1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
[]
# The path where the output will be written to, the extension will determine the
# output format, supported extensions are: svg, dot, png, jpg
#output = "target/deps.svg"
# The deps field determines which dependencies will be included in the graph
= false
= false
# The targets field determines which targets will be included in the graph
= []
[]
# The confidence threshold for detecting a license from a license text.
# The higher the value, the more confident the tool needs to be that the
# detected license is correct. The default is 0.8.
= 0.8
# List of explicitly allowed licenses
# See https://spdx.org/licenses/ for list of possible licenses
= [
"Apache-2.0",
"Apache-2.0 WITH LLVM-exception",
"MIT",
"BSD-2-Clause",
"BSD-3-Clause",
"ISC",
"Unicode-DFS-2016",
]
# List of explicitly disallowed licenses
# See https://spdx.org/licenses/ for list of possible licenses
= ["GPL-2.0", "GPL-3.0", "AGPL-1.0", "AGPL-3.0"]
# Lint level for when multiple versions of the same license are detected
= "warn"
# Confidence threshold for detecting a license from a license text.
# The higher the value, the more confident the tool needs to be that the
# detected license is correct. The default is 0.8.
# confidence-threshold = 0.8
# Allow 1 or more licenses on a per-crate basis, so that particular licenses
# aren't accepted for every possible crate as with the normal allow list
= [
# Each entry is the crate and version constraint, and its the license
#{ allow = ["Zlib"], name = "adler32", version = "*" },
]
# Some crates don't have (easily) machine readable licensing information,
# adding a clarification or license text here will take precedence over
# the detection code
[[]]
# The name of the crate the clarification applies to
= "ring"
# The optional version constraint for the crate
#version = "*"
# The SPDX expression for the license requirements of the crate
= "MIT AND ISC AND OpenSSL"
# One or more files in the crate's source used as the "source of truth" for
# the license expression. If the files are missing, or do not contain the
# specified license text, the clarification will be ignored
= [{ = "LICENSE", = 0xbd0eed23 }]
[]
# Lint level for when multiple versions of the same crate are detected
= "warn"
# Lint level for when a crate version requirement is `*`
= "allow"
# The confidence threshold for detecting a license from a license text.
# The higher the value, the more confident the tool needs to be that the
# detected license is correct. The default is 0.8.
= "all"
# List of crates that are allowed. Use with care!
= []
# List of crates to deny
= []
# Certain crates/versions that will be skipped when doing duplicate detection.
= []
# Similarly to `skip` allows you to skip certain crates from being checked. Unlike `skip`,
# `skip-tree` skips the crate and all of its dependencies entirely.
= []
[]
# The path where the advisory database is cloned/fetched into
= "~/.cargo/advisory-db"
# The url(s) of the advisory databases to use
= ["https://github.com/rustsec/advisory-db"]
# The lint level for security vulnerabilities
= "deny"
# The lint level for unmaintained crates
= "warn"
# The lint level for crates that have been yanked from their source registry
= "warn"
# The lint level for crates with security notices. Note that as of
# 2019-12-17 there are no security notice advisories in
# https://github.com/rustsec/advisory-db
= "warn"
# A list of advisory IDs to ignore. Note that ignored advisories will still
# output a note when they are encountered.
= [
#"RUSTSEC-0000-0000",
]