18
18
# dependencies not shared by any other crates, would be ignored, as the target
19
19
# list here is effectively saying which targets you are building for.
20
20
targets = [
21
- # The triple can be any string, but only the target triples built in to
22
- # rustc (as of 1.40) can be checked against actual config expressions
23
- #{ triple = "x86_64-unknown-linux-musl" },
24
- # You can also specify which target_features you promise are enabled for a
25
- # particular target. target_features are currently not validated against
26
- # the actual valid features supported by the target architecture.
27
- #{ triple = "wasm32-unknown-unknown", features = ["atomics"] },
21
+ # The triple can be any string, but only the target triples built in to
22
+ # rustc (as of 1.40) can be checked against actual config expressions
23
+ # { triple = "x86_64-unknown-linux-musl" },
24
+ # You can also specify which target_features you promise are enabled for a
25
+ # particular target. target_features are currently not validated against
26
+ # the actual valid features supported by the target architecture.
27
+ # { triple = "wasm32-unknown-unknown", features = ["atomics"] },
28
28
]
29
29
30
30
# This section is considered when running `cargo deny check advisories`
@@ -48,7 +48,7 @@ notice = "warn"
48
48
# A list of advisory IDs to ignore. Note that ignored advisories will still
49
49
# output a note when they are encountered.
50
50
ignore = [
51
- # "RUSTSEC-0000-0000",
51
+ # "RUSTSEC-0000-0000",
52
52
]
53
53
# Threshold for security vulnerabilities, any vulnerability with a CVSS score
54
54
# lower than the range specified will be ignored. Note that ignored advisories
@@ -69,16 +69,12 @@ unlicensed = "warn"
69
69
# List of explicitly allowed licenses
70
70
# See https://spdx.org/licenses/ for list of possible licenses
71
71
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
72
- allow = [
73
- " MIT" ,
74
- " Apache-2.0" ,
75
- " Apache-2.0 WITH LLVM-exception" ,
76
- ]
72
+ allow = [" MIT" , " Apache-2.0" , " Apache-2.0 WITH LLVM-exception" ]
77
73
# List of explicitly disallowed licenses
78
74
# See https://spdx.org/licenses/ for list of possible licenses
79
75
# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
80
76
deny = [
81
- # "Nokia",
77
+ # "Nokia",
82
78
]
83
79
# Lint level for licenses considered copyleft
84
80
copyleft = " warn"
@@ -102,9 +98,9 @@ confidence-threshold = 0.8
102
98
# Allow 1 or more licenses on a per-crate basis, so that particular licenses
103
99
# aren't accepted for every possible crate as with the normal allow list
104
100
exceptions = [
105
- # Each entry is the crate and version constraint, and its specific allow
106
- # list
107
- #{ allow = ["Zlib"], name = "adler32", version = "*" },
101
+ # Each entry is the crate and version constraint, and its specific allow
102
+ # list
103
+ # { allow = ["Zlib"], name = "adler32", version = "*" },
108
104
]
109
105
110
106
# Some crates don't have (easily) machine readable licensing information,
@@ -123,8 +119,8 @@ exceptions = [
123
119
# and the crate will be checked normally, which may produce warnings or errors
124
120
# depending on the rest of your configuration
125
121
# license-files = [
126
- # Each entry is a crate relative path, and the (opaque) hash of its contents
127
- #{ path = "LICENSE", hash = 0xbd0eed23 }
122
+ # Each entry is a crate relative path, and the (opaque) hash of its contents
123
+ # { path = "LICENSE", hash = 0xbd0eed23 }
128
124
# ]
129
125
130
126
[licenses .private ]
@@ -137,7 +133,7 @@ ignore = false
137
133
# is only published to private registries, and ignore is true, the crate will
138
134
# not have its license(s) checked
139
135
registries = [
140
- # "https://sekretz.com/registry
136
+ # "https://sekretz.com/registry
141
137
]
142
138
143
139
# This section is considered when running `cargo deny check bans`.
@@ -156,28 +152,28 @@ wildcards = "allow"
156
152
highlight = " all"
157
153
# List of crates that are allowed. Use with care!
158
154
allow = [
159
- #{ name = "ansi_term", version = "=0.11.0" },
155
+ # { name = "ansi_term", version = "=0.11.0" },
160
156
]
161
157
# List of crates to deny
162
158
deny = [
163
- # Each entry the name of a crate and a version range. If version is
164
- # not specified, all versions will be matched.
165
- #{ name = "ansi_term", version = "=0.11.0" },
166
- #
167
- # Wrapper crates can optionally be specified to allow the crate when it
168
- # is a direct dependency of the otherwise banned crate
169
- #{ name = "ansi_term", version = "=0.11.0", wrappers = [] },
159
+ # Each entry the name of a crate and a version range. If version is
160
+ # not specified, all versions will be matched.
161
+ # { name = "ansi_term", version = "=0.11.0" },
162
+ #
163
+ # Wrapper crates can optionally be specified to allow the crate when it
164
+ # is a direct dependency of the otherwise banned crate
165
+ # { name = "ansi_term", version = "=0.11.0", wrappers = [] },
170
166
]
171
167
# Certain crates/versions that will be skipped when doing duplicate detection.
172
168
skip = [
173
- #{ name = "ansi_term", version = "=0.11.0" },
169
+ # { name = "ansi_term", version = "=0.11.0" },
174
170
]
175
171
# Similarly to `skip` allows you to skip certain crates during duplicate
176
172
# detection. Unlike skip, it also includes the entire tree of transitive
177
173
# dependencies starting at the specified crate, up to a certain depth, which is
178
174
# by default infinite
179
175
skip-tree = [
180
- #{ name = "ansi_term", version = "=0.11.0", depth = 20 },
176
+ # { name = "ansi_term", version = "=0.11.0", depth = 20 },
181
177
]
182
178
183
179
# This section is considered when running `cargo deny check sources`.
0 commit comments