1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
# Cargo-deny configuration file
# Settings for dependency graph
[]
# List of target platforms to support
= [
"x86_64-unknown-linux-gnu",
"aarch64-unknown-linux-gnu",
"x86_64-unknown-linux-musl",
"aarch64-apple-darwin",
"x86_64-apple-darwin",
"x86_64-pc-windows-msvc",
]
# Settings for security vulnerabilities and unmaintained crates check
[]
# How to handle unmaintained crates (all, workspace, transitive, none)
= "none"
# List of security vulnerabilities to ignore
# [[advisories.ignore]]
# id = "RUSTSEC-2020-0001"
# reason = "reason"
# License settings
[]
# List of allowed licenses
= [
"MIT",
"Apache-2.0",
"Unicode-3.0",
"Unlicense",
]
# License matching confidence threshold (0.0 ~ 1.0)
= 0.8
# License exceptions for specific crates
# [[licenses.clarify]]
# name = "ring"
# expression = "ISC AND MIT AND OpenSSL"
# license-files = [{ path = "LICENSE", hash = 0xbd0eed23 }]
# Dependency version policy settings
[]
# Whether to allow multiple versions of the same crate (deny, warn, allow)
= "warn"
# Whether to allow wildcard versions (deny, warn, allow)
= "warn"
# List of specific crates to allow
= [
# { name = "some-crate", version = "=1.2.3" },
]
# List of specific crates to ban
# deny = [
# { name = "bad-crate", version = "*" },
# ]
# List of crates to skip (exclude from checks)
# skip = [
# { name = "skipped-crate", version = "*" },
# ]