1717# this list would mean the nix crate, as well as any of its exclusive
1818# dependencies not shared by any other crates, would be ignored, as the target
1919# list here is effectively saying which targets you are building for.
20+ [graph ]
2021targets = []
2122
2223# This section is considered when running `cargo deny check advisories`
@@ -27,39 +28,24 @@ targets = []
2728db-path = " ~/.cargo/advisory-db"
2829# The url(s) of the advisory databases to use
2930db-urls = [" https://github.com/rustsec/advisory-db" ]
30- # The lint level for security vulnerabilities
31- vulnerability = " deny"
3231# The lint level for unmaintained crates
33- unmaintained = " warn "
32+ unmaintained = " workspace "
3433# The lint level for crates that have been yanked from their source registry
3534yanked = " warn"
36- # The lint level for crates with security notices. Note that as of
37- # 2019-12-17 there are no security notice advisories in
38- # https://github.com/rustsec/advisory-db
39- notice = " warn"
4035# A list of advisory IDs to ignore. Note that ignored advisories will still
4136# output a note when they are encountered.
4237ignore = [
4338 # "RUSTSEC-0000-0000",
4439 " RUSTSEC-2020-0071" ,
4540 " RUSTSEC-2020-0159" ,
41+ " RUSTSEC-2021-0139" , # unmaintained: ansi_term 0.12.1
42+ " RUSTSEC-2020-0095" , # unmaintained: difference 2.0.0
4643]
47- # Threshold for security vulnerabilities, any vulnerability with a CVSS score
48- # lower than the range specified will be ignored. Note that ignored advisories
49- # will still output a note when they are encountered.
50- # * None - CVSS Score 0.0
51- # * Low - CVSS Score 0.1 - 3.9
52- # * Medium - CVSS Score 4.0 - 6.9
53- # * High - CVSS Score 7.0 - 8.9
54- # * Critical - CVSS Score 9.0 - 10.0
55- # severity-threshold =
5644
5745# This section is considered when running `cargo deny check licenses`
5846# More documentation for the licenses section can be found here:
5947# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
6048[licenses ]
61- # The lint level for crates which do not have a detectable license
62- unlicensed = " deny"
6349# List of explictly allowed licenses
6450# See https://spdx.org/licenses/ for list of possible licenses
6551# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
@@ -80,24 +66,6 @@ allow = [
8066 " BSL-1.0" , # xxhash-rust
8167 " Unicode-3.0" ,
8268]
83- # List of explictly disallowed licenses
84- # See https://spdx.org/licenses/ for list of possible licenses
85- # [possible values: any SPDX 3.11 short identifier (+ optional exception)].
86- deny = []
87- # Lint level for licenses considered copyleft
88- copyleft = " deny"
89- # Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
90- # * both - The license will be approved if it is both OSI-approved *AND* FSF
91- # * either - The license will be approved if it is either OSI-approved *OR* FSF
92- # * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF
93- # * fsf-only - The license will be approved if is FSF *AND NOT* OSI-approved
94- # * neither - This predicate is ignored and the default lint level is used
95- allow-osi-fsf-free = " neither"
96- # Lint level used when no other predicates are matched
97- # 1. License isn't in the allow or deny lists
98- # 2. License isn't copyleft
99- # 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
100- default = " deny"
10169# The confidence threshold for detecting a license from license text.
10270# The higher the value, the more closely the license text must be to the
10371# canonical license text of a valid SPDX license file.
0 commit comments