11# cargo-deny configuration for ClamReef Agent
2- # See https://embarkstudios.github.io/ cargo-deny/ for more information
2+ # Compatible with recent cargo-deny versions
33
44[graph ]
5- # If true, metadata will be collected with `--all-features`. Note that this can't
6- # be toggled off if true, if you want to conditionally enable it, set it to false
7- # here and pass `--all-features` to cargo-deny on the command line.
5+ # If true, metadata will be collected with `--all-features`
86all-features = true
9- # If set, these feature flags will be passed when collecting metadata. This list
10- # will be extended if you supply additional feature flags on the command line
11- features = []
12- # If set, disables the default features for a crate
13- no-default-features = false
147
158[advisories ]
16- # The lint level for security vulnerabilities
9+ # Lint level for security vulnerabilities
1710vulnerability = " deny"
18- # The lint level for unmaintained crates
11+ # Lint level for unmaintained crates
1912unmaintained = " warn"
20- # The lint level for crates that have been yanked from their source registry
13+ # Lint level for yanked crates
2114yanked = " warn"
22- # The lint level for crates with security notices.
15+ # Lint level for crates with security notices
2316notice = " warn"
24- # A list of advisory IDs to ignore. Note that ignored advisories will still
25- # output a note when they are encountered.
26- ignore = [
27- # "RUSTSEC-0000-0000",
28- ]
17+ # Advisory IDs to ignore
18+ ignore = []
2919
3020[licenses ]
31- # The lint level for crates which do not have a detectable license
32- unlicensed = " deny "
21+ # Confidence threshold for detecting a license from license text
22+ confidence-threshold = 0.8
3323# List of explicitly allowed licenses
3424allow = [
3525 " MIT" ,
@@ -50,57 +40,18 @@ deny = [
5040]
5141# Lint level for when multiple versions of the same license are detected
5242copyleft = " warn"
53- # Confidence threshold for detecting a license from license text.
54- confidence-threshold = 0.8
55- # Allow 1 or more licenses on a per-crate basis, so that particular licenses
56- # aren't accepted for every possible crate as with the normal allow list
57- exceptions = [
58- # Each entry is the crate and version constraint, and its the license
59- { allow = [" OpenSSL" ], name = " ring" },
60- ]
61-
62- [[licenses .clarify ]]
63- # The name of the crate the clarification applies to
64- name = " ring"
65- # The optional version constraint for the crate
66- version = " *"
67- # The SPDX expression for the license requirements of the crate
68- expression = " MIT AND ISC AND OpenSSL"
69- # One or more files in the crate's source used as the "source of truth" for
70- # the license expression. If the files are missing, or their checksums do not
71- # match, the clarification will fail
72- license-files = [
73- { path = " LICENSE" , hash = 0xbd0eed23 }
74- ]
43+ # The default lint level for licenses not explicitly allowed or denied
44+ default = " deny"
7545
7646[bans ]
7747# Lint level for when multiple versions of the same crate are detected
7848multiple-versions = " warn"
7949# Lint level for when a crate version requirement is `*`
8050wildcards = " allow"
81- # The graph highlighting used when creating dotgraphs for crates
82- # with multiple versions
83- highlight = " all"
84- # List of crates that are allowed to have multiple versions
85- allow = [
86- # { name = "ansi_term", version = "=0.11.0" },
87- ]
51+ # List of crates that are allowed. Use with care!
52+ allow = []
8853# List of crates to deny
89- deny = [
90- # Each entry the name of a crate and a version range. If version is
91- # not specified, all versions will be matched.
92- # { name = "ansi_term", version = "=0.11.0" },
93- ]
94- # Certain crates/versions that will be skipped when doing duplicate detection.
95- skip = [
96- # { name = "ansi_term", version = "=0.11.0" },
97- ]
98- # Similarly to `skip` allows you to skip certain crates from duplicate
99- # detection. Unlike skip, it also includes the entire tree of transitive
100- # dependencies starting from the specified crate, up to a certain depth.
101- skip-tree = [
102- # { name = "ansi_term", version = "=0.11.0", depth = 20 },
103- ]
54+ deny = []
10455
10556[sources ]
10657# Lint level for what to happen when a crate from a crate registry that is
@@ -109,8 +60,7 @@ unknown-registry = "warn"
10960# Lint level for what to happen when a crate from a git repository that is not
11061# in the allow list is encountered
11162unknown-git = " warn"
112- # List of URLs for allowed crate registries. Defaults to the crates.io index
113- # if not specified. If it is specified but empty, no registries are allowed.
63+ # List of URLs for allowed crate registries
11464allow-registry = [" https://github.com/rust-lang/crates.io-index" ]
11565# List of URLs for allowed Git repositories
11666allow-git = []
0 commit comments