17
17
# this list would mean the nix crate, as well as any of its exclusive
18
18
# dependencies not shared by any other crates, would be ignored, as the target
19
19
# list here is effectively saying which targets you are building for.
20
+ [graph ]
20
21
targets = []
21
22
22
23
# This section is considered when running `cargo deny check advisories`
@@ -27,39 +28,24 @@ targets = []
27
28
db-path = " ~/.cargo/advisory-db"
28
29
# The url(s) of the advisory databases to use
29
30
db-urls = [" https://github.com/rustsec/advisory-db" ]
30
- # The lint level for security vulnerabilities
31
- vulnerability = " deny"
32
31
# The lint level for unmaintained crates
33
- unmaintained = " warn "
32
+ unmaintained = " workspace "
34
33
# The lint level for crates that have been yanked from their source registry
35
34
yanked = " warn"
36
- # The lint level for crates with security notices. Note that as of
37
- # 2019-12-17 there are no security notice advisories in
38
- # https://github.com/rustsec/advisory-db
39
- notice = " warn"
40
35
# A list of advisory IDs to ignore. Note that ignored advisories will still
41
36
# output a note when they are encountered.
42
37
ignore = [
43
38
# "RUSTSEC-0000-0000",
44
39
" RUSTSEC-2020-0071" ,
45
40
" RUSTSEC-2020-0159" ,
41
+ " RUSTSEC-2021-0139" , # unmaintained: ansi_term 0.12.1
42
+ " RUSTSEC-2020-0095" , # unmaintained: difference 2.0.0
46
43
]
47
- # Threshold for security vulnerabilities, any vulnerability with a CVSS score
48
- # lower than the range specified will be ignored. Note that ignored advisories
49
- # will still output a note when they are encountered.
50
- # * None - CVSS Score 0.0
51
- # * Low - CVSS Score 0.1 - 3.9
52
- # * Medium - CVSS Score 4.0 - 6.9
53
- # * High - CVSS Score 7.0 - 8.9
54
- # * Critical - CVSS Score 9.0 - 10.0
55
- # severity-threshold =
56
44
57
45
# This section is considered when running `cargo deny check licenses`
58
46
# More documentation for the licenses section can be found here:
59
47
# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
60
48
[licenses ]
61
- # The lint level for crates which do not have a detectable license
62
- unlicensed = " deny"
63
49
# List of explictly allowed licenses
64
50
# See https://spdx.org/licenses/ for list of possible licenses
65
51
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
@@ -80,24 +66,6 @@ allow = [
80
66
" BSL-1.0" , # xxhash-rust
81
67
" Unicode-3.0" ,
82
68
]
83
- # List of explictly disallowed licenses
84
- # See https://spdx.org/licenses/ for list of possible licenses
85
- # [possible values: any SPDX 3.11 short identifier (+ optional exception)].
86
- deny = []
87
- # Lint level for licenses considered copyleft
88
- copyleft = " deny"
89
- # Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
90
- # * both - The license will be approved if it is both OSI-approved *AND* FSF
91
- # * either - The license will be approved if it is either OSI-approved *OR* FSF
92
- # * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF
93
- # * fsf-only - The license will be approved if is FSF *AND NOT* OSI-approved
94
- # * neither - This predicate is ignored and the default lint level is used
95
- allow-osi-fsf-free = " neither"
96
- # Lint level used when no other predicates are matched
97
- # 1. License isn't in the allow or deny lists
98
- # 2. License isn't copyleft
99
- # 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
100
- default = " deny"
101
69
# The confidence threshold for detecting a license from license text.
102
70
# The higher the value, the more closely the license text must be to the
103
71
# canonical license text of a valid SPDX license file.
0 commit comments