10
10
# when any section or field is not specified in your own configuration
11
11
12
12
# Root options
13
-
13
+ [ graph ]
14
14
# If 1 or more target triples (and optionally, target_features) are specified,
15
15
# only the specified targets will be checked when running `cargo deny check`.
16
16
# This means, if a particular package is only ever used as a target specific
@@ -46,6 +46,8 @@ no-default-features = false
46
46
# If set, these feature will be enabled when collecting metadata. If `--features`
47
47
# is specified on the cmd line they will take precedence over this option.
48
48
# features = []
49
+
50
+ [output ]
49
51
# When outputting inclusion graphs in diagnostics that include features, this
50
52
# option can be used to specify the depth at which feature edges will be added.
51
53
# This option is included since the graphs can be quite large and the addition
@@ -61,30 +63,13 @@ feature-depth = 1
61
63
db-path = " ~/.cargo/advisory-db"
62
64
# The url(s) of the advisory databases to use
63
65
db-urls = [" https://github.com/rustsec/advisory-db" ]
64
- # The lint level for security vulnerabilities
65
- vulnerability = " deny"
66
- # The lint level for unmaintained crates
67
- unmaintained = " warn"
68
66
# The lint level for crates that have been yanked from their source registry
69
67
yanked = " warn"
70
- # The lint level for crates with security notices. Note that as of
71
- # 2019-12-17 there are no security notice advisories in
72
- # https://github.com/rustsec/advisory-db
73
- notice = " warn"
74
68
# A list of advisory IDs to ignore. Note that ignored advisories will still
75
69
# output a note when they are encountered.
76
70
ignore = [
77
71
# "RUSTSEC-0000-0000",
78
72
]
79
- # Threshold for security vulnerabilities, any vulnerability with a CVSS score
80
- # lower than the range specified will be ignored. Note that ignored advisories
81
- # will still output a note when they are encountered.
82
- # * None - CVSS Score 0.0
83
- # * Low - CVSS Score 0.1 - 3.9
84
- # * Medium - CVSS Score 4.0 - 6.9
85
- # * High - CVSS Score 7.0 - 8.9
86
- # * Critical - CVSS Score 9.0 - 10.0
87
- severity-threshold = " Medium"
88
73
89
74
# If this is true, then cargo deny will use the git executable to fetch advisory database.
90
75
# If this is false, then it uses a built-in git library.
@@ -96,38 +81,16 @@ severity-threshold = "Medium"
96
81
# More documentation for the licenses section can be found here:
97
82
# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
98
83
[licenses ]
99
- # The lint level for crates which do not have a detectable license
100
- unlicensed = " deny"
101
84
# List of explicitly allowed licenses
102
85
# See https://spdx.org/licenses/ for list of possible licenses
103
86
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
104
87
allow = [
105
- # "MIT",
106
- # "Apache-2.0",
107
- # "Apache-2.0 WITH LLVM-exception",
88
+ " MIT" ,
89
+ " Apache-2.0" ,
90
+ " Apache-2.0 WITH LLVM-exception" ,
91
+ " Unicode-DFS-2016" ,
108
92
]
109
- # List of explicitly disallowed licenses
110
- # See https://spdx.org/licenses/ for list of possible licenses
111
- # [possible values: any SPDX 3.11 short identifier (+ optional exception)].
112
- deny = [
113
- # "Nokia",
114
- ]
115
- # Lint level for licenses considered copyleft
116
- copyleft = " warn"
117
- # Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
118
- # * both - The license will be approved if it is both OSI-approved *AND* FSF
119
- # * either - The license will be approved if it is either OSI-approved *OR* FSF
120
- # * osi - The license will be approved if it is OSI approved
121
- # * fsf - The license will be approved if it is FSF Free
122
- # * osi-only - The license will be approved if it is OSI-approved *AND NOT* FSF
123
- # * fsf-only - The license will be approved if it is FSF *AND NOT* OSI-approved
124
- # * neither - This predicate is ignored and the default lint level is used
125
- allow-osi-fsf-free = " osi"
126
- # Lint level used when no other predicates are matched
127
- # 1. License isn't in the allow or deny lists
128
- # 2. License isn't copyleft
129
- # 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
130
- default = " deny"
93
+
131
94
# The confidence threshold for detecting a license from license text.
132
95
# The higher the value, the more closely the license text must be to the
133
96
# canonical license text of a valid SPDX license file.
0 commit comments