | 
 | 231 | +# List of URLs for allowed Git repositories  | 
 | 232 | +allow-git = []  | 
 | 233 | + | 
 | 234 | +[sources.allow-org]  | 
 | 235 | +# github.com organizations to allow git sources for  | 
 | 236 | +github = []  | 
 | 237 | +# gitlab.com organizations to allow git sources for  | 
 | 238 | +gitlab = []  | 
 | 239 | +# bitbucket.org organizations to allow git sources for  | 
 | 240 | +bitbucket = []  | 
0 commit comments