1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
# This template contains all of the possible sections and their default values
# Note that all fields that take a lint level have these possible values:
# * deny - An error will be produced and the check will fail
# * warn - A warning will be produced, but the check will not fail
# * allow - No warning or error will be produced, though in some cases a note
# will be
# This section is considered when running `cargo deny check advisories`
# More documentation for the advisories section can be found here:
# https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html
[]
# The path where the advisory database is cloned/fetched into
= "~/.cargo/advisory-db"
# The url(s) of the advisory databases to use
= ["https://github.com/rustsec/advisory-db"]
# The lint level for security vulnerabilities
= "deny"
# The lint level for unmaintained crates
= "deny"
# The lint level for crates that have been yanked from their source registry
= "deny"
# The lint level for crates with security notices.
= "deny"
# A list of advisory IDs to ignore. Note that ignored advisories will still
# output a note when they are encountered.
= [
"RUSTSEC-2023-0018" # remove_dir_all is used by proptest, a dev dependency
]
# This section is considered when running `cargo deny check licenses`
# More documentation for the licenses section can be found here:
# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
[]
= "deny"
= ["Apache-2.0", "Apache-2.0 WITH LLVM-exception", "BSD-2-Clause", "BSD-3-Clause", "MIT", "Unicode-DFS-2016"]
# List of explictly disallowed licenses
# See https://spdx.org/licenses/ for list of possible licenses
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
= []
# Lint level for licenses considered copyleft
= "deny"
# Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
# * both - The license will be approved if it is both OSI-approved *AND* FSF
# * either - The license will be approved if it is either OSI-approved *OR* FSF
# * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF
# * fsf-only - The license will be approved if is FSF *AND NOT* OSI-approved
# * neither - This predicate is ignored and the default lint level is used
= "neither"
# Lint level used when no other predicates are matched
# 1. License isn't in the allow or deny lists
# 2. License isn't copyleft
# 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
= "deny"
# The confidence threshold for detecting a license from license text.
# The higher the value, the more closely the license text must be to the
# canonical license text of a valid SPDX license file.
# [possible values: any between 0.0 and 1.0].
= 0.8
[]
# If true, ignores workspace crates that aren't published, or are only
# published to private registries
= true
# This section is considered when running `cargo deny check bans`.
# More documentation about the 'bans' section can be found here:
# https://embarkstudios.github.io/cargo-deny/checks/bans/cfg.html
[]
= "deny"
= "deny"
= "all"
= [
{ = "syn", = "*", = 5 }, # Used in both serde_derive and proptest-derive
{ = "quick-error", = "*" }, # proptest relies on two versions of this
{ = "itoa", = "*" }, # various dependencies rely on two versions of this
{ = "hermit-abi", = "*" }, # various dependencies rely on two versions of this
{ = "memoffset", = "*" }, # various dependencies rely on two versions of this
{ = "windows-sys", = "*" }, # various dependencies rely on two versions of this
]
# This section is considered when running `cargo deny check sources`.
# More documentation about the 'sources' section can be found here:
# https://embarkstudios.github.io/cargo-deny/checks/sources/cfg.html
[]
# Lint level for what to happen when a crate from a crate registry that is not
# in the allow list is encountered
= "deny"
# Lint level for what to happen when a crate from a git repository that is not
# in the allow list is encountered
= "deny"
# List of URLs for allowed crate registries. Defaults to the crates.io index
# if not specified. If it is specified but empty, no registries are allowed.
= ["https://github.com/rust-lang/crates.io-index"]