1010# when any section or field is not specified in your own configuration
1111
1212# Root options
13-
13+ [ graph ]
1414# If 1 or more target triples (and optionally, target_features) are specified,
1515# only the specified targets will be checked when running `cargo deny check`.
1616# This means, if a particular package is only ever used as a target specific
@@ -46,12 +46,6 @@ no-default-features = false
4646# If set, these feature will be enabled when collecting metadata. If `--features`
4747# is specified on the cmd line they will take precedence over this option.
4848# features = []
49- # When outputting inclusion graphs in diagnostics that include features, this
50- # option can be used to specify the depth at which feature edges will be added.
51- # This option is included since the graphs can be quite large and the addition
52- # of features from the crate(s) to all of the graph roots can be far too verbose.
53- # This option can be overridden via `--feature-depth` on the cmd line
54- feature-depth = 1
5549
5650# This section is considered when running `cargo deny check advisories`
5751# More documentation for the advisories section can be found here:
@@ -61,22 +55,19 @@ feature-depth = 1
6155db-path = " ~/.cargo/advisory-db"
6256# The url(s) of the advisory databases to use
6357db-urls = [" https://github.com/rustsec/advisory-db" ]
64- # The lint level for security vulnerabilities
65- vulnerability = " deny"
6658# The lint level for unmaintained crates
67- unmaintained = " warn "
59+ unmaintained = " workspace "
6860# The lint level for crates that have been yanked from their source registry
6961yanked = " warn"
70- # The lint level for crates with security notices. Note that as of
71- # 2019-12-17 there are no security notice advisories in
72- # https://github.com/rustsec/advisory-db
73- notice = " warn"
7462# A list of advisory IDs to ignore. Note that ignored advisories will still
7563# output a note when they are encountered.
7664ignore = [
7765# NOTE: This is a TEMPORARY recognition of the cbindgen use of clap+atty that
7866# requires clap to update its dependencies
79- " RUSTSEC-2021-0145" ,
67+ # "RUSTSEC-2021-0145",
68+ # This advisory is that async-std is deprecated in favour of smol
69+ # But this is only used as a dev dependency in tests
70+ " RUSTSEC-2025-0052" ,
8071]
8172# Threshold for security vulnerabilities, any vulnerability with a CVSS score
8273# lower than the range specified will be ignored. Note that ignored advisories
@@ -98,8 +89,6 @@ ignore = [
9889# More documentation for the licenses section can be found here:
9990# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
10091[licenses ]
101- # The lint level for crates which do not have a detectable license
102- unlicensed = " deny"
10392# List of explicitly allowed licenses
10493# See https://spdx.org/licenses/ for list of possible licenses
10594# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
@@ -110,6 +99,7 @@ allow = [
11099 " CDLA-Permissive-2.0" ,
111100 " ISC" ,
112101 " OpenSSL" ,
102+ " BlueOak-1.0.0" ,
113103 # Unicode-DFS-2016 is superseded by Unicode-3.0
114104 # See https://opensource.org/license/unicode-inc-license-agreement-data-files-and-software
115105 " Unicode-DFS-2016" ,
@@ -118,26 +108,6 @@ allow = [
118108 # Considered Copyleft, but permitted in this project
119109 " MPL-2.0" ,
120110]
121- # List of explicitly disallowed licenses
122- # See https://spdx.org/licenses/ for list of possible licenses
123- # [possible values: any SPDX 3.11 short identifier (+ optional exception)].
124- deny = [
125- # "Nokia",
126- ]
127- # Lint level for licenses considered copyleft
128- copyleft = " warn"
129- # Blanket approval or denial for OSI-approved or FSF Free/Libre licenses
130- # * both - The license will be approved if it is both OSI-approved *AND* FSF
131- # * either - The license will be approved if it is either OSI-approved *OR* FSF
132- # * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF
133- # * fsf-only - The license will be approved if is FSF *AND NOT* OSI-approved
134- # * neither - This predicate is ignored and the default lint level is used
135- allow-osi-fsf-free = " neither"
136- # Lint level used when no other predicates are matched
137- # 1. License isn't in the allow or deny lists
138- # 2. License isn't copyleft
139- # 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither"
140- default = " deny"
141111# The confidence threshold for detecting a license from license text.
142112# The higher the value, the more closely the license text must be to the
143113# canonical license text of a valid SPDX license file.
@@ -276,8 +246,8 @@ allow-git = []
276246
277247[sources .allow-org ]
278248# 1 or more github.com organizations to allow git sources for
279- # github = [""]
249+ github = [" veraison " ]
280250# 1 or more gitlab.com organizations to allow git sources for
281251# gitlab = [""]
282252# 1 or more bitbucket.org organizations to allow git sources for
283- # bitbucket = [""]
253+ # bitbucket = [""]
0 commit comments