|  | 
|  | 1 | +# This template contains all of the possible sections and their default values | 
|  | 2 | + | 
|  | 3 | +# Note that all fields that take a lint level have these possible values: | 
|  | 4 | +# * deny - An error will be produced and the check will fail | 
|  | 5 | +# * warn - A warning will be produced, but the check will not fail | 
|  | 6 | +# * allow - No warning or error will be produced, though in some cases a note | 
|  | 7 | +# will be | 
|  | 8 | + | 
|  | 9 | +# The values provided in this template are the default values that will be used | 
|  | 10 | +# when any section or field is not specified in your own configuration | 
|  | 11 | + | 
|  | 12 | +# If 1 or more target triples (and optionally, target_features) are specified, | 
|  | 13 | +# only the specified targets will be checked when running `cargo deny check`. | 
|  | 14 | +# This means, if a particular package is only ever used as a target specific | 
|  | 15 | +# dependency, such as, for example, the `nix` crate only being used via the | 
|  | 16 | +# `target_family = "unix"` configuration, that only having windows targets in | 
|  | 17 | +# this list would mean the nix crate, as well as any of its exclusive | 
|  | 18 | +# dependencies not shared by any other crates, would be ignored, as the target | 
|  | 19 | +# list here is effectively saying which targets you are building for. | 
|  | 20 | +targets = [ | 
|  | 21 | +    # The triple can be any string, but only the target triples built in to | 
|  | 22 | +    # rustc (as of 1.40) can be checked against actual config expressions | 
|  | 23 | +    #{ triple = "x86_64-unknown-linux-musl" }, | 
|  | 24 | +    # You can also specify which target_features you promise are enabled for a | 
|  | 25 | +    # particular target. target_features are currently not validated against | 
|  | 26 | +    # the actual valid features supported by the target architecture. | 
|  | 27 | +    #{ triple = "wasm32-unknown-unknown", features = ["atomics"] }, | 
|  | 28 | +] | 
|  | 29 | + | 
|  | 30 | +# This section is considered when running `cargo deny check advisories` | 
|  | 31 | +# More documentation for the advisories section can be found here: | 
|  | 32 | +# https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html | 
|  | 33 | +[advisories] | 
|  | 34 | +# The path where the advisory database is cloned/fetched into | 
|  | 35 | +db-path = "~/.cargo/advisory-db" | 
|  | 36 | +# The url(s) of the advisory databases to use | 
|  | 37 | +# db-urls = ["https://github.com/rustsec/advisory-db"] | 
|  | 38 | +db-urls = ["https://gitee.com/mirrors_RustSec/advisory-db"] | 
|  | 39 | +# The lint level for security vulnerabilities | 
|  | 40 | +vulnerability = "deny" | 
|  | 41 | +# The lint level for unmaintained crates | 
|  | 42 | +unmaintained = "warn" | 
|  | 43 | +# The lint level for crates that have been yanked from their source registry | 
|  | 44 | +yanked = "warn" | 
|  | 45 | +# The lint level for crates with security notices. Note that as of | 
|  | 46 | +# 2019-12-17 there are no security notice advisories in | 
|  | 47 | +# https://github.com/rustsec/advisory-db | 
|  | 48 | +notice = "warn" | 
|  | 49 | +# A list of advisory IDs to ignore. Note that ignored advisories will still | 
|  | 50 | +# output a note when they are encountered. | 
|  | 51 | +ignore = [ | 
|  | 52 | +    #"RUSTSEC-0000-0000", | 
|  | 53 | +] | 
|  | 54 | +# Threshold for security vulnerabilities, any vulnerability with a CVSS score | 
|  | 55 | +# lower than the range specified will be ignored. Note that ignored advisories | 
|  | 56 | +# will still output a note when they are encountered. | 
|  | 57 | +# * None - CVSS Score 0.0 | 
|  | 58 | +# * Low - CVSS Score 0.1 - 3.9 | 
|  | 59 | +# * Medium - CVSS Score 4.0 - 6.9 | 
|  | 60 | +# * High - CVSS Score 7.0 - 8.9 | 
|  | 61 | +# * Critical - CVSS Score 9.0 - 10.0 | 
|  | 62 | +#severity-threshold = | 
|  | 63 | + | 
|  | 64 | +# This section is considered when running `cargo deny check licenses` | 
|  | 65 | +# More documentation for the licenses section can be found here: | 
|  | 66 | +# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html | 
|  | 67 | +[licenses] | 
|  | 68 | +# The lint level for crates which do not have a detectable license | 
|  | 69 | +unlicensed = "allow" | 
|  | 70 | +# List of explicitly allowed licenses | 
|  | 71 | +# See https://spdx.org/licenses/ for list of possible licenses | 
|  | 72 | +# [possible values: any SPDX 3.7 short identifier (+ optional exception)]. | 
|  | 73 | +allow = [ | 
|  | 74 | +    "MIT", | 
|  | 75 | +    "Apache-2.0", | 
|  | 76 | +    "Apache-2.0 WITH LLVM-exception", | 
|  | 77 | +    "ISC", | 
|  | 78 | +    "Unicode-DFS-2016", | 
|  | 79 | +    "BSD-3-Clause", | 
|  | 80 | +    "BSD-2-Clause", | 
|  | 81 | +] | 
|  | 82 | +# List of explicitly disallowed licenses | 
|  | 83 | +# See https://spdx.org/licenses/ for list of possible licenses | 
|  | 84 | +# [possible values: any SPDX 3.7 short identifier (+ optional exception)]. | 
|  | 85 | +deny = [ | 
|  | 86 | +    #"Nokia", | 
|  | 87 | +] | 
|  | 88 | +# Lint level for licenses considered copyleft | 
|  | 89 | +copyleft = "warn" | 
|  | 90 | +# Blanket approval or denial for OSI-approved or FSF Free/Libre licenses | 
|  | 91 | +# * both - The license will be approved if it is both OSI-approved *AND* FSF | 
|  | 92 | +# * either - The license will be approved if it is either OSI-approved *OR* FSF | 
|  | 93 | +# * osi-only - The license will be approved if is OSI-approved *AND NOT* FSF | 
|  | 94 | +# * fsf-only - The license will be approved if is FSF *AND NOT* OSI-approved | 
|  | 95 | +# * neither - This predicate is ignored and the default lint level is used | 
|  | 96 | +allow-osi-fsf-free = "neither" | 
|  | 97 | +# Lint level used when no other predicates are matched | 
|  | 98 | +# 1. License isn't in the allow or deny lists | 
|  | 99 | +# 2. License isn't copyleft | 
|  | 100 | +# 3. License isn't OSI/FSF, or allow-osi-fsf-free = "neither" | 
|  | 101 | +default = "deny" | 
|  | 102 | +# The confidence threshold for detecting a license from license text. | 
|  | 103 | +# The higher the value, the more closely the license text must be to the | 
|  | 104 | +# canonical license text of a valid SPDX license file. | 
|  | 105 | +# [possible values: any between 0.0 and 1.0]. | 
|  | 106 | +confidence-threshold = 0.8 | 
|  | 107 | +# Allow 1 or more licenses on a per-crate basis, so that particular licenses | 
|  | 108 | +# aren't accepted for every possible crate as with the normal allow list | 
|  | 109 | +exceptions = [ | 
|  | 110 | +    # Each entry is the crate and version constraint, and its specific allow | 
|  | 111 | +    # list | 
|  | 112 | +    #{ allow = ["Zlib"], name = "adler32", version = "*" }, | 
|  | 113 | +] | 
|  | 114 | + | 
|  | 115 | +# Some crates don't have (easily) machine readable licensing information, | 
|  | 116 | +# adding a clarification entry for it allows you to manually specify the | 
|  | 117 | +# licensing information | 
|  | 118 | +#[[licenses.clarify]] | 
|  | 119 | +# The name of the crate the clarification applies to | 
|  | 120 | +#name = "ring" | 
|  | 121 | +# The optional version constraint for the crate | 
|  | 122 | +#version = "*" | 
|  | 123 | +# The SPDX expression for the license requirements of the crate | 
|  | 124 | +#expression = "MIT AND ISC AND OpenSSL" | 
|  | 125 | +# One or more files in the crate's source used as the "source of truth" for | 
|  | 126 | +# the license expression. If the contents match, the clarification will be used | 
|  | 127 | +# when running the license check, otherwise the clarification will be ignored | 
|  | 128 | +# and the crate will be checked normally, which may produce warnings or errors | 
|  | 129 | +# depending on the rest of your configuration | 
|  | 130 | +#license-files = [ | 
|  | 131 | +# Each entry is a crate relative path, and the (opaque) hash of its contents | 
|  | 132 | +#{ path = "LICENSE", hash = 0xbd0eed23 } | 
|  | 133 | +#] | 
|  | 134 | + | 
|  | 135 | +[licenses.private] | 
|  | 136 | +# If true, ignores workspace crates that aren't published, or are only | 
|  | 137 | +# published to private registries | 
|  | 138 | +ignore = false | 
|  | 139 | +# One or more private registries that you might publish crates to, if a crate | 
|  | 140 | +# is only published to private registries, and ignore is true, the crate will | 
|  | 141 | +# not have its license(s) checked | 
|  | 142 | +registries = [ | 
|  | 143 | +    #"https://sekretz.com/registry | 
|  | 144 | +] | 
|  | 145 | + | 
|  | 146 | +# This section is considered when running `cargo deny check bans`. | 
|  | 147 | +# More documentation about the 'bans' section can be found here: | 
|  | 148 | +# https://embarkstudios.github.io/cargo-deny/checks/bans/cfg.html | 
|  | 149 | +[bans] | 
|  | 150 | +# Lint level for when multiple versions of the same crate are detected | 
|  | 151 | +multiple-versions = "warn" | 
|  | 152 | +# Lint level for when a crate version requirement is `*` | 
|  | 153 | +wildcards = "allow" | 
|  | 154 | +# The graph highlighting used when creating dotgraphs for crates | 
|  | 155 | +# with multiple versions | 
|  | 156 | +# * lowest-version - The path to the lowest versioned duplicate is highlighted | 
|  | 157 | +# * simplest-path - The path to the version with the fewest edges is highlighted | 
|  | 158 | +# * all - Both lowest-version and simplest-path are used | 
|  | 159 | +highlight = "all" | 
|  | 160 | +# List of crates that are allowed. Use with care! | 
|  | 161 | +allow = [ | 
|  | 162 | +    #{ name = "ansi_term", version = "=0.11.0" }, | 
|  | 163 | +] | 
|  | 164 | +# List of crates to deny | 
|  | 165 | +deny = [ | 
|  | 166 | +    # Each entry the name of a crate and a version range. If version is | 
|  | 167 | +    # not specified, all versions will be matched. | 
|  | 168 | +    #{ name = "ansi_term", version = "=0.11.0" }, | 
|  | 169 | +    # | 
|  | 170 | +    # Wrapper crates can optionally be specified to allow the crate when it | 
|  | 171 | +    # is a direct dependency of the otherwise banned crate | 
|  | 172 | +    #{ name = "ansi_term", version = "=0.11.0", wrappers = [] }, | 
|  | 173 | +] | 
|  | 174 | +# Certain crates/versions that will be skipped when doing duplicate detection. | 
|  | 175 | +skip = [ | 
|  | 176 | +    #{ name = "ansi_term", version = "=0.11.0" }, | 
|  | 177 | +] | 
|  | 178 | +# Similarly to `skip` allows you to skip certain crates during duplicate | 
|  | 179 | +# detection. Unlike skip, it also includes the entire tree of transitive | 
|  | 180 | +# dependencies starting at the specified crate, up to a certain depth, which is | 
|  | 181 | +# by default infinite | 
|  | 182 | +skip-tree = [ | 
|  | 183 | +    #{ name = "ansi_term", version = "=0.11.0", depth = 20 }, | 
|  | 184 | +] | 
|  | 185 | + | 
|  | 186 | +# This section is considered when running `cargo deny check sources`. | 
|  | 187 | +# More documentation about the 'sources' section can be found here: | 
|  | 188 | +# https://embarkstudios.github.io/cargo-deny/checks/sources/cfg.html | 
|  | 189 | +[sources] | 
|  | 190 | +# Lint level for what to happen when a crate from a crate registry that is not | 
|  | 191 | +# in the allow list is encountered | 
|  | 192 | +unknown-registry = "warn" | 
|  | 193 | +# Lint level for what to happen when a crate from a git repository that is not | 
|  | 194 | +# in the allow list is encountered | 
|  | 195 | +unknown-git = "warn" | 
|  | 196 | +# List of URLs for allowed crate registries. Defaults to the crates.io index | 
|  | 197 | +# if not specified. If it is specified but empty, no registries are allowed. | 
|  | 198 | +allow-registry = [ | 
|  | 199 | +    # "https://github.com/rust-lang/crates.io-index", | 
|  | 200 | +    "https://mirrors.ustc.edu.cn/crates.io-index", | 
|  | 201 | +] | 
|  | 202 | +# List of URLs for allowed Git repositories | 
|  | 203 | +allow-git = [ | 
|  | 204 | +    "git://mirrors.ustc.edu.cn/crates.io-index", | 
|  | 205 | +] | 
|  | 206 | + | 
|  | 207 | +[sources.allow-org] | 
|  | 208 | +# 1 or more github.com organizations to allow git sources for | 
|  | 209 | +github = [] | 
|  | 210 | +# 1 or more gitlab.com organizations to allow git sources for | 
|  | 211 | +gitlab = [] | 
|  | 212 | +# 1 or more bitbucket.org organizations to allow git sources for | 
|  | 213 | +bitbucket = [] | 
0 commit comments